SlideShare a Scribd company logo
1 of 13
A SEMINAR REPORT ON :
MOBILE COMPUTING AND APPLICATION
SUBMITTED BY :
Name : Sonalika Sethy
Reg No. : 1901206083
Branch : CSE, 7th Sem
CONTENTS:
• Introduction
• How it works
• Types of mobile computing
• Diagram
• Applications of mobile computing
• Future scope
• Advantages
• Disadvantages
• Conclusion
• References
INTRODUCTION:
 Mobile Computing refers a technology that allows transmission of data, voice and
video via a computer or any other wireless enabled device.
 It is free from having a connection with a fixed physical link.
 It facilitates the users to move from one physical location to another during
communication.
 In other words, you can say that mobile computing allows transmission of data, voice
and video via a computer or any other wireless-enabled device without being
connected to a fixed physical link. In this technology, data transmission is done
wirelessly with the help of wireless devices such as mobiles, laptops etc.
HOW IT WORKS:
• Generally, a mobile computing system involves a mobile
device, such as a laptop, computer, tablet or
smartphone, and a wireless network connection based
on Wi-Fi or cellular wireless technology, such as 5G.
• Mobile devices can typically store data locally, and access
to that data doesn’t require a network connection.
• Mobile computers typically accommodate access to both
wireless and wired technology.
• There are many mobile computing devices for vertical
and specialized applications which includes devices for
medical, surveillance, security and control uses.
TYPES OF MOBILE
COMPUTING:
• Mobile computing is a combination of
infrastructure, hardware and software technology.
The various parts of mobile computing are as
follows:
• Mobile Infrastructure: Infrastructure refers to the
technical pieces that allow devices to communicate.
Mobile infrastructure includes the wireless
networks, wireless protocols and data formats.
• Mobile hardware: The physical mobile device and
supporting hardware that users interact with make
up the mobile hardware. This may include cell
phones, laptops, tablets, wearable computers and
accompanying chargers and accessories.
• Mobile software. This refers to the applications that
run on mobile devices, including mobile operating
system (OSes) and user-facing applications, such as
mobile browsers and e-commerce applications.
Diagram:
APPLICATIONS:
• Web or Internet access.
• Global Position System (GPS).
• Emergency services.
• Entertainment services.
• Educational services.
• Social media portal
• E-Government
• Tour and Travel
FUTURE SCOPE:
• Enterprise Business Intelligence (BI) for Mobile Apps will
Increase
• Enhance the Protection for Mobile Phones
• More Emphasis on Mobile User Experience
• Development of Better Mobile Wallets
• Apple and IBM Partnership to Make Better Enterprise
Software
• Google Algorithm - Wise Computing
• Best Mobile SEO Activities and Strategies Will Become
Best Trend
ADVANTAGES:
• Mobile devices are smaller and more portable than
traditional computers, making them easy to carry and
use in a range of contexts.
• Over time, mobile devices have become less expensive
and easier to obtain. Increasingly, people opt for
smartphones and tablets as their primary means of
online connectivity.
• Mobile devices let users engage in phone, video and
various text and instant messaging applications.
• Mobile devices and applications enable companies to
collect more consumer data than was possible with
traditional computing.
DISADVANTAGES:
• Despite increasing battery life, power consumption
continues to be an issue, and mobile devices must be
recharged regularly.
• Mobile computing raises significant data
security because business users, especially, may have
sensitive data on their devices while traveling or working
remotely.
• Mobile devices can be distracting and potentially
dangerous in a hazardous work environment that
requires the employee's attention.
CONCLUSION:
• Today’s mobile computing technologies have gone
notches higher in comparison to yester years. Users can
nowadays work comfortably from any location as long as
they are connected to a secure network. Mobile
computing has become a major part of Information
Communication and Technology world.
REFERENCES:
• Google.com
• Wikipedia.org
• Techtarget.com
• Tutorialspoint.com
THANK YOU!!

More Related Content

Similar to Mobile Computing and Application 2.pptx

Small computing & Mobile Computing
Small computing & Mobile ComputingSmall computing & Mobile Computing
Small computing & Mobile ComputingPaul Kahoro
 
Mobile computing
Mobile computingMobile computing
Mobile computingamellia27
 
Internet of Things
Internet of ThingsInternet of Things
Internet of ThingsMphasis
 
Mobile computing
Mobile computingMobile computing
Mobile computingpooja s p
 
WIRELESS APPLICATIONS.pptx
WIRELESS APPLICATIONS.pptxWIRELESS APPLICATIONS.pptx
WIRELESS APPLICATIONS.pptxAimafatima4
 
Technology in Education Technology Presentation in Blue Peach Illustrative St...
Technology in Education Technology Presentation in Blue Peach Illustrative St...Technology in Education Technology Presentation in Blue Peach Illustrative St...
Technology in Education Technology Presentation in Blue Peach Illustrative St...MaryroseVicente6
 
Overview of mobile computing
Overview of mobile computingOverview of mobile computing
Overview of mobile computingVENNILAV6
 
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...Editor IJCATR
 
A Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile ComputingA Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile ComputingEditor IJCATR
 
A Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile ComputingA Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile ComputingEditor IJCATR
 
Details About Mobile Cloud Computing
Details About Mobile Cloud ComputingDetails About Mobile Cloud Computing
Details About Mobile Cloud Computingvaishnavi_sv
 
Lesson one introduction to mc
Lesson one  introduction to mcLesson one  introduction to mc
Lesson one introduction to mcssuser8662bb
 
Mobile Cloud Computing
Mobile Cloud ComputingMobile Cloud Computing
Mobile Cloud ComputingBhaktiKarale
 
Trends and technological and social innovations in innovation
Trends and technological and social innovations in innovationTrends and technological and social innovations in innovation
Trends and technological and social innovations in innovationDavid Cardenas
 
The Evolution of Cellphones: From Brick Phones to Smartphones
The Evolution of Cellphones: From Brick Phones to SmartphonesThe Evolution of Cellphones: From Brick Phones to Smartphones
The Evolution of Cellphones: From Brick Phones to SmartphonesPLAYBEATS2
 
SYBSC(CS)_WCIOT_Sem-II-Unit 3 IoT Architecture.pdf
SYBSC(CS)_WCIOT_Sem-II-Unit 3 IoT Architecture.pdfSYBSC(CS)_WCIOT_Sem-II-Unit 3 IoT Architecture.pdf
SYBSC(CS)_WCIOT_Sem-II-Unit 3 IoT Architecture.pdfshubhangisonawane6
 

Similar to Mobile Computing and Application 2.pptx (20)

Small computing & Mobile Computing
Small computing & Mobile ComputingSmall computing & Mobile Computing
Small computing & Mobile Computing
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
WIRELESS APPLICATIONS.pptx
WIRELESS APPLICATIONS.pptxWIRELESS APPLICATIONS.pptx
WIRELESS APPLICATIONS.pptx
 
Technology in Education Technology Presentation in Blue Peach Illustrative St...
Technology in Education Technology Presentation in Blue Peach Illustrative St...Technology in Education Technology Presentation in Blue Peach Illustrative St...
Technology in Education Technology Presentation in Blue Peach Illustrative St...
 
Overview of mobile computing
Overview of mobile computingOverview of mobile computing
Overview of mobile computing
 
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
 
A Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile ComputingA Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile Computing
 
A Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile ComputingA Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile Computing
 
Details About Mobile Cloud Computing
Details About Mobile Cloud ComputingDetails About Mobile Cloud Computing
Details About Mobile Cloud Computing
 
Lesson one introduction to mc
Lesson one  introduction to mcLesson one  introduction to mc
Lesson one introduction to mc
 
Mobile computin intro.pptx
Mobile computin intro.pptxMobile computin intro.pptx
Mobile computin intro.pptx
 
Mobile Era & Mobility
Mobile Era & MobilityMobile Era & Mobility
Mobile Era & Mobility
 
Mobile Cloud Computing
Mobile Cloud ComputingMobile Cloud Computing
Mobile Cloud Computing
 
Current trends in mobile computing
Current trends in mobile computingCurrent trends in mobile computing
Current trends in mobile computing
 
Trends and technological and social innovations in innovation
Trends and technological and social innovations in innovationTrends and technological and social innovations in innovation
Trends and technological and social innovations in innovation
 
The Evolution of Cellphones: From Brick Phones to Smartphones
The Evolution of Cellphones: From Brick Phones to SmartphonesThe Evolution of Cellphones: From Brick Phones to Smartphones
The Evolution of Cellphones: From Brick Phones to Smartphones
 
SYBSC(CS)_WCIOT_Sem-II-Unit 3 IoT Architecture.pdf
SYBSC(CS)_WCIOT_Sem-II-Unit 3 IoT Architecture.pdfSYBSC(CS)_WCIOT_Sem-II-Unit 3 IoT Architecture.pdf
SYBSC(CS)_WCIOT_Sem-II-Unit 3 IoT Architecture.pdf
 

Recently uploaded

UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
Effects of rheological properties on mixing
Effects of rheological properties on mixingEffects of rheological properties on mixing
Effects of rheological properties on mixingviprabot1
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
 
pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture designssuser87fa0c1
 

Recently uploaded (20)

UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
Effects of rheological properties on mixing
Effects of rheological properties on mixingEffects of rheological properties on mixing
Effects of rheological properties on mixing
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
 
pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture design
 

Mobile Computing and Application 2.pptx

  • 1. A SEMINAR REPORT ON : MOBILE COMPUTING AND APPLICATION SUBMITTED BY : Name : Sonalika Sethy Reg No. : 1901206083 Branch : CSE, 7th Sem
  • 2. CONTENTS: • Introduction • How it works • Types of mobile computing • Diagram • Applications of mobile computing • Future scope • Advantages • Disadvantages • Conclusion • References
  • 3. INTRODUCTION:  Mobile Computing refers a technology that allows transmission of data, voice and video via a computer or any other wireless enabled device.  It is free from having a connection with a fixed physical link.  It facilitates the users to move from one physical location to another during communication.  In other words, you can say that mobile computing allows transmission of data, voice and video via a computer or any other wireless-enabled device without being connected to a fixed physical link. In this technology, data transmission is done wirelessly with the help of wireless devices such as mobiles, laptops etc.
  • 4. HOW IT WORKS: • Generally, a mobile computing system involves a mobile device, such as a laptop, computer, tablet or smartphone, and a wireless network connection based on Wi-Fi or cellular wireless technology, such as 5G. • Mobile devices can typically store data locally, and access to that data doesn’t require a network connection. • Mobile computers typically accommodate access to both wireless and wired technology. • There are many mobile computing devices for vertical and specialized applications which includes devices for medical, surveillance, security and control uses.
  • 5. TYPES OF MOBILE COMPUTING: • Mobile computing is a combination of infrastructure, hardware and software technology. The various parts of mobile computing are as follows: • Mobile Infrastructure: Infrastructure refers to the technical pieces that allow devices to communicate. Mobile infrastructure includes the wireless networks, wireless protocols and data formats. • Mobile hardware: The physical mobile device and supporting hardware that users interact with make up the mobile hardware. This may include cell phones, laptops, tablets, wearable computers and accompanying chargers and accessories. • Mobile software. This refers to the applications that run on mobile devices, including mobile operating system (OSes) and user-facing applications, such as mobile browsers and e-commerce applications.
  • 7. APPLICATIONS: • Web or Internet access. • Global Position System (GPS). • Emergency services. • Entertainment services. • Educational services. • Social media portal • E-Government • Tour and Travel
  • 8. FUTURE SCOPE: • Enterprise Business Intelligence (BI) for Mobile Apps will Increase • Enhance the Protection for Mobile Phones • More Emphasis on Mobile User Experience • Development of Better Mobile Wallets • Apple and IBM Partnership to Make Better Enterprise Software • Google Algorithm - Wise Computing • Best Mobile SEO Activities and Strategies Will Become Best Trend
  • 9. ADVANTAGES: • Mobile devices are smaller and more portable than traditional computers, making them easy to carry and use in a range of contexts. • Over time, mobile devices have become less expensive and easier to obtain. Increasingly, people opt for smartphones and tablets as their primary means of online connectivity. • Mobile devices let users engage in phone, video and various text and instant messaging applications. • Mobile devices and applications enable companies to collect more consumer data than was possible with traditional computing.
  • 10. DISADVANTAGES: • Despite increasing battery life, power consumption continues to be an issue, and mobile devices must be recharged regularly. • Mobile computing raises significant data security because business users, especially, may have sensitive data on their devices while traveling or working remotely. • Mobile devices can be distracting and potentially dangerous in a hazardous work environment that requires the employee's attention.
  • 11. CONCLUSION: • Today’s mobile computing technologies have gone notches higher in comparison to yester years. Users can nowadays work comfortably from any location as long as they are connected to a secure network. Mobile computing has become a major part of Information Communication and Technology world.
  • 12. REFERENCES: • Google.com • Wikipedia.org • Techtarget.com • Tutorialspoint.com