IT Essential Chapter 12 Mobile, Linux, and macOS Operating Systems
iOS Display & Brightness Menu
iOS Display & Brightness Menu When using an iOS device, to configure screen brightness, swipe up from the very bottom of the screen and slide the brightness bar up or down to vary the brightness. Alternatively, to configure brightness in the Settings menu, tap Settings > Display & Brightness then slide the brightness to the desired level, as shown in Figure 12-22.
Screen Locks and Biometric Authentication (12.2.1)
Setting screen locks and using biometric authentication are methods that can help protect against unauthorized access to a device. Such measures can prevent immedi- ate access to a device for an intruder.
iOS Location Services
iOS Location Services To enable GPS on iOS devices, tap Settings > Privacy, then toggle Location Services on, as shown in Figure 12-25.
iOS Screen Auto-Rotation Setting
iOS Screen Auto-Rotation Setting When using an iOS device, to enable automatic rotation, swipe up from the bottom or down from the top (depending on your device) to open the Control Center. Then tap the screen rotation lock icon, shown in Figure 12-19, until it is turned off.
NFC Payment (12.1.4.6)
Mobile payment refers to any payments made through a mobile phone. You can make mobile payments in several ways:
Virtual Assistants (12.1.4.8)
A digital assistant, sometimes called a virtual assistant, is a program that can understand natural conversational language and perform tasks for the end user. Modern mobile devices are powerful computers, which makes them a perfect plat- form for digital assistants. Popular digital assistants include Google Now for Android, Siri for iOS, and Cortana for Windows Phone 8.1 and Windows 10 Mobile. Digital assistants rely on artificial intelligence, machine learning, and voice recogni- tion technology, as shown in Figure 12-34, to understand conversational-style voice commands. As the end user interacts with a digital assistant, sophisticated algorithms predict the user's needs and fulfill requests. By pairing simple voice requests with other inputs, such as GPS location, digital assistants can perform tasks such as playing a specific song, performing a web search, taking a note, or sending an email.
Virtual Private Network (12.1.4.7)
A virtual private network (VPN) is a private network that uses a public network (usually the Internet) to connect remote sites or users together (see Figure 12-29). Instead of using a dedicated leased line, a VPN uses "virtual" connections routed through the Internet from the company's private network to the remote site or employee. Many companies create their own VPNs to accommodate the needs of remote employees and distant offices. With the proliferation of mobile devices, it was a natural move to add VPN clients to smartphones and tablets. When a VPN is established from a client to a server, the client accesses the network behind the server as if it were connected directly to that network. Because VPN protocols also allow for data encryption, the communication between client and server is secure. When the VPN information has been added to the device, the VPN connection must be started before traffic can be sent and received through it.
Android Brightness Menu
Android Brightness Menu When using an Android device, to configure screen brightness, swipe down from the very top of the screen and use the path Display > Brightness, then slide the bright- ness to the desired level, as shown in Figure 12-21. Alternatively, tap the Adaptive Brightness toggle to allow the device to determine the optimal screen brightness based on the amount of ambient light.
Android Location Services
Android Location Services To enable GPS on Android devices, tap Settings > Location, then tap on the toggle to turn on location services, as shown in Figure 12-24.
Android Screen Auto-Rotation Setting
Android Screen Auto-Rotation Setting When using an Android device, to enable auto rotation, open the notifications panel and turn on the auto-rotate function by tapping the screen rotation icon, indicated in Figure 12-18.
GPS (12.1.4.3)
Another common feature of mobile devices is the ability to work with the Global Positioning System (GPS). GPS is a navigation system, shown in Figure 12-23, that determines the time and geographical location of the device by using messages from satellites in space and a receiver on Earth. A GPS radio receiver uses at least four satellites to calculate position, based on the messages. GPS is very accurate and can be used under most weather conditions. However, dense foliage, tunnels, and tall buildings can interrupt satellite signals. GPS receivers must have line-of-sight to GPS satellites and do not work indoors. Indoor Positioning Systems (IPS) can determine location by triangulating the position of the device based on proximity to other radio signals, such as Wi-Fi access points.
Direct Mobile Billing
By using a mobile billing option during checkout, a user identifies himself or herself (usually through two-factor authentication) and allows the charge to be added to the mobile service bill. This type of billing is very popular in Asia and has several benefits: security, convenience, and no need for bank cards or credit cards. NFC Payment (12.1.4.6)
Premium SMS based transactional payments
Consumers send an SMS message to a carrier's special phone number containing a payment request. The seller is informed that the payment has been received and is cleared to release the goods. The charge is then added to the customer's phone bill. Slow speed, poor reliabil- ity, and poor security are a few shortcomings of this method. NFC Payment (12.1.4.6)
Enabling Wi-Fi Calling on Android
Enabling Wi-Fi Calling on Android To enable Wi-Fi calling on Android, tap Settings > More (under the Wireless & Networks section), tap on Wi-Fi Calling as shown in Figure 12-27 to expose the on/off toggle. Tap on the toggle to turn it on.
What Do You Already Know? - Locks (12.2.1.1)
It is imperative that a mobile device be protected by a screen lock. There are five types of screen locks: face, passcode, pattern, swipe, and fingerprint. Read the scenario and select the lock that is used in each case.
iOS GUI
On iOS, to increase security, the passcode is used as part of the encryption keyfor the entire system. Because the passcode is not stored anywhere, no one (includ- ing Apple) can gain access to the user data on iOS devices without the passcode.The system depends on the user providing the passcode before the system can be unlocked and decrypted for use. A forgotten passcode renders user data unreachable, as shown in Figure 12-39, and the user must perform a full restore from a backup saved in iTunes or iCloud. Restrictions on Failed Login Attempts (12.2.1.3)
Screen Calibration (12.1.4.2)
Screen Calibration (12.1.4.2) When using a mobile device, you may need to adjust the brightness of the screen (see Figure 12-20). When bright sunlight makes the screen difficult to read, increase the brightness level. Inversely, very low brightness is helpful when reading a book on a mobile device at night. Some mobile devices can be configured to automatically adjust the brightness depending on the amount of surrounding light. The device must have a light sensor to use auto-brightness.
Screen Orientation (12.1.4.1)
Screen Orientation (12.1.4.1) Most mobile devices can be used in either portrait or landscape mode, as shown in Figure 12-17. A sensor inside the device, called an accelerometer, detects how the device is being held and changes the screen orientation appropriately. Users can choose the viewing mode that is the most comfortable for them for different types of content or applications. Content is automatically rotated to the position of the device. This feature is useful, for example, when taking a photograph. When the device is turned to landscape mode, the Camera app also turns to landscape mode. Also, when a user is writing a text, turning the device to landscape mode automati- cally turns the app to landscape mode, making the keyboard larger and wider.
Security (12.3.2.3)
Security (12.3.2.3) Digital assets are very valuable, and the theft of these assets are a major threat to users and organizations. Proper security practices include methods of protecting credentials that allow access to these assets.
Contactless NFC (Near Field Communication)
This method is used mostly in physical store transactions. A consumer pays for goods or services by waving the phone near the payment system. Based on a unique ID, the payment is charged directly against a prepaid account, bank account, or credit card. NFC payments are also used in mass-transportation services, for public parking, and in many other consumer areas. NFC Payment (12.1.4.6)
Configuring a VPN Connection on Android
To create a new VPN connection on Android, tap Settings > More (under the Wireless & Networks section) > VPN, tap on the + sign to add a VPN connection, and enter the VPN information (see Figure 12-30).
Configuring a VPN Connection on iOS
To create a new VPN connection on iOS, tap Settings > General > VPN > Add VPN Configuration, then fill in the screen shown in Figure 12-32.
Restrictions on Failed Login Attempts (12.2.1.3)
When a passcode has been properly implemented, unlocking a mobile device requires entering the correct PIN, password, pattern, or another passcode type. In theory, a passcode, such as a PIN, could be guessed given enough time and persever- ance. To prevent someone from trying to guess a passcode, mobile devices can be set to perform defined actions after a certain number of incorrect attempts have been made. For Android devices, shown in Figure 12-37, the number of failed attempts before lockout depends on the device and version of Android OS. It is common for an Android device to lock when a passcode has failed from 4 to 12 times. After a device is locked, you can unlock it by entering the Gmail account information used to set up the device.
Wi-Fi Calling (12.1.4.5)
Wi-Fi Calling (12.1.4.5) Instead of using the cellular carrier's network, a modern smartphone can use the Internet to transport voice calls by taking advantage of a local Wi-Fi hotspot (see Figure 12-26). This is called Wi-Fi calling. Locations such as coffeeshops, work- places, libraries, and homes usually have Wi-Fi networks connected to the Internet. A phone can transport voice calls through a local Wi-Fi hotspot. If there is no Wi-Fi hotspot within reach, the phone uses the cellular carrier's network to transport voice calls. Wi-Fi calling is very useful in areas with poor cellular coverage because it uses a local Wi-Fi hotspot to fill the gaps. The Wi-Fi hotspot must be able to guarantee a throughput of at least 1 Mbps to the Internet for a good-quality call. When Wi-Fi calling is enabled and in use during a voice call, the phone displays "Wi-Fi" next to the carrier name.
Mobile Web Payments
With this method, a consumer uses the Web or dedi- cated apps to complete a payment transaction. This method relies on Wireless Application Protocol (WAP) and usually requires the use of a credit card or a pre-registered online payment solution, such as PayPal. NFC Payment (12.1.4.6)