SlideShare a Scribd company logo
Mobile computing is a generic term used
to refer to a variety of devices that allow
people to access data and information from
where ever they are. Also known as Mobile
Device
Many types of mobile computers have been
introduced since the 1990s including the :-
Smartphone
Tablet Computer
Ultra-Mobile PC
Wearable Computer
 Range
 Security
 Transmission interferences
Human interface with device
Need three important things :-
1. Mobile Device.
2. Network Connection.
3. Software Application.
Social networking is the grouping of individuals into specific groups…!
Social networking is web-based services that allow individuals to
create a public profile, to create a list of users with whom to share
connection, and view and cross the connections within the system
Connection
Share ideas
Marketing
Business tool
Free Calling
Addict
Health related problems.
Strangers..!!
Mobile computing with social networking

More Related Content

What's hot

Should Government Control the Internet and its contents
Should Government Control the Internet and its contentsShould Government Control the Internet and its contents
Should Government Control the Internet and its contents
Anirban Roy
 
Digital citizenship power point
Digital citizenship power pointDigital citizenship power point
Digital citizenship power point
Khanyiso Nemuhuyuni
 
Internet of Things
Internet of Things Internet of Things
Internet of Things
Adithya Jayaprakash
 
Internet of things
Internet of thingsInternet of things
Internet of things
reddivarihareesh
 
McAfee Focus 2011 - Security in the Age of a Mobile Workforce and Mobile Devices
McAfee Focus 2011 - Security in the Age of a Mobile Workforce and Mobile DevicesMcAfee Focus 2011 - Security in the Age of a Mobile Workforce and Mobile Devices
McAfee Focus 2011 - Security in the Age of a Mobile Workforce and Mobile Devices
Scott Carlson
 
Valley Cafe February 2014 • Age of Context
Valley Cafe February 2014 • Age of ContextValley Cafe February 2014 • Age of Context
Valley Cafe February 2014 • Age of Context
Services Valley
 
Lecture 1
Lecture 1Lecture 1
Lecture 1
vishal choudhary
 
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
acijjournal
 
INTERNET OF THINGS PPT
INTERNET OF THINGS PPTINTERNET OF THINGS PPT
INTERNET OF THINGS PPT
Harsh Kumar
 
Ambient Intelligence
Ambient IntelligenceAmbient Intelligence
Ambient Intelligence
Dr. Mazlan Abbas
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
AtiqurRehman129
 
Event Based Social Networks
Event Based Social NetworksEvent Based Social Networks
Event Based Social Networks
mani kiran kumar Yechuri
 

What's hot (12)

Should Government Control the Internet and its contents
Should Government Control the Internet and its contentsShould Government Control the Internet and its contents
Should Government Control the Internet and its contents
 
Digital citizenship power point
Digital citizenship power pointDigital citizenship power point
Digital citizenship power point
 
Internet of Things
Internet of Things Internet of Things
Internet of Things
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
McAfee Focus 2011 - Security in the Age of a Mobile Workforce and Mobile Devices
McAfee Focus 2011 - Security in the Age of a Mobile Workforce and Mobile DevicesMcAfee Focus 2011 - Security in the Age of a Mobile Workforce and Mobile Devices
McAfee Focus 2011 - Security in the Age of a Mobile Workforce and Mobile Devices
 
Valley Cafe February 2014 • Age of Context
Valley Cafe February 2014 • Age of ContextValley Cafe February 2014 • Age of Context
Valley Cafe February 2014 • Age of Context
 
Lecture 1
Lecture 1Lecture 1
Lecture 1
 
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
 
INTERNET OF THINGS PPT
INTERNET OF THINGS PPTINTERNET OF THINGS PPT
INTERNET OF THINGS PPT
 
Ambient Intelligence
Ambient IntelligenceAmbient Intelligence
Ambient Intelligence
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Event Based Social Networks
Event Based Social NetworksEvent Based Social Networks
Event Based Social Networks
 

Similar to Mobile computing with social networking

MTECH-REPORT GROUP 1 STEM COURTESY.pptx
MTECH-REPORT GROUP 1 STEM COURTESY.pptxMTECH-REPORT GROUP 1 STEM COURTESY.pptx
MTECH-REPORT GROUP 1 STEM COURTESY.pptx
EdwinGervacio2
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptx
cheruturga
 
Empowerment-Technologies-1.pptx
Empowerment-Technologies-1.pptxEmpowerment-Technologies-1.pptx
Empowerment-Technologies-1.pptx
GeraldoGaspar3
 
LESSON 1, 2 & 3-ETECH 1S
LESSON 1, 2 & 3-ETECH 1SLESSON 1, 2 & 3-ETECH 1S
LESSON 1, 2 & 3-ETECH 1S
Juvywen
 
Lesson 1 2 Edited
Lesson 1 2 EditedLesson 1 2 Edited
Lesson 1 2 Edited
Juvywen
 
Cyberunions
CyberunionsCyberunions
Cyberunions
Leischa
 
Cyberunions ccisua
Cyberunions ccisuaCyberunions ccisua
Cyberunions ccisua
Leischa
 
Cyberunions
CyberunionsCyberunions
Cyberunions
Leischa
 
Cyberunions
CyberunionsCyberunions
Cyberunions
Leischa
 
INTERNET
INTERNETINTERNET
INTERNET
yaharamazing
 
etech.pptx
etech.pptxetech.pptx
etech.pptx
LiezlLumapac
 
empowerment technology
empowerment technologyempowerment technology
empowerment technology
rheagido
 
unit1-181110135541.pptx
unit1-181110135541.pptxunit1-181110135541.pptx
unit1-181110135541.pptx
adrianjaydelara
 
CS_UNIT 2(P3).pptx
CS_UNIT 2(P3).pptxCS_UNIT 2(P3).pptx
CS_UNIT 2(P3).pptx
GaytriDhingra1
 
Powerpoint.pptx
Powerpoint.pptxPowerpoint.pptx
Powerpoint.pptx
NibbleGribble
 
Computer application lecture note-Chapter-5.pptx
Computer application lecture note-Chapter-5.pptxComputer application lecture note-Chapter-5.pptx
Computer application lecture note-Chapter-5.pptx
gadisaAdamu
 
I.T Security Threats
I.T Security ThreatsI.T Security Threats
I.T Security Threats
Umakant Mishra
 
Information and communications technology SHS
Information and communications technology SHSInformation and communications technology SHS
Information and communications technology SHS
erwin marlon sario
 
ICT.pptx
ICT.pptxICT.pptx
Quality Metrics In Ubiquitous Computing
Quality Metrics In Ubiquitous ComputingQuality Metrics In Ubiquitous Computing
Quality Metrics In Ubiquitous Computing
Rutvik Pensionwar
 

Similar to Mobile computing with social networking (20)

MTECH-REPORT GROUP 1 STEM COURTESY.pptx
MTECH-REPORT GROUP 1 STEM COURTESY.pptxMTECH-REPORT GROUP 1 STEM COURTESY.pptx
MTECH-REPORT GROUP 1 STEM COURTESY.pptx
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptx
 
Empowerment-Technologies-1.pptx
Empowerment-Technologies-1.pptxEmpowerment-Technologies-1.pptx
Empowerment-Technologies-1.pptx
 
LESSON 1, 2 & 3-ETECH 1S
LESSON 1, 2 & 3-ETECH 1SLESSON 1, 2 & 3-ETECH 1S
LESSON 1, 2 & 3-ETECH 1S
 
Lesson 1 2 Edited
Lesson 1 2 EditedLesson 1 2 Edited
Lesson 1 2 Edited
 
Cyberunions
CyberunionsCyberunions
Cyberunions
 
Cyberunions ccisua
Cyberunions ccisuaCyberunions ccisua
Cyberunions ccisua
 
Cyberunions
CyberunionsCyberunions
Cyberunions
 
Cyberunions
CyberunionsCyberunions
Cyberunions
 
INTERNET
INTERNETINTERNET
INTERNET
 
etech.pptx
etech.pptxetech.pptx
etech.pptx
 
empowerment technology
empowerment technologyempowerment technology
empowerment technology
 
unit1-181110135541.pptx
unit1-181110135541.pptxunit1-181110135541.pptx
unit1-181110135541.pptx
 
CS_UNIT 2(P3).pptx
CS_UNIT 2(P3).pptxCS_UNIT 2(P3).pptx
CS_UNIT 2(P3).pptx
 
Powerpoint.pptx
Powerpoint.pptxPowerpoint.pptx
Powerpoint.pptx
 
Computer application lecture note-Chapter-5.pptx
Computer application lecture note-Chapter-5.pptxComputer application lecture note-Chapter-5.pptx
Computer application lecture note-Chapter-5.pptx
 
I.T Security Threats
I.T Security ThreatsI.T Security Threats
I.T Security Threats
 
Information and communications technology SHS
Information and communications technology SHSInformation and communications technology SHS
Information and communications technology SHS
 
ICT.pptx
ICT.pptxICT.pptx
ICT.pptx
 
Quality Metrics In Ubiquitous Computing
Quality Metrics In Ubiquitous ComputingQuality Metrics In Ubiquitous Computing
Quality Metrics In Ubiquitous Computing
 

Recently uploaded

Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
Zilliz
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 

Recently uploaded (20)

Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 

Mobile computing with social networking