© 2013 by the McGraw-Hill Companies, Inc. All rights reserved. Chapter 5B The Mobile User.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Review of Chapter 2. Important concepts – The Internet is a worldwide collection of networks that links millions of businesses, government agencies, educational.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Speaker Name, Title Windows 8 Pro: For Small Business.
9 C H A P T E R © 2001 The McGraw-Hill Companies, Inc. All Rights Reserved1 Communicating in Real Time Now it is also possible to converse in real time.
Lesson 13: Customizing System Settings what the Control Panel is changing or customizing the desktop display changing the date or time changing or customizing.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Chapter 6A Operating System Basics PART II.
Lesson 01: The Digital Experience  Transition from traditional devices to multipurpose digital devices. Wired phones move to cell phones and now smart.
For further information computersecurity.wlu.ca
Mgt 20600: IT Management & Applications Telecommuncations and Networks Tuesday March 28, 2006.
TC2-Computer Literacy Mr. Sencer February 4, 2010.
Remote Desktop Connection Techniques Wireless Communication Networks.
By Janea Tate  Skype is a software application that allows users to make voice calls over the Internet. Calls to other users within the Skype service.
Making Contact With Your Customers. Who are Klick2Contact? Highly experienced telecommunications professionals Backed by major European investment group.
REAL TOOLS FOR REAL AGENTS
Cambodia-India Entrepreneurship Development Centre - : :.... :-:-
Digital Technology Basics Digital Technology Basics includes two lessons:  Lesson 1: The Modern Digital Experience  Lesson 2: Digital Technology & Career.
MCTS GUIDE TO MICROSOFT WINDOWS 7 Chapter 14 Remote Access.
Computers Are Your Future Eleventh Edition Chapter 1: Computers & You Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
The Internet. What is the internet? a vast network designed to transfer data from one computer to another.
Digital Literacy. Productivity Programs Digital Literacy Courses and Topics Computer Basics Security and Privacy Internet and Web Basics Digital Lifestyle.
Sophos Mobile Security
©2013 Cengage Learning. All Rights Reserved. Business Management, 13e Technology and Information Management Electronic Technology Fundamentals.
Introduction to Skype A. Name -. Applies to Skype for home and small business accounts.
P6 - CONFIGURE THE SOFTWARE. CONFIGURE SOFTWARE Most software can be configured to suit an individual user, for example by changing the appearance of.
Internet Standard Grade Computing. Internet a wide area network spanning the globe. consists of many smaller networks linked together. Service a way of.
Business Computing 550 Lesson 4. Fundamentals of Information Systems, Fifth Edition Chapter 4 Telecommunications, the Internet, Intranets, and Extranets.
Digital Citizenship By Web Design.  It is a system to teach students and teachers the way to use technology correctly. As new technology appears we all.
Protecting Yourself Online (Information Assurance)
Making your PDA work for you! Sharaine Rawlinson Cindy Camp.
The Internet Netiquette and Dangers. Outline Netiquette Dangers of the Internet.
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials Software: Finding and installing software Suitable for: Improver.
CHAPTER 2 COMMUNICATION, NETWORKS, AND THE WWW. WHAT IS COMMUNICATIONS? A process in which two or more computers or devices transfer data, instructions,
Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Twelfth Edition.
IT security By Tilly Gerlack.
Keyloggers At Work Jason Clark. History Believed to have been first used by the government Believed that they were used in the early 1990’s Software key.
Move Pictures From Your Mobile Phone to Your PC.  You never know when a photo opportunity is going to arise, which is why having a camera phone can be.
Chapter 4 – Slide 1 Effective Communication for Colleges, 10 th ed., by Brantley & Miller, 2005© Technology and Electronic Communication.
IT Introduction to Information Technology CHAPTER 01.
Chapter 8 Browsing and Searching the Web. Browsing and Searching the Web FAQs: – What’s a Web page? – What’s a URL? – How does a browser work? – How do.
E-Safety E-safety relates to the education of using new technology responsibly and safely focusing on raising awareness of the core messages of safe content,
Slide 3-1 Chapter 3 Terms Electronic Commerce and Internet Technologies Introduction to Information Systems Judith C. Simon.
By Kim Young Jun IGCSE1.  Computer network  Common types of network  Ring, bus, star and tree  Local are networks  Wide are networks  Wireless LANs.
FriendFinder Location-aware social networking on mobile phones.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
HART RESEARCH ASSOTESCIA Key findings from telephone survey of parents of children who access the Internet, conducted for Who Needs Parental Controls?
FriendFinder Location-aware social networking on mobile phones.
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved Chapter 15 Creating Collaborative Partnerships.
Communication Methods
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Automated Data Capture Technologies O It is often necessary or convenient to capture data automatically, for example the delivery of a package by an Cable.
Enw / Name. Advantages and Disadvantages of this type of network Draw / insert a drawing of a RING network What type of network would you recommend a.
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Securing Your Data in Endpoint and Mobile Environments Frank Suijten Security.
Mobile Money 1/37 Fiserv Mobile Money Staff Education © 2010 Beavercreek Marketing, a division of Beavercreek Inc. All rights reserved. All trademarks.
Websms Offers Professional Messaging Solutions via Web, , Gateway or Directly Out of Excel (Online) on the Microsoft Office 365 Platform OFFICE 365.
Features to look for in a Work Management Software before choosing one.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
Mobile Operating Systems
Letsignit, an Automated Signature Solution for Microsoft Office 365 and Microsoft Exchange, Provides Efficiency in Branding and Customization OFFICE.
Booklet365 Office 365 Outlook Add-In Makes Easy Work of Managing Schedules for Fitness Gyms, Sports Associations, Trainers, and Their Customers Partner.
Chapter 3 Installing and Using Software
Call AVG Antivirus Support | Fix Your PC
Information Technology Services Education and Awareness Team
Letsignit, an Automated Signature Solution for Microsoft Office 365 and Microsoft Exchange, Provides Efficiency in Branding and Customization OFFICE.
McGraw-Hill Technology Education
McGraw-Hill Technology Education
Information Technology Services Education and Awareness Team
COMPLETE BUSINESS TEXTING SOLUTION
Who We Are Pitt Information Technology provides resources at the University for students, faculty, and staff Technology Support Computer Accounts .
Presentation transcript:

© 2013 by the McGraw-Hill Companies, Inc. All rights reserved. Chapter 5B The Mobile User

2 2 © 2013 by the McGraw-Hill Companies, Inc. All rights reserved. Learning Objectives 5.5Identify software for various mobile devices 5.6 Explain the general differences between office-based and mobile work models 5.7 Summarize how users of mobile computing devices can protect themselves and their devices while using them courteously

3 3 © 2013 by the McGraw-Hill Companies, Inc. All rights reserved. Mobile Software Software:Software: –For notebooks, tablets, and netbooks –To support mobile devices –To assist with mobile computing –For general use (apps)

4 4 © 2013 by the McGraw-Hill Companies, Inc. All rights reserved. Notebooks, Tablets and Netbooks Software is limited only by what the hardware and OS are capable of runningSoftware is limited only by what the hardware and OS are capable of running Power plan:Power plan: –When you begin using the computer, check power type, battery level, and power plan –Hover the mouse over the battery icon –Hover the mouse over the wireless icon to display the quality of the wireless connection

5 5 © 2013 by the McGraw-Hill Companies, Inc. All rights reserved. Mobile Devices Ring tones: Sounds that signal an incoming call or text messageRing tones: Sounds that signal an incoming call or text message –Can be chosen by the user –Most phones include an assortment –Other ring tones available Wallpaper: Customized background appearance of the screenWallpaper: Customized background appearance of the screen –Varied options –Can be created on a PC and transferred to the phone –Free wallpaper available online may introduce malware

6 6 © 2013 by the McGraw-Hill Companies, Inc. All rights reserved. Mobile Computing Anti-malware is needed for a smart phoneAnti-malware is needed for a smart phone Synchronizing programs transfer information between devicesSynchronizing programs transfer information between devices Wi-Fi scanning software makes it easy to connect to open Wi-Fi networksWi-Fi scanning software makes it easy to connect to open Wi-Fi networks Apps for QR codesApps for QR codes (two-dimensional bar codes that encode Web addresses that encode Web addresses and other information)

7 7 © 2013 by the McGraw-Hill Companies, Inc. All rights reserved. General Use Many programs are available for smart phones and PDAsMany programs are available for smart phones and PDAs Programs vary by devicePrograms vary by device Some apps make the online experience better with Web browsing, social networking, etc.Some apps make the online experience better with Web browsing, social networking, etc. Some apps support particular interestsSome apps support particular interests Some apps offer business and productivity softwareSome apps offer business and productivity software

8 8 © 2013 by the McGraw-Hill Companies, Inc. All rights reserved. Choosing Software to Download Apps are generally organize by keyword or categoryApps are generally organize by keyword or category Ways to improve the chance of finding useful software:Ways to improve the chance of finding useful software: –Visit the application store –If the store has knowledgeable salespeople, ask them –Ask a knowledgeable friend –Visit a trusted download site for PC programs

9 9 © 2013 by the McGraw-Hill Companies, Inc. All rights reserved. Effective Mobile Business FlexibilityFlexibility Mobile considerationsMobile considerations Specific tips for businessesSpecific tips for businesses Considerations for mobile workersConsiderations for mobile workers When and where to workWhen and where to work

10 © 2013 by the McGraw-Hill Companies, Inc. All rights reserved. Flexibility Flexibility is one key benefitFlexibility is one key benefit –Virtual teams: Teams whose members are geographically dispersed and use technology to communicate –Telecommuting: The practice of having employees work remotely

11 © 2013 by the McGraw-Hill Companies, Inc. All rights reserved. Mobile Considerations Management styleManagement style – Managers must be able to supervise from a distance Performance measurementPerformance measurement –Performance must be measurable from a distance CostsCosts –Virtual office: company sets up minimal office services Information risk:Information risk: –Potential of risk to the company’s intellectual property

12 © 2013 by the McGraw-Hill Companies, Inc. All rights reserved. Specific Tips for Businesses Manage by goal, not by typing timeManage by goal, not by typing time Make some of the work goals very short termMake some of the work goals very short term Establish workers availabilityEstablish workers availability Give supervisors guidelinesGive supervisors guidelines

13 © 2013 by the McGraw-Hill Companies, Inc. All rights reserved. Mobile Workers Considerations for mobile workersConsiderations for mobile workers –Preferred environment –Active communication –Consistent focus –Appropriate tasks When and where to work:When and where to work: –Finding a quiet place –Setting a schedule –Prioritizing work

14 © 2013 by the McGraw-Hill Companies, Inc. All rights reserved. Safe Computing Driving safelyDriving safely –A prevalent risk in mobile computing is the danger of using cell phones while driving Protecting equipment from theft, loss, and damageProtecting equipment from theft, loss, and damage –Keep your cell phone in a safe place Protecting privacyProtecting privacy Installing malware protectionInstalling malware protection

15 © 2013 by the McGraw-Hill Companies, Inc. All rights reserved. Safe Computing Accessing public Wi-Fi spots safelyAccessing public Wi-Fi spots safely –Be cautious about joining open wireless networks Virtual private network (VPN): a private, secure connectionVirtual private network (VPN): a private, secure connection –A VPN uses tunneling, a method in which each piece of data (each packet) from the sending computer is encapsulated within another packet before being sent –Individuals can subscribe to a personal VPN for a fee

16 © 2013 by the McGraw-Hill Companies, Inc. All rights reserved. Courteous Computing Pay attention to one thing at a timePay attention to one thing at a time –Excuse yourself to take a call Keep private conversations privateKeep private conversations private Turn down or mute the sound on your deviceTurn down or mute the sound on your device Say good-bye when chatting or sending instant messagesSay good-bye when chatting or sending instant messages Write when you’re calmWrite when you’re calm