[ New messages · Members · Forum rules · Search · RSS ]
  • Page 1 of 1
  • 1
Case Study Q&A by Chip
JerryDate: Wednesday, 26/10/2011, 2:50 PM | Message # 1
Ford Everest
Group: Administrators
Messages: 137
Reputation: 0
Status: Offline
1. List 5 types of the smartphone: (3 Points)
2. There are how many types of memory built in and list down (3 point)
3. What is RAM known as and what it is?
4. What is disk E?
5. What is Firmware?
6. What is disk C?
7. The mobile devices have processors based on what?
8. How the Bluetooth work?
9. What is the important use of the Bluetooth?
10. What is the advantage and the dixadvantage of the Bluetooth?
11. What is the Piconet
12. What is Other Communication Technologies?
13. Is the Interface important to mobile device? Why?
14. What is the techniques and various design that manufactures have tried to overcome the limitation of space? Please list below
15. How Iphone 4 sense the user’s touch?
16. How much is pixal per inch in Iphone 4 display?
17. Who had attempted to standardize the industry by detailing the features expected in Each generation?
18. What is the new technics?
19. What virus produces a flashing skull animation in the background regardless of what application the user is using?
20. Give at least 5 advice how reduce chance of loss data
 
JerryDate: Wednesday, 26/10/2011, 2:54 PM | Message # 2
Ford Everest
Group: Administrators
Messages: 137
Reputation: 0
Status: Offline
1. List 5 types of the smartphone: (3 Points)
• PIM
• Digital Camera
• Moblie Phone
• Mp3/4 Player
• Web Browser
• E-mail Client
• Palm-Top Computer
• Direct links with social networks
• Wireless Credit Card
2. There are how many types of memory built in and list down (3 point)
• 4 type (ROM, Chache, RAM, Flash Memory)
3. What is RAM known as and what it is?
• It also known as dynamic memory (SDRAM) it is the electronics where the OS and all application actually run.
4. What is disk E?
• It is the expansion card and it is where all the application and files were store and install in.
5. What is Firmware?
• It is disk Z and it was where the operating system lives.
6. What is disk C?
• It is flash storage and it is where all the files were in stored.
7. The mobile devices have processors based on what?
• It was based on the ARM family of 32-bit RISC architecture
8. How the Bluetooth work?
• It used radio waves in the frequency band 2.402 GHZ – 2.480 GHZ to allow Bluetooth enabled devices to automatically connect with each other.
9. What is the important use of the Bluetooth?
• To synchronization of data between two devices.
10. What is the advantage and the dixadvantage of the Bluetooth?
• The power consumed in communication is very low and consequently the rage is limited. However, signal can pass through the walls of a building as line of sight is not required.
11. What is the Piconet
• When a connection is made between two or more devices
12. What is Other Communication Technologies?
• Wi-Fi
• Mobile Phone (Cell-Phone) Networks
• Infra-Red
• USB
• Ethernet
• WiMAX
• Firewire.
13. Is the Interface important to mobile device? Why?
• Yes it is because consequently, companies have devoted considerable time and money into researching ways of providing easy access to multiple functions on a device small enough to fit into your pocket.
14. What is the techniques and various design that manufactures have tried to overcome the limitation of space? Please list below
• detachable keyboards
• scroll wheel
• thumb wheel
• multi-touch.
15. How Iphone 4 sense the user’s touch?
• Panel laminated on the glass which uses electrical fields to sense the user’s touch.
16. How much is pixal per inch in Iphone 4 display?
• 326 pixal per inch
17. Who had attempted to standardize the industry by detailing the features expected in Each generation?
• The International Telecommunication Union
18. What is the new technics?
• Revolution (not backwards-compatible so a new frequency spectrum is needed), or
• Evolution (which can use the same frequency-bands).
19. What virus produces a flashing skull animation in the background regardless of what application the user is using?
• Symbian Skull Virus
20. Give at least 5 advice how reduce chance of loss data
• encrypt all data that a smartphone receives
• clear all caches after each VPN (Virtual Private Networks) session
• choose one with a “kill” switch
• password before opening applications such as email, web browser
• keep data permanently in your data centre, not on the smartphone
• some companies can wipe the data off your stolen smartphone remotely
• do not run apps not approved by the phone company
• do not use unsecured Wi-Fi networks (to avoid “man-in-the-middle” attacks)
• do not “jail-break” your smartphone
 
  • Page 1 of 1
  • 1
Search:

Statistics
Map
Login form