Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Name ________________________________________________________ Date __________________
- Chapter 10: Mobile Devices
- After completion of this chapter, students should be able to:
- · Understand and Compare Android, iOS and Windows Phone 8.1 operating systems
- · Identify and explain components of mobile hardware
- · Describe the features of mobile operating systems
- · Compare and explain security methods for mobile devices
- · Establish basic network connectivity and configure Email on mobile devices
- · Describe mobile device synchronization
- · Compare Linux and OS X
- · Understand tools and features of OS X and Linux Operating Systems
- · Navigate the OS X and Linux interfaces and the Linux Command Line
- · Apply the six steps of the troubleshooting process for mobile, Linux and OS X Operating Systems
- 10.1 Mobile Operating Systems
- 1. Explain the difference between “open source” and closed source” IOS software, giving an example of each:
- Open source - when the developer provides the source code (ex. Android)
- Closed source - when the programs source code is not published (ex. IOS)
- 2. What are “apps”
- programs created to perform specific tasks on mobile devices
- 3. What are two good sources for safely downloading Android apps?
- Google Play, 1Mobile
- 4. Explain what is meant by push and pull?
- Pull - When a user runs the Google Play app or the Apple App Store app from a mobile device, apps and content that are downloaded are pulled from a server to the device.
- Push - Android devices, Google Play using any desktop or laptop computer and purchase content is pushed to the Android device from the server. iOS users are able to purchase content from iTunes on a desktop or laptop computer that is then pushed to an iOS device
- 5. Which company does not allow “pulling,” directly to your mobile device and why?
- Android
- 6. What is “side loading”?
- Downloading apps from different sources from the Internet through Wi-Fi, Bluetooth, data cables, and other methods
- 7. What icons are on the Android system bar? (sketch and label)
- Back - returns to the previous page
- Home - returns to the home screen
- Recent apps - thumbnail images of recently opened applications
- Menu - shows additional options of the current screen
- 8. What are Android widgets?
- Application shortcuts
- 10.1.2.3 Lab - Working with Android
- 9. What are three main differences between iOS and Android interfaces?
- No navigation icons, no widgets, no app shortcuts
- 10. What functions can be performed with the home button on an iOS mobile device?
- Wake the device, return to the home screen, open the multitask bar, start Siri/ voice control, open audio controls
- 11. How would you access the notification area?
- Swipe your finger from the top of the screen to the bottom
- 12. How do you move the location of an apple IOS app?
- Step 1. Touch and hold the app until it jiggles.
- Step 2. Drag it to an empty area of any home screen.
- Step 3. Release the app.
- Step 4. Move any additional apps.
- Step 5. Press the Home button to save the changes.
- 13. What is an alert badge?
- It is a red dot with a white number that is placed in the upper right corner of an app to indicate that there is a notification
- 10.1.3.3 Lab - Working with iOS
- 14. Rather than displaying icons on Windows phones, how are apps referenced on the Start screen?
- tiles are apps that can display dynamic information and allow interaction right on the start screen
- 15. What are the three navigational buttons on Windows phones and what purpose do they serve?
- Back , Start, Search
- 16. How can you access the Windows Phone digital assistant, Cortana?
- You can access the Windows Phone digital assistant by using the search button
- 17. List the three steps to create a folder using the Windows phone interface:
- Step 1. On Start screen, tap and hold a tile.
- Step 2. Move the tile on top of another tile until the folder pops into the foreground.
- Step 3. To name the folder, tap Name folder, give it a name, and then tap Enter.
- 18. What internal device determines screen orientation?
- accelerometer
- 19. What is the difference between landscape or portrait? (sketch it)
- 20. What setting can be changed to conserve battery power and why?
- 21. How do non-GPS devices determine their location?
- These devices use information from Wi-Fi networks and cellular networks, if available, to provide location services.
- 10.1.5.3 Lab - Mobile Device Features - Android and iOS
- 10.1.5.4 Lab - Mobile Device Information
- 22. What is Wi-Fi calling?
- Instead of using the cellular carrier's network, modern smartphones can use the Internet to transport voice calls by taking advantage of a local Wi-Fi hotspot.
- 23. Where is Wi-Fi calling useful?
- in areas with poor cellular coverage because it uses a local Wi-Fi hotspot to fill the gaps.
- 24. Name and describe 4 types of Mobile Payments:
- Premium SMS based transactional payments - consumers send a SMS message to a carrier's special phone number containing a payment request. The seller is informed the payment has been received and is cleared to release the goods. The charge is then added to the customer's phone bill. Slow speed, poor reliability, and poor security are a few shortcomings of this method.
- Direct Mobile Billing - Using a mobile billing option during check-out, a user identifies him or herself (usually through a two-factor authentication) and allows the charge to be added to the mobile service bill. This is very popular in Asia and has the following benefits: security, convenience, and no need for bank cards or credit cards.
- Mobile Web Payments - The consumer uses the web or dedicated apps to complete the transaction. This method relies on the Wireless Application Protocol (WAP) and usually requires the use of credit cards or a pre-registered online payment solution, such as PayPal.
- Contactless NFC (Near Field Communication) – This method is used mostly in physical store transactions. A consumer pays for good or services by waving the phone near the payment system. Based on an unique ID, the payment is charged directly against a pre-paid account or bank account. NFC is also used in mass-transportation services, the public parking sector, and many more consumer areas.
- 25. What is the virtual assistant for Android?
- Google
- 26. For IOS?
- Siri
- 27. For Windows Phone 8.1?
- Chortona
- 10.2 Methods for Securing Mobile Devices
- 28. What are two purposes of the passcode lock feature on mobile devices?
- If a mobile device is lost, anyone who finds the device has access to contacts, text messages, and web accounts
- The lock can also be delayed to engage after a specified amount of time passes after the device goes into the power-saving state.
- 29. List 7 common types of passcode Locks:
- a. None
- b. Swipe
- c. Pattern
- d. PIN
- e. Password
- f. Simple Passcode
- g. Touch ID
- 30. Which mobile device security feature requires the user to slide a finger over the screen in a specific sequence to unlock the device?
- Pattern
- 31. What other unlock options are available through Android 5.0?
- Trusted Devices, Trusted Face, Trusted Voice, On-Body Detection
- 10.2.1.2 Lab – Passcode Locks
- 32. How can you prevent someone from trying to guess a passcode?
- mobile devices can be set to perform defined actions after a certain number of incorrect attempts have been made.
- 33. If enabled, what occurs after the passcode is not entered correctly after 10 attempts?
- Android - After a device is locked, you can unlock it by entering the Gmail account information used to set up the device
- IOS - the device remains disabled for 1 minute. Each failed attempt after six results in additional waiting time
- 34. Why is it important to periodically back up data on mobile devices?
- So if anything happens to your device you will have a backup to go to that was not with the problem
- 35. What is Remote backup on mobile devices?
- A remote backup is when a device copies its data to cloud storage using a backup app. If data needs to be restored, run the backup app and access the website to retrieve the data.
- 36. What 3 common items are automatically backed up on both Android and iOS devices?
- a. Calendar
- b. Mail
- c. Contacts
- 37. What 4 functions can be performed from the Android Device Manager?
- a. Locate device
- b. Ring device
- c. lock device
- d. Erase data
- 38. A mobile device locator app uses location data from what 3 sources?
- Cellular towers
- GPS
- Wi-Fi hotspots
- 39. Which two conditions must be met for mobile device security measures such as remote lock and remote wipe to function?
- the user must visit Android Device Manager Dashboard hosted at https://www.google.com/android/devicemanager and log in with the Google account used on the Android device.
- 40. What is meant by rooting or jailbreaking and why would you want to do it?
- Rooting and Jailbreaking are two names for removing restrictions and protections added to mobile operating systems. Rooting is the term used for Android devices, and Jailbreaking is used for iOS devices. The manufacturer restrictions are removed from these devices, allowing them to run arbitrary user-code, granting users full access to the file system and full access to kernel modules.
- 41. What is meant by “bricking” your device? (you may need to look this up)
- when used in reference to consumer electronics, describes an electronic device such as a smartphone, game console, router, or tablet computer that, due to a serious misconfiguration, corrupted firmware, or a hardware problem, can no longer function, hence, is as technologically useful as a brick.
- 42. Which operating systems updates are easier Apple or Android and how?
- Android because it updates automatically every day
- 10.3 Network Connectivity and Email
- 43. What four precautions should you use when communicating over Wi-Fi?
- Use the highest Wi-Fi security framework possible. Currently WPA2 security is the most secure.
- Enable security on home networks.
- Never send login or password information using clear, unencrypted text.
- Use a VPN connection when possible.
- 10.3.1.2 Lab - Mobile Wi-Fi - Android and iOS
- 44. Describe the “evolution” of industry standards for cellular networks, from their origin to modern standards.
- The first generation (1G) of cell phones began service in the 1980s.
- In the 1990s, the second generation (2G) of mobile devices was marked by a switch from analog to digital standards.
- Third-generation (3G) standards enable mobile devices to go beyond simple voice and data communications
- Fourth-generation (4G) standards provide ultra-broadband Internet access
- 45. What mobile standards are the most common today?
- Third-generation (3G)
- 46. What is Airplane mode and why would it be useful?
- Most mobile devices also have a setting called Airplane Mode that turns off all cellular, Wi-Fi, and Bluetooth radios. Airplane Mode is useful when traveling on an airplane or when located where accessing data is prohibited or expensive
- 47. What are some uses of Bluetooth on mobile devices?
- Bluetooth technology provides a simple way for mobile devices to connect to each other and to wireless accessories
- 48. What are the two levels of Bluetooth networking standard?
- physical and protocol
- 49. Explain the concept of Bluetooth pairing.
- Bluetooth pairing is when two Bluetooth devices establish a connection to share resources
- 50. List some default Bluetooth pairing numbers(search online):
- 987395, 487628
- 51. What are Email servers responsible for?
- for forwarding email messages sent by their users.
- 52. List 5 protocols commonly used in email:
- a. Post Office Protocol version 3 (POP3)
- b. Internet Message Access Protocol (IMAP)
- c. Simple Mail Transfer Protocol (SMTP)
- d. Multipurpose Internet Mail Extensions (MIME)
- e. Secure Socket Layer (SSL)
- 10.3.3.2 Activity - Matching Email Protocols Instructor Check _______________
- 53. What is the user prompted for upon configuring an Android mobile device for the first time?
- you are prompted to sign in to your Google account with your Gmail email address and password.
- 54. What is required to set up an iOS device?
- An Apple ID is used to access the Apple App Store, the iTunes Store, and iCloud. iCloud provides email and the ability to store content on remote servers. The iCloud email is free and comes with remote storage for backups, mail, and documents.
- 55. What do Internet Email services usually provide to users?
- a web-based interface to allow users to access their mailboxes through any web browser
- 56. When can Data Synchronization be helpful?
- when specific information is the same across multiple devices
- 57. List a few types of data that can be synchronized:
- Contacts
- Email
- Calendar entries
- Pictures
- Music
- Apps
- Video
- Browser links and settings
- Location Data
- 10.4 Linux and OS X Operating Systems
- 58. What is meant by a “non-proprietary” operating system, as in with Unix?
- Its open source so you can do what you want to the source
- 59. What is different about the Linux GUI, which causes there to be and extremely large number of Linux distributions?
- It can be edited to a user's use
- 60. On OS X, what is Mission Control and how can it be accessed?
- is a quick way to see everything that is currently open on your Mac
- 61. In what way can the user communicate with the operating systems in both Linux and OS X?
- by using the command line interface (CLI).
- 62. What program is known as the “interpreter” between the user and the operating system?
- shell interprets
- 63. What file systems are used in Linux?
- Terminator, eterm, xterm, konsole, gnome-terminal
- 64. What file systems are used in OS X?
- Terminal
- 10.4.1.4 Lab – Install Linux in a Virtual Machine and Explore the GUI
- (You may need to use the 32bit version, even on a 64bit system)
- 65. What is the primary goal of Data Backup and Recovery?
- creating a copy (or multiple copies) of data for safekeeping
- 66. Give an example of 1 data backup/recovery tool for Linux and give an example for OS X.
- Linux. Déjà Dup
- OS X. Time Machine
- 67. List some common maintenance task that can be performed using disk utility software:
- Partition management, Mount or Unmount disk partitions, Disk Format, Bad Sector Check, Query S.M.A.R.T. attributes
- 68. What is “mounting” a partition?
- mounting a partition relates to the process of binding a partition of a disk or a disk image file (usually a .iso) to a folder location
- 69. What is multiboot?
- a program that is located in the boot sector and allows the user to choose which OS to use at boot time
- 70. What is a popular boot manager?
- Grub or boot camp
- 71. What determines the maximum number of operating systems allowed for multiboot?
- The maximum number of operating systems allowed will depend on the size of the disk and while the boot manager technology allows a computer to have multiple OSs installed, only one OS can be used at a time
- Watch 10.4.1.7 Video – Multiboot in Windows 7
- 72. Why should maintenance tasks be scheduled and performed regularly?
- Maintenance tasks should be scheduled and performed frequently to prevent problems or to detect problems early
- 73. What is the “Cron” service in Linux?
- the cron service is responsible for scheduled tasks. As a service, cron runs in the background and executes tasks at specific dates and times
- 74. List some measures that can be taken to prevent malicious software from infecting a computer system:
- Operating System Updates
- Firmware Updates
- Antivirus and Antimalware
- Security Credentials Manage
- 75. Where is firmware normally found?
- Firmware is commonly found in embedded devices, such as digital watches, traffic lights and home appliances
- 76. What are some of the security credentials associated with a user?
- Usernames, passwords, digital certificates, encryption keys
- 77. In a Unix-based Command Line Interface, what does the “cd” command do?
- Change to the current directory
- 78. What about the “man” command in Linux?
- Shows the documentation for specific commands
- 79. How can additional information be shown about a file using the “ls” command?
- Shows the files inside a directory
- 80. What command is used to exit the editor?
- Command q
- 10.4.3.3 Lab – Working with the Linux Command Line
- 10.5 Basic Troubleshooting Process for Mobile, Linux and OS X Operating Systems
- 81. In order, name the six steps of the troubleshooting process:
- a. Identify the Problem
- b. Establish a Theory of Probable Cause
- c. Test the Theory to Determine Cause
- d. Establish a Plan of Action to Resolve the Problem and Implement the Solution
- e. Verify Full System Functionality and Implement Preventive Measures
- f. Document Findings, Actions, and Outcomes
- 82. A user accidentally drops a mobile device into a pool. What corrective action should be taken?
- Contact the manufacturer for repair or replacement.
- 83. After being left in a car for many hours on a hot day, an iPhone cannot be turned on. What should the user do to fix this problem?
- If, after waiting for the device to cool down the device is still not working, contact the manufacturer for replacement or repair
- 84. After an upgrade to a mobile device, some applications are no longer working, but some work fine. The user can make calls and send and receive email. Which two kinds of problems could be related to these issues?
- The specific apps may not be compatible with the update, memory issue, update may have had errors (software issue)
- 85. How can you reset an iOS device?
- go to Settings > General >Reset and then select Erase All Content and Settings. After typing in your passcode if you've set one, you'll get a warning box appear, with the option to Erase iPhone (or iPad) in red
- 86. Which scenario or situation would prevent a user from upgrading the OS on an Android device?
- Not compatible
- 10.5.2.2 Lab – Troubleshooting Mobile Devices
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement