Chapter 9

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Bezel

a plastic piece of trim that mounts around the LCD display or keyboard on a laptop

Laptop Memory

smaller SODIMM and MicroDIMM

Laptop Keyboards

these keyboards are smaller than traditional keyboards and some keys have special, unique functions.

Wireless (on/off)

Turn the wireless on or off.

OS Updates and Patches

Always keep the device's operating system up-to-date. Hackers are constantly trying to find new ways to exploit various technologies, and mobile devices are no exception. These exploits can be anything from relatively harmless adware to dangerous Trojans that take complete control of a device. The way a device receives an update depends heavily on the type of mobile device, the manufacturer, and, if it's a smart phone, the cellular carrier.

Near Field Communication Connector

An NFC connector used to emulate cryptographic smart card functionalities for RFID tags or memory cards.

App Scanner

An app scanner is a tool that can be used to identify problems with installed apps. · When installed, the app scans all installed apps on the mobile device and uses a definitions list to identify any issues. · App scanners can be configured to automatically scan the mobile device on a specified schedule. Because app scanners use a definitions list to identify problems, it is important that the list is always kept up to date.

Authenticator Applications

An authenticator application is a specialized app called an "authenticator." The app is pre-set by you to work with the service and provides a constantly rotating set of codes that you can use to utilize two-factor authentication or verification. The codes in authenticator apps sync across your accounts and provide an extra layer of security. For example, implementing two-factor authentication on your Gmail account would require you to use your username, password and one of the generated codes from the authenticator apps to log in to your Gmail account. It may take a little longer to log in, but it provides you with an added layer of security.

Emergency Notification

An emergency notification system is a method of facilitating one-way message broadcasts to one or many groups of people, alerting them to a pending or existing emergency.

Airplane mode

Turning off the cellular radio on your mobile device

Architecture

Two computer architectures are used by mobile devices: · x86: The x86 architecture is compatible with standard x86 PC hardware and software, which allows the device to run operating systems such as Windows. Some newer versions of Android can also run on the x86 architecture. · ARM: Some tablets, such as the iPad, use the ARM architecture. ARM is more power-efficient and less expensive to manufacture than x86. Android runs primarily on ARM.

Firewalls

Use a firewall to inspect network traffic and to allow or block traffic based on a set of rules.

Credit Card Readers

A credit card reader allows you to accept credit and debit cards payments through your smartphone or tablet.

Laptop

A portable computer small enough to use in your lap

2G

2G (second generation) networks were the first to offer digital data services. 2G data speeds are slow (14.4 Kbps) and are used mainly for text messaging, not internet connectivity. 2.5G supports speeds up to 144 Kbps.

3G

3G offers simultaneous voice and data. Minimum speeds for stationary users are quoted at 2 Mbps or higher. The following extensions enhance 3G networks: oHSPA+ (also known as smart antenna) uses multiple-input and multiple-output (MIMO). It significantly increases data throughput and link range without additional bandwidth or increased transmit power. oLong Term Evolution (LTE) and LTE-Advanced increase downlink/uplink speeds to 100/50 Mbps and 1Gbps/500Mbps, respectively.

4G

4G is available with minimum speeds around 3-8 Mbps, with over 100 Mbps possible. 4G: oUses MIMO. oIs not compatible with 3G; 4G requires a complete retrofit on the part of service providers and new equipment for the consumer. oUtilizes Worldwide Interoperability for Microwave Access (WiMAX). WiMAX delivers high-speed internet service (up to 1 Gbps for stationary users) to large geographical areas.

5G

5G is able to achieve speeds twenty times faster that 4G; its peak speed is 20Gb per second. oUses MIMO. oIncludes lower frequencies than previous generations, down to 600 MHz. oUses Long-Term Evolution (LTE) for wireless connections.

Lightning

A proprietary computer bus and power connector created by Apple Inc. to replace its previous proprietary 30-pin dock connector.

nickel metal hydride

A battery that uses the same cathode reaction as the NiCad battery but a different anode reaction, the oxidation of hydrogens in a metal alloy.

Cell Tower Analyzer

A cell tower analyzer can be used to troubleshoot cellular network connectivity by displaying the following information: · Signal strength/interference · Number of cell towers in the area · The location of each cell tower · Mobile network information (e.g., network type, data activity, service provider, etc.)

Preferred Roming List (PRL)

A database residing in a wireless device that contains information used during the system selection and acquisition process.

Inverter

A device that converts DC power from a computer to AC for a screen.

Smartphone

A device that integrates a cell phone with the features of a PC, such as the ability to store information, receive email, and install programs.

Docking Stations

A docking station allows you to charge an electronic device. Because a wide range of dockable devices have different connectors, power signaling, and uses, docks are not standardized and are designed for a specific make and model of a mobile device.

Keyboard backlight

A feature on some keyboards where the keys light up on the keyboard.

Gyroscope

A feature that measures the vertical and horizontal orientation of the device.

Liquid Crystal Display (LCD)

A flat-panel monitor that creates an image when liquid crystals become electronically charged.

Fuel Cell

A growing technology that is being implemented into the small electronic device market. It's not truly a battery, and instead of being recharged, its fuel is replaced for instant "recharge".

PDA (Personal Digital Assistant)

A portable device that is small enough to hold in the palm of your hand. Usually contains an address book, note making features, telephone and Internet facilities. Allows data to be exchanged with computers

Hotspot

A hotspot is a physical location where you can obtain wireless Internet access using a wireless local area network (WLAN) with a router connected to an internet service provider.

miniUSB/microUSB

A mini-USB connector is a small USB cable connector that is often used by handheld electronic devices like mobile phones, MP3 players, and digital cameras. On mobile phones it is often used for both USB data connectivity and charging. The new connector, called micro-USB, is smaller than the mini-USB connector and allows for even thinner device designs.

Long-Term Evolution (LTE)

A mobile communications standard used by 5G.

No Display

A mobile device's display can stop working for a several reasons. If you are troubleshooting a mobile device with a display issue, consider the following: · Make sure the device is fully charged and powered on. It is possible that the device is powered off or the battery is drained. · Check the device's brightness level. If the brightness level is too low, it may appear as though the display is off. Look at the screen in a dark room to make sure this isn't the case. · Find out if the device was dropped. When a mobile device is dropped, it is possible for the screen to be damaged, even if there is no physical damage. · Look for physical damage. If the screen is cracked or the device has physical damage, the display is most likely broken and needs to be replaced. · If your device is displaying but won't cast to an external device, such as a television, make sure both devices are using updated versions, have permission to connect to other devices, and have paired correctly. Use online forums to search your symptoms and find solutions for your specific devices or contact the devices' manufacturers for support.

Mobile Virtual Private Network (Mobile VPN)

A mobile virtual private network (mobile VPN) provides mobile devices with access to network resources and software applications on their home network when they connect using other wireless or wired networks.

Tablet PC

A personal computer similar in size and thickness to a notepad on which you can take notes using a stylus or digital pen on a touch screen.

Infrared port (IR)

A port on a mobile device that enables devices to exchange data without using cables.

Light Emitting Diode (LED)

A semiconductor component that emits light when an electric current passes through it.

Software development kit (SDK)

A set of software development tools that allows the creation of applications for a certain software package, software framework, hardware platform, computer system, video game console, operating system, or similar development platform.

Netbook

A small portable laptop computer designed for wireless communication and access to the Internet

Smart Camera

A smart camera is a self-contained standalone vision system with a built-in image sensor in the housing of an industrial video camera. It contains all necessary communication interfaces, such as Ethernet, as well as industry-proof 24V I/O lines for connection to a PLC, actuators, relays or pneumatic valves.

SDK/APK

A software development kit (SDK) is a set of software development tools that allow the creation of applications for a certain software package, software framework, hardware platform, computer system, video game console, operating system, or similar development platform. To create applications, you have to download a specific software development kit. For example, the development of an Android app requires an SDK with Java, for iOS apps an iOS SDK with Swift, and for MS Windows the .NET Framework SDK with .NET. There are also SDKs that are installed in apps to provide analytics and data about activity. Prominent examples include Google and Facebook.Android application package (APK) is the package file format the Android OS uses to distribute and install mobile apps and middleware.

Global Positioning System (GPS)

A space-based navigation system that provides location and time information in all weather conditions anywhere on or near the Earth where there is an unobstructed line of sight to four or more GPS satellites.

Primary Rate Interface (PRI)

A telecommunications interface standard used on an Integrated Services Digital Network (ISDN) to carry multiple DS0 voice and data transmissions between the network and a user.

Touchscreen Interface

A touchscreen is an input device normally layered on the top of an electronic visual display of an information processing system. A user can give input or control the information processing system through simple or multi-touch gestures by touching the screen with a special stylus and/or one or more fingers. The touchscreen enables the user to interact directly with what is displayed rather than using a mouse, touchpad, or any other intermediate device, like a stylus.

nickel-cadmium battery

A type of rechargeable battery using nickel oxide hydroxide and metallic cadmium as electrodes.

International Mobile Subscriber Identity (IMSI)

A unique identifier that defines a subscriber in the wireless world, including the country and mobile network to which the subscriber belongs. The IMSI is one of the pieces of information stored on a SIM card.

International Mobile Equipment Identity (IMEI)

A unique number given to every single mobile phone. The number is typically found behind the battery.

Virtual Assistant

A virtual assistant is a program that understands your conversation, replies to you, and carries out many daily tasks for you like sending mail, making a search, opening apps, reporting the news and weather, and more. You can initiate these tasks using your voice. Some examples of a virtual assistant include AIVIC, Skyvi, and iris.

Sleep (Modern Standby)

Able to switch from a low power state to a high power state.

Airplane Mode

Airplane mode is a setting available on many smart phones, portable computers, and other electronic devices that suspends the device's radio-frequency signal transmitting functions, which disables telephone, Wi-Fi, and Bluetooth when activated.

Docking Station

An external device that attaches to a mobile computer or device and contains a power connection and provides connections to peripheral devices.

Device Encryption

Another line of defense that can be implemented, and is used by default on most new devices, is encryption. Encryption prevents someone from accessing the stored information in any capacity. This means even if someone got a hold of a device and were somehow able to copy the contents of the device, they wouldn't be able to view any of the information. It would be encrypted. There are two types of encryption methods used by mobile devices: · Partial device encryption. With this method, only the sections of the device's storage that contain files are encrypted. This type of encryption is fast, but it doesn't encrypt deleted files, which can be recovered using special software. · Full device encryption. This method encrypts every single sector of the device's storage, regardless of whether it has data or not. This protects the entirety of the device, including deleted files. If a mobile device doesn't encrypt contents by default, it's important to make sure that full device encryption is enabled and configured.

Trusted vs. Untrusted Apps

Applications for mobile devices can be placed into two categories: trusted and untrusted. · Trusted apps are those that have been reviewed and approved by the device's app service. When approved, the app is signed with a certificate that identifies it as a trusted app. For the most part, this means the app is safe to install and does not contain malicious code. · Untrusted apps are those that have not been verified and approved by the app service. While it's possible that an untrusted app could be entirely safe, it's just too risky to install one. In fact, most devices won't allow them to be installed by default. Software for mobile devices should be restricted to trusted app stores such as Google Play, the Microsoft Store, or Apple App Store.

Apps

Applications must be written to run on mobile devices based on the operating system and system architecture. App distribution is provided online by platform: · Google: Play Store · iOS: AppStore · MS: Windows Store

Unauthorized Access

Because smart phones connect to so many networks, it is possible for someone unauthorized to access your data, mobile device account, location, camera, and microphone. There are several things you can do to mitigate this risk: · Data: your phone is a unique vulnerability because it is so portable--it is very easy for someone to steal. In addition to protecting your data with basic security practices like locking your phone with a strong password, be aware of data theft from the inside as well. Mobile phones are computers that hackers can access using the same methods they use for desktop and laptop computers. Any financial, personal, or sensitive information on your phone is equally vulnerable, if not more so. Many social media applications allow third-party app developers to collect and sell information about their users. · Account: share your mobile device account information only with authorized vendors and people who share your mobile device plan. Carefully select who to share a mobile phone plan with. Ensure they have proved themselves honest and trustworthy because when you share a mobile phone plan, you share a lot of personal information. If you suspect a plan provider's employee has accessed your account without authorization, contact your provider and explain your concerns as soon as possible. · Location: any time you turn on your cell phone's GPS tracking ability, you make yourself vulnerable to unauthorized location tracking. To mitigate this risk, turn the GPS location feature off when you aren't using GPS navigation and be wary of apps that ask to track your location, especially if they don't need to track your location to perform their function. · Camera and microphone: be wary of any app that accesses your camera and microphone, especially if it doesn't need to access those features to function. If your camera and microphone are hacked, anything visual or auditory data your phone collects becomes accessible to the hacker.

Biometric Authentication

Biometric authentication is a type of authentication that relies on the unique physical characteristics of individuals to verify their identity for secure access. Some mobile devices support biometric authentication on lock screens. The two most common ones are fingerprint and facial recognition.

Bluetooth

Bluetooth is a wireless technology standard for exchanging data over short distances from fixed and mobile devices and for building personal area networks (PANs).

Extra Batteries/Chargers

Cell phone chargers have gone through a diverse evolution that included cradles, plug-in cords, and obscure connectors. However, more recent devices generally use micro-USB. (Apple devices still use proprietary cables.)External batteries can be included in the case (power case). Also, external batteries can include rubber suction.

Tethering

Connecting one device to another.

Media Control

Controls the media playing in your device, such as allowing to skip or rewind videos, etc.

Lithium ion

Currently the most popular type of battery popular with notebook computers that is more efficient than earlier types. Sometimes abbreviated as "Li-Ion" battery.

Accelerometer

Detects the physical movements of the tablet by measuring its linear acceleration in one dimension.

Pointing Device

Device, such as a mouse or trackball, that allows the user to select objects on the screen.

E-readers

E-readers are similar in size to tablets, but they lack the functionality of a tablet. Their primary purpose is for reading digital books, newspapers, magazines, and other periodicals. Most e-readers use E Ink to display digital content. E Ink is a special technology that creates a high-contrast, black and white display. Even though they can display only grayscale, E Ink screens are great for e-readers because they consume much less power than LCD screens and they don't suffer from visibility problems when used in bright sunlight.

EDGE

EDGE (also called 2.75G) networks are an intermediary, between 2G and 3G networks. EDGE is the first cellular technology to be truly internet-compatible, with speeds of 400-1,000 Kbps.

Dual Displays

Enable dual displays.

LCD Display

Flat display that uses liquid crystals—organic, oil-like material placed between two polarizers—to form characters and graphic images on a backlit screen.

Gamepads

Gamepads allow you to turn your mobile device into a virtual multi-touch gamepad for PC games through a Wi-Fi connection.

Geotracking

Geotracking is the ability to identify a person's current physical location by obtaining GPS data from their smart phones or other GPS-enabled devices.

Laptop Processors

Have lower power consumption requirements and produce less heat than desktop processors.

IMEI vs. IMSI

IMEI stands for International Mobile Equipment Identity. It is a unique number given to every single mobile phone. It is typically located behind the battery. IMEI numbers of cellular phones connected to a GSM network are stored in the Equipment Identity Register database containing all valid mobile phone equipment. When a phone is reported stolen or is not type approved, the number is marked invalid. IMSI stands for International Mobile Subscriber Identity. This is a unique identifier that defines a subscriber in the wireless world, including the country and mobile network to which the subscriber belongs. The IMSI is one of the pieces of information stored on a SIM card.

Slow Performance

If the device seems to be running slow, there are a couple things you can look at in order to identify the problem: · Identify system resources and usage. Many mobile devices have a system monitor that can be used to identify which apps are using system resources (i.e., memory, processor, etc.). · Make sure the app being used is compatible with the mobile device. Older mobile devices have slower processors and might not be able to run all the latest mobile apps available to it. · Check the amount of free storage on the mobile device. If a mobile device's storage is more than 80% full, performance can be reduced considerably. · If the cell phone overheats, turn it off and place it in a cool place out of direct sunlight. It is possible for overheating to damage hardware, but generally, cooling down will correct issues. Avoid overheating by keeping the phone out of direct sunlight and extremely hot places, such as a car parked in direct sunlight. · If your speakers do not perform correctly, begin troubleshooting by checking your sound settings. Make sure nothing is set to Mute, Vibrate, Do not Disturb, or Silent. Make sure your phone isn't connected to another device with Bluetooth. After that, plug headphones into your device. If you can hear sound through the headphones but not through the device's speakers, you may have a hardware issue. If turning the phone off and back on again doesn't fix the problem, you should contact your phone's manufacturer or your cell service provider for support. · If your GPS isn't functioning, first, make sure your phone is receiving a clear signal. You need a clear signal for the GPS to work and to troubleshoot any GPS problems. Make sure you have enabled location permissions for the app you are trying to use. You can refresh location services by turning the Location function on and off or putting your phone in Airplane mode for a few moments. If these solutions don't work, you may have to reset all of your location and network data or restore your device's factory settings. · You can review security and performance logs on your phone just as you can on a PC. This can help you troubleshoot performance issues. Review materials from your device manufacturer to learn how review logs on your phone. Note that you may need to connect your phone to a computer with a USB.

Applications

If you cannot load an app from the Microsoft Store, use the Windows Store Apps Troubleshooter to search for and correct problems. Third-party apps have varying levels of support. You may have to contact the developer to troubleshoot issues. If you are unable to decrypt an email, you probably do not have the correct private key. You will need to export it from another computer. If your GPS is not functioning, begin troubleshooting by running the Hardware and Device Troubleshooter program. You can also update Bluetooth drivers if you are having trouble pairing a GPS-dependent Bluetooth device. If the pairing device uses Window 7 or older, install the drivers in Compatibility mode for the correct Windows version. And as always, use known good devices to check for damaged hardware and replace components as necessary.

Video

If your laptop has no display at all, · Press the Fn (Function) and the appropriate display key to switch the display output to the laptop monitor. · If the built-in monitor isn't working, connect an external monitor to the laptop. Use the Fn keys to direct output to the external monitor. · If you don't get a display on either monitor, you can assume that there is a problem with the video card. Repairing the video card typically means replacing the motherboard. · If the display renders on the external monitor but still won't render on your laptop, then you can assume that there is a problem with your LCD display. If this is the case, you should verify that: oYour LCD cutoff switch is working. Sometimes the switch can get stuck in the off position, thus preventing the display from being sent to the LCD. oThere aren't cracks in the bezel around your LCD. This can be an indicator that your LCD has been damaged. oThe power bundles that go from your laptop to the LCD are not damaged or cracked. You must remove the bezel around the LCD to inspect the power bundles. Additional problems with laptop displays include: · Dead Spots - Dead spots are areas on your screen (sometimes entire rows or columns of pixels) that no longer work. This means that your LCD assembly is no longer functioning and you will need to replace it. Be aware that it is often cheaper to purchase a new laptop computer than to replace the display. · Bad Backlight - A bad backlight may cause a display to become dim. It is important to note that dimming the backlight is a power saving method used by laptop computers to conserve power, so you should always verify that this isn't the cause for a dimmed screen before choosing to replace the backlight. · Flickering Screen - A flickering screen can be caused by a faulty backlight or inverter. Replacement parts can be purchased from your laptop's manufacturer. If you know that your LCD needs to be replaced but you don't have the resources to buy a new LCD or a new laptop, you can consider converting your laptop into a desktop system by hooking it up to an external monitor permanently. If the video card is bad, you might be able to use a remote solution, such as Remote Desktop, to connect to the laptop from an external system.

Device Management

In addition to policies, mobile devices can be secured by using special Mobile Device Management (MDM) tools, which allow for remote management of multiple mobile devices. By using an MDM tool, an IT administrator can: · Test configuration settings before deploying them. · Create and enforce mobile device security policies. · Remotely wipe mobile devices. · Push OS updates to devices. The specific MDM you use depends on the mobile device's operating system. · iOS devices use the Apple Configurator tool. · Windows Mobile devices use the Microsoft Intune tool, which is a cloud-based mobile management app. · Android devices can be managed using a variety of free or paid third-party MDM tools, including the Microsoft Intune tool.

Internal Hard Disks

Internal hard disks are usually 2.5" or 3.5" and very thin compared to desktop hard disks. SATA, SSDs, and flash drives are used in portable devices.

Hard Drive Repair

Internal hard drives are usually 2.5" or 3.5" in size. · Verify the interface type (SATA), speed, capacity, and RPM speed supported by the notebook before purchasing a replacement drive. · Most hard drives are replaced by removing a cover on the bottom or side of the computer. · Some disk drives are placed inside a caddy with a special connector. You will need this caddy when replacing the drive.

Internal Storage

Internal storage is a hardware component located inside the device and used to store data. Some tablets use solid state drives (SSD). Others may use on-board flash memory (such as the iPad). Some also have external USB ports for removable storage.

Antivirus and Anti-Malware

It is a good idea to install an anti-malware app on mobile devices, especially devices that are used by an organization or connect to a company network. This will protect the device from malicious email attachments, downloads, or applications. It will also help prevent the spread of viruses onto a network.

Power

Laptops can run from either AC power through the transformer or from battery power. When troubleshooting power, verify that: · The cord from the AC outlet to the power adapter is correctly plugged into both the wall and the adapter unit. Move it around to see if a more secure connection can be made. · The LED light on your power adapter is lit. If it isn't lit, this means that your point of failure is between the outlet and the adapter. · Your battery is sufficiently charged. If the battery reads it is fully charged in Windows, disconnect your laptop from its power source. If the battery lasts only a short amount of time, you can assume that your battery needs to be replaced. · If the computer runs for only a short time even while plugged in, it could be that the power adapter is bad. If the adapter is not working, the computer will run off of the battery until the battery is drained. Try using a different adapter, or verify the power coming from the adapter. If your battery seems to be losing the ability to hold a charge, or if the power drops shortly after starting to use it, you might need to recalibrate the battery.

Launcher

Launcher is the name for the part of the GUI that lets users customize the home screen (the phone's desktop), launch mobile apps, make phone calls, and perform other tasks on Android devices.

Device Locator

Many smart phones and tablets have a device location feature to locate a lost or stolen device. This feature is usually a proprietary service specific to the device manufacturer; however, there are also third-party apps that offer location services. If the service has been set up on a device, the owner can use a website or software application to identify the approximate location of the device on a map. The service can also tell the device to take a picture with both the front and back cameras, then send the pictures to you. This can further help identify the device's exact location.

Wireless Network Card

Might be integrated onto the motherboard, or added through add-on cards.

Unauthorized Access

Mobile devices are vulnerable to many of the same attacks that target desktop systems. One such attack is unauthorized access, where an attacker gains access to a specific feature or functionality of the mobile device. · Unauthorized account access occurs when an attacker obtains the login credentials for a cloud backup service or the device itself. This can result in leaked personal files and data. To protect against this, make sure to use some sort of authentication on the mobile device. Also make sure to use complex passwords and, if possible, set up two-factor authentication with all accounts that contain sensitive information. · Unauthorized root access is typically the result of a virus or malicious program installed on the mobile device. With root access, the malicious program can make low-level system changes to the mobile device, including modifying root certificates. To protect against unintended root access, install a anti-malware app on the mobile device and keep it up to date. · Unauthorized location tracking occurs when the GPS on the device is being used to track your location without your permission. To protect against this, review the device's security settings and identify which installed apps have access to location services. You can then modify each app's permissions to deny location tracking access. · Unauthorized camera/microphone activation is when the device's camera or microphone is being used without the user's permission. This can be caused by a malicious program or individual, or it could be caused by an installed application that has been granted permission to use these services. Most mobile devices have an LED or icon that indicates if the camera is being used. If a camera is being used without permission, review the device's security settings and app permission settings. In addition, you can install an anti-malware app and run a scan on the device to remove any malicious apps. · If you become locked out of your phone, you can always get back in by performing a factory reset, but note that this will remove all data from your device.

Networking Capabilities

Mobile devices implement 802.11b/g/n networking to provide networking connectivity. Bluetooth is also commonly implemented for connecting peripherals in place of wired USB connections.

Non-Responsive Touchscreen

Mobile devices use capacitive touchscreens, which require a conductive material touching the screen to work. If the touchscreen is not functioning or is inaccurate, you should: · Look for liquid on the screen. Because water is conductive, any type of moisture on the screen will result in erratic touchscreen behavior. · Check for cracks or physical damage. A cracked screen can disrupt the current flow across the screen and cause specific sections of the touchscreen to fail. · Make sure the screen is calibrated. If the touchscreen is inaccurate, try calibrating it using the device's built-in calibration app.

Headsets

Mobile headsets allow you to listen to music and answer phone calls. Mobile headsets come in both corded and cordless varieties using Bluetooth technology.

Mobile Payment Service

Mobile payment services operated under financial regulation and are performed using a mobile device. Instead of paying with cash, check, or credit cards, a consumer can use a mobile phone to pay for a wide range of services and digital or hard goods.

Weak or No Signal

Most connectivity issues are a result of a weak signal or some sort of interference. If a mobile device is having connectivity problems, try the following: · If the device is having problems connecting to a wireless network: oMake sure the wireless adapter is turned on. oVerify that the wireless configuration settings are correct. oUse a Wi-Fi analyzer to identify the network's signal strength as well as interference sources (e.g., other network signals). oVerify that you are not over your data limit and being denied data access. · If the device is having problems with cellular service: oMake sure the mobile device has a SIM card installed. oUse a cell tower analyzer to identify network coverage, signal strength, and network type (i.e., 1x, 3G, 4G). oIdentify whether or not the mobile device has a data plan. If it does, make sure the device has not gone over the data limits specified in the plan.

Laptop Networking

Most have built-in networking devices such as an Ethernet port, a modem port, wireless, Bluetooth, and/or infrared.

Failed Login Attempts

Most mobile devices are configured by default to allow only a set number of failed login attempts, which is usually ten. If more than ten failed logins are attempted, the mobile device will automatically wipe the entire contents of the device and reset it to the factory defaults. It's important to make sure that this feature is enabled on all mobile devices. This is one of the best lines of defense you can provide to a mobile device. Even if the passcode or PIN aren't very secure, it will be pretty hard to guess the right one with only ten attempts at your disposal.

Memory Repair

Most notebooks use a small panel on the bottom to access the additional memory slots. · Some notebooks include a base amount of memory built onto the motherboard or a memory module soldered into the first memory slot. You will not be able to remove or upgrade this memory. · Some notebooks have one memory slot located underneath the keyboard, and a second slot accessible through a door on the bottom of the case, or both slots are accessible from the bottom. · The amount of base memory installed will affect the total amount of system memory you can have.

Multifactor Authentication

Multifactor authentication is a type of authentication that requires multiple authentication credentials to verify the user's identity for a login or other transaction. For example, you might require a user to enter a username, password, pin, and fingerprint before authenticating to a computer system.

LCD Display Repair

Multiple components make up the LCD display: · The bezel is the case in which the LCD is set. · The backlight illuminates the LCD by evenly dispersing light over the entire screen. These backlights are usually cold cathode fluorescent lamps (CCFL) or LEDs. · The inverter is a power supply for the LCD screen that converts the DC power used by the computer to AC power needed for the backlight. An inverter is not used with LED backlights because LEDs use DC power. · The remainder of the LCD screen comes as a unit. · The antenna for wireless network cards is typically housed in the display bezel. When replacing video components: · You will need to remove the keyboard and any palm rests in order to remove the video card or the display components. · Some video cards are integrated on the motherboard and cannot be replaced. If the video card can be replaced, you will need to disconnect the display wires first. · Power cables run from your laptop to the LCD through the hinges that attach the LCD to the laptop. If these cables become bent or frayed, they can cause your LCD to lose power or display. · To remove the display assembly, remove the screws holding the lid that are typically located beneath the keyboard or a plastic cover above the keyboard. Unplug the video cables and the wireless antenna or other device cables. · To access the inverter, backlight, or other display components, remove the screws in the bezel. These screws are typically underneath rubber pads that keep the lid from hitting the palm rests. · When replacing the video card or LCD components, be sure to reconnect the wireless network antenna when reassembling.

Backlight

One of three main components used in LCDs to illuminate an image.

Protective Covers

Protective covers or cases are designed to attach to, support, and hold a mobile device. Protective covers are meant to protect a mobile device from accidental drops, shock, and water. Protective covers include: · Pouches and sleeves · Holsters · Shells · Skins · Bumpers · Flip cases and wallets · Screen protection and body films Leather cases

Radio Firmware

Radio firmware controls basic low-level functions like network connectivity, Wi-Fi, and GPS. For several years, radio meant baseband, and controlled network connectivity aspects only, while Wi-Fi and GPS were governed by OS drivers like any other devices. Baseband updates may improve or diminish battery performance, network signal strength, and roaming capability.

Remote Backup Applications

Remote backup applications allow you to recover important business data and personal files (e.g., pictures and texts) from a lost, stolen, or broken phone. Most cellular providers offer some type of cloud backup service. In addition, each mobile OS offers their own proprietary backup service: · iOS devices have two different backup tools: oThe desktop application iTunes can be used to backup and restore iOS devices. iTunes requires mobile devices to be connected to the desktop computer via a USB cable. oApple devices can also use the iCloud service to backup and synchronize files and settings across all Apple devices (i.e., mobile and desktop devices). iCloud is a cloud-based backup service and requires the user to have an Apple ID, which needs to be logged into and configured on each Apple device. Apple devices can then synchronize and backup files over the internet. · Android devices use the Google sync service to sync and backup mail, contacts, calendar, and files across all android devices. Google sync is a cloud-based service and requires a Google account. · Windows Mobile devices have two backup tools: oOneDrive is Microsoft's cloud-based backup service and requires a Microsoft account. oWindows Mobile devices can also be backed up using a desktop computer with the Windows OS installed.

Remote Wipe

Remote wipe is used to remotely format a mobile device. It's a feature that's built into a lot of mobile devices, especially smart phones. But, it's also possible to use third-party software, such as Windows Intune, to achieve this functionality. Remote wipe requires some sort of connection to the device. This means that in order to send a remote wipe command, the device needs to be powered on and have cellular or Wi-Fi connection.

Smart Phones

Smart phones combine the functionality of a cellular phone with the features of a desktop computer. Smart phones can access the internet either through a Wi-Fi connection or by using a 3G, 4G, and LTE cellular connection. They can also be used as a GPS navigation unit, a portable gaming device, and a mobile music player. Smart phones typically have a screen size between 2.5 inches and 5 inches. Most smart phones use the Android and iOS operating systems, but there is also a Microsoft Windows system called Lumia and a Google Chrome operating system called Fuchsia.

Prevent Unintended Connections

Some mobile devices are configured to automatically connect to open Wi-Fi networks or accept other types of wireless connections (e.g., Bluetooth). This presents a serious security threat. For example, if a mobile device were to connect to an AP owned by a malicious individual, any information sent by the device can be captured by the malicious person. · To prevent against unintended Wi-Fi connections: oConfigure Wi-Fi settings to always ask for permission to connect to unknown wireless networks. oIf Wi-Fi is not being used, consider turning off the Wi-Fi adapter. oIf a mobile device has already connected to an unknown wireless network, remove the network from the saved networks list in order to prevent future connections. · To prevent against unintended Bluetooth pairing: oUnless Bluetooth is actively being used, turn it off. This will not only prevent Bluetooth pairing and discovery, but also increase the device's battery life. oIf a the mobile device has been accidentally paired with another device, navigate to Bluetooth settings and delete (unpair) the device.

Memory/MicroSD

Some smart phones feature SD card slots, usually the smaller MicroSD variant. These, in combination with a compatible SD card, can be used to transfer files from one device to another, or simply to increase the storage capacity of the phone.

Speakers

Speakers allow you to listen to your mobile device without headphones. Portable speakers can be connected to your mobile device using Bluetooth or through the earphone jack.

Hibernate

System appears to be off, power consumption at its lowest, volatile memory is saved to a hibernation file to preserve system state, and some components are powered so the computer can wake from keyboard, LAN, or USB input.

Sleep

System appears to be off, volatile memory is refreshed, and some components are powered so the computer can wake from keyboard, LAN, or USB input.

Tablets

Tablet devices use a touchscreen interface instead of the touchpad and keyboard used by notebook PCs. The touchscreen interface is usually capacitive, meaning that it requires conductive material, such as your finger tip, for input. Capacitive touchscreens provide multi-touch capabilities, which allow the tablet to recognize multiple finger touches at the same time.

PRL Updates

The Preferred Roaming List (PRL) is a database residing in a wireless device that contains information used during the system selection and acquisition process. Without a PRL, the device may not be able to roam. In some cases, having a missing or corrupt PRL can lead to a customer not having service at all. On many networks, regularly updating the PRL is advised if the subscriber uses the device outside the home area frequently, particularly if they do so in multiple different areas. This allows the phone to choose the best roaming carriers, particularly roaming partners with whom the home carrier has a cost-saving roaming agreement, rather than using non-affiliated carriers. PRL files can also be used to identify home networks along with roaming partners, making the PRL an actual list that determines the total coverage of the subscriber, both home and roaming coverage.

PRI Updates

The Primary Rate Interface (PRI) is a telecommunications interface standard used on an Integrated Services Digital Network (ISDN) for carrying multiple DS0 voice and data transmissions between the network and a user. The PRI is a level of service assigned by the ISDN sometimes referred to as an ISDN PRI. The PRI provides businesses with digital access to the PSTN. While ISDN PRI is usually associated with only voice transmission, it is capable of transmitting data, video, and faxes as well. To upgrade PRI, you need to purchase an additional PRI line.

Screen orientation

The layout or orientation of the screen that is either portrait or landscape.

Laptop Components

The most common portable components used with laptop systems are keyboards, mice, digitizer pads, and antennae. The following list suggests troubleshooting methods to use when working with these components: · A bad keyboard can be tested by plugging in an external keyboard to your laptop and seeing if it works. If it does, you can assume that your laptop keyboard is malfunctioning and needs to be replaced. · Most laptop systems have features that cause keyboard keys to perform alternate functions, such as emulating 10-key functionality by turning on the NUM LOCK. Before troubleshooting other problems, make sure that no special features are enabled that may cause keys to perform alternate tasks. · Sometimes the NUM LOCK indicator lights don't correctly correspond to the NUM LOCK's function state. Some power saving modes don't support indicator light function. Sometimes you must press the F LOCK key with the NUM LOCK key for it to respond. If neither of these is the case, the computer probably isn't properly maintaining the NUM LOCK state and may have damaged components. · Mouse malfunction on a laptop is usually caused by the installation of an incorrect driver. Good indicators that the incorrect driver has been installed are if the laptop mouse's sensitivity isn't consistent or if the mouse doesn't recognize a double tap. · A digitizer pad is used in laptop and PDA systems to receive input. Input is written onto the pad with a stylus pen, then those motions are transferred into data that is processed by the system. If this pad becomes scratched, the laptop or PDA cannot receive input correctly. This is most easily resolved by buying a cleaning product called Screen Clean. This product removes the top layer of plastic from the digitizer pad, thus removing existing scratches and giving the pad a fresh surface. However, you will need to replace the digitizer pad or buy a new system if the scratch is too deep. · Another problem that digitizer pads face is called pointer drift or ghost cursor. Drift occurs when a pad's pressure sensors need to be realigned. If this is the case, your digitizer pad needs to be recalibrated. It is always best to address this issue before it progresses to the point that you can't access the recalibration utility. · Though laptop antennae are supposed to be omni-directional, they sometimes need to be re-oriented to get the best reception. This can usually be done by moving the laptop until the reception picks up. If redirecting the antennae doesn't work and wireless reception is consistently poor, the antennae may need to be replaced. · Many laptops include a switch that turns the wireless network card on and off. When troubleshooting wireless network connectivity, make sure the switch is turned on. · If your speakers are not producing sound, begin troubleshooting by making sure the volume is turned all the way up and your speakers or headphones are connected correctly. Make sure your sound card works properly and is running with updated drivers. If that doesn't fix the issue, run the Windows Audio Troubleshooter program. If none of these solutions work, you may have damaged hardware components that need to be replaced. As long as your laptop runs, you can substitute an external device connected to a PS/2, USB, PCMCIA, or ExpressCard slot for most failed components, allowing you to continue using the computer.

Android Package (APK)

The package file format used by the Android operating system for the distribution and installation of mobile apps and middleware.

Processor Repair

The processor is typically located underneath the keyboard. · Remove the keyboard to expose the processor. · Some notebooks have processors soldered onto the motherboard. On these systems, you will not be able to upgrade or replace the processor. · Because of the limited space in a notebook case, the processor uses a heat pipe to pull heat towards the side of the case where a small fan can vent the heat from the case.

Soft off

The system appears to be off, comprised of a full shutdown and boot cycle.

Mechanical Off

The system is completely off and consumes no power, the system returns to a working state only after a full reboot.

Touchpad Repair

The touchpad takes the place of a mouse. · The most common problem for the touchpad is that the mouse cursor is not controlled properly based on where you press. In this case, recalibrate the touchpad. oSome notebooks recalibrate the touchpad at every system boot. Reboot the computer, making sure not to press the touchpad during startup. oMost notebooks include a utility for calibrating the touchpad. Run the utility and follow the instructions to recalibrate. A tablet PC with a touch screen might also need to be recalibrated periodically. · If you need to replace the touchpad, it is typically connected to the palm rest which is part of the inside case. You will need to remove the keyboard and the palm rest to replace the touchpad.

Working

The whole system is usable.

Cellular (on/off)

Turn the cellular on or off.

Screen brightness

This is a function key that allows you to adjust the visibility of the display. This is very useful, especially in the case of power conservation as the screen usually uses the most power of any computer component.

Volume settings

This is a function key to quickly adjust the level of the sound. There is also a button to mute the sound altogether.

Operating System

Three operating systems are commonly used with mobile devices: · Android (open source) oThe stock version of Android contains a home screen where you can put app shortcuts and widgets. oThere is a button on the Home screen that will lead you to the App Drawer. oCustomization possibilities are endless. Android can even be made to look like Windows or iOS. oAll the high-end Android phones are as responsive as other operating system. oIf it is a device with specifications from Google, which is the case with the Nexus series and the Android One series, then it is completely lag-free and fairly responsive. oAndroid has the most number of applications in its Google Play Store. oMany Android manufacturers like Samsung, Sony, HTC, LG, and Motorola. · iOS (closed source/vendor specific) oiOS looks very similar to Android. oIt has a home screen and a button to enter the App Drawer. oiOS is lightweight and provides lag-performance free. Since iOS software and hardware are built by Apple alone, it is well-balanced. oiOS devices or iPhones are solely designed and developed by Apple. · Windows (closed source/vendor specific) oApps on the home screen are tiles. Swiping the tile to the left gives a list of apps installed on the device. oCustomization options are limited to changing colors and resizing the tiles. oWindows Phone is lightweight and provides a lag-free OS. oThe Windows store has the least number of applications of the three major operating systems. oMicrosoft Mobiles, formerly Nokia, is the leading Windows Phone provider.

Touchpad (on/off)

Turn the touchpad on or off.

Screen Locks

To secure access to a mobile device, such as a tablet or smart phone, configure the device's lock screen to use some sort of authentication. Several different types of lock screen authentication methods include: · Swipe lock. Most mobile devices are configured to use a swipe lock screen. This means that anyone can unlock the device with a simple swipe of the screen; there's no authentication at all. For obvious reasons, this is not very secure. · Biometric locks. The two most common biometric locks are fingerprint and facial recognition. With fingerprint recognition, the finger of the user is scanned and used to unlock the device. With facial recognition, the device's camera is used to scan the user's face and unlock the device. · PIN. A PIN allows a user to enter the correct four or six numbers in order to unlock the mobile device. · Pattern Unlock. Pattern unlock allows the user to create a line pattern on a nine point grid, used to unlock a mobile device. · Passcode. Passcode authentication uses a user-defined password to unlock the device. The password can be a mix of letters, numbers, and symbols

Bluetooth (on/off)

Turn Bluetooth on or off.

GPS (on/off)

Turn GPS on or off.

Policies and Procedures

Use policies and procedures to secure your mobile devices. · BYOD vs. corporate owned. Some organizations implement security policies that forbid users from connecting their personal mobile devices to the organizational network (wired or wireless). Some organizations allow mobile devices; in fact, they may even provide users with mobile devices. However, there is a risk in this situation that company data may be copied to these devices that could be compromised if a device is lost. As a safeguard, many of these organizations require that remote wipe be enabled on the device so that if it is lost or stolen, a command can be sent remotely to the device to remove all data on it. · Profile security requirements. Utilize an Acceptable Use Policy to specify how users: oConnect their personally-owned mobile devices to the organization's wireless network. If they can, the policy may also specify rules for what internet resources they are allowed to access using those devices. oUse company-owned computers for personal uses, such as shopping for personal items on ecommerce websites.

Wearable Devices

Wearable devices are a type of mobile device meant to be worn somewhere on the body. These devices range from being as simple as a fitness tracker wrist band to as complex as glasses or a virtual reality headset. Most wearable devices are designed to interface with another device. For example, a smart watch by itself has a limited set of functionality; however, smart watches are designed to connect to smart phones using Bluetooth. Doing this unlocks additional functionality, such as reading texts or answering phones calls through the smart watch.

Webcam

Webcams are camera and microphone systems that allow users to communicate through the internet with audio and video. Most laptops have a built-in webcam, but you can purchase one and connect it to the computer through a USB port.

Keyboard Repair

When experiencing problems with the keyboard: · Cleaning the keyboard might correct stuck keys or keys that will not display a character when typed. · If numbers type instead of letters (such as 1 for J, 2 for K, etc.), make sure that the Num Lock is turned off. · If the keyboard doesn't work, you can connect an external keyboard to continue using the system until the keyboard is replaced. When replacing the keyboard, be aware of the following: · You can replace the pointer stick pad by simply pulling off the old one and replacing it. · Screws at the bottom of the notebook case or underneath a plastic bevel on the top hold the keyboard in place. · A laptop keyboard is generally connected to the system board using a flat, ribbon-like cable. · You will typically need to remove the keyboard to replace other internal components (such as the processor, wireless card, or video card).

Wi-Fi Analyzer

Wi-Fi analyzers are special apps that can be used to troubleshoot Wi-Fi connectivity issues. Most Wi-Fi analyzer apps provide the following functionality: · Identify the number of APs that are broadcasting · Display the signal strength and channel of each wireless network · Obtain wireless network information (e.g., signal band, SSID, security mode, etc.)

Wi-Fi Calling

Wi-Fi calling allows your iPhone to place and receive phone calls and text messages over a Wi-Fi network. If you have a weak cellular signal but a solid Wi-Fi signal, your iPhone will automatically switch over and route calls and texts using Wi-Fi. You can only use this if your cellular carrier supports it.

Wireless Network Card Repair

Wireless network cards might be integrated onto the motherboard, or added through add-on cards. · Mini-PCI or mini-PCIe slots are used to add devices such as a wireless card. · Some card slots might be accessible through a panel on the bottom, or underneath the memory or the hard drive. Otherwise, you will typically need to remove the keyboard and the palm rest, or the rest of the case, to get at the expansion slots. · Wireless cards require an antenna. Connectors on the card connect to the antenna, which is usually a wire routed into the lid and around the display. · Be sure to reconnect both the antenna and keyboard connectors when reassembling.


Kaugnay na mga set ng pag-aaral

NRS326- Fluid + Electrolyte Socrative

View Set

Research Exam III Practice Problems

View Set

Chapter 12 Managing Individuals and a diverse Workforce

View Set

Management (Griffin) - Chapter 20

View Set

Bio 106 Exam Study Guide Chapter 4

View Set

Chapter 20 Trauma and Surgical Management

View Set