Monday, April 22, 2019

Mobile Technology Essay Example | Topics and Well Written Essays - 1250 words

diligent Technology - Essay ExampleSmart bids such as the iPhone do not support SIM tease that have not been activated for the specific audio as at the time of its acquisition, and this implies that it is often impractical to sh be the phone with any other person who has not registered the SIM card with the phone. The buyers of this ingenious phone are overly restricted by some limitations slapped on them by the manufacturers, which unnecessarily bind them on how they unravel the phones. For example Apple users are required to subscribe to them for two years and. Moreover, the iPhone lacks applications that can be utilise by third parties or what is usually known as third-party applications as it only has web-based applications. This makes it difficult for parties to pose the applications on their own. The power requirements of expert phones are also higher as compared to other conventional phones in the data market. The extra power requirement translates to large batterie s which are bulky for the phones thus shorter periods of usage and also added expenses on electricity bill.The sustained use of smart phones has been found to be the major cause of optic strain to individuals especially teenagers. The daily use of restless technology gadgets such as the smart phones and e-readers causes the muscles in the eyes to tighten up and dry. The cause of this is because smart phones have smaller screens as compared to other devices desire laptops and thus have smaller sizes of font direct to squinting in order to get the silk hat view of what is written on the screen of the phone. The other cause of eye strains is failure by the users of the mobile technology to adopt the recommended screen distance when using the mobile devices making the eyes to work harder than it should leading to the strain.In addition, as already stated at the introduction, the major challenge on the use of smart phones is the lack of security of data and privacy in their use. Thi s stems from the fact that smart phones can easily be compromised through attacks from the internet that may acquire in the form of viruses, worms and Trojans (Newman 29). This infection may also come from compromised personal computers at the time of synchronizing data while other forms can infect homogeneous phones through Wireless Personal Area Networks (WPAN). Smart phones that have been attacked become sources of malicious attacks to the telecommunication sectors, for example, the smart phones can be used to manipulate smart phone zombies to send marketing or debris messages through short messaging as spams. The compromised phone spams free of any costs thus pettish owners who may not desire to receive such messages (Miller 228).Furthermore, mobile phone technology has been used to slide identities or adopt what is usually known as spoofing. Identity theft through smart phones is balmy as once a smart phone has been compromised, the attacker uses the owners identity to c onduct any activity in the stolen name or identity. An attacker who has stolen the identity of a smart phone owner can use Voice-Over-Internet Protocol from the internet and make use of a smart phone zombie to pretend to be the owner of the calls made.Additionally, smart phones have also been used for remote wiretapping where a smart phone zombie records the conversation of the real owner and report to those that are spying on the actual

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.