Week Ten: Mobile Devices

The weekly Objective for this week topics included the following aspects:

·         Define Operating Systems (OS) used with mobile devices.

·         Comparing hardware components used with mobile devices and laptops

·         Discussion how to configure, secure, synchronize, and troubleshoot mobile devices that use different operating systems.

·         Trouble shooting common mobile device issues.

·         Explain basic mobile device security.

·         Describe typical mobile device security and application troubleshooting issues.

It wasn’t long ago when mobile devices were only known to be used by few percent of the world populations. Forward to today, that isn’t the case anymore, and thanks to the innovation technology.

The operating system of a mobile device is completely different from the desktop operation. According to Meyers, “mobile devices are packed with tightly integrated hardware, aren’t designed to be upgraded by their users, and come with mobile-oriented operating systems.”

There is quite a similarity between hardware components used with mobile devices and laptops. Such similarity has to do with the facts that both have Graphical User Interface (GUI), Central Processing Unit (CPU), Apps (Applications), and many more. For example, Android smartphones come with the following three CPU: ARM, ARM64, and x86, and amount the three, the ARM is the simples of all because “it is properly optimized for battery consumption.”

Mobile devices can be configurated to meet users’ desires, and preferences. An example will be activating certain features and while deactivating others. Most mobile devices are manufactured with special types of security software protection without the users having to install one. Other than Apple iOS, Android devices give users the option for installing their only secure software. There are many different, similarity ways for troubleshooting devices with different OS, and they the following simple tasks that users can perform themself:

·         Check and Adjust Configuration

/Setting.

·         Close Running Apps.

·         Soft Reset.

·         Uninstall/Reinstall Apps.

·         Reset to Factory Default.

 

There are many others troubleshooting tasks that can be perform that aren’t being discuss here. Users can figure out some of the troubleshooting tasks on their own simply by searching the Internet. Just like desktop and laptop computers needing some forms of security applications to prevent from be hack, so as mobile devices. Security your mobile device will require these tools: Multifactor Authentication, Biometric Authentication, and Authenticator Applications. Downloading and installing Apps from a trusted sources like, Microsoft, Amazon, Google, and Apple is far better rather than from a none trusted sources. 

Comments

Popular posts from this blog