SlideShare a Scribd company logo
1 of 14
Basic mobile
networking and
synchronization.
Page 2
Instructor, PACE-IT Program – Edmonds Community College
Areas of Expertise Industry Certification
 PC Hardware
 Network Administration
 IT Project Management
 Network Design
 User Training
 IT Troubleshooting
Qualifications Summary
Education
 M.B.A., IT Management, Western Governor’s University
 B.S., IT Security, Western Governor’s University
Entrepreneur, executive leader, and proven manger
with 10+ years of experience turning complex issues
into efficient and effective solutions.
Strengths include developing and mentoring diverse
workforces, improving processes, analyzing
business needs and creating the solutions
required— with a focus on technology.
Page 3
– Basic network connectivity for mobile.
– Mobile device synchronization.
PACE-IT.
Page 4
Basic mobile networking and synchronization.
Page 5
Many mobile devices can
take advantage of cellular
data networks.
As the user, you need to know how to enable and
disable this connectivity when necessary; otherwise,
additional data charges could be incurred.
All of the operating systems allow the enable/disable
function to be done from the settings area of the
operating system. Some mobile devices allow the
user to enable and disable cellular networks from
the Home screen. This varies by device and
manufacturer.
Basic mobile networking and synchronization.
Page 6
Basic mobile networking and synchronization.
Bluetooth networking.
1) Enable Bluetooth.
2) Enable pairing.
3) Find device for pairing.
4) Enter the appropriate PIN code.
5) Test connectivity.
While there may be some differences in how you get to Bluetooth on
various mobile devices, the basic set up steps will remain the same.
Page 7
– Email configuration.
» One advantage to mobile devices is the ability to send
and receive emails while on the go.
» As long as the user has an Internet connection, email is
possible.
– Configuration requirements
» SMTP is the protocol for sending emails.
» Know which protocol is necessary for receiving (i.e.,
POP3 or IMAP).
» Know the fully qualified domain name (FQDN) for the
email provider servers (the SMTP server and either the
POP3 or IMAP server).
» Know the proper ports and SSL settings to use; these will
be determined by the email provider.
Basic mobile networking and synchronization.
Page 8
– Common email settings.
» SMTP: port 25.
» SMTPS: port 465.
» POP3: port 110.
» POP3S: port 995.
» IMAP: port 143.
» IMAPS: port 993.
– Gmail.
» POP3: pop.gmail.com on port 995.
» SMTP: smtp.gmail.com on port 587.
» Security is TLS (transport layer security).
Basic mobile networking and synchronization.
Page 9
Basic mobile networking and synchronization.
Page 10
Each operating system uses
its own method to
synchronize data. Refer to
the vendors for their specific
processes.
Any type of data can be synchronized across mobile
devices and their larger cousins.
Common types of data that gets synchronized
include: contacts, programs, email, photos, music
and videos.
Basic mobile networking and synchronization.
Page 11
– Synchronization.
» Provides protection against lost equipment by providing a
backup copy.
» Allows for the free movement of data and keeps it
current.
– Synchronization applications.
» Mobile device operating system providers have their own
apps for synchronization. One must be installed on the
PC. Follow the vendor’s instructions.
– Connection types for synchronization.
» Wireless or cellular: cloud synchronization.
» Wireless: synchronization across wireless networks.
» USB: wired synchronization.
» Bluetooth: not as common, but still an option for some.
» Infrared (IR): no longer a current method.
Basic mobile networking and synchronization.
Page 12
Basic mobile networking and synchronization.
Many mobile devices are capable of using cellular networking. Many can
also connect to wireless networks. All should have Bluetooth connectivity
capabilities. Email configuration is dependent on the provider of the service.
Topic
Basic network connectivity
for mobile.
Summary
Synchronizing data protects against loss of device and helps with the
movement of a data between sources. Almost any kind of data can be
synchronized. Each mobile device utilizes its own application to facilitate
the synchronization. It can occur in the cloud or over wireless, wired,
Bluetooth, or IR.
Mobile device
synchronization.
Page 13
THANK YOU!
This workforce solution was 100 percent funded by a $3 million grant awarded by the
U.S. Department of Labor's Employment and Training Administration. The solution was
created by the grantee and does not necessarily reflect the official position of the U.S.
Department of Labor. The Department of Labor makes no guarantees, warranties, or
assurances of any kind, express or implied, with respect to such information, including
any information on linked sites and including, but not limited to, accuracy of the
information or its completeness, timeliness, usefulness, adequacy, continued availability
or ownership. Funded by the Department of Labor, Employment and Training
Administration, Grant #TC-23745-12-60-A-53.
PACE-IT is an equal opportunity employer/program and auxiliary aids and services are
available upon request to individuals with disabilities. For those that are hearing
impaired, a video phone is available at the Services for Students with Disabilities (SSD)
office in Mountlake Terrace Hall 159. Check www.edcc.edu/ssd for office hours. Call
425.354.3113 on a video phone for more information about the PACE-IT program. For
any additional special accommodations needed, call the SSD office at 425.640.1814.
Edmonds Community College does not discriminate on the basis of race; color; religion;
national origin; sex; disability; sexual orientation; age; citizenship, marital, or veteran
status; or genetic information in its programs and activities.

More Related Content

What's hot

What's hot (20)

PACE-IT: Wireless LAN Infrastructure (part 2)
PACE-IT: Wireless LAN Infrastructure (part 2)PACE-IT: Wireless LAN Infrastructure (part 2)
PACE-IT: Wireless LAN Infrastructure (part 2)
 
PACE-IT, Security+1.4: Common Network Protocols (part 1)
PACE-IT, Security+1.4: Common Network Protocols (part 1)PACE-IT, Security+1.4: Common Network Protocols (part 1)
PACE-IT, Security+1.4: Common Network Protocols (part 1)
 
PACE-IT: Troubleshooting Wireless Networks (part 2)
PACE-IT: Troubleshooting Wireless Networks (part 2)PACE-IT: Troubleshooting Wireless Networks (part 2)
PACE-IT: Troubleshooting Wireless Networks (part 2)
 
PACE-IT: Common WAN Components and Issues
PACE-IT: Common WAN Components and IssuesPACE-IT: Common WAN Components and Issues
PACE-IT: Common WAN Components and Issues
 
PACE-IT, Security+1.4: Common Network Protocols (part 2)
PACE-IT, Security+1.4: Common Network Protocols (part 2)PACE-IT, Security+1.4: Common Network Protocols (part 2)
PACE-IT, Security+1.4: Common Network Protocols (part 2)
 
PACE-IT: Introduction to Wired Network Standards
PACE-IT: Introduction to Wired Network StandardsPACE-IT: Introduction to Wired Network Standards
PACE-IT: Introduction to Wired Network Standards
 
Pace IT - Setting Up a SOHO Network
Pace IT - Setting Up a SOHO NetworkPace IT - Setting Up a SOHO Network
Pace IT - Setting Up a SOHO Network
 
Pace IT - Introduction to the Transport Layer
Pace IT - Introduction to the Transport LayerPace IT - Introduction to the Transport Layer
Pace IT - Introduction to the Transport Layer
 
PACE-IT: Network Infrastructure Implementations - N10 006
PACE-IT: Network Infrastructure Implementations - N10 006 PACE-IT: Network Infrastructure Implementations - N10 006
PACE-IT: Network Infrastructure Implementations - N10 006
 
Pace IT Coax and Fiber
Pace IT Coax and FiberPace IT Coax and Fiber
Pace IT Coax and Fiber
 
PACE-IT: Troubleshooting Connectivity With Utilities
PACE-IT: Troubleshooting Connectivity With UtilitiesPACE-IT: Troubleshooting Connectivity With Utilities
PACE-IT: Troubleshooting Connectivity With Utilities
 
PACE-IT: Introduction_to Network Devices (part 2) - N10 006
PACE-IT: Introduction_to Network Devices (part 2) - N10 006 PACE-IT: Introduction_to Network Devices (part 2) - N10 006
PACE-IT: Introduction_to Network Devices (part 2) - N10 006
 
PACE-IT: Troubleshooting Fiber Cable Networks
PACE-IT: Troubleshooting Fiber Cable NetworksPACE-IT: Troubleshooting Fiber Cable Networks
PACE-IT: Troubleshooting Fiber Cable Networks
 
PACE-IT: Common Threats (part 1)
PACE-IT: Common Threats (part 1)PACE-IT: Common Threats (part 1)
PACE-IT: Common Threats (part 1)
 
PACE-IT: Troubleshooting Copper Wire Networks (part 2)
PACE-IT: Troubleshooting Copper Wire Networks (part 2)PACE-IT: Troubleshooting Copper Wire Networks (part 2)
PACE-IT: Troubleshooting Copper Wire Networks (part 2)
 
R Thomas resume
R Thomas resumeR Thomas resume
R Thomas resume
 
PACE-IT: Troubleshooting Connectivity With Hardware
PACE-IT: Troubleshooting Connectivity With HardwarePACE-IT: Troubleshooting Connectivity With Hardware
PACE-IT: Troubleshooting Connectivity With Hardware
 
Security Assessment Report and Business Continuity Plan
Security Assessment Report and Business Continuity PlanSecurity Assessment Report and Business Continuity Plan
Security Assessment Report and Business Continuity Plan
 
Pace IT - Common Ports and Protocols
Pace IT - Common Ports and ProtocolsPace IT - Common Ports and Protocols
Pace IT - Common Ports and Protocols
 
Duc le resume v1
Duc le resume v1Duc le resume v1
Duc le resume v1
 

Viewers also liked

Healthy living dluong 2
Healthy living dluong 2Healthy living dluong 2
Healthy living dluong 2
Jairo Reynoso
 
healthy_living
healthy_livinghealthy_living
healthy_living
vasant oak
 
Healthy lifestyle
Healthy lifestyleHealthy lifestyle
Healthy lifestyle
Daisy
 

Viewers also liked (20)

NutriEvent 2016
NutriEvent 2016NutriEvent 2016
NutriEvent 2016
 
Healthy living
Healthy living Healthy living
Healthy living
 
Healthy Fasting during festival
Healthy Fasting during festivalHealthy Fasting during festival
Healthy Fasting during festival
 
Healthy lifestyle in our school
Healthy lifestyle in our schoolHealthy lifestyle in our school
Healthy lifestyle in our school
 
Healthyliving mw-2
Healthyliving mw-2Healthyliving mw-2
Healthyliving mw-2
 
Healthy living dluong 2
Healthy living dluong 2Healthy living dluong 2
Healthy living dluong 2
 
Vegetables
VegetablesVegetables
Vegetables
 
healthy_living
healthy_livinghealthy_living
healthy_living
 
Fast Fds
Fast FdsFast Fds
Fast Fds
 
Healthy lifestyle for chidren.
Healthy lifestyle for chidren.Healthy lifestyle for chidren.
Healthy lifestyle for chidren.
 
Eat This Not That
Eat This Not ThatEat This Not That
Eat This Not That
 
Healthy life style
Healthy life styleHealthy life style
Healthy life style
 
Health and lifestyle
Health and lifestyleHealth and lifestyle
Health and lifestyle
 
food poisoning
food poisoningfood poisoning
food poisoning
 
Stress on Student
Stress on StudentStress on Student
Stress on Student
 
Fast food(power point)
Fast food(power point)Fast food(power point)
Fast food(power point)
 
Health Tips For A Healthy Life Style
Health Tips For A Healthy Life StyleHealth Tips For A Healthy Life Style
Health Tips For A Healthy Life Style
 
Healthy lifestyle
Healthy lifestyleHealthy lifestyle
Healthy lifestyle
 
The Basic Food Groups on the Food Pyramid
The Basic Food Groups on the Food PyramidThe Basic Food Groups on the Food Pyramid
The Basic Food Groups on the Food Pyramid
 
Academic pressure
Academic pressure Academic pressure
Academic pressure
 

Similar to Pace IT - Basic Mobile Network

Running headCapstone Project Activity - Unit 2 2C.docx
Running headCapstone Project Activity - Unit 2 2C.docxRunning headCapstone Project Activity - Unit 2 2C.docx
Running headCapstone Project Activity - Unit 2 2C.docx
rtodd599
 

Similar to Pace IT - Basic Mobile Network (20)

Pace IT - Client Networking (Part 3)
Pace IT - Client Networking (Part 3)Pace IT - Client Networking (Part 3)
Pace IT - Client Networking (Part 3)
 
PACE-IT, Security+1.4: Common Network Protocols (part 3)
PACE-IT, Security+1.4: Common Network Protocols (part 3)PACE-IT, Security+1.4: Common Network Protocols (part 3)
PACE-IT, Security+1.4: Common Network Protocols (part 3)
 
PACE-IT: Networking Services and Applications (part 2) - N10 006
PACE-IT: Networking Services and Applications (part 2) - N10 006PACE-IT: Networking Services and Applications (part 2) - N10 006
PACE-IT: Networking Services and Applications (part 2) - N10 006
 
Pace IT - Control Panel (Part 3)
Pace IT - Control Panel (Part 3)Pace IT - Control Panel (Part 3)
Pace IT - Control Panel (Part 3)
 
PACE-IT: Common Networking Protocols (part 2)
PACE-IT: Common Networking Protocols (part 2)PACE-IT: Common Networking Protocols (part 2)
PACE-IT: Common Networking Protocols (part 2)
 
Pace IT - Basic Mobile Device
Pace IT - Basic Mobile DevicePace IT - Basic Mobile Device
Pace IT - Basic Mobile Device
 
PACE-IT: Common Network Vulnerabilities
PACE-IT: Common Network VulnerabilitiesPACE-IT: Common Network Vulnerabilities
PACE-IT: Common Network Vulnerabilities
 
Pace IT - Client Networking (Part 2)
Pace IT - Client Networking (Part 2)Pace IT - Client Networking (Part 2)
Pace IT - Client Networking (Part 2)
 
PACE-IT: Networking Services and Applications (part 1) - N10 006
PACE-IT: Networking Services and Applications (part 1) - N10 006PACE-IT: Networking Services and Applications (part 1) - N10 006
PACE-IT: Networking Services and Applications (part 1) - N10 006
 
Pace IT - Types of Internet Connections
Pace IT - Types of Internet ConnectionsPace IT - Types of Internet Connections
Pace IT - Types of Internet Connections
 
Field Data Gathering Services — A Cloud-Based Approach
Field Data Gathering Services — A Cloud-Based ApproachField Data Gathering Services — A Cloud-Based Approach
Field Data Gathering Services — A Cloud-Based Approach
 
State of the Art M2M /IoT Solutions
State of the Art M2M /IoT Solutions State of the Art M2M /IoT Solutions
State of the Art M2M /IoT Solutions
 
PACE-IT, Security+1.2: Secure Network Administration Concepts
PACE-IT, Security+1.2: Secure Network Administration ConceptsPACE-IT, Security+1.2: Secure Network Administration Concepts
PACE-IT, Security+1.2: Secure Network Administration Concepts
 
PACE-IT: Basic Cloud Concepts - N10 006
PACE-IT: Basic Cloud Concepts - N10 006 PACE-IT: Basic Cloud Concepts - N10 006
PACE-IT: Basic Cloud Concepts - N10 006
 
Pace IT - Network Devices (part 2)
Pace IT - Network Devices (part 2)Pace IT - Network Devices (part 2)
Pace IT - Network Devices (part 2)
 
Pace IT - Troubleshooting Networks Wired
Pace IT - Troubleshooting Networks WiredPace IT - Troubleshooting Networks Wired
Pace IT - Troubleshooting Networks Wired
 
Running headCapstone Project Activity - Unit 2 2C.docx
Running headCapstone Project Activity - Unit 2 2C.docxRunning headCapstone Project Activity - Unit 2 2C.docx
Running headCapstone Project Activity - Unit 2 2C.docx
 
Pace IT - Alternative Internet Connections
Pace IT - Alternative Internet ConnectionsPace IT - Alternative Internet Connections
Pace IT - Alternative Internet Connections
 
PACE-IT: Common Network Security Issues
PACE-IT: Common Network Security IssuesPACE-IT: Common Network Security Issues
PACE-IT: Common Network Security Issues
 
PingPal infodeck: How to survive BYOD and mobile networks
PingPal infodeck: How to survive BYOD and mobile networksPingPal infodeck: How to survive BYOD and mobile networks
PingPal infodeck: How to survive BYOD and mobile networks
 

More from Pace IT at Edmonds Community College

More from Pace IT at Edmonds Community College (20)

PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
 
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
 
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
 
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
 
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
 
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
 
PACE-IT, Security + 5.3: Security Controls for Account Management
PACE-IT, Security + 5.3: Security Controls for Account ManagementPACE-IT, Security + 5.3: Security Controls for Account Management
PACE-IT, Security + 5.3: Security Controls for Account Management
 
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
 
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
 
PACE-IT, Security + 5.1: Summary of Authentication Services
PACE-IT, Security + 5.1: Summary of Authentication ServicesPACE-IT, Security + 5.1: Summary of Authentication Services
PACE-IT, Security + 5.1: Summary of Authentication Services
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
 
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and TechniquesPACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
 
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative EnvironmentsPACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
 
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
PACE-IT, Security+ 4.4: Controls to Ensure Data SecurityPACE-IT, Security+ 4.4: Controls to Ensure Data Security
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
 
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
PACE-IT, Security+ 4.3: Solutions to Establish Host SecurityPACE-IT, Security+ 4.3: Solutions to Establish Host Security
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
 
PACE-IT, Security+3.7: Overview of Security Assessment Tools
PACE-IT, Security+3.7: Overview of Security Assessment ToolsPACE-IT, Security+3.7: Overview of Security Assessment Tools
PACE-IT, Security+3.7: Overview of Security Assessment Tools
 
PACE-IT, Security+3.6: Security Enhancement Techniques
PACE-IT, Security+3.6: Security Enhancement TechniquesPACE-IT, Security+3.6: Security Enhancement Techniques
PACE-IT, Security+3.6: Security Enhancement Techniques
 
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PACE-IT, Security+3.5: Types of Application Attacks (part 2)PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
 
PACE-IT, Security+3.5: Types of Application Attacks (part 1)
PACE-IT, Security+3.5: Types of Application Attacks (part 1)PACE-IT, Security+3.5: Types of Application Attacks (part 1)
PACE-IT, Security+3.5: Types of Application Attacks (part 1)
 

Recently uploaded

1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 

Recently uploaded (20)

Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 

Pace IT - Basic Mobile Network

  • 2. Page 2 Instructor, PACE-IT Program – Edmonds Community College Areas of Expertise Industry Certification  PC Hardware  Network Administration  IT Project Management  Network Design  User Training  IT Troubleshooting Qualifications Summary Education  M.B.A., IT Management, Western Governor’s University  B.S., IT Security, Western Governor’s University Entrepreneur, executive leader, and proven manger with 10+ years of experience turning complex issues into efficient and effective solutions. Strengths include developing and mentoring diverse workforces, improving processes, analyzing business needs and creating the solutions required— with a focus on technology.
  • 3. Page 3 – Basic network connectivity for mobile. – Mobile device synchronization. PACE-IT.
  • 4. Page 4 Basic mobile networking and synchronization.
  • 5. Page 5 Many mobile devices can take advantage of cellular data networks. As the user, you need to know how to enable and disable this connectivity when necessary; otherwise, additional data charges could be incurred. All of the operating systems allow the enable/disable function to be done from the settings area of the operating system. Some mobile devices allow the user to enable and disable cellular networks from the Home screen. This varies by device and manufacturer. Basic mobile networking and synchronization.
  • 6. Page 6 Basic mobile networking and synchronization. Bluetooth networking. 1) Enable Bluetooth. 2) Enable pairing. 3) Find device for pairing. 4) Enter the appropriate PIN code. 5) Test connectivity. While there may be some differences in how you get to Bluetooth on various mobile devices, the basic set up steps will remain the same.
  • 7. Page 7 – Email configuration. » One advantage to mobile devices is the ability to send and receive emails while on the go. » As long as the user has an Internet connection, email is possible. – Configuration requirements » SMTP is the protocol for sending emails. » Know which protocol is necessary for receiving (i.e., POP3 or IMAP). » Know the fully qualified domain name (FQDN) for the email provider servers (the SMTP server and either the POP3 or IMAP server). » Know the proper ports and SSL settings to use; these will be determined by the email provider. Basic mobile networking and synchronization.
  • 8. Page 8 – Common email settings. » SMTP: port 25. » SMTPS: port 465. » POP3: port 110. » POP3S: port 995. » IMAP: port 143. » IMAPS: port 993. – Gmail. » POP3: pop.gmail.com on port 995. » SMTP: smtp.gmail.com on port 587. » Security is TLS (transport layer security). Basic mobile networking and synchronization.
  • 9. Page 9 Basic mobile networking and synchronization.
  • 10. Page 10 Each operating system uses its own method to synchronize data. Refer to the vendors for their specific processes. Any type of data can be synchronized across mobile devices and their larger cousins. Common types of data that gets synchronized include: contacts, programs, email, photos, music and videos. Basic mobile networking and synchronization.
  • 11. Page 11 – Synchronization. » Provides protection against lost equipment by providing a backup copy. » Allows for the free movement of data and keeps it current. – Synchronization applications. » Mobile device operating system providers have their own apps for synchronization. One must be installed on the PC. Follow the vendor’s instructions. – Connection types for synchronization. » Wireless or cellular: cloud synchronization. » Wireless: synchronization across wireless networks. » USB: wired synchronization. » Bluetooth: not as common, but still an option for some. » Infrared (IR): no longer a current method. Basic mobile networking and synchronization.
  • 12. Page 12 Basic mobile networking and synchronization. Many mobile devices are capable of using cellular networking. Many can also connect to wireless networks. All should have Bluetooth connectivity capabilities. Email configuration is dependent on the provider of the service. Topic Basic network connectivity for mobile. Summary Synchronizing data protects against loss of device and helps with the movement of a data between sources. Almost any kind of data can be synchronized. Each mobile device utilizes its own application to facilitate the synchronization. It can occur in the cloud or over wireless, wired, Bluetooth, or IR. Mobile device synchronization.
  • 14. This workforce solution was 100 percent funded by a $3 million grant awarded by the U.S. Department of Labor's Employment and Training Administration. The solution was created by the grantee and does not necessarily reflect the official position of the U.S. Department of Labor. The Department of Labor makes no guarantees, warranties, or assurances of any kind, express or implied, with respect to such information, including any information on linked sites and including, but not limited to, accuracy of the information or its completeness, timeliness, usefulness, adequacy, continued availability or ownership. Funded by the Department of Labor, Employment and Training Administration, Grant #TC-23745-12-60-A-53. PACE-IT is an equal opportunity employer/program and auxiliary aids and services are available upon request to individuals with disabilities. For those that are hearing impaired, a video phone is available at the Services for Students with Disabilities (SSD) office in Mountlake Terrace Hall 159. Check www.edcc.edu/ssd for office hours. Call 425.354.3113 on a video phone for more information about the PACE-IT program. For any additional special accommodations needed, call the SSD office at 425.640.1814. Edmonds Community College does not discriminate on the basis of race; color; religion; national origin; sex; disability; sexual orientation; age; citizenship, marital, or veteran status; or genetic information in its programs and activities.