Mobile App Dev Cat

Download as pdf or txt
Download as pdf or txt
You are on page 1of 2

1.

Explain the concept of mobile computing

Mobile computing refers to the use of small, portable computing devices, such as
smartphones, tablets, and laptops, to access and process data and information while on
the move. It allows users to perform various tasks, including accessing the internet,
sending emails, making phone calls, and running applications, without being confined to
a fixed location. Mobile computing relies on wireless communication technologies such
as Wi-Fi, cellular networks, and Bluetooth to connect these devices to the internet and
other networks. The key characteristics of mobile computing include portability,
connectivity, and mobility, enabling users to stay productive and connected regardless of
their location.

2. What are the main components of a mobile computing system?


The main components of a mobile computing system include:
• Mobile Device: This is the hardware component of the system, such as
smartphones, tablets, or laptops, which provides computing capabilities.
• Operating System (OS): The mobile device runs on an operating system
specifically designed for mobile platforms, such as Android, iOS, or Windows
Mobile.
• Wireless Communication Networks: Mobile computing relies on wireless
communication technologies to connect to the internet and other networks. This
includes Wi-Fi, cellular networks (3G, 4G, 5G), Bluetooth, and NFC (Near Field
Communication).
• Mobile Applications: These are software applications designed to run on mobile
devices, providing various functionalities to users. Mobile applications can be
downloaded and installed from app stores such as Google Play Store or Apple App
Store.
• Cloud Services: Mobile computing often involves accessing and storing data in
the cloud. Cloud services provide storage, computing power, and other resources
over the internet, allowing users to access their data from anywhere and on any
device.
• Sensors: Mobile devices are equipped with various sensors, such as GPS,
accelerometer, gyroscope, and proximity sensors, which enable them to interact
with the physical world and gather data for various applications.
3. Describe the differences between Wi-Fi and cellular data:
i. Wi-Fi (Wireless Fidelity):
o Wi-Fi is a wireless networking technology that allows devices to connect to a
local area network (LAN) wirelessly.
o It is typically used to provide internet access within a limited range, such as a
home, office, or public hotspot.
o Wi-Fi connections are established using a wireless router or access point, and
devices must be within the range of the router to connect.
o Wi-Fi is commonly used for high-speed internet access, and it can provide
faster data speeds compared to cellular data in areas with strong Wi-Fi
coverage.
o Wi-Fi is often used for data-intensive tasks such as streaming video,
downloading large files, or online gaming.
ii. Cellular Data:
o Cellular data refers to the wireless communication technology used by
mobile devices to connect to cellular networks (3G, 4G, 5G).
o It allows devices to access the internet and other network services over long
distances, using a network of cellular towers provided by mobile carriers.
o Cellular data is more widely available than Wi-Fi and allows users to access
the internet even when they are outside the range of Wi-Fi networks.
o Data speeds on cellular networks can vary depending on the network
technology (3G, 4G, 5G) and signal strength, but they are generally slower
than Wi-Fi.
o Cellular data is commonly used when Wi-Fi is not available or when users
require internet access while on the move, such as when traveling or
commuting.

4. What are the security challenges associated with mobile computing?

• Data Loss and Theft: Mobile devices are small and portable, making them more
susceptible to loss or theft. If a device is lost or stolen, sensitive data stored on the device,
such as personal information, emails, and documents, can be compromised.
• Unauthorized Access: Mobile devices may be accessed by unauthorized users if they are
not properly secured. Weak passwords, lack of encryption, and unsecured connections
can make it easier for hackers to gain access to sensitive information.
• Malware and Viruses: Mobile devices are increasingly targeted by malware and viruses,
which can infect the device and steal data, send spam, or cause other malicious activities.
Users may inadvertently download malicious apps or visit infected websites, putting their
devices at risk.
• Phishing Attacks: Mobile users are often targeted by phishing attacks, where hackers
attempt to trick users into providing sensitive information, such as passwords or credit
card details, through fraudulent emails, messages, or websites.
• Data Interception: Wireless communication technologies used in mobile computing,
such as Wi-Fi and cellular networks, are susceptible to data interception and
eavesdropping. Hackers can intercept and capture data transmitted over these networks,
including sensitive information such as login credentials and financial data.
• Jailbreaking and Rooting: Jailbreaking (for iOS devices) and rooting (for Android
devices) are techniques used to bypass the built-in security restrictions of mobile
operating systems, allowing users to install unauthorized apps and access system files.
However, jailbroken or rooted devices are more vulnerable to security threats, as they can
be more easily exploited by malware and malicious apps.

By: GICHERU DUNCAN-21/05493

You might also like