IT Essential Chapter 12 Mobile, Linux, and macOS Operating Systems

¡Supera tus tareas y exámenes ahora con Quizwiz!

iOS Display & Brightness Menu

iOS Display & Brightness Menu When using an iOS device, to configure screen brightness, swipe up from the very bottom of the screen and slide the brightness bar up or down to vary the brightness. Alternatively, to configure brightness in the Settings menu, tap Settings > Display & Brightness then slide the brightness to the desired level, as shown in Figure 12-22.

Screen Locks and Biometric Authentication (12.2.1)

Setting screen locks and using biometric authentication are methods that can help protect against unauthorized access to a device. Such measures can prevent immedi- ate access to a device for an intruder.

iOS Location Services

iOS Location Services To enable GPS on iOS devices, tap Settings > Privacy, then toggle Location Services on, as shown in Figure 12-25.

iOS Screen Auto-Rotation Setting

iOS Screen Auto-Rotation Setting When using an iOS device, to enable automatic rotation, swipe up from the bottom or down from the top (depending on your device) to open the Control Center. Then tap the screen rotation lock icon, shown in Figure 12-19, until it is turned off.

NFC Payment (12.1.4.6)

Mobile payment refers to any payments made through a mobile phone. You can make mobile payments in several ways:

Virtual Assistants (12.1.4.8)

A digital assistant, sometimes called a virtual assistant, is a program that can understand natural conversational language and perform tasks for the end user. Modern mobile devices are powerful computers, which makes them a perfect plat- form for digital assistants. Popular digital assistants include Google Now for Android, Siri for iOS, and Cortana for Windows Phone 8.1 and Windows 10 Mobile. Digital assistants rely on artificial intelligence, machine learning, and voice recogni- tion technology, as shown in Figure 12-34, to understand conversational-style voice commands. As the end user interacts with a digital assistant, sophisticated algorithms predict the user's needs and fulfill requests. By pairing simple voice requests with other inputs, such as GPS location, digital assistants can perform tasks such as playing a specific song, performing a web search, taking a note, or sending an email.

Virtual Private Network (12.1.4.7)

A virtual private network (VPN) is a private network that uses a public network (usually the Internet) to connect remote sites or users together (see Figure 12-29). Instead of using a dedicated leased line, a VPN uses "virtual" connections routed through the Internet from the company's private network to the remote site or employee. Many companies create their own VPNs to accommodate the needs of remote employees and distant offices. With the proliferation of mobile devices, it was a natural move to add VPN clients to smartphones and tablets. When a VPN is established from a client to a server, the client accesses the network behind the server as if it were connected directly to that network. Because VPN protocols also allow for data encryption, the communication between client and server is secure. When the VPN information has been added to the device, the VPN connection must be started before traffic can be sent and received through it.

Android Brightness Menu

Android Brightness Menu When using an Android device, to configure screen brightness, swipe down from the very top of the screen and use the path Display > Brightness, then slide the bright- ness to the desired level, as shown in Figure 12-21. Alternatively, tap the Adaptive Brightness toggle to allow the device to determine the optimal screen brightness based on the amount of ambient light.

Android Location Services

Android Location Services To enable GPS on Android devices, tap Settings > Location, then tap on the toggle to turn on location services, as shown in Figure 12-24.

Android Screen Auto-Rotation Setting

Android Screen Auto-Rotation Setting When using an Android device, to enable auto rotation, open the notifications panel and turn on the auto-rotate function by tapping the screen rotation icon, indicated in Figure 12-18.

GPS (12.1.4.3)

Another common feature of mobile devices is the ability to work with the Global Positioning System (GPS). GPS is a navigation system, shown in Figure 12-23, that determines the time and geographical location of the device by using messages from satellites in space and a receiver on Earth. A GPS radio receiver uses at least four satellites to calculate position, based on the messages. GPS is very accurate and can be used under most weather conditions. However, dense foliage, tunnels, and tall buildings can interrupt satellite signals. GPS receivers must have line-of-sight to GPS satellites and do not work indoors. Indoor Positioning Systems (IPS) can determine location by triangulating the position of the device based on proximity to other radio signals, such as Wi-Fi access points.

Direct Mobile Billing

By using a mobile billing option during checkout, a user identifies himself or herself (usually through two-factor authentication) and allows the charge to be added to the mobile service bill. This type of billing is very popular in Asia and has several benefits: security, convenience, and no need for bank cards or credit cards. NFC Payment (12.1.4.6)

Premium SMS based transactional payments

Consumers send an SMS message to a carrier's special phone number containing a payment request. The seller is informed that the payment has been received and is cleared to release the goods. The charge is then added to the customer's phone bill. Slow speed, poor reliabil- ity, and poor security are a few shortcomings of this method. NFC Payment (12.1.4.6)

Enabling Wi-Fi Calling on Android

Enabling Wi-Fi Calling on Android To enable Wi-Fi calling on Android, tap Settings > More (under the Wireless & Networks section), tap on Wi-Fi Calling as shown in Figure 12-27 to expose the on/off toggle. Tap on the toggle to turn it on.

What Do You Already Know? - Locks (12.2.1.1)

It is imperative that a mobile device be protected by a screen lock. There are five types of screen locks: face, passcode, pattern, swipe, and fingerprint. Read the scenario and select the lock that is used in each case.

iOS GUI

On iOS, to increase security, the passcode is used as part of the encryption keyfor the entire system. Because the passcode is not stored anywhere, no one (includ- ing Apple) can gain access to the user data on iOS devices without the passcode.The system depends on the user providing the passcode before the system can be unlocked and decrypted for use. A forgotten passcode renders user data unreachable, as shown in Figure 12-39, and the user must perform a full restore from a backup saved in iTunes or iCloud. Restrictions on Failed Login Attempts (12.2.1.3)

Screen Calibration (12.1.4.2)

Screen Calibration (12.1.4.2) When using a mobile device, you may need to adjust the brightness of the screen (see Figure 12-20). When bright sunlight makes the screen difficult to read, increase the brightness level. Inversely, very low brightness is helpful when reading a book on a mobile device at night. Some mobile devices can be configured to automatically adjust the brightness depending on the amount of surrounding light. The device must have a light sensor to use auto-brightness.

Screen Orientation (12.1.4.1)

Screen Orientation (12.1.4.1) Most mobile devices can be used in either portrait or landscape mode, as shown in Figure 12-17. A sensor inside the device, called an accelerometer, detects how the device is being held and changes the screen orientation appropriately. Users can choose the viewing mode that is the most comfortable for them for different types of content or applications. Content is automatically rotated to the position of the device. This feature is useful, for example, when taking a photograph. When the device is turned to landscape mode, the Camera app also turns to landscape mode. Also, when a user is writing a text, turning the device to landscape mode automati- cally turns the app to landscape mode, making the keyboard larger and wider.

Security (12.3.2.3)

Security (12.3.2.3) Digital assets are very valuable, and the theft of these assets are a major threat to users and organizations. Proper security practices include methods of protecting credentials that allow access to these assets.

Contactless NFC (Near Field Communication)

This method is used mostly in physical store transactions. A consumer pays for goods or services by waving the phone near the payment system. Based on a unique ID, the payment is charged directly against a prepaid account, bank account, or credit card. NFC payments are also used in mass-transportation services, for public parking, and in many other consumer areas. NFC Payment (12.1.4.6)

Configuring a VPN Connection on Android

To create a new VPN connection on Android, tap Settings > More (under the Wireless & Networks section) > VPN, tap on the + sign to add a VPN connection, and enter the VPN information (see Figure 12-30).

Configuring a VPN Connection on iOS

To create a new VPN connection on iOS, tap Settings > General > VPN > Add VPN Configuration, then fill in the screen shown in Figure 12-32.

Restrictions on Failed Login Attempts (12.2.1.3)

When a passcode has been properly implemented, unlocking a mobile device requires entering the correct PIN, password, pattern, or another passcode type. In theory, a passcode, such as a PIN, could be guessed given enough time and persever- ance. To prevent someone from trying to guess a passcode, mobile devices can be set to perform defined actions after a certain number of incorrect attempts have been made. For Android devices, shown in Figure 12-37, the number of failed attempts before lockout depends on the device and version of Android OS. It is common for an Android device to lock when a passcode has failed from 4 to 12 times. After a device is locked, you can unlock it by entering the Gmail account information used to set up the device.

Wi-Fi Calling (12.1.4.5)

Wi-Fi Calling (12.1.4.5) Instead of using the cellular carrier's network, a modern smartphone can use the Internet to transport voice calls by taking advantage of a local Wi-Fi hotspot (see Figure 12-26). This is called Wi-Fi calling. Locations such as coffeeshops, work- places, libraries, and homes usually have Wi-Fi networks connected to the Internet. A phone can transport voice calls through a local Wi-Fi hotspot. If there is no Wi-Fi hotspot within reach, the phone uses the cellular carrier's network to transport voice calls. Wi-Fi calling is very useful in areas with poor cellular coverage because it uses a local Wi-Fi hotspot to fill the gaps. The Wi-Fi hotspot must be able to guarantee a throughput of at least 1 Mbps to the Internet for a good-quality call. When Wi-Fi calling is enabled and in use during a voice call, the phone displays "Wi-Fi" next to the carrier name.

Mobile Web Payments

With this method, a consumer uses the Web or dedi- cated apps to complete a payment transaction. This method relies on Wireless Application Protocol (WAP) and usually requires the use of a credit card or a pre-registered online payment solution, such as PayPal. NFC Payment (12.1.4.6)


Conjuntos de estudio relacionados

Social Cognition (Ch 4 Social PSY)

View Set

Ciencias II - Electrostatica , Ley de Coulomb y Ohm

View Set

(Exam 1) Chapter 11: Health Care of the Older Adult

View Set

Chapter 11: Assisted Delivery and Cesarean Birth Maternal Prep-U

View Set

Chapter 9: Teaching and Counseling

View Set

Income Tax Aspects of Real Estate Exam Results

View Set

ISYS 2263 - Test 2 SQL & MS Access (Practice Exam & Quiz)

View Set

Combo with AP US History - Unit 2 - Articles of Confederation and 1 other

View Set

PrepU Health Assess Ch. 2 Assignment 2

View Set

NoSQL (MongoDB , Big Table) vs SQL (MySQL)

View Set