Question

describe three common element such as security, GUI, hardware, camera and touch screen features of mobile...

describe three common element such as security, GUI, hardware, camera and touch screen features of mobile computing devices.

0 0
Add a comment Improve this question Transcribed image text
Answer #1

Mobile Touchscreen: In recent times, we have seen a great transformation of mobile computing devices and components. Earlier Mobile phones used to have a separate dial-pad mounted below the screen but nowadays external dial pad have vanished completely and the functionality of the dial pad has been embedded as a software in the mobile's operating system. The mobile screens have become a touch screen that acts as an input device and sense the touch gestures and operate as per the instructions provided by the user. The touch screens are sensitive to stress; a user communicates with the mobile applications by touching pictures or words on the screen. The touchscreen set-up consists of a normal glass panel that is covered with conductive and resistive metallic layers. These two layers are held apart by spacers, and a scratch resistant layer is placed on top of the whole setup.

How does the Touch screen work?

  • When the screen is touched by the user, the two layers make contact exactly at that spot.
  • Due to the change in the electrical field, the coordinates of the point of contact are calculated by the processor.
  • Then, a special driver translates the touch into something that the operating system can understand, much as a computer mouse driver translates the movements of a mouse into a click or a drag.
  • The change in the electrical current is registered as a touch event and sent to the controller for processing.

Camera: It is a feature which is able to capture photographs and often record video in all the smartphones. The smartphone camera comprises of different components like a lens, sensors, software. The lens enables them to see pictures; Sensor takes what the lens sees and turns it into digital data, and the software analyzes the data and turns it into an image file that you can do something with.

How does the Camera work?

  • The lens projects the image on the sensor
  • the sensor senses the light and electronic signals are produced which are then transmitted on your screen.
  • As you press the shutter button on the screen, the shutter goes off the sensor, and the sensor reads the image and transmits it to your screen, where you see the image.

Security: Mobile security can come in many appearances and patterns. Some protections are mounted directly into the phone device. For example, the default Autolock feature in iPhone that requires the user to enter a password after a few minutes of inactivity. Other mobile security protections are made into the network, such as reliable encryption standards for data traveling across cellular networks. Till now, due to advanced standards applied to mobile computing, we haven't seen data breach or security issue with smartphone technology. But then also, mobile users need to be aware of the common security threats and their preventions. Two of the most effective mobile security measures are remote lock and remote wipe. Many devices also include GPS tracking features to locate the phone or even activate "screaming" alarms.

Add a comment
Know the answer?
Add Answer to:
describe three common element such as security, GUI, hardware, camera and touch screen features of mobile...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Introduction 25 Unit 1 Discussion: Mobile Computing Devices use mobile computing devices throughout the day. Pick one or two typical day(s) for you and create a journal of all the interactions th...

    Introduction 25 Unit 1 Discussion: Mobile Computing Devices use mobile computing devices throughout the day. Pick one or two typical day(s) for you and create a journal of all the interactions that you have with mobile computers. You may get a friend or family member to help, too. For example, smart phone, iPad, GPS, smart watch, automobile computers, etc., are just a few examples. Discussion Responses Discuss a minimum of three mobile computer devices that you used or came in...

  • describe three different element's of mobile computing devices

    describe three different element's of mobile computing devices

  • Read the case study "Google, Apple, and Facebook Struggle for Your Internet Experience" on page 255....

    Read the case study "Google, Apple, and Facebook Struggle for Your Internet Experience" on page 255. Then discuss the advantages and disadvantages for each company. BUSINESS PROBLEM-SOLVING CASE Google, Apple, and Facebook Battle for Your Internet Experience Apple has a legacy of innovation on its side. In Three Internet titans Google, Apple, and 2011, it unveiled the potentially market disrupting Facebook are in an epic struggle to dominate your Siri (Speech Interpretation and Recognition Internet experience, and caught in the...

  • Describe at least three internal control weaknesses related to computer security that existed at AAA Inc. prior to the flood occurrence.

    AAA Inc., a pharmaceutical firm, provides discounted prescription drugs through direct mail. AAA has a small systems staff that designs and writes AAA’s customized software. With the addition of a small staff of systems developers and software technicians, AAA has decided to maintain an in-house data processing function, rather than outsource it to a service bureau.AAA has experienced significant sales growth due to the increased prices of prescription drugs. Medical insurance companies have been restricting reimbursements to minimize increases in...

  • Question 1 To remove the underlining from an <a> element, you can use CSS to set...

    Question 1 To remove the underlining from an <a> element, you can use CSS to set its A. text-decoration property to none B. text-decoration property to off C. underline property to none D underline property to off Question 2 You can use the CSS list-style-type property to change A. the bullet style in an unordered list B the number style in an ordered list C the terms style in a description list Dthe bullet or number style in an unordered...

  • Question 1 To remove the underlining from an <a> element, you can use CSS to set...

    Question 1 To remove the underlining from an <a> element, you can use CSS to set its A. text-decoration property to none B. text-decoration property to off C. underline property to none D underline property to off Question 2 You can use the CSS list-style-type property to change A. the bullet style in an unordered list B the number style in an ordered list C the terms style in a description list Dthe bullet or number style in an unordered...

  • Explain what enterprise resource planning (ERP) systems. Outline several of their key characteristics. Describe in reasonable...

    Explain what enterprise resource planning (ERP) systems. Outline several of their key characteristics. Describe in reasonable detail how a company leverages an ERP system and how its operations are improved after installing an ERP system like SAP. Explain how a supply chain management system helps an organization make its operations more efficient What is Upstream and Downstream management of the supply chain? Explain the concept of “Supply Network”, its benefits, and how technology made this concept available Explain the difference...

  • Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around...

    Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...

  • Please use own words. Thank you. CASE QUESTIONS AND DISCUSSION > Analyze and discuss the questions...

    Please use own words. Thank you. CASE QUESTIONS AND DISCUSSION > Analyze and discuss the questions listed below in specific detail. A minimum of 4 pages is required; ensure that you answer all questions completely Case Questions Who are the main players (name and position)? What business (es) and industry or industries is the company in? What are the issues and problems facing the company? (Sort them by importance and urgency.) What are the characteristics of the environment in which...

  • 1) analyze the following case 2) give a summary and suggest ways for the company ——————...

    1) analyze the following case 2) give a summary and suggest ways for the company —————— Salesforce.com, one of the most disruptive technology companies of the past few years, has single-handedly shaken up the software industry with its innovative business model and resounding success. Salesforce provides customer relationship management (CRM) and other application software solutions in the form of software as a service leased over the Internet, as opposed to software bought and installed on machines locally. The company was...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
Active Questions
ADVERTISEMENT