COMPTIA A+ CERTIFICATION EXAM CORE 1 (220-1001) OBJECTIVES COVERED IN THIS CHAPTER:
This chapter will focus on the exam topics related to mobile devices. It will follow the structure of the CompTIA A+ 220-1001 exam blueprint, objective 1, and cover the seven subobjectives that you will need to master before taking the exam. The Mobile Devices domain represents 14 percent of the total exam.
Whether you choose to call them laptops, notebooks, tablets, or something different is mostly a matter of semantics. In this section, I’ll discuss some of the basic components of laptops and their installation (when possible and called for). In many cases, the components are the same as in a desktop computer.
The following topic is addressed in exam objective 1.1:
Replacing hardware and devices in a laptop can be a challenge because of the size limitations. The best way to determine the proper disassembly method is to consult the documentation from the manufacturer.
Some models of notebook PCs require a special T-8 Torx screwdriver. Most PC toolkits come with a T-8 bit for a screwdriver with interchangeable bits, but you may find that the T-8 screws are countersunk in deep holes so that you can’t fit the screwdriver into them. In such cases, you need to buy a separate T-8 screwdriver, available at most hardware stores or auto parts stores.
Prepare a clean, well-lit, flat work surface; assemble your tools and manuals; and ensure that you have the correct parts. Shut down the PC, unplug it, and detach any external devices such as an external keyboard, mouse, or monitor. In this section, with these general guidelines for opening the laptop in mind, you’ll look at replacing various components of a laptop. Always ensure that you have grounded yourself before working with computer components of any kind. Use an antistatic wristband and attach it to the case.
When replacing the keyboard, one of the main things you want to keep in mind is not to damage the data cable connector to the system board.
Before changing a hard drive, you should back up the old hard drive if the data is needed. Then, to change the hard drive, follow these steps:
Although many devices still use a magnetic disk hard drive, most laptop vendors are moving to using either solid-state drives or hybrid drives, which are a combination of magnetic disk and solid-state technology.
The advantage of solid-state drives is that they are not as susceptible to damage if the device is dropped, and they are generally faster because no moving parts are involved. They are, however, more expensive, and when they fail, they don’t typically display any advanced warning symptoms like a magnetic drive will do.
Hybrid storage products have a magnetic disk and some solid-state memory. These drives monitor the data being read from the hard drive, and they cache the most frequently accessed bits to the high-speed flash memory. These drives tend to cost slightly more than traditional hard drives (but far less than solid-state drives), but the addition of the SSD memory for cached bits creates a surprising improvement in performance. This improvement will not appear initially because the drive must “learn” the most frequently accessed data on the drive.
The 2.5-inch hard drives are small (which makes them attractive for a laptop, where space is at a minimum), but in comparison to 3.5-inch hard drives, they have less capacity and cache, and they operate at a lower speed.
Moreover, whereas 2.5-inch drives operate from 5,400 to 7,200 rpm, 3.5-inch drives can operate from 7,200 to 10,000 rpm. However, 2.5-inch drives use about half the power (again, good for a laptop) of a 3.5-inch drive (2.5 W rather than 5 W).
The 1.8-inch drive is the smallest of the three I’m discussing here. It was originally used in subnotebooks and audio players. It has the least capacity of the three, with the largest up to 320 GB. It has only two platters, each of which can hold 220 GB maximum.
There should be a panel used for access to the memory modules. If the panels are not marked (many are not), refer to your laptop instruction manuals to locate the panel on the bottom.
Smart card readers come in both internal and external versions. External versions will most likely plug into a USB port, and replacing them is easy; all you do is plug them in. It is possible that you may need to install a driver for the device; and if so, you should use the installation utility that came with the device if there is one. There are also external readers that use the ExpressCard slot.
Internal readers will reside in a drive bay as a hard drive or optical drive would. Take the following steps to replace one:
Replacing an optical drive is usually easier than replacing a hard drive or memory. Remove the screw that secures the optical drive to the bottom of the notebook. Grasp the edge of the optical drive bezel and slide the optical drive out of the base enclosure. Insert the new optical drive into the base enclosure until the connector is seated and replace the screw that secures the optical drive to the bottom of the notebook.
Both 802.11 and Bluetooth wireless cards that are built in can be replaced if they go bad. Sometimes they reside near the memory, so you would open the same panel that holds the memory. In other cases (such as a Dell Inspiron), you have to remove the memory, keyboard, optical drive, and hand rest to get to it. The Bluetooth card may be located in the same place, or it may be located at the edge of the laptop with its own small panel to remove. Consult your documentation.
Once you’ve found either type of wireless card, disconnect the two antenna contacts from the card. Do not pull by the wire; pull by the connector itself. Remove any screws from the wireless card and gently pull out the card from the slot. Insert the replacement card into the slot at a 45-degree angle, replace the screws, and reconnect the antenna to the adapter. Replace the parts you were required to remove to get to the card, reversing your steps carefully.
Changing an external mobile broadband card is as simple as pulling the old USB stick out and plugging in the new one. Because USB is plug and play, you shouldn’t have to do anything, but even in the case of an issue the manufacturer usually provides a CD with the drivers or you can obtain them from the vendor website.
Changing an internal card is much like the process of changing an internal 802.11 card; follow the instructions indicated in the previous section.
When changing a graphics card, you must ensure that the card is supported by the laptop and the operating system. This is the process:
Since many of the wireless cards are mini-PCIe, replacing any other card in this format will follow the same procedure, with the exception of removing and reconnecting the antenna cables (present only on the wireless cards). You can find the location of the card in the documentation. Make sure that the new card is firmly inserted into the slot after removing the old card.
The screen is one of the more involved parts to replace, which is why many people throw a laptop away when the screen gets damaged. It’s possible to replace a damaged screen, but you have to remove a lot of parts to do so. Start by removing the battery and then hold the power on for 10 seconds to drain the power out of the capacitors.
Remove all the screws on the back of the unit and then turn the laptop over. Remove the speaker bezel and you will see six wires coming from the old screen to the laptop. Remove the keyboard (see the instructions in the section “Keyboard”). Under the keyboard, locate where these six wires connect, and disconnect them. Make note of what went where so you can replace them correctly when you reconnect the new screen.
Remove the screws that are holding the old screen to the hinges of the laptop. Position the new screen in place and screw it into the hinges. Reroute the six wires coming from the new screen through any holes or spaces that lead them to their connection points. These are usually for the video cable, mic jacks, and wireless antenna. Reconnect the keyboard and reinstall it. Replace all parts that were required to get at the keyboard and replace all screws on the back of the unit.
These are general guidelines for this replacement, and you should always check the documentation for any departures from this general approach.
Replacing a bad DC jack usually requires soldering. If this is not a skill you possess, just replace the motherboard. If you want to attempt it, remove all the parts to get to the motherboard. In some cases, the old DC jack can still be used; it just needs to have the old solder removed and replaced. If that is not the case, remove the old DC jack by unsoldering it from the connector. Then put the new jack in place and solder it to the connectors. Replace all the parts and pieces you removed to get to the board. In general, a bad DC jack usually means a new board.
Replacing the battery in a laptop is simply a matter of removing the battery storage bay, removing the old battery from the bay, inserting the new battery into the bay, and replacing the bay. Determining the battery type for the replacement will probably take longer than the replacement procedure. In fact, many users carry extra batteries for situations where they know they will need to use the laptop for longer than the battery life (such as a long plane trip) and change the battery as needed.
This is another repair where many parts must be removed just to get to the piece to be replaced.
Several of the replacement procedures in this section have involved plastic pieces that either hold something in place or cover something. These pieces—which are important enough to be noted specifically as a component of this exam—may be held in place by screws, or they may use snaps. In either case, it is easy to damage these parts (especially the snaps) in the disassembly or assembly process. If this occurs, consult the documentation for the laptop. Even these pieces will have part numbers and can be ordered. It’s easier to just take great care not to damage them in the first place. The best way to prevent damage to these pieces is to never force a piece in place. If you meet resistance, back out and try to determine what the obstruction is. Restoring the full case is also important. Leaving open spaces can tamper with the air circulation as it was originally designed, resulting in overheating. A mobile device, particularly a laptop, will quickly overheat if the case is compromised in any way.
To replace speakers, first follow the earlier instructions to remove the hard drive, the battery pack, and all the screws holding the body together.
Replacing the system board requires removing all parts discussed up to this point since they all are either in the way of or connected to the motherboard. Once that is done, take the following steps:
If the CPU is not built into the motherboard, it can be replaced. If it is built in, then you will be replacing the motherboard as well. If you are upgrading the processor and not simply replacing it, make sure your BIOS will support the new processor. It may be that you need to flash the BIOS to support the new CPU. You can determine this at the website of either the CPU maker or the laptop. This is important!
Follow the earlier instructions to remove the case, keyboard, and display. This will allow you to separate the two parts of the case.
In some cases, you may encounter a laptop that allows you to get at this from the bottom without removing the keyboard and display. This is why it is best to follow the specific directions in the documentation to save unnecessary component removal.
List the steps to install or replace laptop components. This includes but is not limited to keyboards, hard drives, memory, optical drives, wireless cards, mini-PCIe cards, screens, DC jacks, batteries, touchpads, speakers, system boards, and CPUs.
The display of a laptop contains more components than you may expect. In this section, I’ll discuss these components and, in some cases, cover competing technologies. The following topics are addressed in exam objective 1.2:
Laptop displays can use any of several technologies: LCD, LED, or OLED. This section provides a quick survey of these display types and their characteristics as they apply to laptops. For more information on all three display types, see objective 3.6 in Chapter 3, “Hardware.”
LCDs have completely replaced CRTs as the default display type for both laptops and desktops. Two major types of LCDs are used today: active matrix screens and passive matrix screens. Their main differences lie in the quality of the image. Both types use some kind of lighting behind the LCD panel to make the screen easier to view. One or more small fluorescent tubes are used to backlight the screen.
Passive Matrix A passive matrix screen uses a row of transistors across the top of the screen and a column of them down the side. It sends pulses to each pixel at the intersection of each row and column combination, telling it what to display. Passive matrix displays are becoming obsolete because they’re less bright and have poorer refresh rates and image quality than active matrix displays. However, they use less power than active matrix displays do.
Active Matrix An active matrix screen uses a separate transistor for each individual pixel in the display, resulting in higher refresh rates and brighter display quality. These screens use more power, however, because of the increased number of transistors that must be powered. Almost all notebook PCs today use active matrix. A variant called thin-film transistor (TFT) uses multiple transistors per pixel, resulting in even better display quality.
There are two major LCD technologies used in LCDs. This section discusses the pros and cons of each.
Twisted Nematic (TN) Twisted nematic (TN) is the older of the two major technologies for flat-panel displays. While it provides the shortest response time, has high brightness, and draws less power than competing technologies, it suffers from poor quality when viewed from wide angles. It suffers color distortions when viewed from above or from the sides.
In-Plane Switching (IPS) This is a newer technology that solves the issue of poor quality at angles other than straight on. It also provides better color quality. However, it has much slower response time and is more expensive. Newer versions like Super-IPS (SIPS) make improvements on the response time.
LCDs can use two kinds of backlighting: LED-based and fluorescent. Fluorescent is an older technology and consists of a fluorescent tube connected to a voltage inverter board that provides power to the backlight. LED-based is a newer technology and uses a matrix of LEDs for the backlighting. Table 1.1 compares the two technologies.
Table 1.1 Fluorescent and LED
Characteristic | Fluorescent | LED |
Size | Thicker and heavier | Thinner and lighter |
Cost | Cheaper | More expensive |
Power | High power consumption and heat generation | Lower power consumption and heat generation |
Brightness | Lower | Higher |
Lifespan | Shorter | Longer |
LED-based monitors are still LCDs (they still use liquid crystals to express images on-screen), but they use a different type of backlight than what is normally used. Several types of backlights are used with LED.
The most common for computers is white LEDs (WLEDs). Using a special diffuser, the light is spread to cover the entire screen. A more expensive type is RGB LED. Instead of using WLEDs on one edge of the screen, with RGB LCD layers, like the previous technology, RGB LEDs are aligned all over the panel matrix. Each LED is capable of red-, green-, or blue-colored light. This gives the display more accurate color than WLEDs. Finally, there is WLED on a flat array, covering the entire screen (like an RGB LED using only WLEDs). Currently, it’s used only in LED-backlit HDTVs. As you’ve seen, however, computer output can be directed to the HDTV screen.
An organic light-emitting diode (OLED) is another type of LED technology. It uses an emissive electroluminescent layer of organic compounds that emit light in response to an electric current. An interesting characteristic of these displays is their flexibility and transparency. This means they can roll up for storage (like a mat), and you can see through the display to objects behind the display. These displays are now available but quite expensive.
The wireless antenna is located in the display. You may recall that when replacing a laptop screen, you encountered a number of wires coming from the screen to the laptop body. One of these is the cable that connects the wireless antenna (located in the display) with the wireless card located in the body of the laptop.
The antennas built into the display usually work quite well. In any specific situation you may improve your signal by moving the laptop around. This changes the polarization of the antenna and may cause it to line up better to the incoming signal.
Many displays today, especially laptop displays, have a webcam built in. They come ready to go with all drivers preinstalled and nothing to configure or set up. If you need to replace the webcam, you will have to disconnect the laptop lid (which holds the display) from the base, remove the screw covers and screws holding the display bezel in place, and remove the bezel. After removing the screws holding the mounting rails to the hinges, remove the LED screen from the lid assembly. Now you can get at the camera, but first carefully remove the tape that holds the camera cable in place and remove it and the camera. Attach the replacement cable to the new camera, install the new camera, and reverse these steps.
While many desktop systems lack a built-in microphone, almost all laptops have one. In some cases this microphone will be located on the laptop bottom, but in many cases it will be in the display next to the webcam or off to the side. If you need to replace it, you will need to take the same steps to get inside the display that you took for the webcam.
When you unhook the lid from the bottom, you will need to unplug several things from the board, and one of those will be the microphone cable. If the microphone is not working (which it probably isn’t or you wouldn’t be replacing it), take a moment to inspect the cable. Sometimes the cable can be cut by the constant opening and closing of the case (it shouldn’t, but sometimes it does happen). You may be able to repair the cable without replacing the microphone.
If that is not the case, remove the microphone and cable and replace both with the new mic and cable. Reverse the steps to get into the display, reconnect the cables to the board, and put the back on the bottom.
An inverter is a component that takes DC power and converts it to an AC form that can be used by the LCD screen. It is implemented as a circuit board that is located behind the LCD. If problems with flickering display or dimness occur, the inverter is a prime suspect.
If the inverter needs to be replaced, you should be aware that it may contain stored energy, so it may need to be discharged to be safe.
Digitizers read pressure applied to the surface of the display and are what make touchscreens work. In some cases, they work with a stylus or small pen-like device; in others, you simply touch the screen with your finger. The digitizer is a thin piece of clear material that fits on top of the display. It has its own cable just as the display itself does. If it gets cracked, which often happens, it can be replaced without replacing the display itself. Typically when you perform this replacement, you will have to open the display lid, as I covered earlier, and separate the digitizer from the display. It is usually glued to the display, and you can use a hair dryer to heat the glue to make removing it easier. When you put the new digitizer in, you may need to reheat the glue on the display to stick them back together.
Differentiate the types of displays available in laptops. Two major types of LCDs are used today: active matrix screens and passive matrix screens.
Describe the location and operational characteristics of the wireless antenna in a laptop. The wireless antenna is located in the display. Moving the laptop changes the polarity of the antenna and may result in a better signal.
Identify the location and function of the inverter. An inverter is a component that takes DC power and converts it to a form that can be used by the LCD screen. It is implemented as a circuit board behind the LCD.
Because of the nature of their physical implementation, laptops have some features not found in desktops and some issues that need to be handled differently than with desktops. In this section, I will discuss some of these features and issues along with the use of some special function keys. The following topics are addressed in exam objective 1.3:
Special function keys exist in both desktops and laptops, but in older laptops function keys have extra functions that may not be present in desktops. These functions are indicated by icons below the letters (F1, F2, and so on), and in the lower-left corner of the keyboard is a key marked Fn. When this key is held down, a function key will perform the function of its icon instead of its usual function. This section describes some of the most common uses of these keys, although manufacturers sometimes implement these keys differently, and some special functions don’t use Fn keys, so you should consult the documentation.
When additional displays are connected to the laptop (for example, a projector or second monitor), holding down the Fn key and pressing the function key with an icon of a monitor (or sometimes a laptop display and second screen) will move the active screen from display to display (or display to a projector) and then to a setting where all monitors have the same output. This is valuable when making a presentation or to direct the image to the projector or the laptop screen. It is also worth noting that various laptop keyboards implement this function on different keys, including F1, F4, and F8.
There is also a function key that will turn the wireless off and on; this key usually has an antenna icon, or perhaps an airplane for airplane mode, and you may not have to hold the Fn key to use it. If wireless does not work (especially if the system is telling you to turn the wireless on), check this setting. It is easy to hit this key and disable the wireless!
Just as you can turn off the wireless (802.11) connection, you can also turn off the cellular (WWAN) connection (if one exists on the device). You will probably need to refer to the device’s documentation to identify the exact key.
On the top row where the keys labeled F1–F12 are located, there are usually a couple of keys (typically F8 and F9) with icons that look like speakers. These keys can be used to raise and lower the volume of the sound. If the icon is blue, you have to hold down the Fn key. Otherwise, you do not need to use the Fn key to activate them. (As a matter of fact, if you hold down the Fn key and use the F8 key, you may be changing the location of the display output, as described in the section “Dual displays.”) If these keys are not present, consult the documentation for the key to use in conjunction with Fn to lower and raise the volume. Most laptops also include a mute button marked as such.
There are usually a couple of function keys (often F4 and F5) with sun icons with arrows pointing up and down, respectively. They could also be located on the lower right on the keyboard. These keys can be used to increase and decrease the brightness of the display. As with the volume settings described in the previous section, you do not need to use the Fn key to activate them. If these keys are not present, consult the documentation for the key to use in conjunction with Fn to increase and decrease the brightness.
In most cases, the same key that turns 802.11 wireless off and on also does the same for Bluetooth. See the section “Wireless (on/off).”
Some keyboards come with backlighting. These models will usually allow you to turn the backlighting on and off by using the Fn key in combination with another key, such as the Z key on some models. Consult the documentation to determine which key combination will perform this function.
While touchpads provide you with a way to operate without a mouse, there are cases when you don’t want to use the touchpad, and it gets in your way when typing. In other cases, the touchpad does not work, simply because it has been turned off. So, how do you enable and disable the touchpad? It can be done using either software or hardware.
In some cases, you may find there is a touchpad icon in the notification area. If there is, you can right-click or double-click it, and in the settings you should find an enable/disable feature. If there is no icon, it may be possible to go to the mouse settings in Control Panel and find touchpad settings. Finally, you can always open Device Manager and enable and disable the touchpad from there.
There also is usually a way to physically enable and disable the touchpad. This varies from laptop to laptop. For example, on a Lenovo, you hit a location in the upper-right corner of the touchpad, and it acts as a toggle switch between on and off. Consult the documentation that came with the laptop, or look on the vendor’s website.
The screen orientation refers to the position of the image on the screen. This is changed by “rotating” the screen. For example, if you rotated the screen 180 degrees, the image would be upside down. Rotating the screen can be done either by using the display settings or in some cases by using a special key combination. In most cases, if you right-click the desktop, you will find the option to rotate in various ways in the menu. It may also be under the Graphics Options menu, as shown in Figure 1.1.
Many laptops also offer keys that are used with media players. For example, you can fast-forward (or go to the next track), rewind (go to the previous track), and stop the player. These keys may have a special location, or they may be included as function keys at the top of the keyboard. If they are in the function keys, you will need to hold down the Fn key as usual. In Figure 1.2, they are located at the top of the keyboard.
Many devices now come with a built-in GPS feature. You can enable and disable the GPS using the privacy settings in Windows. While you will probably find it is enabled by default, you can disable it in Windows 10 by bringing up the Charms bar. At the bottom, choose the Settings charm. Tap or click the Change PC Settings link and then select Privacy on the left. Choose Location. On this page you can select to either turn it off completely or turn it off for certain applications, as shown Figure 1.3.
Airplane mode suspends many of the device’s signal-transmitting functions. It’s called airplane mode because it disables the transmission of signals that interfere with aircraft signaling (or so they say). Enabling and disabling this mode can be done either in Windows or in some cases by using a special key on the keyboard.
To enable and disable it in Windows 10, navigate to the PC settings, as discussed in the “GPS (on/off)” section. In the PC settings, select Network. Then select Airplane Mode. On the right you will see a button to toggle between on and off, as shown in Figure 1.4. There will be separate controls for Wi-Fi and Bluetooth.
On many laptops this can also be done using one of the function keys. If this feature is present on the laptop, the key will have an airplane icon on it. Use it as you would any function key to toggle between off and on.
Some notebook PCs have optional accessories called docking stations or port replicators. They let you quickly connect/disconnect with external peripherals and may also provide extra ports that the notebook PC doesn’t normally have.
A docking station essentially allows a laptop computer to be converted to a desktop computer. When plugged into a docking station, the laptop has access to things it doesn’t have stand-alone—the network, a workgroup printer, and so on. The cheapest form of docking station (if it can be called that) is a port replicator. Typically, you slide a laptop into the port replicator, and the laptop can then use a full-sized monitor, keyboard (rather than the standard 84 keys on a laptop), mouse, and so on. Extended, or enhanced, replicators add other ports not found on the laptop, such as PC slots, sound, and more. The most common difference between port replicators and docking stations is that port replicators duplicate the ports the laptop already has to outside devices, and the docking station expands the laptop to include other ports and devices that the laptop does not natively have.
Laptops can support plug and play at three levels, depending on how dynamically they’re able to adapt to changes.
Cold Docking The laptop must be turned off and back on for the change to be recognized.
Warm Docking The laptop must be put in and out of suspended mode for the change to be recognized.
Hot Docking The change can be made and is recognized while running normal operations.
Each docking station works a little differently, but there is usually a button you can press to undock the notebook from the unit. There may also be a manual release lever in case you need to undock when the button is unresponsive. Moreover, the docking station must be purchased from the same vendor you purchased the laptop from because docking stations are vendor-and model-specific.
Port replicators are a form of docking station and were discussed in the previous section.
Laptops can be easily stolen. Therefore, they come with a lock slot to which a cable lock can be attached. Figure 1.5 shows the lock slot, and Figure 1.6 shows the connected lock (sometimes called a Kensington lock).
Many mobile devices today have a removable screen. While it appears that the screen is removable, you are actually unhooking the keyboard because the computer is contained in the display. With the keyboard detached, you can use the device as a tablet, and with the keyboard attached, you can interact with the device as you would a laptop.
Many of these same devices also allow for the rotation of the screen when it is attached to the keyboard. This might be a rotation within the frame of the screen, or it could be a rotation in a circle.
Describe the purpose of special function keys. In the lower-left corner of the keyboard is a key with blue text that says Fn. When this key is held, other keys with a similar blue marking (such as F1–F12) will perform a different function than their normal function.
Differentiate between docking stations and port replicators. A docking station essentially allows a laptop computer to be converted to a desktop computer. Extended, or enhanced, replicators add other ports not found on the laptop, such as PC slots, sound, and more. The most common difference between port replicators and docking stations is whether the peripheral provides network access and expands the laptop’s capabilities.
Describe approaches to the physical security of a laptop. Laptops come with a lock slot to which a cable lock can be attached. Also, there is a lock on some models for the lid of the laptop.
At one time, the term mobile devices referred only to notebook laptops, tablets, and PDAs. Today this category includes all sort of devices that at one time were only ideas. In this section, you’ll look at digital devices that have had their capabilities greatly expanded, such as smart cameras that have become essentially computers with a lens, and smart watches and fitness monitors that almost become part of their owner. The following are the topics covered in exam objective 1.4:
Tablet devices have been in existence in some form or fashion since the early 1990s. Early on they were proprietary devices that didn’t have a lot in common with desktop computers, but increasingly the two form factors have gravitated toward one another; now, many new tablets run the same operating systems that are run on desktop systems. Most tablet computers run one of three operating systems: Android, iOS, or Windows 10.
The tablet market was changed significantly with the release of the iPad by Apple. It was the most successful tablet ever at its time of release, and it set the standard for others to meet. Today, typical features of tablets include the following:
Tablet devices today use touchscreen displays rather than keyboards, although keyboards can be attached. Some, such as the Microsoft Surface, can be attached and detached at will from a keyboard that also acts as a stand and a cover for the device. In most cases, tablets require applications written for the platform, although the Surface can run the Windows 10 operating system and thus can also run regular desktop applications.
As phones have become smarter and smarter, they more and more resemble computers rather than phones. Today’s smartphones are really computers that can make calls. They have touchscreen interfaces, an on-screen keyboard that can be brought up to input data, and sometimes even motion sensors and mobile payment mechanisms.
Moreover, the drive by organizations and individuals to create applications for these devices has exploded. Every week it seems someone has designed and created an application that turns the phone into some new gadget! Because of this phenomenon, the smartphone has become almost part of the body to several younger generations of users.
Most of these devices run either the iOS or Android operating system, although Microsoft continues to release Windows phones that run a special Windows OS for the device. The latest is Windows 10.
Since the days of Dick Tracy’s futuristic phone watch, we have waited for wearable technology to arrive, and it has. In this section, I’ll survey some of the latest examples of digital devices created to be worn.
Smart watches that are computers on your wrist have arrived! Although the jury is still out on the long-term viability of the smart watch, when Apple introduced one in 2015, most in the industry began to take the devices seriously. These devices run either proprietary operating systems or Android. The Apple model runs an operating system called Watch OS.
These devices are typically paired to a smartphone for the purpose of accessing calls and messages, and they contain GPS features as well. The following are some of the features you may find in these smart watches:
While many smart watches can also act as fitness monitors, there is a class of devices that specializes in tracking your movement. Fitness monitors read your body temperature, heart rate, and blood pressure. They do this while also tracking where you are for the purpose of determining the distance you ran or walked and the time it took to do so.
Some of the devices, called fitness trackers, are wrist bands that can track the information discussed and communicate wirelessly to an application located on a computer. One of these is shown in Figure 1.7. Other, more sophisticated units combine a strap that goes around the chest with a watch or band that collects the information gathered by the sensors in the band.
Extended reality is an exciting new field that includes both augmented reality and virtual reality. Both concepts involve wearing special headsets that deliver the visual experience. While reality immerses the user into a virtual environment, much like a four-dimensional game, augmented reality involves glasses that while permitting a clear vison of the real world, can project graphics and text onto this view using a small side screen. A virtual reality headset is shown in Figure 1.8.
By now, everyone has heard about and probably seen Google Glass, the most well-known and recognizable computing device worn as glasses. Just in case you haven’t, Figure 1.9 shows a drawing of the glasses.
While worn as glasses, they also have a small screen just to the side of one of the eyes that houses the computer screen (think Cyborg). The user can view the screen at any time by just casting a glance at it. Many promising uses have been proposed for the devices, with a number in the healthcare field. Although sale of the devices to individuals was halted, sales to organizations that have or are working to find ways to use the glasses continue.
Another similar device that is not based on glasses but around a headset format is the HC1 headset computer by Zebra. It can respond to voice commands and body movements. One of these is shown in Figure 1.10.
While these devices typically have Internet access and can be used for Internet browsing, the main job e-readers were created for is reading. These devices have proven to be more popular with older users because younger users seem to have grown up reading everything on a computer and see no reason for another device. Older users, on the other hand, who are still struggling with the move from reading printed material to reading on a device, like the idea of a device dedicated to enhancing their reading experience.
The Kindle was the first of these devices to garner widespread acceptance. The Nook soon followed. Both enjoyed good sales until other rivals began to enter the market. Sales of these devices are now in decline because of the aging of the main customer base. The following are some of the features found in these devices:
A global positioning system (GPS) uses satellite information to plot the global location of an object and use that information to plot the route to a second location. GPS devices are integrated into many of the mobile devices discussed already and are used for many things, but when I use the term for a stand-alone device, I am usually referring to a navigation aid.
These aids have grown in sophistication over time and now not only can plot your route but also help you locate restaurants, lodging, and other services along the way. Another use for these devices is tracking delivery vehicles and rental cars.
Describe the common features of tablets. These features include cameras (in some cases dual), GPS, handwriting recognition, and solid-state hard drives support.
Describe some items that are considered wearable technology. Wearable technology includes smart watches, fitness monitors, Google Glass, and headset computers.
Mobile devices in many cases have the same connection types and ports as laptop and desktop computers, but the accessories can vary somewhat. In this section, you’ll look at the types of ports and accessories you will find on mobile devices. Specifically, I will cover the following topics:
Mobile devices possess both wireless and wired connection options. In this section, I’ll cover both types.
While mobile devices may not have as many wired options as desktop devices, they still can have a wide range of physical port types.
The two most common ports found on mobile devices are micro-USB and mini-USB. Both are small–form-factor implementations of the USB standard, the latest of which is USB 3.1. In Figure 1.11, the mini-USB and micro-USB connectors are compared to the regular USB connector.
The USB-C is a new port type that can accept either end of its cable, and it doesn’t matter if it’s upside down! USB-C, also known as USB Type-C, is a 24-pin USB connector system, which is distinguished by its two-fold rotationally symmetrical connector. All Thunderbolt 3 cables will work as USB-C cables as well.
The data rates for various types of USB are in Table 1.2.
Table 1.2 USB speeds
Type | Speed |
1.0 | 187.5 KB to 1.5 MB |
2.0 | 60 MB |
3.0 | 625 MB (super speed) |
3.1 | 1.25 GB |
3.2 | 2.5 GB (super speed) |
The Lightning connector from Apple is an eight-pin connector that while not standard has advantages over USB, according to Apple. The following are some of these advantages:
Figure 1.12 shows a Lightning connector next to a USB cable.
When one device is connected to another device for the purpose of using the Internet connection, it is said to be tethered to the device providing the access. While use of this connection can be done by using 802.11, it can also be done connecting through Bluetooth or a USB cable between the devices. Even with unlimited data programs, the tethering (or mobile hotspot as it is also called) has a limited amount of data, and then the hotspot function only is throttled (max speed reduced).
Many mobile devices have proprietary ports that they use either for power or for communication. While this was widespread at one point, vendors have gradually moved toward using standard physical implementations of both power and communication ports. While I can’t cover all of these, the best examples are the ports used by Apple in its devices.
Apple uses what it calls the Lightning connector for power. Although it makes an adapter for this connector to convert it to mini-USB, it doesn’t encourage its use, because of the limitations the adapter places on the functionality of the proprietary connector.
The following are other examples of proprietary connectors:
For the most part, you will find that many vendors have chosen to adopt standard connection types for both power and communication.
Mobile devices can have several types of wireless connection options. In this section we’ll look at those.
Near Field Communication (NFC) is a short-range technology that allows mobile devices to establish radio communication by touching one another or by coming in close proximity to one another. The technology was first used in Radio Frequency ID (RFID) tagging and was implemented on mobile devices first as a way to share short-range information and later as a method to make payments at a point of sale. It operates by reading tags, which are small microchips with antennas that can in some cases only be read and other cases can be read and written to.
NFC is a wireless technology that allows smartphones and other equipped devices to communicate when very near one another or when touching. NFC operates at slower speeds than Bluetooth but consumes far less power and doesn’t require pairing. It also does not create a PAN like Bluetooth; rather, the connections are point to point. NFC can operate up to 20 cm at a transfer rate of 0.424 Mbps.
NFC is also a standard managed by the ISO and uses tags that are embedded in the devices. NFC components include an initiator and a target; the initiator actively generates an RF field that can power a passive target. This enables NFC targets to take simple form factors such as tags, stickers, key fobs, or cards that do not require batteries.
These devices connect either using USB or in some rare cases using a serial connection. Consult the documentation to determine whether you need a special driver installed.
A mobile device must have the support for NFC built in, and many already do. Special applications are available that make it easy to use the technology in various ways.
Mobile devices also support Bluetooth wireless connections. Bluetooth is an infrared technology that can connect a printer to a computer at a short range; its absolute maximum range is 100 meters (330 feet), and most devices are specified to work within 10 meters (33 feet). When printing with a Bluetooth-enabled device (like a PDA or mobile phone) and a Bluetooth-enabled printer, all you need to do is get within range of the device (that is, move closer), select the print driver from the device, and choose Print. The information is transmitted wirelessly through the air using radio waves and is received by the device. Bluetooth speed depends on version. Table 1.3 shows this for the latest versions.
Table 1.3 Bluetooth speeds
Version | Speed |
2.0 | 2.1 MB |
2.1 | 2.1 MB |
3.0 | 24 MB (over Wi-Fi connection) |
4.0 | 2.1 MB over Bluetooth and 24MB over Wi-Fi |
4.1 | 2.1 MB over Bluetooth and 24MB over Wi-Fi |
4.2 | 2.1 MB over Bluetooth and 24MB over Wi-Fi |
5.0 | 2.1 MB over Bluetooth and 24MB over Wi-Fi |
While infrared (IR) connectors were once common on mobile devices, they disappeared only to reappear recently. Infrared technology requires direct line of sight and has been used for printers in the past. It can operate at a distance of 5 meters and can offer up to 4 Mbps. It is being replaced with Bluetooth over time.
Another way that many mobile devices can connect to other devices is through a hotspot or when tethered to another device. Many mobile devices have the ability to act as 802.11 hotspots for other wireless devices in the area. There are also devices dedicated solely to performing as mobile hotspots.
Mobile devices require a lot of accessories to take advantage of many of the features they provide. While many of these are also commonly used with desktop and laptop devices, some are much more likely to be used with mobile devices. In this section, you’ll take a brief look at the types of accessories you may find attached to a mobile device.
Headsets provide the ability to take your conversation offline or to listen to your music in private. They can be connected both through a wired connection, usually a 3.55 mm audio connector or USB, and by using Bluetooth to pair the device with the headset.
Speakers are used in the same fashion as headsets. They can also be connected using the same options that include using USB, using a 3.55 mm audio plug, or by pairing the speakers with the devices using Bluetooth. This includes the speaker systems in many cars, which can now be paired with the devices using Bluetooth as well.
People seem to love to kill time playing games on their smartphones and other mobile devices, but they may find their level of enjoyment increased by connecting the devices to a game controller offering them many more input options. These controllers look like any game controller, which can differ based on the game being played and the type of input required for the game.
These controllers can also be small, some fitting on a keychain. They typically are paired to the mobile device using the Bluetooth connection. Some of the newer game controllers for this purpose can be set on a table and the mobile device plugs physically into a slot or holder on the controller, making a connection with the controller. Figure 1.13 shows the layout of a typical game controller.
Batteries are the lifeline of mobile devices. For a device to stay constantly connected, many users purchase extra battery packs that can be used to power the devices when the battery is dead and no power outlet is available. Some of these packs simply provide power to the device, while others store power used to charge the device’s battery. Figure 1.14 shows an example of a battery pack that can be charged while providing power to the device.
While much work has been done to make mobile devices sturdier and more durable, they are still somewhat delicate pieces of electronics. For this reason, an entire industry has sprung up to provide protective covers for the devices. Some are made of a hard plastic material and protect the device from all but the worst impacts, while others go further and provide waterproofing as well.
Mobile devices can also accept connections from external credit card readers. Some of these physically connect to the smartphone, and others can communicate with the phone using Bluetooth. Many of them use the same jack used for the headphones. There is usually software that has to be installed on the device as well and a processing agreement established with a provider. Figure 1.15 shows the Square reader.
Secure digital (SD) cards are a type of flash memory. Micro-SD is the smallest of three standards. Many mobile devices have MicroSD slots or ports on them that allow you to connect one to the device. This allows you either to access data on the memory card or to move information to the memory card from the smartphone. For more information on MicroSD, see the section “Solid-state drives” in Chapter 3.
Describe the most common connection types found on mobile devices. These include Near Field Communication, proprietary ports, Lightning, Bluetooth, and infrared.
Identify the most common mobile device accessories. Mobile devices will accept gamepads, headsets, speakers, docking stations, battery packs and chargers, and credit card readers. They can also use protective covers and waterproof containers to protect them.
For mobile devices to deliver the functionality that most expect, they must be connected to a network. To use email (one of the most important functions to many users), the device must be set up properly. The subobjectives covered in this section include the following:
Like most computing devices, mobile devices provide more robust functionality when connected to a network (especially if that network is the Internet). Two types of networks can be used to gain access to the Internet: cell phone networks and Wi-Fi networks.
Cell phone networks have in the past been the second choice because the performance is not as good as an 802.11 Wi-Fi connection. With the introduction of 4G Long Term Evolution (LTE) technologies, however, the performance delivered by the cell network may become more competitive.
In either case, most mobile devices will have the ability to make an 802.11 connection or use the cell network. If you want to disable the automatic connection to the cell phone network or if it was somehow turned off and needs to be turned back on, you can do this through the settings. One example of the steps to access these settings is Settings ➢ Wireless ➢ Mobile ➢ Enable Data (select or deselect this). This is only one navigational example, and you should consult the documentation that came with the device.
Making a Wi-Fi connection is much like doing so with a laptop. In the settings of the device will be a section for Wi-Fi (in iPhone it’s called Wi-Fi, and in Android it’s called Wireless And Networks). When you access it, you will see all the Wi-Fi networks within range. Just as you would do with a laptop, select one and attempt to connect to the Wi-Fi network. If the connection requires a password, you will have to supply it. You also can preconfigure a wireless profile for commonly used secure wireless networks as well as those where the service set identifier (SSID) has been hidden.
Hotspots are publicly provided points of access to an 802.11 wireless network connected to the Internet. They typically have little or no security configured to make it as easy as possible for users to connect. Vendors have also created devices that allow a single device to act as a hotspot for other devices in the area. Sometimes these are called mobile hotspots. Some mobile devices can be turned into mobile hotspots with a software upgrade or an addition to the service plan.
Tethering is the process of sharing the Internet connection of one device with another device. Connection of the phone or tablet with other devices can be done over wireless LAN (Wi-Fi), over Bluetooth, or with a physical connection using a cable, for example through USB. It also may be done by using a mobile hotspot or by using a similar feature on a mobile device.
Since airlines do not permit enabling the wireless connection on mobile devices during takeoff and landing, vendors created a mode called Airplane mode in which this function is turned off but all other functionality (games and other applications not requiring Internet access) is still fully functional.
Bluetooth is a short-range wireless technology that is used to create a wireless connection between digital devices. One of its applications is to create connections between mobile devices and items such as speakers, headphones, external GPS units, and keyboards. Before you can take advantage of this technology, the devices must be configured to connect to one another. This section will discuss how to configure a Bluetooth connection.
On Android mobile devices, follow these steps:
On iOS mobile devices, follow these steps:
Pairing a mobile device with an external device (speaker, headphone, and so forth) will enable the two devices to communicate. The first step is to enable pairing. This is much simpler than it sounds. For either mobile operating system, simply turn the external device on and you are ready for the next step. In some cases, you may need to make the external device discoverable. Check the documentation for the external device to see whether this is the case and how you do this.
Now that the external device is on and transmitting a signal, the mobile device is ready for pairing.
On an Android mobile device, follow these steps:
On an iOS mobile device, when Bluetooth is enabled, it automatically starts scanning for Bluetooth devices. When your device appears in the list, select it. If a PIN is required, move on to the next step.
Many external devices will ask for a PIN when you select the external device from the list of discovered devices. In many cases, the PIN is 0000, but you should check the manual of the external device.
Once the previous steps are complete, test communication between the two devices. If you’re using a headset, turn on some sound and see whether you can hear it in the headphones.
Email is one of the most important functions that people access on their mobile devices. This section will discuss how to configure email on the device. The following procedures are common examples, and your specific device may differ slightly. Please consult the documentation for your device.
Before you can access email on your mobile device, you must know the settings for the email server of your email provider. There are two protocols that can be used to access email accounts: POP3 and IMAP. If your account offers the use of IMAP, you should select it in the following steps because IMAP accounts have more functionality.
You will need the following information to complete this setup:
On an Android mobile device, follow these steps:
On an iOS mobile device, follow these steps:
On an Android mobile device, follow these steps:
On an iOS mobile device, follow these steps:
With either operating system, you can (and should) select to use security if your email server supports it. This will encrypt all traffic between the mobile device and the email server. The choices offered are usually SSL or TLS, so you will need to know which of these is in use.
With respect to the S/MIME configuration, you need the following:
Exchange supports S/MIME, so that part is taken care of. Once you have obtained your certificate, you must import it into your device and make it available to the email program. Your certificate must be obtained from a certificate authority company such as VeriSign. The steps to this process will vary from organization to organization. Once you have downloaded the certificate, place it at a location on the device where you can find it during the import process.
Typically, the certificate will come to you in an email that you should open on the Android device. When you click the enrollment link in the email, you will be required to enter the password you set when you requested the certificate. Then you will create another password (called a PKCS#12 passphrase) that you will need during the certificate installation.
When the certificate downloads to the device, it will go into the Downloads folder. Now you have to add it to your credentials. Follow these steps:
The certificate is now available to use to encrypt email.
For iOS, follow the organizational steps to request a certificate. When the email arrives, open it on the iOS device as you did in Android. Then follow these steps:
You probably also want to set up your personal email on a device from a commercial provider. This section will look at some of the major email systems you may encounter.
To set up iCloud email on an Android device, follow these instructions:
As you can imagine, setting up iCloud email on an iOS device is simple because the applications all reside in the Apple ecosystem. First set up an iCloud email account. If you have an email address that ends with @mac.com or @me.com, you already have an equivalent address that’s the same except it ends with @icloud.com. On your IOS device, go to Settings, tap your name, and then select iCloud. Choose the apps—such as Photos, Contacts, Calendars, and third-party apps—that you want to use with iCloud.
On an Android mobile device, follow these steps:
On an iOS mobile device, follow these steps:
To set up Outlook on Android, first, if required, install Outlook for Android. Follow these steps:
On iOS, follow these steps:
If you select Configure Manually, you can set up an Exchange account with Basic authentication. Enter your email password. You might also be prompted to enter additional server information.
If you select Sign In, your email address is sent to Microsoft to discover your Exchange account information. If your account uses multifactor authentication, you’ll be guided through a custom authentication workflow.
Because Yahoo recommends using IMAP as an email client, these are the instructions for setting up IMAP on Android systems:
On an iOS device, use these instructions:
The product release information (PRI) is the connection between the mobile device and the radio. From time to time this may need updating, which may add features or increase data speed.
The preferred roaming list (PRL) is a list of radio frequencies residing in the memory of some kinds of digital phones. It lists frequencies the phone can use in various geographic areas. Each area is ordered by the bands the phone should try to use first. Therefore, it’s a priority list for which towers the phone should use.
When roaming, the PRL may instruct the phone to use the network with the best roaming rate for the carrier, rather than the one with the strongest signal at the moment. As carrier networks change, an updated PRL may be required.
The baseband is the chip that controls all the GSM and 3G phone RF waves. An update makes the code in the chip current.
All mobile devices may require one or more of these updates at some point. In many cases, these updates will happen automatically, or “over the air.” In other cases, you may be required to disable Wi-Fi and enable data for these to occur.
In Android phones, the location of the PRI update option will differ, but you’ll generally find it in one of a few places in the Settings menu.
In iOS, there is no separate PRL update command on iOS devices, but running a software update will force an update of the PRL.
A PRI update is a flash process. This usually occurs in over-the-air updates. When done manually, it involves acquiring the file and then performing a flash process with the bootloader, which in many cases also updates the radio (see the next section). The flash process can result in a useless device (bricked), so follow the vendor instructions.
The radios in mobile devices are equipped with firmware that, like all firmware, may need an update from time to time. In Android, follow these steps:
In iOS, follow these steps:
International Mobile Equipment Identification (IMEI) is used to identify a physical phone device, while International Mobile Subscriber Identification (IMSI) is used to identify a Subscriber Identification Module (SIM) card.
Many users need to use the mobile devices to connect to the corporate network. This should be done using a VPN connection. To set up a VPN connection in Android, follow these steps:
Enable Bluetooth and pair a Bluetooth device with a mobile network. Describe the process for both the iOS and Android operating systems.
Configure email on a mobile device. Describe the process of configuring email, including both Exchange and Gmail for both the iOS and Android operating systems.
Keeping information in sync between your desktop or laptop and your mobile device is one of the features that many users want to take advantage of. There are many types of information that can be synced, applications that can be installed to perform the synchronization, and connection methods that can be used to do this. This section discusses mobile device synchronization. The topics addressed in this section include the following:
When synchronizing the various data types we will discuss shortly, there are three basic ways to make this happen: You can synchronize to the cloud, a desktop, or an automobile’s computer system. In this section, you’ll look at all three approaches.
One synchronization method that is gaining in popularity (along with all things “cloud”) is synchronizing all your devices to a cloud server. This provides a central location for your data, settings, and all other items listed in the “Types of data to synchronize” section next. This can be set up such that all devices update with the cloud as soon as they attain Internet access.
Another approach is to set up a sync process directly between two devices such as a smartphone and a desktop computer. In this case, the two devices will sync with one another at any time they find themselves on the same network such as a home wireless network.
Yes, cars now have computing systems and as such can be synced to the mobile device either by using Bluetooth or by using cables designed by the vendors to connect to the car system.
Users may be interested in maintaining a consistency between the state of data that exists on the laptop or desktop and the state of the same data on a mobile device. This section discusses common types of data.
No one wants to enter a long list of contacts into a mobile device when that same list already exists in your email account. Using push synchronization (push means it’s automatic and requires no effort on the part of the user), you ensure that any changes made to the contact list either on the mobile device or on the desktop will be updated on the other device the next time you make a connection to the email account from the other device. It will also update if the mobile device makes a direct connection to the desktop (covered later in “Connection types to enable synchronization”).
Program data from applications such as databases can also be synchronized between servers and mobile devices. A good example is the synchronization of the data entered into handheld devices used by the wait staff in restaurants and the server in the back room of the restaurant. Another example is the synchronization of data from handheld scanners in a warehouse with a server that may or may not be on-site. This seamless automatic updating makes the entire operation more productive.
Even more important to users than their contacts is the state of their email. The mobile device will synchronize the contacts, calendar items, and email each time the mobile device makes contact with the email account. This results in a consistent state between what is seen on the desktop and what is seen on the mobile device. Push synchronization will usually allow you to configure the push schedule, such as every 30 minutes. To preserve battery life, push sync should take place less frequently.
Pictures are another item that users frequently want to view from their mobile device without going through the process of manually downloading them to the device. Synchronization allows the pictures stored on the desktop (or even a share on a server) to be available on the mobile device, even the one you just added an hour ago.
Music files can also be included in the sync process. This helps to keep your library available on the mobile device. When you start talking about music and video files (see the next section), a word of caution is in order. These large files can quickly add up and fill the hard drive and also add significantly to your data usage if the sync is happening over a wireless cell phone connection using a data plan. They can also be hard on the battery.
Video libraries can be kept consistent across devices using synchronization. Be aware of the effect of these large files on your drive space, battery level, and data usage if you are syncing wirelessly through a cell phone network.
The calendar is a critical application for both work and play. All mobile devices support syncing the calendar between devices. In some cases, it may require a small application, especially when the email system of which the calendar is part of is in a different ecosystem (for example, Google Mail and an iPhone).
Bookmarks of frequently visited websites make everyone’s day easier, and when the same ones are available in the browser of all your devices, including your mobile devices, it doubles the benefit. Bookmarks are another item that can be configured to sync automatically.
Technology to sync documents located in multiple locations has been around for some time now. Users have come to expect this functionality, and it is present in modern mobile devices as well. Users want to be able to work anywhere on any device and this facilitates that.
In some cases, users may decide to allow an application to track their location for the purpose of tailoring search results. When this is done, it can be a onetime thing or the users can give the application ongoing permission to do so. Most device browsers will indicate this with some sort of icon or indicator on that page. These settings can also be synchronized between devices as well.
While social media was once a guilty distraction, today even businesses and organizations use social media. When users have multiple accounts, many mobile platforms such as Google and Apple offer applications that can allow them to track and post to multiple accounts at once, reducing the time required to “check and update” the accounts.
Many users have accounts that give them access to books in digital format, or e-books. Naturally, they want to have access to these books (and other content types) on all their devices. Not only can this be done, but the sync process can keep their various devices up-to-date with the latest position of a bookmark in the book or of new items that have been highlighted or notes that have been made.
Finally, passwords can also be synchronized across devices. For example, when you change your Gmail password on one device it automatically updates it on all other devices.
Mutual authentication is a process whereby not only does the server verify the credential of the client but the client also verifies the credential of the server. It adds additional security to the process. Both Android and iOS devices support this type of authentication, typically using SSL. One of the challenges presented to performing this type of authentication in mobile devices is their relative lack of processing power when compared with desktop and laptop systems.
Some devices come with a sync feature installed, but for the most robust functionality (for example, syncing between devices with different operating systems such as iPhone to Android and Android), synchronization applications that will do a much better job than the built-in applications can be purchased either at the Apple Store site or in other app marketplaces.
When obtaining one of these, ensure that your device meets all the requirements of the application. These applications will call for certain minimum requirements on the mobile device to operate correctly, so observe these guidelines to ensure a successful installation and operation.
The synchronization process can be carried out over several methods of connection between the devices. In some cases, you can connect the mobile device to the laptop or desktop using a USB connector. In other cases, you can establish a Bluetooth connection from the mobile device and the desktop. Finally, an 802.11 WLAN can also be used to establish this connection. In some instances, the synchronization application will allow you to introduce a shared folder into the scenario (like Dropbox, for example), which then allows you to use the Internet to sync from the laptop to the Dropbox and then from the Dropbox to the mobile device.
Identify synchronization methods. These include synchronizing to the cloud, synchronizing to the desktop, and synchronizing to the automobile.
Identify type of data to sync. These include contacts, applications, email, pictures, music, videos, calendars, bookmarks, documents, location data, social media data, e-books, and passwords.
You can find the answers in the Appendix.
What is the maximum transmission speed of an ExpressCard in PCIe2 mode?
Which interface is natively found only in Apple devices?
What special screwdriver is typically required to work on a notebook?
What is the easiest thing to damage when removing a laptop keyboard?
Which component if damaged can render the hard drive useless?
What size hard drive goes in a laptop?
Which is not an advantage of solid-state drives?
Which display uses a row of transistors across the top of the screen and a column of them down the side?
Which display is a newer technology that solves the issue of poor quality at angles other than straight on?
Which of the following lets you quickly connect/disconnect with external peripherals and may also provide extra ports that the notebook PC doesn’t normally have?
In what mode of plug and play must the laptop be turned off and back on for the change to be recognized?
Which of the following is a class of devices that specializes in tracking your movement?
Which of the following uses satellite information to plot the global location of an object and uses that information to plot the route to a second location?
Which interface is the most common port found on mobile devices?
Which is the most common pin code when selecting discovered Bluetooth devices?
Which of the following is the connection between the mobile device and the radio?
Which of the following is a process whereby not only does the server verify the credential of the client but the client also verifies the credential of the server?
Which of the following is the use of physical factors of authentication?