IT Fundamentals/Mobile Devices

From Wikiversity
Jump to navigation Jump to search
Smartphone icon.svg

Mobile devices are small computing devices, typically small enough to be handheld (and hence also commonly known as a handheld computer or simply handheld) having a display screen with touch input and/or a miniature keyboard and a variety of wireless connectivity options.[1] This lesson covers mobile devices and telephony. As computing devices have become smaller and networking more ubiquitous the Internet of Things (IOT) has become a reality. IOT is being defined as all devices connected together and available anywhere, anytime.

Objectives and Skills[edit]

Objectives and skills for the mobile devices portion of IT Fundamentals certification include:[2]

  • Explain the basic software features and functions of wireless devices
    • Unlocking/security
    • Bluetooth pairing
      • Hands free
      • Data transfer
    • Wireless connection setup
      • Verify wireless capabilities
      • Turn on WiFi
      • Locate SSID
      • Enter wireless password (if applicable)
      • Verify internet connection
    • Email configuration
      • POP3
      • IMAP
      • SMTP
    • Screen orientation
    • Synchronization configuration
    • Airplane mode
    • Stores for mobile applications
  • Identify the following alternative technologies and their purpose
    • Web applications
    • VoIP
    • Telepresence
    • Gesture-based interaction
      • Swiping
      • Pinch-to-zoom
      • Kinetics

Readings[edit]

  1. Wikipedia: Mobile device
  2. Wikipedia: Bluetooth
  3. Wikipedia: Voice over IP
  4. Wikipedia: Multi-touch

Multimedia[edit]

  1. YouTube: Comparing Android and iOS
  2. YouTube: Mobile Device Security Best Practices
  3. YouTube: Mobile Device Networking
  4. YouTube: Configuring Email on Mobile Devices
  5. YouTube: What is the Internet of Things

Activities[edit]

  1. Pair Bluetooth devices, such as a keyboard, mouse, or headset with a computer, tablet, or smartphone.
  2. Transfer files between a smartphone or tablet and a computer.
  3. Access a Wi-Fi network from a smartphone or tablet and verify Internet connectivity.
  4. Configure email on a smartphone or tablet with POP3 or IMAP and SMTP settings.
  5. Use multi-touch gestures on various devices.

Lesson Summary[edit]

  • Mobile devices are small, typically handheld computing devices having a display screen with touch input and/or a miniature keyboard and a variety of wireless connectivity options.[3]
  • Mobile devices have an operating system (OS), and can run various types of application software, known as apps.[4]
  • Most mobile devices can be equipped with Wi-Fi, Bluetooth, NFC and GPS capabilities.[5]
  • Most mobile devices include a camera and media player for video and music files. [6]
  • Many mobile devices contain sensors like accelerometers, compasses, magnetometers, and/or gyroscopes, allowing detection of orientation and motion.[7]
  • Bluetooth is a wireless technology standard for exchanging data over short distances from fixed and mobile devices, and building personal area networks (PANs).[8]
  • A master Bluetooth device can communicate with a maximum of seven devices in a piconet.[9]
  • Bluetooth has three classes of radios, with Class 2 most commonly found in mobile devices.[10]
  • Class 2 Bluetooth has a typical range of 5 - 10 meters.[11]
  • A Bluetooth device in discoverable mode transmits the device name, device class, list of services, and other technical information on demand.[12]
  • Use of Bluetooth device services may require pairing or acceptance by its owner, but the connection itself can be initiated by any device and held until it goes out of range.[13]
  • The Bluetooth pairing process may be triggered either by a specific request from a user to generate a bond, or it is triggered automatically when connecting to a service where the identity of a device is required for security purposes.[14]
  • During pairing, Bluetooth devices establish a bond through a shared secret known as a link key.[15]
  • The bond enables Bluetooth devices to reconnect to each other in the future without user intervention when the devices are in range.[16]
  • Bluetooth security uses the link key to generate the encryption key used to secure communication.[17]
  • When desired, users can delete the Bluetooth link key to remove bonding relationships.[18]
  • Bluetooth security risks may be mitigated by using Bluetooth only when required, enabling discovery only when necessary, removing paired devices when not in use, and regularly updating firmware on Bluetooth-enabled devices.[19]
  • Voice over IP (VoIP) is a methodology and group of technologies for the delivery of voice communications and multimedia sessions over Internet Protocol (IP) networks, such as the Internet.[20]
  • VoIP is available on many smartphones, personal computers, and on Internet access devices. Calls and SMS text messages may be sent over 3G or Wi-Fi.[21]
  • VoIP connections are perceived as less reliable than circuit-switched public telephone networks and may face problems with latency, packet loss, and jitter.[22]
  • Multi-touch refers to the ability of a surface (a trackpad or touchscreen) to recognize the presence of more than one point of contact with the surface.[23]
  • Multi-touch awareness is often used to implement advanced functionality such as swiping, pinch to zoom, and other predefined gestures.[24]

Key Terms[edit]

accelerometer
A device that measures g-force.[25]
airplane mode
A setting available on many mobile phones and other electronic devices that, when activated, suspends many of the device's signal transmitting functions while still permitting use of other functions that do not require signal transmission.[26]
Bluejacking
The sending of unsolicited messages over Bluetooth to Bluetooth-enabled devices.[27]
Bluesnarfing
The unauthorized access of information from a wireless device through a Bluetooth connection.[28]
compass
An instrument used for navigation and orientation that shows direction relative to the geographic cardinal directions.[29]
GPS (Global Positioning System)
A space-based satellite navigation system that provides location and time information in all weather conditions, anywhere on or near the earth where there is an unobstructed line of sight to four or more system satellites.[30]
gyroscope
A device for measuring or maintaining orientation, based on the principle of preserving angular momentum.[31]
IMAP (Internet Mail Access Protocol)
An Application Layer Internet protocol that allows an e-mail client to access e-mail on a remote mail server using TCP port 143 or port 993 for SSL/TLS.[32]
IR (Infrared)
A standard for wireless communication in consumer electronics that uses waves just below the visible light spectrum.[33]
ISDN (Integrated Services Digital Network)
A set of communication standards for simultaneous digital transmission of voice, video, data, and other network services over the traditional circuits of the public switched telephone network.[34]
kinetics
Of or having to do with the relationship between the motion of bodies and its causes, namely forces and torques.[35]
LTE ( Long-Term Evolution)
A standard for wireless communication of high-speed data for mobile phones and data terminals, commonly marketed as 4G.[36]
magnetometer
An instrument used to measure the strength and, in some cases, the direction of the magnetic field at a point in space.[37]
NFC (Near Field Communications)
A set of ideas and technology that enables smartphones and other devices to establish radio communication with each other by touching them together or bringing them into proximity, typically a distance of 10 cm (3.9 in) or less.[38]
PAN (Personal Area Network)
A computer network used for data transmission among devices such as computers, telephones and personal digital assistants.[39]
PDA (Personal Digital Assistant)
A mobile device that functions as a personal information manager, replaced by smartphones.[40]
POP (Post Office Protocol)
An application-layer Internet standard protocol used by local e-mail clients to retrieve e-mail from a remote server using TCP port 110 or port 995 for SSL/TLS.[41]
POP3 (Post Office Protocol 3)
The current version of the Post Office Protocol.[42]
POTS (Plain Old Telephone Service)
The voice-grade telephone service based on analog signal transmission that was common before the advent of advanced forms of telephony such as Integrated Services Digital Network (ISDN), cellular telephone systems, and Voice over Internet Protocol (VoIP).[43]
SMTP (Simple Mail Transfer Protocol)
An Internet standard for electronic mail transmission across Internet Protocol (IP) networks using TCP port 25 for servers and TCP ports 465 or 587 for clients.[44]
telepresence
A set of technologies which allow a person to feel as though they are at a place other than their true location.[45]
touchscreen
An input device normally layered on top of an electronic visual display supporting input through simple or multi-touch gestures with a stylus/pen and/or one or more fingers.[46]
WAP (Wireless Application Protocol)
A technical standard for accessing information over a mobile wireless network, used prior to the wide acceptance of smartphones with fully capable browsers.[47]
WiMAX (Worldwide Interoperability for Microwave Access, Inc.)
A cellular wireless communications standard designed to provide up to 40 Mbps data rates, in use by some mobile carriers prior to the adoption of LTE.[48]

Review Questions[edit]

Enable JavaScript to hide answers.
Click on a question to see the answer.
  1. Mobile devices are small, typically handheld computing devices having _____.
    Mobile devices are small, typically handheld computing devices having a display screen with touch input and/or a miniature keyboard and a variety of wireless connectivity options.
  2. Mobile devices have an operating system (OS), and can run _____.
    Mobile devices have an operating system (OS), and can run various types of application software, known as apps.
  3. Most mobile devices can be equipped with _____ communication capabilities.
    Most mobile devices can be equipped with Wi-Fi, Bluetooth, NFC and GPS communication capabilities.
  4. Most mobile devices include _____ for video and music files.
    Most mobile devices include a camera and media player for video and music files.
  5. Many mobile devices contain sensors like _____, allowing detection of orientation and motion.
    Many mobile devices contain sensors like accelerometers, compasses, magnetometers, and/or gyroscopes, allowing detection of orientation and motion.
  6. Bluetooth is _____.
    Bluetooth is a wireless technology standard for exchanging data over short distances from fixed and mobile devices, and building personal area networks (PANs).
  7. A master Bluetooth device can communicate with a maximum of _____ devices in a piconet.
    A master Bluetooth device can communicate with a maximum of seven devices in a piconet.
  8. Bluetooth has three classes of radios, with _____ most commonly found in mobile devices.
    Bluetooth has three classes of radios, with Class 2 most commonly found in mobile devices.
  9. Class 2 Bluetooth has a typical range of _____.
    Class 2 Bluetooth has a typical range of 5 - 10 meters.
  10. A Bluetooth device in discoverable mode transmits _____.
    A Bluetooth device in discoverable mode transmits the device name, device class, list of services, and other technical information on demand.
  11. Use of Bluetooth device services may require _____, but the connection itself can be initiated by any device and held until it goes out of range.
    Use of Bluetooth device services may require pairing or acceptance by its owner, but the connection itself can be initiated by any device and held until it goes out of range.
  12. The Bluetooth pairing process may be triggered either by _____, or _____.
    The Bluetooth pairing process may be triggered either by a specific request from a user to generate a bond, or it is triggered automatically when connecting to a service where the identity of a device is required for security purposes.
  13. During pairing, Bluetooth devices establish a bond through a shared secret known as _____.
    During pairing, Bluetooth devices establish a bond through a shared secret known as a link key.
  14. The bond enables Bluetooth devices to reconnect to each other in the future without _____ when the devices are in range.
    The bond enables Bluetooth devices to reconnect to each other in the future without user intervention when the devices are in range.
  15. Bluetooth security uses _____ to generate the encryption key used to secure communication.
    Bluetooth security uses the link key to generate the encryption key used to secure communication.
  16. When desired, users can _____ to remove bonding relationships.
    When desired, users can delete the Bluetooth link key to remove bonding relationships.
  17. Bluetooth security risks may be mitigated by _____.
    Bluetooth security risks may be mitigated by using Bluetooth only when required, enabling discovery only when necessary, removing paired devices when not in use, and regularly updating firmware on Bluetooth-enabled devices.
  18. Voice over IP (VoIP) is _____.
    Voice over IP (VoIP) is a methodology and group of technologies for the delivery of voice communications and multimedia sessions over Internet Protocol (IP) networks, such as the Internet.
  19. VoIP is available on _____. Calls and SMS text messages may be sent over 3G or Wi-Fi.
    VoIP is available on many smartphones, personal computers, and on Internet access devices. Calls and SMS text messages may be sent over 3G or Wi-Fi.
  20. VoIP connections are perceived as _____ compared to circuit-switched public telephone networks and may face problems with _____.
    VoIP connections are perceived as less reliable compared to circuit-switched public telephone networks and may face problems with latency, packet loss, and jitter.
  21. Multi-touch refers to _____.
    Multi-touch refers to the ability of a surface (a trackpad or touchscreen) to recognize the presence of more than one point of contact with the surface.
  22. Multi-touch awareness is often used to _____.
    Multi-touch awareness is often used to implement advanced functionality such as swiping, pinch to zoom, and other predefined gestures.

Assessments[edit]

See Also[edit]

References[edit]

Nuvola apps edu miscellaneous.svg Type classification: this is a lesson resource.
Progress-1000.svg Completion status: this resource is considered to be complete.
  1. Wikipedia: Mobile device
  2. CompTIA IT Fundamentals Certification Exam Objectives (FC0-U51)
  3. Wikipedia: Mobile device
  4. Wikipedia: Mobile device
  5. Wikipedia: Mobile device
  6. Wikipedia: Mobile device
  7. Wikipedia: Mobile device
  8. Wikipedia: Bluetooth
  9. Wikipedia: Bluetooth
  10. Wikipedia: Bluetooth
  11. Wikipedia: Bluetooth
  12. Wikipedia: Bluetooth
  13. Wikipedia: Bluetooth
  14. Wikipedia: Bluetooth
  15. Wikipedia: Bluetooth
  16. Wikipedia: Bluetooth
  17. Wikipedia: Bluetooth
  18. Wikipedia: Bluetooth
  19. Wikipedia: Bluetooth
  20. Wikipedia: Voice over IP
  21. Wikipedia: Voice over IP
  22. Wikipedia: Voice over IP
  23. Wikipedia: Multi-touch
  24. Wikipedia: Multi-touch
  25. Wikipedia: Accelerometer
  26. Wikipedia: Airplane mode
  27. Wikipedia: Bluejacking
  28. Wikipedia: Bluesnarfing
  29. Wikipedia: Compass
  30. Wikipedia: Global Positioning System
  31. Wikipedia: Gyroscope
  32. Wikipedia: Internet Message Access Protocol
  33. Wikipedia: Consumer IR
  34. Wikipedia: Integrated Services Digital Network
  35. Wikipedia: Kinetics (physics)
  36. Wikipedia: LTE (telecommunication)
  37. Wikipedia: Magnetometer
  38. Wikipedia: Near field communication
  39. Wikipedia: Personal area network
  40. Wikipedia: Personal digital assistant
  41. Wikipedia: Post Office Protocol
  42. Wikipedia: Post Office Protocol
  43. Wikipedia: Plain old telephone service
  44. Wikipedia: Simple Mail Transfer Protocol
  45. Wikipedia: Telepresence
  46. Wikipedia: Touchscreen
  47. Wikipedia: Wireless Application Protocol
  48. Wikipedia: WiMAX