Chapter 9 Laptops and Mobile Devices PDF

Summary

This document discusses the components, features, and functionality of laptops and mobile devices. It includes detailed descriptions about hardware, software, and connectivity options. It covers topics like external features, input devices, and displays. The content is written in a clear and concise manner, utilizing technical terms.

Full Transcript

Chapter 9: Laptops and Mobile Devices Chapter 9: Laptops and Mobile Devices 9.0: Introduction 9.0.1: Welcome 9.0.1.1: Laptops and Mobile Devices Improvements in technology have allowed the laptop to become lightweight, powerful, and much more affordable. Because of this, laptops are found in just...

Chapter 9: Laptops and Mobile Devices Chapter 9: Laptops and Mobile Devices 9.0: Introduction 9.0.1: Welcome 9.0.1.1: Laptops and Mobile Devices Improvements in technology have allowed the laptop to become lightweight, powerful, and much more affordable. Because of this, laptops are found in just about every setting today. Laptops run the same operating systems as desktop computers and most come with built in Wi-Fi, webcam, microphone, speakers, and ports to attach external components. A mobile device is any device that is hand-held, lightweight, and typically has a touchscreen for input. Like a desktop or laptop computer, mobile devices use an operating system to run applications (apps), games, and play movies and music. Mobile device also have different CPU architecture, designed to have a reduced instruction set when compared to laptop and desktop processors. With the increase in demand for mobility, the popularity of laptops and other mobile devices continues to grow. This chapter focuses on many features of laptops, mobile devices, and their capabilities. 9.1: Laptop Components 9.1.1: Features of Laptop Components 9.1.1.1: External Features Unique to Laptops Laptop and desktop computers use many of the same hardware features so that peripherals can be interchangeable. The placement of ports, connections, and drives is unique because of the compact design of a laptop. Top view of a laptop shows three LEDs on the top of the laptop  P a g e | 60 Chapter 9: Laptops and Mobile Devices Rear view of a laptop Front view of a laptop Laptops require a port for external power and can operate using either a battery or an AC power adapter. You can use this port to power the computer or to charge the battery. Right side view of a laptop Left side view of a laptop 9.1.1.2: Common Input Devices and LEDs in Laptops Laptops are designed to be compact and portable, while maintaining much of the same functionality provided by desktop computers. As a result, essential input devices are built into laptops. When a laptop lid is lifted, the following input devices may be present:  Touchpad  Pointing stick  Keyboard  Fingerprint readers  Microphone  Web camera Laptops may feature LEDs that show the status of specific devices or components. LEDs are commonly found below the display screen or directly above the keyboard. LEDs vary by laptop model. Laptop icons P a g e | 61 Chapter 9: Laptops and Mobile Devices 9.1.2: Laptop Displays 9.1.2.1: LCD, LED, and OLED Displays There are three types of laptop displays:  Liquid-crystal display (LCD)  Light-emitting diode (LED)  Organic light-emitting diode (OLED) LED displays use less power and have a longer lifespan than LCD displays, making them the display choice for many laptop manufactures. Organic LED (OLED) technology is commonly used for mobile devices and digital cameras, but can also be found in some laptops. With OLED displays, every pixel is individually lit. Some laptops now come with detachable touch screens that can be used like a tablet when the display is detached. Other laptops permit the keyboard to fold back behind the display to allow the laptop to function like a tablet. To accommodate these types of laptops, Windows will rotate the display 90, 180, or 270 degrees automatically or by pressing the Control + Alt keys simultaneously with the arrow key for which way you want the laptop to face. 9.1.2.4: Webcam and Microphone Most laptops today have a webcam and microphone built in. The webcam is normally positioned at the top, center of the display. The internal microphone can often be found next to the webcam. Some manufactures may place the microphone next to the keyboard, or on the side of the laptop. P a g e | 62 Chapter 9: Laptops and Mobile Devices 9.2.2: Wireless Configuration 9.2.2.1: Bluetooth The Bluetooth technical specification is described by the Institute of Electrical and Electronics Engineers (IEEE) 802.15.1 standard. Bluetooth devices are capable of handling voice, music, videos, and data. Bluetooth Installation and Configuration Windows activates connections to Bluetooth devices by default. If the connection is not active, look for a switch on the front face or on the side of the laptop to enable the connection. If a laptop does not feature Bluetooth technology, you can purchase a Bluetooth adapter that plugs into a USB port. 9.2.2.3: Wi-Fi Laptops usually access the internet by using wireless adapters. Wireless adapters can be built in to the laptop or attached to the laptop through an expansion port. 9.4: Mobile Device Hardware Overview 9.4.1: Mobile Device Hardware 9.4.1.1: Mobile Device Parts Unlike laptops, mobile devices, such as smartphone and tablets, are typically small enough to be handheld. A smartphone can be carried in a pocket. A tablet can be carried in a purse or small backpack. P a g e | 63 Chapter 9: Laptops and Mobile Devices There are parts and instructions available from many websites for replacing broken mobile device parts, including touchscreens, front or back glass, and batteries. Installing parts from sources other than the manufacturer voids the manufacturer’s warranty and might harm the device. Some mobile devices might have one or more of the following field-replaceable parts:  Battery - Some mobile device batteries can be replaced. Mobile phone battery  Memory card - Many mobile devices use memory cards to add storage. Micro SD Card  Subscriber Identity Module (SIM) card - This small card contains information used to authenticate a device to mobile telephone and data providers, SIM cards can also hold user data such as contacts and text messages. SIM Card 9.4.1.3: Touchscreens Most mobile devices do not have a keyboard or a pointing device. They use touchscreens to allow users to physically interact with what is shown on the screen and type on a virtual keyboard. Icons, like those found on desktops and laptops, are clicked with a touch rather than a mouse button. Mobile device manufacturers use the word tap or touch when describing operations and steps when using a mobile device. P a g e | 64 Chapter 9: Laptops and Mobile Devices In addition to a single touch, there are some common finger movements, called gestures, used to perform functions:  Slide or swipe - Move between screens horizontally or vertically. Touch the screen, slide your finger quickly in the direction you want to move the screen and let go.  Double touch - Zoom items such as photographs, maps, and text. Touch the screen twice quickly to zoom in. Touch the screen twice quickly again to zoom out.  Long touch - Select items, such as text, icons, or photos. Touch and hold the screen until options become available for the item you are touching.  Scroll - Scroll items that are too large for the screen, such as photos or web pages. Touch and hold the screen, moving your finger in the direction you want to move the item. Lift your finger when you reach the area of the screen you want to see.  Pinch - Zoom out from objects, such as photographs, maps, and text. Touch the screen with two fingers and pinch them together to zoom out from the object.  Spread - Zoom in on objects, such as photographs, maps, and text. Touch the screen with two fingers and spread them apart to zoom in on the object. Some smartphones have a proximity sensor that turns off the touchscreen when the phone is up to your ear and turns it on when you pull the device away from your ear. This prevents functions from being activated by contact with your face or ear, and also saves power. 9.4.1.7: Accessories Mobile device accessories are not necessary for the functions of the devices as intended by the manufacturer. However, accessories can enhance the user’s experience. The accessories, except for protective covers, can be connected to the laptops and mobile devices via wired or wireless technologies. Protective covers: P a g e | 65 Chapter 9: Laptops and Mobile Devices Mobile devices are portable electronic devices. Cases and protective covers can protect these devices from physical damage during travel or use. Furthermore, some protective covers also provide protection from water damage. Power sources:  External batteries / portable chargers – While on the go, the external batteries can provide the extra power for mobile devices. Portable chargers, such as solar chargers and car chargers, can replenish power. External Battery Portable chargers  Docking stations – These allow mobile devices to easily connect to other devices. Most docking stations will also act as a charger while the mobile device is connected. Some docking stations also have speakers or keyboards. Audio Accessories  Headsets / ear buds - These allow a user to listen to audio output privately. If the headset or ear buds have a microphone, the user can have phone conversation while keeping their hands free. Both wireless and wired connections are available. Headsets Ear buds P a g e | 66 Chapter 9: Laptops and Mobile Devices  Speakers - These speakers can come in different colors, shapes and sizes. Speakers can also be wireless or wired. Other:  Credit card readers - People can use their smartphones with credit card readers to accept credit card payments from anyone.  Game pad - These are peripheral devices used for playing video games.  Memory/MicroSD - Like a laptop, built-in memory card readers increase storage capacity. 9.4.2: Other Mobile Devices 9.4.2.1: Wearable Devices Wearable devices are clothing or accessories that have miniature computing devices. Smart watches, fitness monitors, and smart headsets are some examples. P a g e | 67 Chapter 9: Laptops and Mobile Devices Smart Watches Smart watches are watches that combine the functions of a watch and some functions of mobile devices. Some smartwatches also include sensors to measure body and environmental metrics such as heart rate, body temperature, elevation, or air temperature. They have touchscreen displays, and they can function on their own or paired with smartphones. These watches can display notifications of incoming messages, incoming phone calls, and social media updates. Smartwatches can run apps on the watch or via a smartphone. They may also allow the users to control some functions, such as music and camera, on a smartphone. Fitness Monitors Fitness monitors are designed to clip onto clothing or be worn on the wrist. They are used for tracking a person’s daily activity and body metrics as they work toward their fitness goals. These devices measure and collect activity data. They can also connect with other Internet-connected devices to upload the data for later review. Some fitness monitors may also have basic smartwatch capabilities, such as displaying caller ID and text messages. Smart Headsets Smart headsets are designed to be worn like a pair of eyeglasses. The headset has a small screen built into the frame or projected onto glass. The headset is often connected to a smartphone for network connectivity. Functions might be controlled by a touchpad on the side or voice commands. These devices have many of the same functions as smartphones. A user can see notifications, read emails, get directions, or take calls via the headset rather than on a smartphone. The display is always visible to the wearer; all they have to do is focus on it. P a g e | 68 Chapter 9: Laptops and Mobile Devices 9.7: Summary This chapter discussed the features and functionality of laptops and mobile devices. The following concepts from this chapter are important to remember:  Laptops and mobile devices are lightweight and can operate on battery power.  Laptops use the same types of ports as desktop computers so that peripheral devices can be interchangeable. Mobile devices can also use some of the same peripheral devices.  Essential input devices, such as a keyboard and track pad, are built into laptops to provide similar functionality as desktop computers. Some laptops and mobile devices use touchscreens as input devices.  The internal components of laptops are typically smaller than desktop components because they are designed to fit into compact spaces and conserve energy. The internal components of mobile devices are usually connected to the circuit board to keep the device compact and light weight.  Docking stations and port replicators can increase the functionality of laptops by providing the same types of ports that are featured on desktop computers. Some mobile devices use docking station to charge or use peripheral devices.  Laptops and mobile devices most commonly feature LCD or LED screens, many of which are touchscreen.  Backlights illuminate LCD and LED laptop displays. OLED displays have no backlight.  The power settings of laptop batteries can be configured to ensure that power is used efficiently.  Laptops and mobile devices can feature a number of wireless technologies, including Bluetooth, Infrared, Wi-Fi and the ability to access Cellular WANs.  Laptop components should be cleaned regularly in order to extend the life of the laptop. P a g e | 69 Chapter 12: Security Chapter 12: Security 12.0: Introduction 12.0.1: Welcome 12.0.1.1: Security This chapter reviews the types of attacks that threaten the security of computers and the data contained on them. A technician is responsible for the security of data and computer equipment in an organization. You will learn how to work with customers to ensure that the best possible protection is in place. To successfully protect computers and the network, a technician must understand both types of threats to computer security: Physical - Events or attacks that steal, damage, or destroy equipment, such as servers, switches, and wiring Data - Events or attacks that remove, corrupt, deny access to authorized users, allow access to unauthorized users, or steal information 12.1: Security Threats 12.1.1: Types of Security Threats 12.1.1.1: Malware Computers and the data contained on them must be secured against malware:  Malware is any software created to perform malicious acts. The word malware is an abbreviation of malicious software.  It is usually installed on a computer without the knowledge of the user. These programs open extra windows on the computer or change the computer configuration.  Malware is capable of modifying web browsers to open specific web pages that are not the desired web page. This is known as browser redirection. It is also capable of collecting information stored on the computer without the user’s consent. The first and most common type of malware is a computer virus. A virus is transferred to another computer through email, USB drives, file transfers, and even instant messaging. The virus hides by attaching itself to computer code, software, or documents on the computer. When the file is P a g e | 71 Chapter 12: Security accessed, the virus executes and infects the computer. Examples of what a virus can do are listed below: Another type of malware is a Trojan horse. A Trojan horse usually looks like a useful program but it carries malicious code. For example, Trojan horses are often provided with free online games. While playing the game, the Trojan horse is installed on the user's system and continues operating even after the game has been closed. Over the years, malware has continued to evolve. A worm (one of malware types) is a self-replicating program that is harmful to networks with the intent to slow or disrupt network operations. Worms typically spread automatically by exploiting known vulnerabilities in legitimate software. To detect, disable, and remove malware before it infects a computer, always use antivirus software, antispyware, and adware removal tools. It is important to know that these software programs become outdated quickly. Therefore, it is the responsibility of the technician to apply the most recent updates, patches, and virus definitions as part of a regular maintenance schedule. Many organizations establish a written security policy stating that employees are not permitted to install any software that is not provided by the company. 12.1.1.3: Phishing Phishing is when a malicious party sends an email, calls on the phone, or places a text with the intent to trick the recipient into providing personal or financial information. Phishing attacks are also used to persuade users to unknowingly install malware on their devices. For example, a user has received an email which looks like it originated from a legitimate outside organization, such as a bank. The attacker might ask for P a g e | 72 Chapter 12: Security verification of information, such as a username, password, or PIN number, to possibly prevent some terrible consequence from occurring. If the user provides the requested information, the phishing attack is successful. A form of phishing attack is called spear phishing. This is when a phishing attack is targeted at a specific individual or organization. Organizations must educate their users regarding phishing attacks. There is rarely a need to provide sensitive personal or financial information online. Legitimate businesses will not ask for sensitive information through email. Be suspicious. When in doubt, make contact by mail or phone to ensure the validity of the request. 12.1.1.4: Spam Spam, also known as junk mail, is unsolicited email. In most cases, spam is used as a method of advertising. However, spam can be used to send harmful links, malware, or deceptive content. The goal is to obtain sensitive information such as a social security number or bank account information. Most spam is sent out by multiple computers on networks that have been infected by a virus or worm. These compromised computers send out as much bulk email as possible. Spam cannot be stopped, but its effects can be diminished. For example, most ISPs filter spam before it reaches the user’s inbox. Many antivirus and email software programs automatically perform email filtering. This means that they detect and remove spam from an email inbox. Organizations must also make employees aware of the dangers of opening email attachments that may contain a virus or a worm. Do not assume that email attachments are safe, even when they are sent from a trusted contact. The sender’s computer may be infected by a virus that is trying to spread itself. Always scan email attachments before opening them. 12.1.1.8: Social Engineering Social engineering occurs when an attacker tries to gain access to equipment or a network by tricking people into providing the necessary access information. For P a g e | 73 Chapter 12: Security example, in the figure below, the social engineer gains the confidence of an employee and convinces the employee to divulge their username and password information. Social Engineering Attack Example Here are some basic precautions to help protect against social engineering:  Never give out your login credentials (e.g., username, password, PIN).  Never post credential information in your work area.  Lock your computer when you leave your desk. To secure a physical location, the business should:  Implement an access or entry control roster listing who is permitted in.  Do not let anyone follow you through a door that requires an access card.  Always ask for the ID of unknown persons.  Restrict access to visitors.  Escort all visitors. P a g e | 74 Chapter 12: Security 12.2: Security Procedures 12.2.1: Windows Local Security Policy 12.2.1.1: What is a Security Policy? A security policy is a set of security objectives that ensure the security of a network, the data, and the computer systems in an organization. The security policy is a constantly evolving document based on changes in technology, business, and employee requirements. The security policy is usually created and managed by the organization management and the IT staff as illustrated in the figure below. 12.2.1.3: Usernames and Passwords The system administrator usually defines a naming convention for usernames when creating network logins. A common example of a username is the first letter of the person’s first name and then the entire last name. Keep the naming convention simple so that people do not have a hard time remembering it. Usernames, like passwords, are an important piece of information and should not be revealed. P a g e | 75 Chapter 12: Security Password guidelines are an important component of a security policy. Any user that must log on to a computer or connect to a network resource should be required to have a password. Passwords help prevent theft of data and malicious acts. Passwords also help to confirm that the logging of events is valid by ensuring that the user is the correct person. Three levels of password protection are recommended:  BIOS – Prevents the operating system from booting and the BIOS settings from being changed without the appropriate password.  Login – Prevents unauthorized access to the local computer.  Network – Prevents access to network resources by unauthorized personnel. 12.2.4: Protection Against Malicious Software 12.2.4.1: Malicious Software Protection Programs Malware includes viruses, worms, Trojan horses, keyloggers, spyware, and adware. These are designed to invade privacy, steal information, damage the system, or delete corrupt data. It is important that you protect computers and mobile devices using reputable antimalware software. The following types of antimalware programs are available:  Antivirus protection - Program continuously monitors for viruses. When a virus is detected, the user is warned, and the program attempts to quarantine or delete the virus, as shown: P a g e | 76 Chapter 12: Security Virus Detection  Adware protection – Program continuously looks for programs that display advertising on your computer.  Phishing protection – Program blocks the IP addresses of known phishing websites and warns the user about suspicious sites.  Spyware protection – Program scans for keyloggers and other spyware.  Trusted / untrusted sources – Program warns you about unsafe programs about to be installed or unsafe websites before they are visited. It may take several different programs and multiple scans to completely remove all malicious software. Run only one malware protection program at a time. Several reputable security organizations such as McAfee, Symantec, Kaspersky, offer all-inclusive malware protection for computers and mobile devices. Be cautious of malicious rogue antivirus products that may appear while browsing the Internet. Most of these rogue antivirus products display an ad or pop-up that looks like an actual Windows warning window. They usually state that the computer is infected and must be cleaned. Clicking anywhere inside the window may begin the download and installation of the malware. P a g e | 77 Chapter 12: Security Example of Rogue Antivirus  When faced with a warning window that is suspect, never click inside the warning window. Close the tab or the browser to see if the warning window goes away. If the tab or browser does not close, press ALT+F4 to close the window or use the task manager to end the program. If the warning window does not goes away, scan the computer using a known, good antivirus or adware protection program to ensure that the computer is not infected. 12.5: Summary This chapter discussed computer security and why it is important to protect computer equipment, networks, and data. Threats, procedures, and preventive maintenance relating to data and physical security were described to help you keep computer equipment and data safe. Some of the important concepts to remember from this chapter are:  Security threats can come from inside or outside of an organization.  Viruses and worms are common threats that attack data.  Develop and maintain a security plan to protect both data and physical equipment from loss.  Keep operating systems and applications up to date and secure with patches and service packs. P a g e | 78

Use Quizgecko on...
Browser
Browser