Which of the following are Apple proprietary connector types that can be used for iOS mobile device synchronization select two?

Question:

Which of the following are Apple-proprietary connector types that can be used for iOS mobile device synchronization? (Select 2 answers)

USB-C connector
30-pin dock connector
USB Type-A connector
8-pin dock connector (a.k.a. Lightning connector)
USB Type-B connector

Expert Answer:

Step 1

SOLUTION:

Which of the following are Apple-proprietary connector types that can be used for iOS mobile device synchronization? (Select 2 answers)

USB-C connector
30-pin dock connector
USB

Bluetooth

The last way that mobile devices expand their physical capabilities is wirelessly, most often using the Bluetooth standard for adding a keyboard (all) or mouse (not with Apple products). In theory, you could attach all sorts of Bluetooth devices to the mobile device,

but the reality seems limited to keyboards. Figure 25-30 shows a diminutive Apple keyboard for the iPad and the iPad resting in a stand to make typing this chapter a little easier than using the virtual keyboard.

NOTE See the"Bluetooth" section toward the end of this chapter for the steps to set up a tablet with a Bluetooth keyboard . Adding Apps

Mobile devices come from the manufacturer with a certain number of vital apps installed for accessing e-mail, surfing the Web, taking notes, making entries in a calendar, and so on. Almost all mobile devices offer multimedia apps to enable you to listen to music, take pictures, watch YouTube videos, and view photos. You'll find instant messaging tools and, in the case of smartphones, telephone capabilities. Apple and Closed Source

Apple makes the most popular mobile devices in the iPhone and the iPad. Both devices use the iOS operating system. Unlike every other manufacturer, Apple tightly controls the user experience, insisting that all developers of apps for iOS follow the same guidelines.

Apple maintains strict control over what apps can be installed onto iOS devices, meaning that if you want to get an app for your iPhone or iPad, you can only get it from the Apple App Store (see Figure 25-31). Apple must approve any app before it goes into the App Store, and Apple reserves the right to refuse to list on the App Store any app that fails to measure up.This controlled environment is called a closed source or vendor-specific system_ Apple is the source for all iOS goodness.

NOTE CompTlA's use of the term "closed source"to describe the distribution of apps with Apple products differs from the more common meaning of the term.Closed source typically means that a company that develops

software doesn't release the underlying programming to other developers. Oppose this term with open source, like Linux distributions where anyone can download and modify the underlying source code.

To add an app, select the App Store icon from the home screen. You can select from featured apps or view by category. You can check out the top 25 paid or free apps or simply search for what you want (see Figure 25-32).

The first time you try to purchase an app through the App Store, you'll be prompted to set up an account. You can use an account that you created previously through the Apple iTunes music and video store or create a new account using the Apple iCloud service. Creating a new iCloud account takes a few steps and a lot of typing in of passwords and such (see Figure 25-33), but eventually you'll get the account figured out.You'll need a valid credit card to set up the account. The iCloud Key Chain builds on the Key Chain feature in OS X to synchronize user information, passwords, and other credentials with all your Apple devices. (See "Synchronization" a little later in the chapter.) Key Chain can seamlessly store many non-Apple credentials as well, such as from Facebook, Amazon, and other providers.

Android Applications

Google Android powers many smartphones and a solid percentage of tablets, but Android differs greatly from Apple iOS in that Google gives the OS away and developers create versions suited to their devices.That means in practice that when you have a smartphone or tablet that uses Google Android for an OS, you have to amend that description to include the manufacturer as well. A Samsung tablet, in other words, uses a version of Android that differs somewhat from the Android an ASUS tablet uses. HTC, for example, uses a custom interface for its Android devices called HTC Sense that changes the look and feel of Android. When you want to get an app for an Android device, you have alternative sources for that app.

Many vendors offer a store with apps developed or customized to work with their devices. These vendor-specific stores enable you to get apps that should work well with your Android smartphone or tablet.

You can also go to a third-party app store or market for apps developed "for Android" that probably will work with your device, but there's not a guarantee that they'll work on all Android devices. Google Play (Android's default app store), for example, offers well over 1 million apps. This Wild West approach to apps makes the Android experience vastly different from the iOS experience when it comes to smartphones and tablets.

NOTE Microsoft has a substantial presence in the mobile devices market withWindows Phone 7, 8,and 8.1 and Windows 10 Mobile.Expect the market share to increase over the coming years. Microsoft embraces an app marketplace somewhere in between that of Apple and Google,with both Microsoft-created apps and those created by other developers available through the Windows Phone Marketplace and other venues.

Windows Applications

Windows apps closely mirror Apple apps in terms of Microsoft's close development and control of apps. While anyone can write an app for Windows Phone, it must be accepted by the Windows Phone Store if the developer wants to distribute it publicly (see Figure 25-34).

Network Connectivity

Mobile devices connect to the outside world through the cellular networks or through various 802.11 Wi-Fi standards. You learned specifics about the standards in Chapter 22, "Wireless Networking," so I won't rehash them here.This section looks at standard configuration issues from the perspective of a mobile device. When you want to connect to a Wi-Fi network, you need to turn on Wi-Fi on your device and then actively connect to a network. If the network is properly configured with WPA or WPA2 encryption, then you also need to have the login information to access the network. The most common way to connect is through the Settings app (see Figure 25-35).

Settings enables you to do the vast majority of configuration necessary to a mobile device.To join a network, for example, tap the Wi-Fi (or Networks) option to see available networks (see Figure 25-36). Simply select the network you want to join and type in the passphrase or passcode . Give the mobile device a moment to get IP and DNS information from the DHCP server, and you're on the network. After you connect to a network successfully, all mobile devices store that network access information automatically, creating a profile of that network based on the SSID (the name of the network) .This works just like with any other device that connects to a Wi-Fi network. If the SSID of a network changes after you've connected to that network, your mobile device will fail to connect to the rechristened network. You need to delete the profile and reconnect . You do this through the Settings app by selecting the Wi-Fi network and selecting Forget this network.

EXAM TIP You can use the Settings app to turn off Wi-Fi or to go into Airplane Mode to stop the device from sending any signals out.

Data

Many mobile devices can use the cellular data services discussed in Chapter 22 to access the Internet.This way you can use your smartphone, tablet, or other mobile devices to get e-mail or browse the Web pretty much anywhere.

By default, mobile devices that use cellular networks for Internet connectivity use data roaming, meaning they'll jump from cell tower to cell tower and from your provider to another provider without obvious notice_ This is no big deal when you travel within your own country where competing providers have inexpensive roaming agreements_ Watch out for data roaming outside your country! If you travel outside of your

country, your mobile device will also happily and seamlessly connect via some other available cell provider_ This can lead to some shockingly huge bills from your cell phone company when you get back from that cruise or out-of-country trip- If you're going outside your cell provider's coverage area, get a plan that specifies that you're traveling. It'll still be more expensive than your regular plan, but not nearly as crazy as an accidental roaming charge. If you don't need to connect when out of country, turn data roaming off. You'll find the feature in the Settings app, as you might expect. You can also turn off cellular data entirely or only turn off cellular services selectively if your device can do more than one type. (You would want to turn off cellular data, for example, if you don't have an unlimited data plan and are getting near your limits.) E-mail

Setting up e-mail offers many levels of complexity with mobile devices, primarily because of the many different types of e-mail servers out there. Every mobile device comes with an e-mail service set up specifically from the mobile OS developer as a starter. Plus you can configure devices to send and receive standard e-mail as welL

iOS, Android, and Windows Phone devices offer e-mail services from Apple, Google, and Microsoft, respectively_ iOS devices integrate perfectly with iCloud, Apple's one-stop shop for e-mail, messaging, and online storage_ Android devices assume a Gmail account, so have a Google/inbox option front and center (see below) . Windows devices integrate Outlookcom e-mail options. The 902 exam describes these options with a whale of a phrase: integrated commercial provider email {sic} configuration.Yeah_

EXAM TIP The 902 exam adds Yahoo! e-mail to the list of integrated commercial providers on mobile devices.Yahoo! does great e-mail, granted,but hasn't been a default option on mobile devices since the Blackberry (a device that died at the hands of the smartphones)_ Just be aware that the exam might throw Yahoo! into the mix (and not include the exclamation point)_

Aside from the integrated e-mail options, mobile devices enable you to set up standard corporate and ISP e-mail configurations as well. The process is similar to that of setting up e-mail accounts that you learned about in Chapter 23- Apple devices go through the Settings app, then the Mail, Contacts, Calendars option (see Figure 25-37)- Tap the Add Account option to bring up the default e-mail options (see Figure 25-38) . If you want to connect to a Microsoft Exchange Server-based e-mail account, tap the appropriate option here and type in your e-mail address, domain, user name, password, and description.

If you want a POP3 or IMAP4 account set up, that's not one of Apple's default options, so you need to click the Other option on the initial Add Account screen. Eventually you'll get prompted as you would expect to choose POP3 or IMAP and type in addresses for the sending (SMTP) and receiving servers. Android-based devices assume you'll have a Gmail account as your primary account, so that option is offered as a distinctive icon on the home screen (see Figure 25-39)- You'll also have an e-mail icon for setting up Exchange, POP3, or IMAP4 accounts. You configure them the same way as you would a desktop e-mail application, including putting in the port number and security type, such as SSL or TLS (see Figure 25-40).

The 902 exam will hit you pretty hard on e-mail settings, specifically on TCP port numbers for the various e-mail protocols_ We've covered these in earlier chapters, but here's a quick cheat sheet and a few alternative numbers for real-world applications_ • POP3 uses TCP port 110

• IMAP4 uses TCP port 123

• SMTP uses TCP port 25

Many servers block these default ports; plus, when you move to more secure versions of the protocols, you need to use other port numbers. No clue whether CompTIA will quiz on the secure ports for POP3, IMAP4, and SMTP, but here they are.

• Secure POP3 uses TCP port 995

• Secure IMAP4 uses TCP port 993

• Secure SMTP uses TCP port 465 or 587

Finally, you may also have to configure other settings, such as Secure/Multipurpose Internet Mail Extensions (SIMIME}, which are used to configure digital signature settings for e-mail, and contacts from the corporate address book, depending on how the corporate e-mail server is set up.

EXAM TIP Be familiar with integrated commercial provider e-mail configuration settings for Google's inbox (inbox by Gmail),Yahoo!,Outlook_ com, and iCloud.Know the corporate and ISP e-mail configuration settings for POP3, IMAP4,port and SSL settings, Exchange,and S/MIME_ Synchronization

From the first day mobile devices came into existence there was a problem: their data. People don't want their contacts on their mobile devices to be different than the contacts on their desktop or online contacts. People don't want to edit e-mail on their mobile device and then have to go online to make the same changes. People only want one calendar. If you have a mobile device, you're going to want a method for all these different sets of data to synchronize so you only have one set of contacts, one e-mail inbox, one calendar, and so forth. Smartphones and tablets can synchronize, or sync, with local machines or over the Internet with cloud-based servers to keep flies and data up-to-date_ These files and data include personal documents, Internet bookmarks, calendar appointments, social media data, eBooks, and even location data. Older devices, such as BlackBerrys and Palm Pilots, had a specialized sync program that installed onto your PC that you could use to sync contacts, calendars, and so on_ Today's devices either use a dedicated program or sync through the cloud_ Various mobile devices sync differently, depending upon the device vendor and software required_ iOS devices use Apple iTunes software to play media and purchase from the iTunes Store, and also to sync iPhones, iPads, and iPods. Android and Windows devices also have an app store, similar to the iTunes Store, that can sync certain configuration settings, apps, software upgrades, and so on_ In some cases, these other mobile devices-Android devices, for example don't necessarily require any particular app to synchronize with, and may use individual apps to synchronize their parts of the device. For example, an e-mail app may be perfectly capable of synchronizing its data to include e-mail and contacts_ Like the later versions of iOS, most of these other devices are capable of syncing over the air using Wi-Fi or cellular technologies.

EXAM TIP Synchronization enables mobile devices to keep up-to-date with a lot of essential information. You should know the types of data typically synced, including contacts, programs (apps), e-mail, pictures, music, videos, calendar information, bookmarks, documents, location data, social media data, and e-books_ It's a lot.You can do this! Exchange ActiveSync

Exchange ActiveSync (EAS) is a Microsoft protocol used to synchronize Microsoft Exchange e-mail, contacts, and calendars that has become widely used across a range of mobile OS platforms and hardware vendors, including Apple and Android devices. It was originally developed as a synchronization protocol for Microsoft Exchange corporate users, but has evolved over time to include more device control and management features. EAS not only has the capability to set up and configure network connectivity and secure e-mail options for clients that connect to Microsoft Exchange corporate servers, but also has the capability to control the much wider range of functions. Some of these functions include the capability to set password policies, remotely wipe or lock a mobile device, and control some device settings.

Synchronization Methods

In the old days, mobile devices were synchronized to a desktop, using a specific type of synchronization software provided with the device_ Also, the type of data to be synced was typically limited to contact information. Now, there are various ways you can sync a device, enabling you to sync contacts, media files, and even apps- You can also get updates and patches from the device manufacturer by syncing your device. You are now also no longer tied to just syncing to the desktop; with faster cellular and Wi-Fi networking technologies, you can sync even large amounts of data to the cloud. Each phone

vendor has its own version of cloud technologies that you can tie to your user account and use to store your personal data from your mobile device. Apple has iCloud, Microsoft has OneDrive, and Google has its own user cloud services, as do some of the individual manufacturers that make Android devices.There are also independent cloud providers that enable you to store your personal data, and even share it with others. Dropbox is a prime example of this type of provider, although there are many others.Most cloud storage services require you to set up security measures to protect your data, such as requiring a username or password as authentication . Some cloud providers also allow you to encrypt data stored in their cloud.

Synchronizing your data to a personal computer (or laptop) has both advantages and disadvantages. The advantages of syncing to a personal computer are that you can be in full control of storing and protecting your own data, encrypted anyway you choose, and can also move it to portable storage in case you need a backup of it later. Disadvantages would be that you must be connected to that computer or within wireless range of it, if you sync wirelessly. That means that you couldn't be on vacation and simply sync your device, unless you are also lugging your big desktop with you. Syncing to the cloud also has its advantages and disadvantages. If you have a good cell

liar or wireless signal, you can sync from anywhere. You do have to be careful of syncing over unsecured public wireless networks, however, since there is a possibility that your data could be intercepted and read over these unsecured networks. Another disadvantage of syncing to the cloud is that once your data is in the cloud, you no longer fully control it. You are at the mercy of the security mechanisms and privacy policies of your provider. You have to accept whatever security mechanisms, such as encryption strength (or lack thereof) they use, and you have to abide by their privacy policies, which may allow them to turn your data over to third parties, such as other companies for marketing, or even law enforcement. Additionally, some cloud providers may limit the type and amount of data you are allowed to store in their cloud.There may be particular types of media files, for example, with certain size limits that you may not be allowed to store, or certain types of software. These restrictions are typically in place to prevent software and media (for example, video and music) piracy.

These are all considerations you'll have to think carefully about when choosing whether to sync to the desktop, the cloud, or both. EXAM TIP The 902 objectives add a curious phrase in the discussion of synchronization,"mutual authentication for multiple services:'This means a little or a lot and it's hard to tell precisely what CompTIA wants here. Certainly,when you log into your iOS device, you effectively authenticate with iCloud,iTunes, and iApple (kidding on that one).That's a lot of services. And,by using an Apple device with a specific hardware ID,the Apple services know precisely your device and user ID as well.That's mutual authentication of a sort. In a completely different way,though,mutual authentication can deal with mobile payment information,authenticating a device with specific credit card data.This doesn't seem relevant to synchronization,but we don't know the direction CompTIA is taking this specific phrase.Be aware of both concepts for the 902 exam. Synchronization Issues

The most common synchronization issue is incomplete sync of data due to connectivity issues, device issues, or even remote infrastructure issues_ Sometimes synchronization issues can cause an incomplete downloading of e-mail or even duplicate e-mail for example, as the device may retry the synchronization process over and over if it can't get a good connection, continually downloading the same e-mail messages. A device may attempt to sync to download an OS patch or update and may fail. The most likely culprit is connectivity issues with Wi-Fi or cellular connections, and the problem can usually be resolved by moving the device to an area with a stronger signal. This doesn't prevent upstream connectivity issues, which may also have to be examined. In some cases, there may be other issues that prevent synchronization. These can be any of a wide range of problems, including authentication issues, OS version issues, or incorrect configuration settings. If a device won't sync even after getting it to a stronger, more stable connection, these are some of the things you should examine. Another problem may be the remote end of the connection. This may be the enterprise e-mail server, or even the entry point into the enterprise network. Failure to properly authenticate or meet the requirements of the entry device may prevent a device from synchronizing.

One other issue you may want to examine when you have synchronization issues is that in some cases synchronization can occur from multiple sources. A device can synchronize from an enterprise app store, for example, as well as the vendor app store; personal e-mail services, such as Gmail and Yahoo! Mail; and even from third-party providers of "whatever-as-a-service" and cloud storage_ So in troubleshooting synchronization issues, you may have to take into account that different providers may have different configuration settings (to include encryption network settings), and in turn these configuration settings could conflict. In the enterprise environment, it's probably incumbent upon the mobile device management team to put together a management and technical strategy that will ensure minimal conflict between different synchronization sources_ iTunes and iCloud

Apple iPhones and iPads sync through Apple iTunes installed on a Mac or a PC. Everything, such as music, videos, contacts, pictures, e-mail, programs, and so on, can be stored locally. You can choose to backup all the apps on your iPhone or iPad to iTunes as well.This single source for backup makes it easy to recover from something catastrophic happening to your Apple device_ If you replace an Apple device, for example, you can simply sync that new device and all your files, contact information, and apps copy to the new device.

EXAM TIP Apple iTunes will run on just about any Mac OS X or Windows machine.To install the latest iTunes for Windows (64-bit), Apple specifies a Windows 7 (64-bit) or later PC with a 1-GHz Intel AMD CPU with support for SSE2 and 512-MB RAM.You can play music with a 1-GHz CPU and a 16-bit sound card,for example,but to scale up to play more complex media, such as HD video,you need a 2.4-GHz CPU with two or more cores_ For a Mac,

the basic software requirements are OS X version 10.7.5 or later.For more information,visit

www.apple.com/support/itunes/getstarted/

With iCloud, you can have all your iPhone or iPad data backed up online and thus accessible from anywhere. This includes any media purchased through iTunes and calendars, contacts, reminders, and so forth.

Android and Gmail

Android- based mobile devices don't have a central desktop application similar to iTunes for Apple devices. Rather, they sync over the Internet but only some data. Contacts, calendars, and e-mail (through Gmail) are all that sync by default. For every other type of data or media, you treat the Android device like a fat thumb drive you drag and drop files into the appropriate folder on the smartphone or tablet.

Mobile Device Communication and Ports

Mobile devices are, well, mobile and need as many possible ways to interconnect with the outside world as possible. This section looks at the many technologies and connections mobile device use to get the data flowing to the Internet and other devices.

NFC

Near Field Communication (NFC) uses chips embedded in mobile devices that create electromagnetic fields when these devices are close to each other. The typical range for NFC communications is anywhere from a very few centimeters to only a few inches.The devices must be very close to or touching each other, and can be used for data exchange for information such as contact information, small files, and even payment transactions through stored credit cards using systems like Apple Pay and Android Pay.This technology is seeing widespread adoption in newer mobile devices, as well as the infrastructures and applications that support them.

Micro-USB/Mini-USB

Unless your devices are manufactured by Apple, it's very likely they use either a micro- or mini-USB port to charge, connect to laptops and PCs, and sync between those devices. Micro-USE and mini-USE connectors, as well as much faster USB 3.0 connectors, are standard on most Android devices, as well as Windows devices. That's not to say that each of these doesn't have their own proprietary connectors as well, since Google and Microsoft provide the OS to multiple device manufacturers, some manufacturers do maintain a proprietary connector that you can only get from them. However, we're seeing less and less of this trend, as most device manufacturers are jumping on the micro and mini-USB bandwagon. This makes it easier to find cables and connectors that will fit almost any mobile device.

Lightning Connector

With the iPhone 5, Apple introduced its current proprietary connector, known as the Lightning connector. It replaced the older 30-pin connectors that Apple used on previous iPhones and iPads. The Lightning connector is an 8-pin connector (see Figure 25-41), and can be inserted without regard to proper orientation; in other words, it'snot "keyed" to insert a specific way (such as right-side up or upside down, as traditional USB connectors are) into the device_ The proprietary nature of the Lightning cable means it's more expensive than a normal USB cable_ It is licensed on a limited basis to other manufacturers, but to prevent widespread production of fake Lightning connectors by non-licensed manufactures, it contains a small chip that identifies it as a true Lightning connector, and cables without that chip typically won't work or will only have limited use. EXAM TIP The Apple Lightning standard is the poster child for proprietary vendor-specific ports and connectors. Only iOS devices use Lightning for communication and power_ Android and Windows Phone devices use industry-standard,vendor-neutral ports and connectors.

USB Type-C

USB 1jpe-C (see Figure 25-42) is the newest iteration of USB connectors, and is not yet commonly found on too many mobile devices, but you can expect to see it more frequently in the near future. In fact, Apple has hinted strongly that they are going to use this type of connector in the future to replace the Lightning connector as the technology matures_ Like the Lightning connector, the USB Type-C connector is not keyed, allowing it to be inserted right-side up or upside down. It supports USB 3-1 technology up to 10 Gbps, making it very fast for data transfers. With any luck, this will be the standardized connector for all future mobile devices, making it easier to buy cables to fit any device, without the worry of proprietary standards_

EXAM TIP You will likely see micro- and mini-USB,USB Type-C, and Lightning mobile device connection types on the exams.Know their characteristics and differences.

Bluetooth

Pairing a Bluetooth device with a mobile device follows a similar, simple pattern through the Settings icon. You turn on Bluetooth on the smartphone or tablet, then power on the Bluetooth device. Return to the mobile device to select to pair with the Bluetooth device, and then enter the appropriate personal identification number (PIN) code. For a keyboard, for example, the smartphone or tablet will display a set of characters for you to type on the keyboard (see Figure 25-43). Once you type in the PIN code, the devices connect.

EXAM TIP Not all Bluetooth pairings require a PIN code,but there's always some kind of pairing action to do on both devices to make a pairing. Always test the connectivity between a mobile device and a newly added Bluetooth accessory. If you've added a keyboard, for example, open up a note-taking app and start typing to make sure it works. NOTE Most mobile devices have Bluetooth discovery disabled by default to conserve battery life.Actively seeking pairing uses electricity, as does completed pairing, so use Bluetooth only when you need to use it and be prepared for the battery hit_

Infrared

Now largely replaced by other, faster technologies, such as Bluetooth and 802_ ll wireless, infrared (IR) was previously used between mobile devices, such as laptops and some older PDAs, to transfer data between them. Infrared was used to create the first real personal area networks (PANs). Infrared uses the wireless Infrared Data Association (IrDA) standard, and at one time was widely used to connect devices such as wireless remotes, printers, wireless mice, digitizers, and other serial devices. Infrared requires line of sight, meaning that devices have to be directly facing each other, requires very short distances (sometimes inches) between devices, and has very slow data rates.

Hotspots and Tethering

A mobile hotspot is typically a small device that has access to cellular technologies such as 3G, 4G, and 4G LTE, and provides access to these networks for Wi-Fi devices. Most of these devices can be purchased from wireless providers such as Verizon, Sprint, AT&T;, T-Mobile, or other carriers, and are usually specific to their type of broadband network These devices can provide wireless access for up to five to ten devices at a time. They're basically wireless routers that route traffic between Wi-Fi devices and broadband technologies. Many of these devices can be purchased as dedicated hotspots. Depending upon the carrier, many cellular phones, as well as tablets, can act as portable hotspots. When used in this manner, it's called tethering to the cell phone. The popular term used for these portable hotspots, as well as devices like cellular phones that also provide hotspot service, is MiFi,which stands for My Wi-Fi. Novatel Wireless actually owns the trademark to this name in the United States, but it has become common to refer to most of these devices as MiFi-capable. While some devices configured as hotspots can use your existing data plan with your carrier, some carriers separate out and limit the amount of data that can be used for tethering_

To configure a device as a hotspot, you typically enable its Wi-Fi connection as sort of a router, between the cellular network and a traditional 802.11-based wireless network Then any devices that you wish to tether to the hotspot simply see the device as a wireless router_ You can also configure a password so that not just anyone can connect to the hotspot. Any device that needs to connect to the hotspot must have the password manually entered into it when configuring its Wi-Fi connection to the device providing the hotspot connectivity. Figure 25-44 shows a screenshot of an Android phone acting as a portable hotspot_

Accessories

Mobile device accessories come in a wide variety of types, packing a huge range of features. Some of the most common accessories that people want for their mobile device, particularly smartphones and tablets, include devices that wirelessly connect to them,

typically using Bluetooth technologies. It's not unusual to find Bluetooth headsets and high-quality external speakers for users to listen to music and chat with friends. Gamepads, including controllers and other accessories that plug into tablets via a USB port or connect via Bluetooth, are also common, effectively turning tablets into full-scale gaming platforms. Additionally, there are also specialized tablets that are outfitted with gaming controllers built in and used specifically as gaming platforms. The NVIDIA SHIELD is one such example of a specialized Android device used as a gaming platform, and it can perform the same functions as other Android tablets. One feature that Android and some Microsoft mobile devices offer is the ability to use removable external storage, such as mini- or micro-USE memory cards, effectively upgrading the storage capabilities of the device.This is something that Apple hasn't quite embraced yet with its devices. In addition to the accessories previously mentioned, there are also accessories that no mobile device user should be without, including extra battery packs (if your mobile device supports battery removal and replacement, which many mobile devices don't) or a battery charger.To recharge mobile devices, battery chargers either plug into a wall outlet and the mobile device, or plug into a computer and the mobile device.Some battery chargers don't require connection to the device at all; they simply require you to lay the device on top of a special pad, from which power is transferred to the device without the need for cables. Depending upon the type of mobile device in use, there are also specialized accessories, including docking stations (typically for tablets) produced by the device manufacturer, and even credit card readers, allowing small businesses to take credit card payments from their mobile device. It's not unusual to see a business have a portable credit card reader plugged into the headphone port on an iPhone, for example. One other important accessory to have for the mobile device user is a cover for the device. These include designer covers with any imaginable designer picture on them that you could think of, as well as hardened covers designed to withstand the impact of dropping a mobile device on the floor, keeping it from breaking into a million pieces. There also screen protectors that range from flimsy plastic all the way to hardened glass that can protect a mobile device screen from scratches and impact. Some of these cases are made of plastic, others of leather or rubber. Some of these cases are even waterproof, allowing the more adventurous folks to take their phones with them while they are diving in oceans or swimming pools.

We've covered only a few of the hundreds of accessories that are available out there for mobile devices. Many accessories also come with apps that help control them or get the most out of the accessory_

Chapter Review

Questions

1. Which of the following is used in mobile devices to convert analog video and sound to digital video and sound?

A. Calibrator

B. SDK

C. Virtual assistant

D. Digitizer

2. Which type of display responds to the difference in electrical potential between you and the screen?

A. Capacitive

B.LCD

C. IPS

D. Resistive

3. Which mobile device screen technology uses no backlight?

A.BYOD

B.LCD C.LED D.OLED

4. What can a government use to determine your location at a specific time as long as you're using your mobile device? A. Multifactor authentication

B. Geotracking

C. Google Earth

D. Authenticator applications

5. What are the steps involved in pairing a Bluetooth keyboard with a tablet?

A. Enable Bluetooth on the tablet; turn on the Bluetooth device; find the device with the tablet; enter a PIN code or other pairing sequence.

B. Turn on the Bluetooth device; find the device with the tablet; enter a PIN code or other pairing sequence.

C. Search for a Bluetooth device from the tablet; select pair from the options to enable the device.

D. Enable Bluetooth on the tablet; turn on the Bluetooth device; find the device with the tablet; select pair from the options to enable the device.

6. Which of the following is a 15-digit number used to uniquely identify a mobile device that connects to a cellular network?

A. IMEi

B. GSM

C. ICCID

D. IMSI

7. A client calls and is upset that he's misplaced his iPad.The mobile device has literally thousands of client records, including business addresses, e-mail addresses, phone numbers, and, in some cases, credit card information. What should he do first?

A. There's nothing he can do. B. He should call his ISP and have them track his iPad.

C. He should access his iCloud account and remotely wipe his iPad to erase all personal data.

D. He should purchase another iPad and sync with his iTunes account.This automatically erases the information on the old tablet.

8. Leonard just purchased a very expensive comic book and paid for it using the stored credit card information on his smartphone. What technology did he use to make the transaction?

A. Swipe lock

B. Wi-Fi calling

C. NFC

D. BitLocker To Go

9. What information do you need to connect an Android-based tablet to an IMAP account?

A. POP3 server DNS name

B. User name and password

C. User name, password, sending and receiving server addresses

D. Exchange server name, user name, and password

10. Which mobile OS enables developers to customize the user experience without restrictions?

A. Android

B. Blackberry

c.iOS

D. Windows Phone

Answers

1. D. Digitizers are used in mobile devices to convert analog video and sound to digital video and sound, or to interpret analog signals associated with touch movement on a screen into digital equivalents_

2. A. A capacitive touchscreen display responds to the difference in electrical potential between you and the screen_

3. D. OLEO technology does not use a backlight_

4. B. Geotracking can locate you and your GPS-equipped mobile device.

5. A. To pair a Bluetooth keyboard with a tablet, enable Bluetooth on the tablet, turn on the Bluetooth device, find the Bluetooth device in the tablet's settings screen, then enter a PIN code or finalize the pairing. 6. A. The International Mobile Equipment Identity (IMEi) number is a 15-digit number used to uniquely identify a mobile device, typically a smartphone or other device that connects to a cellular network

7. C. To protect his data, the client should log into his iCloud account and remotely wipe the iPad and erase all personal data.

8. C. Leonard likely purchased his comic book using Near Field Communication (NFC) technology, which can be used for payment transactions through stored credit card information in mobile applications.

9. C. To connect an Android-based tablet to an IMAP account, you'll need a user name and password and the sending and receiving server addresses_ 10. A. Google Android is open source, enabling developers to create custom versions for their devices.

What is the name of a proprietary connector type used by Apple mobile devices?

The Lightning connector is used to connect Apple mobile devices like iPhones, iPads, and iPods to host computers, external monitors, cameras, USB battery chargers, and other peripherals.

What is a proprietary connector type that features a symmetrical reversible connector plug?

Which of the following is a proprietary connector type that features a symmetrical/reversible connector plug? eSATA connectors feature a distinct L-shape (right-angled or left-angled) that prevents the improper insertion of a connector plug into an eSATA port.

Which of the following connector types could be used to connect devices to an RS 232 port?

RJ-45 is still a current connector standard. The RS-232 connector is a form of serial data transmission used for connecting computers and its peripheral devices to allow serial data exchanges between them. The RS-232 connector is most commonly found in DB9 or DB15 connections on PCs for printers, mice, and modems.

Which of the following are characteristics of F type connectors?

Electrical Characteristics of F-type Connectors:.
Frequency Range: DC to 4 GHz..
Impedance: 75 Ohms..
Interface Standard: IEC 60169-24..
RF Leakage: -100dB min @ 1 GHz..
Return Loss: = ≥ 20 dB..
Operating Temperature: -40°C to +85°C..
Coupling Mechanism: Screw-on coupling..
Mating: 3/8-32 threaded..