Mobile Devices Flashcards

1
Q

In what 3 major ways do notebooks and other portable deviced differ from desktop systems?

A

Notebooks and other portable devices differ from desktop systems in three major ways:

  • Portable devices are built to be lighter and easier to carry. The smaller form causes components to be placed in closer proximity, which has historically caused technical development to lag behind that of desktops.
  • Portable devices often run on battery power. Individual components are engineered to minimize the power consumption in order to maximize battery life.
  • Because the devices are built to be carried around, they also must withstand more wear and tear
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Describe a laptop (or notebook)

A

A laptop (or notebook) is a portable version of a desktop system. It often has similar hardware and runs similar software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Describe a Tablet PC

A

A Tablet PC is a notebook that includes a touchscreen to allow input by tapping the screen, dragging objects, or through handwriting recognition. A stylus is a special pen designed to be used by these touchscreens for input. Tablet PCs might run special versions of the operating system to enable touchscreen input

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Describe a PDA

A

A PDA (Personal Digital Assistant) is a hand-held device, typically with a small touchscreen. A PDA uses special hardware and software that provides basic productivity applications (email, word processing, spreadsheets).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Describe a smart phone

A

A smart phone is a phone that includes functions of a PDA. As functions are added to smart phones, the line between smart phones and PDAs is disappearing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Describe a netbook

A

A netbook is a notebook computer with a smaller form factor (10-11 inch screen or smaller) and custom hardware designed to maximize battery life (from 6-11 hours on a single charge). Originally, netbooks used a special operating system that often did not support all of the features of a normal desktop operating system. Increasingly, netbooks can run a regular version of the operating system, although the reduced hardware might still limit their usefulness to email, word processing, and multimedia. Netbooks typically do not have integrated CD/DVD drives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Describe a Processor (laptop component)

A

Processors built especially for laptop computers have lower power consumption requirements and produce less heat than desktop processors.

  • On most systems, you can configure the processor to use a lower bus speed when running from battery power, thereby conserving battery life.
  • Many mobile processors are capable of automatic throttling to turn off extra cores or reduce the speed to conserve energy.
  • Processors do not have the large heat sink and fan combinations to dissipate heat. Rather, heat is controlled by minimizing power consumption and small fans that draw away heat
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Describe memory (laptop component)

A

Laptop memory uses SODIMM and UniDIMM packages with SDRAM and DDR/DDR2/DDR3/DDR4 memory. These modules are sometimes called MicroDIMMs.

Many notebooks come with a base amount of memory built onto the motherboard and one or two additional slots. When replacing notebook memory, make sure the size of modules you purchase are supported by the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Describe keyboard (laptop component)

A

Notebook keyboards are smaller than standard keyboards. Keys are often a bit smaller and closer together. Keys such as the number pad and some function keys might be left off, but are accessible by pressing a special Fn key to provide alternate functions for regular keys.

You can use a USB port to connect an external keyboard; some laptops include a PS/2 port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Describe pointing devices (laptop component)

A

Instead of a mouse, notebooks use one (or more) of the following devices:

  • Pointing sticks are small knobs in the center of the keyboard. Pushing on this knob moves the cursor.
  • The touchpad is located below the keyboard. Moving your finger across the pad moves the mouse. You can also tap the touchpad to click the mouse.
  • Buttons below the keyboard replace mouse buttons for clicks, double-clicks, and right-clicks.
  • A digitizer pad is used in laptop and PDA systems to receive input. Input is written onto the pad with a stylus pen and then those motions are transferred into data that is processed by the system.
  • You can also use the PS/2 connector or a USB connector to connect an external mouse.

Touchpads are more common than pointing sticks. Notebooks with a pointing stick often come with a touchpad as well

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Describe video (laptop component)

A

Be aware of the following facts about screens and video cards:

  • XGA screens have the normal 4:3 aspect ratio. WXGA screens use a widescreen aspect ratio.
  • Some screens promise brighter display for crisper viewing or better viewing outdoors.
  • The video controller is either integrated onto the motherboard or it might be a separate board that can be replaced.
  • Video memory typically shares a portion of the system memory, although some notebooks have dedicated video memory.
  • Most notebooks have an external video port that you can use to display the screen on a projector or a monitor. To show the display on the external monitor, change the display settings in the operating system or use the Fn keyboard combination.
  • Some notebooks have special touchscreens that can rotate 180 degrees, allowing the notebook to close and the screen to still be visible.
  • Some notebooks allow you to detach or remove the screen from the keyboard. This turns the notebook into a tablet.
  • Some laptops have multiple display screens. You can always connect a second monitor to a laptop if you need dual display functionality
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Describe networking (laptop component)

A

Most notebooks include built-in networking devices such as an Ethernet port, a modem port, wireless, Bluetooth, and/or infrared.

  • Wireless networking capabilities are often provided by a small card that plugs into an internal mini-PCI slot (located under the keyboard or accessible through the back). The wireless antennae might be a wire that extends around the screen.
  • You can use USB or ExpressCards to add missing or malfunctioning networking features
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Describe internal hard disks (laptop component)

A

Internal hard disks are typically 2.5” or 3.5” and very thin compared to desktop hard disks. SATA, solid state drives, and Flash drives are used in portable devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Describe Port Replicator/Docking Station (laptop component)

A

A port replicator or docking station attaches to a laptop computer and allows you to connect multiple devices such as a mouse, keyboard, printer, network connection, or additional monitors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Explain the Fn key

A

The Fn key (short for function) is a keyboard modifier key that allows the keyboard to perform additional functions without needing to add additional keys. The Fn key is typically found on notebooks (because of their compact keyboard design) and on full-sized multimedia keyboards. Keys that have a special function when pressed in conjunction with the Fn key can be identified by a small icon or word, which is typically the same color as the Fn key. For example, the F1 key on a notebook might have a small moon icon in the corner of the key, indicating that the Fn+F1 key combination will put the notebook to sleep

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What’s this icon

A

Airplane mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What’s this icon

A

Bluetooth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What’s this icon

A

Dual displays

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What’s this icon

A

GPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What’s this icon

A

Keyboard backlight

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What’s this icon

A

Screen brightness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What’s this icon

A

Screen orientation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What’s this icon

A

Touchpad off/on

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What’s this icon

A

Volume

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What’s this icon

A

Wireless/cellular (on/off)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What are common ways laptops save power?

A

Laptop systems are designed to use as little power as possible. Common ways laptops save power are:

  • Turning off any drives that aren’t currently being used.
  • Stepping down the bus speed in the CPU.
  • Turning off the monitor after a period of inactivity.

Putting the computer to sleep or turning it off automatically

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Failing to use the correct adapter can cause a laptop to what?

A

Failing to use the correct adapter can cause a laptop to:

  • Receive insufficient power to turn on.
  • Receive insufficient power to charge the battery.
  • Receive an excess of power that will fry the system
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What are the characteristics of Nickel Metal Hydride (NiMH) laptop battery?

A
  • Does not develop a memory.
  • 40% longer lifetime than nickel cadmium.
  • Greater charge capacity than nickel cadmium.
  • Less toxic than nickel cadmium.
  • Slightly more expensive than nickel cadmium.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What are the characteristics of Nickel Cadmium (NiCad) laptop battery?

A
  • Develops a memory and begins to store less power as it is repeatedly recharged. To avoid battery memory problems, completely drain the battery before recharging it.
  • Takes up more physical space than lithium ion batteries.
  • Very heat sensitive.
  • No longer used on new laptops.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What are the characteristics of Lithium Ion (Li-Ion) laptop battery?

A
  • Does not develop a memory
  • A rechargeable battery with twice the capacity of a nickel cadmium battery with significantly increased stability and safety.
  • Takes up less physical space and weighs less than nickel cadmium or nickel metal hydride batteries for comparable power output.
  • Has a shorter lifespan than nickel metal hydride.
  • Not heat sensitive like nickel cadmium.
  • Cannot be overcharged.
  • More expensive than nickel cadmium or nickel metal hydride.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What are the characteristics of Fuel Cell laptop battery?

A
  • A growing technology that is still developing and is being implemented into the small electronic device market.
  • Not truly a battery.
  • Offers instant power and uses replaceable cartridges.
  • Rather than being recharged (taking hours), when its charge becomes low, the fuel is merely replaced (taking seconds).
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Explain Advanced Configuration and Power Interface (ACPI) standards

A

The ability for a computer to manage devices to conserve power is made possible by implementing the Advanced Configuration and Power Interface (ACPI) standards.

  • ACPI is also known as Instant Available and Always On. Is often mistakenly referred to as APM (an older standard).
  • The operating system, BIOS, and devices interact to manage power.
  • Users can configure settings that identify events and power consumption characteristics. For example, you can configure the display to turn off after 5 minutes of inactivity.
  • The system can monitor the battery and other device states and dynamically change power consumption on one or more devices.
  • ACPI supports Plug and Play
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

ACPI standardizes a number of power states. Name them and their characteristics.

A

Power State

Characteristics

Working

  • The whole system is usable.
  • Unused save power in a low power state.

Sleep (Modern Standby)

  • Able to switch from a low-power state to a high-power state quickly.

Sleep

  • The system appears to be off.
  • Volatile memory is refreshed.
  • Some components are powered so the computer can wake from keyboard, LAN, or USB input.

In Hybrid Sleep mode, used on desktops, the hibernation file saves the system state in case the system loses power.

Hibernate

  • The system appears to be off.
  • Power consumption is at the lowest level.
  • Volatile memory is saved to a hibernation file to preserve the system state.
  • Some components are powered so the computer can wake from keyboard, LAN, or USB input.

Soft Off

  • The system appears to be off.
  • This state is comprised of a full shutdown and boot cycle.

Mechanical Off

  • The system is completely off and consumes no power.
  • The system returns to a working state only after a full reboot.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Power Scheme

A

Windows uses Power Schemes to manage power for the system. A power scheme is a collection of power settings that are either predefined or created by a user for use in different computing environments.

  • Each power scheme controls power down settings for the monitor, hard drives, and the entire system, and has settings for when running on AC power or on battery power.
  • You can modify the existing schemes or create new ones to meet your needs through the Power Options utility in the Control Panel. In Windows 10, you can edit power schemes by right-clicking the desktop and selecting Display Settings > Power & Sleep.
  • The preconfigured power schemes available depend on the operating system version and the computer type (laptop or desktop). Some manufacturers also include preconfigured power schemes. Default power schemes are often included to maximize performance or power savings.
  • Power schemes work for both laptop and desktop systems.
  • Edit the power scheme to control what the device does when you press the power button, shut down the system, or close the laptop lid.
  • In Windows, sleep corresponds to the suspend ACPI state. With hybrid sleep, data in memory is retained as well as written to the hard disk. If the computer is turned off while in hybrid sleep, it can be resumed using the data stored on disk
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What should you be aware of when working with power settings?

A
  • Power management must be supported by the BIOS, devices, and the operating system.
  • In Windows, hibernation must be enabled before you can select Hibernate as an option for shutting down the system or in a power scheme.
  • The BIOS must have ACPI support enabled before you can enable hibernation in Windows. If the Hibernate tab is missing, check the BIOS. If the BIOS does not have a setting for ACPI, you might need to upgrade the BIOS.
  • By default, Windows is allowed to control power to all devices that support the feature. You can edit the device properties in Device Manager to prevent Windows from controlling the device.
  • The Wake on LAN (WoL) feature allows a device that receives a special network signal to wake the computer from a sleeping or hibernated state. WoL is often used by desktop administrators to remotely start up computers for management purposes.
    • By default, devices are not allowed to wake the computer, although they might support this feature.
    • Edit the device properties in Device Manager to allow a device to wake the computer.
    • WoL is not recommended for laptop computers, as the computer will periodically come out of standby to check its network state which runs down the battery
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

If your laptop does not include a calibration tool, you can calibrate the battery by following what steps?

A

If your laptop does not include a calibration tool, you can calibrate the battery by following these steps:

  1. Charge the battery to 100%. Because you might not be able to trust the power meter that shows in Windows, be sure to allow sufficient charging time.
  2. In Windows, change the Power Scheme settings so that the system is not shut down automatically when the battery level reaches a low level.
  3. Unplug the laptop and run it on battery power only.
  4. When the battery level drops below 3%, turn the laptop off.
  5. Plug the laptop in and fully charge the battery.
  6. Restart the computer and restore your previous Power Scheme settings
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What should you be aware of when working with laptop bateries?

A

Be aware of the following when working with laptop batteries:

  • Some manufacturers recommend calibrating the battery when you first use it and every 3 months thereafter.
  • Extreme high or low temperatures shorten the battery life.
  • To provide more working time when running on battery power, turn down the display brightness, avoid watching DVDs or playing CDs, turn off wireless networking when not in use, use Power Scheme settings to power off unused devices, and adjust processor power settings (if available).
  • If you will not use the battery for longer than 2 weeks (for example, if you are not using the laptop or are running it only on AC power), remove the battery and store it separately.
  • Storing a battery longer than 3 months without use might affect its ability to hold a charge.
  • Depending on how you use them, most batteries will last between 1-3 years. Under normal conditions, the battery will gradually lose capacity over time. If the battery the battery life is still low after calibration, the only solution is to replace the battery
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What are some troubleshooting tips for Power (laptop) issues?

A

Laptops can run from either AC power through the transformer or from battery power. When troubleshooting power, verify that:

  • The cord from the AC outlet to the power adapter is correctly plugged into both the wall and the adapter unit. Move it around to see if a more secure connection can be made.
  • The LED light on your power adapter is lit. If it isn’t lit, this means that your point of failure is between the outlet and the adapter.
  • Your battery is sufficiently charged. If the battery reads it is fully charged in Windows, disconnect your laptop from its power source. If the battery lasts only a short amount of time, you can assume that your battery needs to be replaced.
  • If the computer runs for only a short time even while plugged in, it could be that the power adapter is bad. If the adapter is not working, the computer will run off of the battery until the battery is drained. Try using a different adapter, or verify the power coming from the adapter.
  • If your battery seems to be losing the ability to hold a charge, or if the power drops shortly after starting to use it, you might need to recalibrate the battery
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

What are some troubleshooting tips if your laptop has no display?

A

If your laptop has no display at all,

  • Press the Fn (Function) and the appropriate display key to switch the display output to the laptop monitor.
  • If the built-in monitor isn’t working, connect an external monitor to the laptop. Use the Fn keys to direct output to the external monitor.
  • If you don’t get a display on either monitor, you can assume that there is a problem with the video card. Repairing the video card typically means replacing the motherboard.
  • If the display renders on the external monitor but still won’t render on your laptop, then you can assume that there is a problem with your LCD display. If this is the case, you should verify that:
    • Your LCD cutoff switch is working. Sometimes the switch can get stuck in the off position, thus preventing the display from being sent to the LCD.
    • There aren’t cracks in the bezel around your LCD. This can be an indicator that your LCD has been damaged.
    • The power bundles that go from your laptop to the LCD are not damaged or cracked. You must remove the bezel around the LCD to inspect the power bundles
40
Q

What are some troubleshooting steps for display issues: Dead Spots?

A

Dead spots are areas on your screen (sometimes entire rows or columns of pixels) that no longer work. This means that your LCD assembly is no longer functioning and you will need to replace it. Be aware that it is often cheaper to purchase a new laptop computer than to replace the display

41
Q

What are some troubleshooting steps for display issues: Bad backlight?

A

A bad backlight may cause a display to become dim. It is important to note that dimming the backlight is a power saving method used by laptop computers to conserve power, so you should always verify that this isn’t the cause for a dimmed screen before choosing to replace the backlight

42
Q

What are some troubleshooting steps for display issues: flickering screen?

A

A flickering screen can be caused by a faulty backlight or inverter. Replacement parts can be purchased from your laptop’s manufacturer

43
Q

WHat should you do if you cannot load an app from the Microsoft Store?

A

If you cannot load an app from the Microsoft Store, use the Windows Store Apps Troubleshooter to search for and correct problems. Third-party apps have varying levels of support. You may have to contact the developer to troubleshoot issues

44
Q

What are some troubleshooting steps when working with keyboards, mice, digitizer pads, and antennae (laptop components)?

A

The most common portable components used with laptop systems are keyboards, mice, digitizer pads, and antennae. The following list suggests troubleshooting methods to use when working with these components:

  • A bad keyboard can be tested by plugging in an external keyboard to your laptop and seeing if it works. If it does, you can assume that your laptop keyboard is malfunctioning and needs to be replaced.
  • Most laptop systems have features that cause keyboard keys to perform alternate functions, such as emulating 10-key functionality by turning on the NUM LOCK. Before troubleshooting other problems, make sure that no special features are enabled that may cause keys to perform alternate tasks.
  • Sometimes the NUM LOCK indicator lights don’t correctly correspond to the NUM LOCK’s function state. Some power saving modes don’t support indicator light function. Sometimes you must press the F LOCK key with the NUM LOCK key for it to respond. If neither of these is the case, the computer probably isn’t properly maintaining the NUM LOCK state and may have damaged components.
  • Mouse malfunction on a laptop is usually caused by the installation of an incorrect driver. Good indicators that the incorrect driver has been installed are if the laptop mouse’s sensitivity isn’t consistent or if the mouse doesn’t recognize a double tap.
  • A digitizer pad is used in laptop and PDA systems to receive input. Input is written onto the pad with a stylus pen, then those motions are transferred into data that is processed by the system. If this pad becomes scratched, the laptop or PDA cannot receive input correctly. This is most easily resolved by buying a cleaning product called Screen Clean. This product removes the top layer of plastic from the digitizer pad, thus removing existing scratches and giving the pad a fresh surface. However, you will need to replace the digitizer pad or buy a new system if the scratch is too deep.
  • Another problem that digitizer pads face is called pointer drift or ghost cursor. Drift occurs when a pad’s pressure sensors need to be realigned. If this is the case, your digitizer pad needs to be recalibrated. It is always best to address this issue before it progresses to the point that you can’t access the recalibration utility.
  • Though laptop antennae are supposed to be omni-directional, they sometimes need to be re-oriented to get the best reception. This can usually be done by moving the laptop until the reception picks up. If redirecting the antennae doesn’t work and wireless reception is consistently poor, the antennae may need to be replaced.
  • Many laptops include a switch that turns the wireless network card on and off. When troubleshooting wireless network connectivity, make sure the switch is turned on.
  • If your speakers are not producing sound, begin troubleshooting by making sure the volume is turned all the way up and your speakers or headphones are connected correctly. Make sure your sound card works properly and is running with updated drivers. If that doesn’t fix the issue, run the Windows Audio Troubleshooter program. If none of these solutions work, you may have damaged hardware components that need to be replaced
45
Q

Accelerometer

A

An accelerometer is also called a g-sensor. It detects a tablet’s physical movements by measuring its linear acceleration in one dimension. The user interface can be automatically rotated to portrait or landscape mode, depending on the unit’s orientation

46
Q

Architecture used in mobile devices

A

Two computer architectures are used by mobile devices:

  • x86: The x86 architecture is compatible with standard x86 PC hardware and software, which allows the device to run operating systems such as Windows. Some newer versions of Android can also run on the x86 architecture.
  • ARM: Some tablets, such as the iPad, use the ARM architecture. ARM is more power-efficient and less expensive to manufacture than x86. Android runs primarily on ARM
47
Q

Geotracking

A

Geotracking is the ability to identify a person’s current physical location by obtaining GPS data from their smart phones or other GPS-enabled devices

48
Q

Gyroscope

A

A gyroscope measures the vertical and horizontal orientation of the device. This essentially creates a user input mechanism. The tablet can detect changes in vertical and horizontal acceleration and respond programmatically. For example, changes in vertical and horizontal acceleration detected by the gyroscope can be used as input for a gaming app

49
Q

IMEI vs. IMSI

A

IMEI stands for International Mobile Equipment Identity. It is a unique number given to every single mobile phone. It is typically located behind the battery. IMEI numbers of cellular phones connected to a GSM network are stored in the Equipment Identity Register database containing all valid mobile phone equipment. When a phone is reported stolen or is not type approved, the number is marked invalid.

IMSI stands for International Mobile Subscriber Identity. This is a unique identifier that defines a subscriber in the wireless world, including the country and mobile network to which the subscriber belongs. The IMSI is one of the pieces of information stored on a SIM card

50
Q

Internal Storage (mobile devices)

A

Internal storage is a hardware component located inside the device and used to store data. Some tablets use solid state drives (SSD). Others may use on-board flash memory (such as the iPad). Some also have external USB ports for removable storage

51
Q

Launcher (mobile devices)

A

Launcher is the name for the part of the GUI that lets users customize the home screen (the phone’s desktop), launch mobile apps, make phone calls, and perform other tasks on Android devices

52
Q

Mobile Payment Service

A

Mobile payment services operated under financial regulation and are performed using a mobile device. Instead of paying with cash, check, or credit cards, a consumer can use a mobile phone to pay for a wide range of services and digital or hard goods

53
Q

Mobile Networking Capabilities

A

Mobile devices implement 802.11b/g/n networking to provide networking connectivity. Bluetooth is also commonly implemented for connecting peripherals in place of wired USB connections

54
Q

3 mobile Operating Systems

A

Three operating systems are commonly used with mobile devices:

  • Android (open source)
    • The stock version of Android contains a home screen where you can put app shortcuts and widgets.
    • There is a button on the Home screen that will lead you to the App Drawer.
    • Customization possibilities are endless. Android can even be made to look like Windows or iOS.
    • All the high-end Android phones are as responsive as other operating system.
    • If it is a device with specifications from Google, which is the case with the Nexus series and the Android One series, then it is completely lag-free and fairly responsive.
    • Android has the most number of applications in its Google Play Store.
    • Many Android manufacturers like Samsung, Sony, HTC, LG, and Motorola.
  • iOS (closed source/vendor specific)
    • iOS looks very similar to Android.
    • It has a home screen and a button to enter the App Drawer.
    • iOS is lightweight and provides lag-performance free. Since iOS software and hardware are built by Apple alone, it is well-balanced.
    • iOS devices or iPhones are solely designed and developed by Apple.
  • Windows (closed source/vendor specific)
    • Apps on the home screen are tiles. Swiping the tile to the left gives a list of apps installed on the device.
    • Customization options are limited to changing colors and resizing the tiles.
    • Windows Phone is lightweight and provides a lag-free OS.
    • The Windows store has the least number of applications of the three major operating systems.
    • Microsoft Mobiles, formerly Nokia, is the leading Windows Phone provider.
55
Q

PRI Updates (mobile devices)

A

The Primary Rate Interface (PRI) is a telecommunications interface standard used on an Integrated Services Digital Network (ISDN) for carrying multiple DS0 voice and data transmissions between the network and a user. The PRI is a level of service assigned by the ISDN sometimes referred to as an ISDN PRI. The PRI provides businesses with digital access to the PSTN. While ISDN PRI is usually associated with only voice transmission, it is capable of transmitting data, video, and faxes as well.

To upgrade PRI, you need to purchase an additional PRI line

56
Q

PRL Updates (mobile devices)

A

The Preferred Roaming List (PRL) is a database residing in a wireless device that contains information used during the system selection and acquisition process. Without a PRL, the device may not be able to roam. In some cases, having a missing or corrupt PRL can lead to a customer not having service at all. On many networks, regularly updating the PRL is advised if the subscriber uses the device outside the home area frequently, particularly if they do so in multiple different areas. This allows the phone to choose the best roaming carriers, particularly roaming partners with whom the home carrier has a cost-saving roaming agreement, rather than using non-affiliated carriers. PRL files can also be used to identify home networks along with roaming partners, making the PRL an actual list that determines the total coverage of the subscriber, both home and roaming coverage

57
Q

Radio Firmware (mobile devices)

A

Radio firmware controls basic low-level functions like network connectivity, Wi-Fi, and GPS. For several years, radio meant baseband, and controlled network connectivity aspects only, while Wi-Fi and GPS were governed by OS drivers like any other devices. Baseband updates may improve or diminish battery performance, network signal strength, and roaming capability

58
Q

SDK/APK (mobile devices)

A

A software development kit (SDK) is a set of software development tools that allow the creation of applications for a certain software package, software framework, hardware platform, computer system, video game console, operating system, or similar development platform. To create applications, you have to download a specific software development kit. For example, the development of an Android app requires an SDK with Java, for iOS apps an iOS SDK with Swift, and for MS Windows the .NET Framework SDK with .NET. There are also SDKs that are installed in apps to provide analytics and data about activity. Prominent examples include Google and Facebook.

Android application package (APK) is the package file format the Android OS uses to distribute and install mobile apps and middleware

59
Q

Explain how a Smart Camera works?

A

A smart camera is a self-contained standalone vision system with a built-in image sensor in the housing of an industrial video camera. It contains all necessary communication interfaces, such as Ethernet, as well as industry-proof 24V I/O lines for connection to a PLC, actuators, relays or pneumatic valves

60
Q

Explain how a Touchscreen Interface works?

A

A touchscreen is an input device normally layered on the top of an electronic visual display of an information processing system. A user can give input or control the information processing system through simple or multi-touch gestures by touching the screen with a special stylus and/or one or more fingers. The touchscreen enables the user to interact directly with what is displayed rather than using a mouse, touchpad, or any other intermediate device, like a stylus

61
Q

(Mobile) Virtual Assistant

A

A virtual assistant is a program that understands your conversation, replies to you, and carries out many daily tasks for you like sending mail, making a search, opening apps, reporting the news and weather, and more. You can initiate these tasks using your voice. Some examples of a virtual assistant include AIVIC, Skyvi, and iris

62
Q

Wi-Fi calling

A

Wi-Fi calling allows your iPhone to place and receive phone calls and text messages over a Wi-Fi network. If you have a weak cellular signal but a solid Wi-Fi signal, your iPhone will automatically switch over and route calls and texts using Wi-Fi. You can only use this if your cellular carrier supports it

63
Q

Generations mobile connection type

A

Cellular networks used for voice and data include the following types:

  • 2G (second generation) networks were the first to offer digital data services. 2G data speeds are slow (14.4 Kbps) and are used mainly for text messaging, not internet connectivity. 2.5G supports speeds up to 144 Kbps.
  • EDGE (also called 2.75G) networks are an intermediary, between 2G and 3G networks. EDGE is the first cellular technology to be truly internet-compatible, with speeds of 400–1,000 Kbps.
  • 3G offers simultaneous voice and data. Minimum speeds for stationary users are quoted at 2 Mbps or higher. The following extensions enhance 3G networks:
    • HSPA+ (also known as smart antenna) uses multiple-input and multiple-output (MIMO). It significantly increases data throughput and link range without additional bandwidth or increased transmit power.
    • Long Term Evolution (LTE) and LTE-Advanced increase downlink/uplink speeds to 100/50 Mbps and 1Gbps/500Mbps, respectively.
  • 4G is available with minimum speeds around 3–8 Mbps, with over 100 Mbps possible. 4G:
    • Uses MIMO.
    • Is not compatible with 3G; 4G requires a complete retrofit on the part of service providers and new equipment for the consumer.
    • Utilizes Worldwide Interoperability for Microwave Access (WiMAX). WiMAX delivers high-speed internet service (up to 1 Gbps for stationary users) to large geographical areas.
  • 5G is able to achieve speeds twenty times faster that 4G; its peak speed is 20Gb per second.
    • Uses MIMO.
    • Includes lower frequencies than previous generations, down to 600 MHz.
    • Uses Long-Term Evolution (LTE) for wireless connections
64
Q

Hotspot

A

A hotspot is a physical location where you can obtain wireless internet access using a wireless local area network (WLAN) with a router connected to an internet service provider

65
Q

IR mobile connection type

A

An infrared port is a port on a mobile device that enables devices to exchange data without using cables.

66
Q

Lightning (mobile)

A

Lightning is a proprietary computer bus and power connector created by Apple Inc. to replace its previous proprietary 30-pin dock connector. It is used to connect Apple mobile devices like iPhones, iPads and iPods to host computers, external monitors, cameras, USB battery chargers, and other peripherals.

67
Q

miniUSB/microUSB (mobile)

A

A mini-USB connector is a small USB cable connector that is often used by handheld electronic devices like mobile phones, MP3 players, and digital cameras. On mobile phones it is often used for both USB data connectivity and charging. The new connector, called micro-USB, is smaller than the mini-USB connector and allows for even thinner device designs.

68
Q

NFC

A

An NFC connector is used to emulate cryptographic smart card functionalities for RFID tags or memory cards.

69
Q

Bluetooth

A

Bluetooth is a wireless technology standard for exchanging data over short distances from fixed and mobile devices and for building personal area networks (PANs). It can connect several devices, overcoming problems of synchronization

70
Q

Mobile VPN

A

A mobile virtual private network (mobile VPN) provides mobile devices with access to network resources and software applications on their home network when they connect using other wireless or wired networks

71
Q

Airplane Mode

A

Airplane mode is a setting available on many smart phones, portable computers, and other electronic devices that suspends the device’s radio-frequency signal transmitting functions, which disables telephone, Wi-Fi, and Bluetooth when activated

72
Q

Tethering

A

Tethering is connecting one device to another. In the context of mobile phones and tablet computers, tethering allows sharing the internet connection of the phone or tablet with other devices like laptops. Connection of the phone or tablet with other devices can be done over wireless LAN (Wi-Fi), over Bluetooth, or by physical connection using a cable like USB

73
Q

Describe Screen Locks

A

To secure access to a mobile device, such as a tablet or smart phone, configure the device’s lock screen to use some sort of authentication. Several different types of lock screen authentication methods include:

  • Swipe lock. Most mobile devices are configured to use a swipe lock screen. This means that anyone can unlock the device with a simple swipe of the screen; there’s no authentication at all. For obvious reasons, this is not very secure.
  • Biometric locks. The two most common biometric locks are fingerprint and facial recognition. With fingerprint recognition, the finger of the user is scanned and used to unlock the device. With facial recognition, the device’s camera is used to scan the user’s face and unlock the device.
  • PIN. A PIN allows a user to enter the correct four or six numbers in order to unlock the mobile device.
  • Pattern Unlock. Pattern unlock allows the user to create a line pattern on a nine point grid, used to unlock a mobile device.
  • Passcode. Passcode authentication uses a user-defined password to unlock the device. The password can be a mix of letters, numbers, and symbols
74
Q

(Mobile) Biometric Authentication

A

Biometric authentication is a type of authentication that relies on the unique physical characteristics of individuals to verify their identity for secure access. Some mobile devices support biometric authentication on lock screens. The two most common ones are fingerprint and facial recognition

75
Q

Multifactor Authentication

A

Multifactor authentication is a type of authentication that requires multiple authentication credentials to verify the user’s identity for a login or other transaction. For example, you might require a user to enter a username, password, pin, and fingerprint before authenticating to a computer system

76
Q

Failed Login Attempts

A

Most mobile devices are configured by default to allow only a set number of failed login attempts, which is usually ten. If more than ten failed logins are attempted, the mobile device will automatically wipe the entire contents of the device and reset it to the factory defaults.

It’s important to make sure that this feature is enabled on all mobile devices. This is one of the best lines of defense you can provide to a mobile device. Even if the passcode or PIN aren’t very secure, it will be pretty hard to guess the right one with only ten attempts at your disposal.

77
Q

Device Encryption

A

Another line of defense that can be implemented, and is used by default on most new devices, is encryption. Encryption prevents someone from accessing the stored information in any capacity. This means even if someone got a hold of a device and were somehow able to copy the contents of the device, they wouldn’t be able to view any of the information. It would be encrypted. There are two types of encryption methods used by mobile devices:

  • Partial device encryption. With this method, only the sections of the device’s storage that contain files are encrypted. This type of encryption is fast, but it doesn’t encrypt deleted files, which can be recovered using special software.
  • Full device encryption. This method encrypts every single sector of the device’s storage, regardless of whether it has data or not. This protects the entirety of the device, including deleted files. If a mobile device doesn’t encrypt contents by default, it’s important to make sure that full device encryption is enabled and configured
78
Q

Remote Wipe

A

Remote wipe is used to remotely format a mobile device. It’s a feature that’s built into a lot of mobile devices, especially smart phones. But, it’s also possible to use third-party software, such as Windows Intune, to achieve this functionality. Remote wipe requires some sort of connection to the device. This means that in order to send a remote wipe command, the device needs to be powered on and have cellular or Wi-Fi connection

79
Q

Device Locator

A

Many smart phones and tablets have a device location feature to locate a lost or stolen device. This feature is usually a proprietary service specific to the device manufacturer; however, there are also third-party apps that offer location services.

If the service has been set up on a device, the owner can use a website or software application to identify the approximate location of the device on a map. The service can also tell the device to take a picture with both the front and back cameras, then send the pictures to you. This can further help identify the device’s exact location

80
Q

Remote Backup Applications

A

Remote backup applications allow you to recover important business data and personal files (e.g., pictures and texts) from a lost, stolen, or broken phone. Most cellular providers offer some type of cloud backup service. In addition, each mobile OS offers their own proprietary backup service:

  • iOS devices have two different backup tools:
    • The desktop application iTunes can be used to backup and restore iOS devices. iTunes requires mobile devices to be connected to the desktop computer via a USB cable.

Apple devices can also use the iCloud service to backup and synchronize files and settings across all Apple devices (i.e., mobile and desktop devices). iCloud is a cloud-based backup service and requires the user to have an Apple ID, which needs to be logged into and

  • configured on each Apple device. Apple devices can then synchronize and backup files over the internet.
  • Android devices use the Google sync service to sync and backup mail, contacts, calendar, and files across all android devices. Google sync is a cloud-based service and requires a Google account.
  • Windows Mobile devices have two backup tools:
    • OneDrive is Microsoft’s cloud-based backup service and requires a Microsoft account.
    • Windows Mobile devices can also be backed up using a desktop computer with the Windows OS installed
81
Q

Authenticator Applications

A

An authenticator application is a specialized app called an “authenticator.” The app is pre-set by you to work with the service and provides a constantly rotating set of codes that you can use to utilize two-factor authentication or verification. The codes in authenticator apps sync across your accounts and provide an extra layer of security.

For example, implementing two-factor authentication on your Gmail account would require you to use your username, password and one of the generated codes from the authenticator apps to log in to your Gmail account. It may take a little longer to log in, but it provides you with an added layer of security

82
Q

OS Updates and Patches

A

Always keep the device’s operating system up-to-date. Hackers are constantly trying to find new ways to exploit various technologies, and mobile devices are no exception. These exploits can be anything from relatively harmless adware to dangerous Trojans that take complete control of a device. The way a device receives an update depends heavily on the type of mobile device, the manufacturer, and, if it’s a smart phone, the cellular carrier

83
Q

Trusted vs. Untrusted Apps

A

Applications for mobile devices can be placed into two categories: trusted and untrusted.

  • Trusted apps are those that have been reviewed and approved by the device’s app service. When approved, the app is signed with a certificate that identifies it as a trusted app. For the most part, this means the app is safe to install and does not contain malicious code.
  • Untrusted apps are those that have not been verified and approved by the app service. While it’s possible that an untrusted app could be entirely safe, it’s just too risky to install one. In fact, most devices won’t allow them to be installed by default. Software for mobile devices should be restricted to trusted app stores such as Google Play, the Microsoft Store, or Apple App Store
84
Q

Antivirus and Anti-Malware

A

It is a good idea to install an anti-malware app on mobile devices, especially devices that are used by an organization or connect to a company network. This will protect the device from malicious email attachments, downloads, or applications. It will also help prevent the spread of viruses onto a network.

85
Q

Firewalls

A

Use a firewall to inspect network traffic and to allow or block traffic based on a set of rules

86
Q

Unauthorized Access

A

Because smart phones connect to so many networks, it is possible for someone unauthorized to access your data, mobile device account, location, camera, and microphone. There are several things you can do to mitigate this risk:

  • Data: your phone is a unique vulnerability because it is so portable–it is very easy for someone to steal. In addition to protecting your data with basic security practices like locking your phone with a strong password, be aware of data theft from the inside as well. Mobile phones are computers that hackers can access using the same methods they use for desktop and laptop computers. Any financial, personal, or sensitive information on your phone is equally vulnerable, if not more so. Many social media applications allow third-party app developers to collect and sell information about their users.
  • Account: share your mobile device account information only with authorized vendors and people who share your mobile device plan. Carefully select who to share a mobile phone plan with. Ensure they have proved themselves honest and trustworthy because when you share a mobile phone plan, you share a lot of personal information. If you suspect a plan provider’s employee has accessed your account without authorization, contact your provider and explain your concerns as soon as possible.
  • Location: any time you turn on your cell phone’s GPS tracking ability, you make yourself vulnerable to unauthorized location tracking. To mitigate this risk, turn the GPS location feature off when you aren’t using GPS navigation and be wary of apps that ask to track your location, especially if they don’t need to track your location to perform their function.
  • Camera and microphone: be wary of any app that accesses your camera and microphone, especially if it doesn’t need to access those features to function. If your camera and microphone are hacked, anything visual or auditory data your phone collects becomes accessible to the hacker.
87
Q

Prevent Unintended Connections

A

Some mobile devices are configured to automatically connect to open Wi-Fi networks or accept other types of wireless connections (e.g., Bluetooth). This presents a serious security threat. For example, if a mobile device were to connect to an AP owned by a malicious individual, any information sent by the device can be captured by the malicious person.

  • To prevent against unintended Wi-Fi connections:
    • Configure Wi-Fi settings to always ask for permission to connect to unknown wireless networks.
    • If Wi-Fi is not being used, consider turning off the Wi-Fi adapter.
    • If a mobile device has already connected to an unknown wireless network, remove the network from the saved networks list in order to prevent future connections.
  • To prevent against unintended Bluetooth pairing:
    • Unless Bluetooth is actively being used, turn it off. This will not only prevent Bluetooth pairing and discovery, but also increase the device’s battery life.
    • If a the mobile device has been accidentally paired with another device, navigate to Bluetooth settings and delete (unpair) the device.
88
Q

Policies and Procedures

A

Use policies and procedures to secure your mobile devices.

  • BYOD vs. corporate owned. Some organizations implement security policies that forbid users from connecting their personal mobile devices to the organizational network (wired or wireless). Some organizations allow mobile devices; in fact, they may even provide users with mobile devices.

However, there is a risk in this situation that company data may be copied to these devices that could be compromised if a device is lost. As a safeguard, many of these organizations require that remote wipe be enabled on the device so that if it is lost or stolen, a command can be sent remotely to the device to remove all data on it.

  • Profile security requirements. Utilize an Acceptable Use Policy to specify how users:
    • Connect their personally-owned mobile devices to the organization’s wireless network. If they can, the policy may also specify rules for what internet resources they are allowed to access using those devices.
    • Use company-owned computers for personal uses, such as shopping for personal items on ecommerce websites.
89
Q

Device Management

A

In addition to policies, mobile devices can be secured by using special Mobile Device Management (MDM) tools, which allow for remote management of multiple mobile devices. By using an MDM tool, an IT administrator can:

  • Test configuration settings before deploying them.
  • Create and enforce mobile device security policies.
  • Remotely wipe mobile devices.
  • Push OS updates to devices.

The specific MDM you use depends on the mobile device’s operating system.

  • iOS devices use the Apple Configurator tool.
  • Windows Mobile devices use the Microsoft Intune tool, which is a cloud-based mobile management app.
  • Android devices can be managed using a variety of free or paid third-party MDM tools, including the Microsoft Intune tool.
90
Q

Troubleshooting Tool: App Scanner

A

An app scanner is a tool that can be used to identify problems with installed apps.

  • When installed, the app scans all installed apps on the mobile device and uses a definitions list to identify any issues.
  • App scanners can be configured to automatically scan the mobile device on a specified schedule.

Because app scanners use a definitions list to identify problems, it is important that the list is always kept up to date

91
Q

Troubleshooting Tool: Wi-Fi Analyzer

A

Wi-Fi analyzers are special apps that can be used to troubleshoot Wi-Fi connectivity issues. Most Wi-Fi analyzer apps provide the following functionality:

  • Identify the number of APs that are broadcasting
  • Display the signal strength and channel of each wireless network
  • Obtain wireless network information (e.g., signal band, SSID, security mode, etc.)
92
Q

Troubleshooting tool: Cell Tower Analyzer

A

A cell tower analyzer can be used to troubleshoot cellular network connectivity by displaying the following information:

  • Signal strength/interference
  • Number of cell towers in the area
  • The location of each cell tower
  • Mobile network information (e.g., network type, data activity, service provider, etc.)
93
Q

Troubleshooting No Display

A

A mobile device’s display can stop working for a several reasons. If you are troubleshooting a mobile device with a display issue, consider the following:

  • Make sure the device is fully charged and powered on. It is possible that the device is powered off or the battery is drained.
  • Check the device’s brightness level. If the brightness level is too low, it may appear as though the display is off. Look at the screen in a dark room to make sure this isn’t the case.
  • Find out if the device was dropped. When a mobile device is dropped, it is possible for the screen to be damaged, even if there is no physical damage.
  • Look for physical damage. If the screen is cracked or the device has physical damage, the display is most likely broken and needs to be replaced.
  • If your device is displaying but won’t cast to an external device, such as a television, make sure both devices are using updated versions, have permission to connect to other devices, and have paired correctly. Use online forums to search your symptoms and find solutions for your specific devices or contact the devices’ manufacturers for support.
94
Q

Troubleshooting Non-Responsive Touchscreen

A

Mobile devices use capacitive touchscreens, which require a conductive material touching the screen to work. If the touchscreen is not functioning or is inaccurate, you should:

  • Look for liquid on the screen. Because water is conductive, any type of moisture on the screen will result in erratic touchscreen behavior.
  • Check for cracks or physical damage. A cracked screen can disrupt the current flow across the screen and cause specific sections of the touchscreen to fail.
  • Make sure the screen is calibrated. If the touchscreen is inaccurate, try calibrating it using the device’s built-in calibration app.
95
Q

Troublshooting Unauthorized Access

A

Mobile devices are vulnerable to many of the same attacks that target desktop systems. One such attack is unauthorized access, where an attacker gains access to a specific feature or functionality of the mobile device.

  • Unauthorized account access occurs when an attacker obtains the login credentials for a cloud backup service or the device itself. This can result in leaked personal files and data. To protect against this, make sure to use some sort of authentication on the mobile device. Also make sure to use complex passwords and, if possible, set up two-factor authentication with all accounts that contain sensitive information.
  • Unauthorized root access is typically the result of a virus or malicious program installed on the mobile device. With root access, the malicious program can make low-level system changes to the mobile device, including modifying root certificates. To protect against unintended root access, install a anti-malware app on the mobile device and keep it up to date.
  • Unauthorized location tracking occurs when the GPS on the device is being used to track your location without your permission. To protect against this, review the device’s security settings and identify which installed apps have access to location services. You can then modify each app’s permissions to deny location tracking access.
  • Unauthorized camera/microphone activation is when the device’s camera or microphone is being used without the user’s permission. This can be caused by a malicious program or individual, or it could be caused by an installed application that has been granted permission to use these services. Most mobile devices have an LED or icon that indicates if the camera is being used. If a camera is being used without permission, review the device’s security settings and app permission settings. In addition, you can install an anti-malware app and run a scan on the device to remove any malicious apps.
  • If you become locked out of your phone, you can always get back in by performing a factory reset, but note that this will remove all data from your device
96
Q

Weak or No Signal Troubleshooting

A

Most connectivity issues are a result of a weak signal or some sort of interference. If a mobile device is having connectivity problems, try the following:

  • If the device is having problems connecting to a wireless network:
    • Make sure the wireless adapter is turned on.
    • Verify that the wireless configuration settings are correct.
    • Use a Wi-Fi analyzer to identify the network’s signal strength as well as interference sources (e.g., other network signals).
    • Verify that you are not over your data limit and being denied data access.
  • If the device is having problems with cellular service:
    • Make sure the mobile device has a SIM card installed.
    • Use a cell tower analyzer to identify network coverage, signal strength, and network type (i.e., 1x, 3G, 4G).
    • Identify whether or not the mobile device has a data plan. If it does, make sure the device has not gone over the data limits specified in the plan.
97
Q

Slow Performance Troubleshooting

A

If the device seems to be running slow, there are a couple things you can look at in order to identify the problem:

  • Identify system resources and usage. Many mobile devices have a system monitor that can be used to identify which apps are using system resources (i.e., memory, processor, etc.).
  • Make sure the app being used is compatible with the mobile device. Older mobile devices have slower processors and might not be able to run all the latest mobile apps available to it.
  • Check the amount of free storage on the mobile device. If a mobile device’s storage is more than 80% full, performance can be reduced considerably.
  • If the cell phone overheats, turn it off and place it in a cool place out of direct sunlight. It is possible for overheating to damage hardware, but generally, cooling down will correct issues. Avoid overheating by keeping the phone out of direct sunlight and extremely hot places, such as a car parked in direct sunlight.
  • If your speakers do not perform correctly, begin troubleshooting by checking your sound settings. Make sure nothing is set to Mute, Vibrate, Do not Disturb, or Silent. Make sure your phone isn’t connected to another device with Bluetooth. After that, plug headphones into your device. If you can hear sound through the headphones but not through the device’s speakers, you may have a hardware issue. If turning the phone off and back on again doesn’t fix the problem, you should contact your phone’s manufacturer or your cell service provider for support.
  • If your GPS isn’t functioning, first, make sure your phone is receiving a clear signal. You need a clear signal for the GPS to work and to troubleshoot any GPS problems. Make sure you have enabled location permissions for the app you are trying to use. You can refresh location services by turning the Location function on and off or putting your phone in Airplane mode for a few moments. If these solutions don’t work, you may have to reset all of your location and network data or restore your device’s factory settings.
  • You can review security and performance logs on your phone just as you can on a PC. This can help you troubleshoot performance issues. Review materials from your device manufacturer to learn how review logs on your phone. Note that you may need to connect your phone to a computer with a USB.