Professional Documents
Culture Documents
CHAPTER 7 Summary: Laptops and Other Mobile Devices
CHAPTER 7 Summary: Laptops and Other Mobile Devices
Mobility
Mobility in information technology means the ability to access information electronically from different locations outside of the home or office.
Mobile connectivity is limited only by the availability of cellular or data networks. Mobile devices have self-contained power in the form of
rechargeable batteries, are generally small and lightweight, and do not rely on other connected peripheral devices, such as a mouse and
keyboard, to operate.
Laptops
Laptops are portable computers. They usually run full versions of operating systems such as Microsoft Windows, MacOS or Linux
Smartphone Characteristics
Smartphones differ from laptops in that they run special operating systems that are designed for mobile devices. Examples of these operating
systems are Google's Android and Apple's iOS. Smartphones may have limited OS
Smartphone Features
An additional feature of smartphones is location services. Most phones include global positioning system (GPS) functionality. A GPS receiver
in the phone uses satellites to determine the geographic location of the device
Smartwatches
Smartwatches are a type of wearable that includes a microprocessor, a special operating systems, and apps. Sensors in the smartwatch can
gather data about various aspects of the body, such as heart rate, and use Bluetooth to report this information back to another device, such
as a smartphone
Fitness Trackers
Fitness trackers are similar to smartwatches but are limited to monitoring the body such as physical activity, sleep, and exercise. FitBit is a
popular example that monitors heart rate and the number of steps taken
Laptop Motherboards
Mini PCIe
It has 54 Pins and support the same standards as Mini PCI with the addition of 802.11n and 802.11ac wireless LAN Standards
Color
The color printing process uses the primary colors cyan, magenta, and yellow, White (CMY)
Document Feeder
Cloud Printing
Cloud printing is sending a print job to a remote printer. The printer could be at any location within your organization’s network. Some printing
companies provide software that you can install and then send print jobs to their closest location for processing
Hardware Optimization
Some printers can be upgraded to print faster and to accommodate more print jobs by adding hardware. The hardware may include
additional paper trays, sheet feeders, network cards, and expansion memory
Advantages of VMS
Manageability: The ability to move, copy and isolate VMS
Sustainability: Energy saving by the way of less hardware and electricity
Availability: The ability to snapshot, clone, and run redundant VMS
Security: Isolation of VMs and application
• Virtualization We need an admin who has to take care of creation of server and its management on the other end don’t need such
admin in cloud, anyone can create and manage as it if fully automated
• Virtualization is a technology that enables a single computer to host multiple virtual computers that share the same host computer
hardware
• Cloud computing is a technology that enables the separation of applications from the hardware
• Virtualization solves these issues by consolidating many virtual servers onto a single physical server, taking advantage of idle
resources and reducing the number of servers required to provide services to users
• Cloud computing provides users with on-demand delivery of computer services over the Internet. Most of us already use these
services when we access online music services or online data storage
Example
Customer / Menu / Waiter and Kitchen
CHAPTER 10 Summary
Windows Installation
An operating system (OS) has a number of functions. One of its main tasks is to act as an interface between the user and the hardware
connected to the computer. (Muti User, Multitasking, Multiprocessing, Multithreading)
Checking OS Compatibility
• An OS must be upgraded periodically to remain compatible with the latest hardware and software. It is also necessary to upgrade an
OS when a manufacturer stops supporting it.
• Upgrading an OS can increase performance.
• When newer versions of an OS are released, support for older versions is eventually withdrawn.
Several tasks
• Account creation
• Windows update
• Device Manager
CHAPTER 11 Summary
Personalizing the Windows Desktop
• Themes – Background
• Desktop Icons
• Task bar
• Display
• Graphis control panel
• Task manager
• File Explorer
• My PC – Properties
• My hard drive – Properties
• Control Panel
• Internet options (home page, etc.)
• Homegroup
• Power options
• Notifications and Actions
• Remote settings/Desktop
• Device and printers
• Sound
• Default programs
• Bit locker
• Event viewer
CHAPTER 13 Summary
Malware
Malware is software developed by cybercriminals to perform malicious acts. In fact, the word malware is an abbreviation of malicious
software.
Sources of Malware
When a malware protection program detects that a computer is infected, it removes or quarantines the threat. However, the computer is most
likely still at risk
update your anti-malware software and perform full scans of all your media
When malware is discovered on a business computer, you should remove the computer from the network to prevent other computers from
becoming infected
Firewalls
A software firewall is a program that provides firewall services on a computer to allow or deny traffic to the computer. The software firewall
applies a set of rules to data transmissions through inspection and filtering of data packets
Software firewall features are applied to a network connection. Software firewalls have a standard set of inbound and outbound rules that are
enabled depending on the location of the connected network.
• A firewall protects computers and networks by preventing undesirable traffic from entering internal networks
• A firewall could allow outside users-controlled access to specific services
• Host-based firewall – Using software such as Windows Defender Firewall.
• Small office home office (SOHO) – Network-based solution using a home or small office wireless router. These devices not only
provide routing and WI-FI services, but they also provide NAT, DHCP, and firewall services
Wireless Security
Wi-Fi Configuration Best Practices
Radio waves used to transmit data in wireless networks make it easy for attackers to monitor
and collect data without physically connecting to a network
Firmware Updates
Most wireless routers offer upgradable firmware