Advertisement
Goldmask99

ITEc10

May 2nd, 2017
72
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 20.23 KB | None | 0 0
  1. Name ________________________________________________________ Date __________________
  2.  
  3. Chapter 10: Mobile Devices
  4. After completion of this chapter, students should be able to:
  5. · Understand and Compare Android, iOS and Windows Phone 8.1 operating systems
  6. · Identify and explain components of mobile hardware
  7. · Describe the features of mobile operating systems
  8. · Compare and explain security methods for mobile devices
  9. · Establish basic network connectivity and configure Email on mobile devices
  10. · Describe mobile device synchronization
  11. · Compare Linux and OS X
  12. · Understand tools and features of OS X and Linux Operating Systems
  13. · Navigate the OS X and Linux interfaces and the Linux Command Line
  14. · Apply the six steps of the troubleshooting process for mobile, Linux and OS X Operating Systems
  15.  
  16.  
  17. 10.1 Mobile Operating Systems
  18.  
  19. 1. Explain the difference between “open source” and closed source” IOS software, giving an example of each:
  20.  
  21.  
  22. Open source - when the developer provides the source code (ex. Android)
  23.  
  24. Closed source - when the programs source code is not published (ex. IOS)
  25.  
  26. 2. What are “apps”
  27.  
  28. programs created to perform specific tasks on mobile devices
  29.  
  30.  
  31. 3. What are two good sources for safely downloading Android apps?
  32.  
  33. Google Play, 1Mobile
  34.  
  35.  
  36.  
  37. 4. Explain what is meant by push and pull?
  38.  
  39. Pull - When a user runs the Google Play app or the Apple App Store app from a mobile device, apps and content that are downloaded are pulled from a server to the device.
  40. Push - Android devices, Google Play using any desktop or laptop computer and purchase content is pushed to the Android device from the server. iOS users are able to purchase content from iTunes on a desktop or laptop computer that is then pushed to an iOS device
  41.  
  42. 5. Which company does not allow “pulling,” directly to your mobile device and why?
  43.  
  44.  
  45. Android
  46.  
  47.  
  48.  
  49. 6. What is “side loading”?
  50.  
  51. Downloading apps from different sources from the Internet through Wi-Fi, Bluetooth, data cables, and other methods
  52.  
  53.  
  54.  
  55. 7. What icons are on the Android system bar? (sketch and label)
  56.  
  57.  
  58. Back - returns to the previous page
  59.  
  60. Home - returns to the home screen
  61.  
  62. Recent apps - thumbnail images of recently opened applications
  63.  
  64. Menu - shows additional options of the current screen
  65.  
  66.  
  67. 8. What are Android widgets?
  68.  
  69.  
  70. Application shortcuts
  71.  
  72.  
  73. 10.1.2.3 Lab - Working with Android
  74.  
  75. 9. What are three main differences between iOS and Android interfaces?
  76.  
  77.  
  78. No navigation icons, no widgets, no app shortcuts
  79.  
  80.  
  81. 10. What functions can be performed with the home button on an iOS mobile device?
  82.  
  83.  
  84. Wake the device, return to the home screen, open the multitask bar, start Siri/ voice control, open audio controls
  85.  
  86.  
  87. 11. How would you access the notification area?
  88.  
  89.  
  90. Swipe your finger from the top of the screen to the bottom
  91.  
  92.  
  93.  
  94. 12. How do you move the location of an apple IOS app?
  95.  
  96. Step 1. Touch and hold the app until it jiggles.
  97. Step 2. Drag it to an empty area of any home screen.
  98. Step 3. Release the app.
  99. Step 4. Move any additional apps.
  100. Step 5. Press the Home button to save the changes.
  101.  
  102. 13. What is an alert badge?
  103.  
  104. It is a red dot with a white number that is placed in the upper right corner of an app to indicate that there is a notification
  105.  
  106.  
  107. 10.1.3.3 Lab - Working with iOS
  108.  
  109.  
  110. 14. Rather than displaying icons on Windows phones, how are apps referenced on the Start screen?
  111.  
  112. tiles are apps that can display dynamic information and allow interaction right on the start screen
  113.  
  114.  
  115. 15. What are the three navigational buttons on Windows phones and what purpose do they serve?
  116.  
  117.  
  118. Back , Start, Search
  119. 16. How can you access the Windows Phone digital assistant, Cortana?
  120.  
  121.  
  122. You can access the Windows Phone digital assistant by using the search button
  123.  
  124. 17. List the three steps to create a folder using the Windows phone interface:
  125.  
  126. Step 1. On Start screen, tap and hold a tile.
  127. Step 2. Move the tile on top of another tile until the folder pops into the foreground.
  128. Step 3. To name the folder, tap Name folder, give it a name, and then tap Enter.
  129.  
  130.  
  131. 18. What internal device determines screen orientation?
  132.  
  133. accelerometer
  134.  
  135. 19. What is the difference between landscape or portrait? (sketch it)
  136.  
  137.  
  138.  
  139.  
  140.  
  141.  
  142.  
  143.  
  144. 20. What setting can be changed to conserve battery power and why?
  145.  
  146.  
  147.  
  148.  
  149. 21. How do non-GPS devices determine their location?
  150.  
  151. These devices use information from Wi-Fi networks and cellular networks, if available, to provide location services.
  152.  
  153.  
  154.  
  155.  
  156. 10.1.5.3 Lab - Mobile Device Features - Android and iOS
  157. 10.1.5.4 Lab - Mobile Device Information
  158.  
  159.  
  160.  
  161. 22. What is Wi-Fi calling?
  162.  
  163.  
  164. Instead of using the cellular carrier's network, modern smartphones can use the Internet to transport voice calls by taking advantage of a local Wi-Fi hotspot.
  165.  
  166.  
  167.  
  168. 23. Where is Wi-Fi calling useful?
  169.  
  170.  
  171. in areas with poor cellular coverage because it uses a local Wi-Fi hotspot to fill the gaps.
  172.  
  173. 24. Name and describe 4 types of Mobile Payments:
  174. Premium SMS based transactional payments - consumers send a SMS message to a carrier's special phone number containing a payment request. The seller is informed the payment has been received and is cleared to release the goods. The charge is then added to the customer's phone bill. Slow speed, poor reliability, and poor security are a few shortcomings of this method.
  175.  
  176. Direct Mobile Billing - Using a mobile billing option during check-out, a user identifies him or herself (usually through a two-factor authentication) and allows the charge to be added to the mobile service bill. This is very popular in Asia and has the following benefits: security, convenience, and no need for bank cards or credit cards.
  177.  
  178. Mobile Web Payments - The consumer uses the web or dedicated apps to complete the transaction. This method relies on the Wireless Application Protocol (WAP) and usually requires the use of credit cards or a pre-registered online payment solution, such as PayPal.
  179.  
  180. Contactless NFC (Near Field Communication) – This method is used mostly in physical store transactions. A consumer pays for good or services by waving the phone near the payment system. Based on an unique ID, the payment is charged directly against a pre-paid account or bank account. NFC is also used in mass-transportation services, the public parking sector, and many more consumer areas.
  181.  
  182.  
  183. 25. What is the virtual assistant for Android?
  184.  
  185. Google
  186.  
  187. 26. For IOS?
  188.  
  189. Siri
  190. 27. For Windows Phone 8.1?
  191.  
  192. Chortona
  193.  
  194. 10.2 Methods for Securing Mobile Devices
  195. 28. What are two purposes of the passcode lock feature on mobile devices?
  196.  
  197.  
  198. If a mobile device is lost, anyone who finds the device has access to contacts, text messages, and web accounts
  199. The lock can also be delayed to engage after a specified amount of time passes after the device goes into the power-saving state.
  200.  
  201. 29. List 7 common types of passcode Locks:
  202.  
  203. a. None
  204. b. Swipe
  205. c. Pattern
  206. d. PIN
  207. e. Password
  208. f. Simple Passcode
  209. g. Touch ID
  210.  
  211.  
  212. 30. Which mobile device security feature requires the user to slide a finger over the screen in a specific sequence to unlock the device?
  213.  
  214.  
  215. Pattern
  216.  
  217.  
  218. 31. What other unlock options are available through Android 5.0?
  219.  
  220. Trusted Devices, Trusted Face, Trusted Voice, On-Body Detection
  221.  
  222.  
  223.  
  224. 10.2.1.2 Lab – Passcode Locks
  225. 32. How can you prevent someone from trying to guess a passcode?
  226.  
  227. mobile devices can be set to perform defined actions after a certain number of incorrect attempts have been made.
  228.  
  229.  
  230. 33. If enabled, what occurs after the passcode is not entered correctly after 10 attempts?
  231.  
  232. Android - After a device is locked, you can unlock it by entering the Gmail account information used to set up the device
  233.  
  234. IOS - the device remains disabled for 1 minute. Each failed attempt after six results in additional waiting time
  235.  
  236.  
  237. 34. Why is it important to periodically back up data on mobile devices?
  238.  
  239. So if anything happens to your device you will have a backup to go to that was not with the problem
  240.  
  241.  
  242.  
  243. 35. What is Remote backup on mobile devices?
  244. A remote backup is when a device copies its data to cloud storage using a backup app. If data needs to be restored, run the backup app and access the website to retrieve the data.
  245.  
  246. 36. What 3 common items are automatically backed up on both Android and iOS devices?
  247.  
  248. a. Calendar
  249. b. Mail
  250. c. Contacts
  251.  
  252.  
  253.  
  254. 37. What 4 functions can be performed from the Android Device Manager?
  255.  
  256. a. Locate device
  257. b. Ring device
  258. c. lock device
  259. d. Erase data
  260.  
  261.  
  262. 38. A mobile device locator app uses location data from what 3 sources?
  263.  
  264. Cellular towers
  265.  
  266. GPS
  267.  
  268. Wi-Fi hotspots
  269.  
  270.  
  271. 39. Which two conditions must be met for mobile device security measures such as remote lock and remote wipe to function?
  272.  
  273. the user must visit Android Device Manager Dashboard hosted at https://www.google.com/android/devicemanager and log in with the Google account used on the Android device.
  274.  
  275.  
  276.  
  277.  
  278. 40. What is meant by rooting or jailbreaking and why would you want to do it?
  279.  
  280.  
  281. Rooting and Jailbreaking are two names for removing restrictions and protections added to mobile operating systems. Rooting is the term used for Android devices, and Jailbreaking is used for iOS devices. The manufacturer restrictions are removed from these devices, allowing them to run arbitrary user-code, granting users full access to the file system and full access to kernel modules.
  282.  
  283.  
  284.  
  285.  
  286.  
  287.  
  288. 41. What is meant by “bricking” your device? (you may need to look this up)
  289.  
  290. when used in reference to consumer electronics, describes an electronic device such as a smartphone, game console, router, or tablet computer that, due to a serious misconfiguration, corrupted firmware, or a hardware problem, can no longer function, hence, is as technologically useful as a brick.
  291.  
  292. 42. Which operating systems updates are easier Apple or Android and how?
  293.  
  294.  
  295. Android because it updates automatically every day
  296.  
  297.  
  298.  
  299. 10.3 Network Connectivity and Email
  300. 43. What four precautions should you use when communicating over Wi-Fi?
  301.  
  302. Use the highest Wi-Fi security framework possible. Currently WPA2 security is the most secure.
  303. Enable security on home networks.
  304. Never send login or password information using clear, unencrypted text.
  305. Use a VPN connection when possible.
  306.  
  307.  
  308.  
  309.  
  310.  
  311. 10.3.1.2 Lab - Mobile Wi-Fi - Android and iOS
  312. 44. Describe the “evolution” of industry standards for cellular networks, from their origin to modern standards.
  313.  
  314. The first generation (1G) of cell phones began service in the 1980s.
  315.  
  316. In the 1990s, the second generation (2G) of mobile devices was marked by a switch from analog to digital standards.
  317. Third-generation (3G) standards enable mobile devices to go beyond simple voice and data communications
  318.  
  319. Fourth-generation (4G) standards provide ultra-broadband Internet access
  320.  
  321.  
  322.  
  323.  
  324. 45. What mobile standards are the most common today?
  325.  
  326. Third-generation (3G)
  327.  
  328.  
  329.  
  330.  
  331.  
  332. 46. What is Airplane mode and why would it be useful?
  333.  
  334. Most mobile devices also have a setting called Airplane Mode that turns off all cellular, Wi-Fi, and Bluetooth radios. Airplane Mode is useful when traveling on an airplane or when located where accessing data is prohibited or expensive
  335.  
  336.  
  337.  
  338. 47. What are some uses of Bluetooth on mobile devices?
  339.  
  340. Bluetooth technology provides a simple way for mobile devices to connect to each other and to wireless accessories
  341.  
  342.  
  343.  
  344. 48. What are the two levels of Bluetooth networking standard?
  345.  
  346. physical and protocol
  347.  
  348.  
  349. 49. Explain the concept of Bluetooth pairing.
  350.  
  351. Bluetooth pairing is when two Bluetooth devices establish a connection to share resources
  352.  
  353.  
  354.  
  355.  
  356. 50. List some default Bluetooth pairing numbers(search online):
  357. 987395, 487628
  358.  
  359. 51. What are Email servers responsible for?
  360.  
  361. for forwarding email messages sent by their users.
  362.  
  363.  
  364.  
  365. 52. List 5 protocols commonly used in email:
  366.  
  367. a. Post Office Protocol version 3 (POP3)
  368. b. Internet Message Access Protocol (IMAP)
  369. c. Simple Mail Transfer Protocol (SMTP)
  370. d. Multipurpose Internet Mail Extensions (MIME)
  371. e. Secure Socket Layer (SSL)
  372.  
  373.  
  374.  
  375. 10.3.3.2 Activity - Matching Email Protocols Instructor Check _______________
  376. 53. What is the user prompted for upon configuring an Android mobile device for the first time?
  377.  
  378. you are prompted to sign in to your Google account with your Gmail email address and password.
  379.  
  380.  
  381.  
  382. 54. What is required to set up an iOS device?
  383. An Apple ID is used to access the Apple App Store, the iTunes Store, and iCloud. iCloud provides email and the ability to store content on remote servers. The iCloud email is free and comes with remote storage for backups, mail, and documents.
  384.  
  385.  
  386. 55. What do Internet Email services usually provide to users?
  387. a web-based interface to allow users to access their mailboxes through any web browser
  388.  
  389.  
  390.  
  391.  
  392. 56. When can Data Synchronization be helpful?
  393.  
  394. when specific information is the same across multiple devices
  395.  
  396.  
  397.  
  398. 57. List a few types of data that can be synchronized:
  399.  
  400. Contacts
  401. Email
  402. Calendar entries
  403. Pictures
  404. Music
  405. Apps
  406. Video
  407. Browser links and settings
  408. Location Data
  409.  
  410.  
  411. 10.4 Linux and OS X Operating Systems
  412. 58. What is meant by a “non-proprietary” operating system, as in with Unix?
  413. Its open source so you can do what you want to the source
  414.  
  415.  
  416.  
  417. 59. What is different about the Linux GUI, which causes there to be and extremely large number of Linux distributions?
  418. It can be edited to a user's use
  419.  
  420.  
  421.  
  422.  
  423. 60. On OS X, what is Mission Control and how can it be accessed?
  424.  
  425. is a quick way to see everything that is currently open on your Mac
  426.  
  427.  
  428. 61. In what way can the user communicate with the operating systems in both Linux and OS X?
  429.  
  430. by using the command line interface (CLI).
  431.  
  432.  
  433. 62. What program is known as the “interpreter” between the user and the operating system?
  434.  
  435. shell interprets
  436.  
  437.  
  438.  
  439. 63. What file systems are used in Linux?
  440.  
  441. Terminator, eterm, xterm, konsole, gnome-terminal
  442.  
  443. 64. What file systems are used in OS X?
  444.  
  445. Terminal
  446.  
  447. 10.4.1.4 Lab – Install Linux in a Virtual Machine and Explore the GUI
  448. (You may need to use the 32bit version, even on a 64bit system)
  449. 65. What is the primary goal of Data Backup and Recovery?
  450.  
  451. creating a copy (or multiple copies) of data for safekeeping
  452.  
  453.  
  454. 66. Give an example of 1 data backup/recovery tool for Linux and give an example for OS X.
  455. Linux. Déjà Dup
  456.  
  457. OS X. Time Machine
  458.  
  459.  
  460.  
  461. 67. List some common maintenance task that can be performed using disk utility software:
  462.  
  463. Partition management, Mount or Unmount disk partitions, Disk Format, Bad Sector Check, Query S.M.A.R.T. attributes
  464.  
  465.  
  466.  
  467. 68. What is “mounting” a partition?
  468.  
  469. mounting a partition relates to the process of binding a partition of a disk or a disk image file (usually a .iso) to a folder location
  470.  
  471.  
  472. 69. What is multiboot?
  473. a program that is located in the boot sector and allows the user to choose which OS to use at boot time
  474.  
  475.  
  476.  
  477. 70. What is a popular boot manager?
  478. Grub or boot camp
  479.  
  480. 71. What determines the maximum number of operating systems allowed for multiboot?
  481.  
  482. The maximum number of operating systems allowed will depend on the size of the disk and while the boot manager technology allows a computer to have multiple OSs installed, only one OS can be used at a time
  483.  
  484. Watch 10.4.1.7 Video – Multiboot in Windows 7
  485. 72. Why should maintenance tasks be scheduled and performed regularly?
  486.  
  487. Maintenance tasks should be scheduled and performed frequently to prevent problems or to detect problems early
  488.  
  489.  
  490.  
  491. 73. What is the “Cron” service in Linux?
  492. the cron service is responsible for scheduled tasks. As a service, cron runs in the background and executes tasks at specific dates and times
  493.  
  494.  
  495.  
  496. 74. List some measures that can be taken to prevent malicious software from infecting a computer system:
  497.  
  498. Operating System Updates
  499. Firmware Updates
  500. Antivirus and Antimalware
  501. Security Credentials Manage
  502.  
  503. 75. Where is firmware normally found?
  504.  
  505. Firmware is commonly found in embedded devices, such as digital watches, traffic lights and home appliances
  506.  
  507.  
  508.  
  509. 76. What are some of the security credentials associated with a user?
  510. Usernames, passwords, digital certificates, encryption keys
  511.  
  512.  
  513.  
  514.  
  515. 77. In a Unix-based Command Line Interface, what does the “cd” command do?
  516. Change to the current directory
  517.  
  518.  
  519.  
  520. 78. What about the “man” command in Linux?
  521.  
  522. Shows the documentation for specific commands
  523.  
  524.  
  525.  
  526. 79. How can additional information be shown about a file using the “ls” command?
  527.  
  528. Shows the files inside a directory
  529.  
  530. 80. What command is used to exit the editor?
  531. Command q
  532.  
  533.  
  534.  
  535.  
  536.  
  537.  
  538. 10.4.3.3 Lab – Working with the Linux Command Line
  539.  
  540.  
  541. 10.5 Basic Troubleshooting Process for Mobile, Linux and OS X Operating Systems
  542. 81. In order, name the six steps of the troubleshooting process:
  543.  
  544. a. Identify the Problem
  545. b. Establish a Theory of Probable Cause
  546. c. Test the Theory to Determine Cause
  547. d. Establish a Plan of Action to Resolve the Problem and Implement the Solution
  548. e. Verify Full System Functionality and Implement Preventive Measures
  549. f. Document Findings, Actions, and Outcomes
  550.  
  551.  
  552.  
  553. 82. A user accidentally drops a mobile device into a pool. What corrective action should be taken?
  554.  
  555. Contact the manufacturer for repair or replacement.
  556.  
  557.  
  558.  
  559.  
  560.  
  561. 83. After being left in a car for many hours on a hot day, an iPhone cannot be turned on. What should the user do to fix this problem?
  562.  
  563. If, after waiting for the device to cool down the device is still not working, contact the manufacturer for replacement or repair
  564.  
  565.  
  566.  
  567.  
  568.  
  569.  
  570. 84. After an upgrade to a mobile device, some applications are no longer working, but some work fine. The user can make calls and send and receive email. Which two kinds of problems could be related to these issues?
  571.  
  572. The specific apps may not be compatible with the update, memory issue, update may have had errors (software issue)
  573.  
  574.  
  575.  
  576.  
  577.  
  578. 85. How can you reset an iOS device?
  579.  
  580.  
  581. go to Settings > General >Reset and then select Erase All Content and Settings. After typing in your passcode if you've set one, you'll get a warning box appear, with the option to Erase iPhone (or iPad) in red
  582.  
  583.  
  584.  
  585. 86. Which scenario or situation would prevent a user from upgrading the OS on an Android device?
  586.  
  587.  
  588. Not compatible
  589.  
  590.  
  591.  
  592.  
  593.  
  594. 10.5.2.2 Lab – Troubleshooting Mobile Devices
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement