People and businesses benefit extensively from mobile technologies, which at anytime and from anywhere, provide a user with the ability to receive emails, browse Web pages, play online games, and upload/download important documents using either smart phones or laptops with 3.5G wireless adapters. An employee can access product information, obtain technician/expert help, acquire stock information, and place orders directly to the business database. Businesses can reduce the cost of network construction, provide employees with convenient and quick supports anytime and anywhere, and give customers twenty-four/seven, year-round, non-stop service, in either information inquiry or specific representative contact.
This module will provide students of computing and Information Systems with both broad and in-depth knowledge, and a critical understanding of mobile computing from different viewpoints: infrastructures, principles and theories, technologies, and applications in different domains. The module will provide a complete overview of the mobile computing subject area, including the latest research.
In this course the core is to make the students know about the various modulation techniques, propagation methods, coding and multi access techniques used in mobile communication. To know about the various wireless network systems and standards.
This module covers topics relating to keeping computers in good condition, troubleshooting computer problems and performing basic repairs on computers. The online instruction portion of this module includes concepts related to computer parts, software, viruses and basic maintenance.
The face-to-face involves hands-on sessions with troubleshooting and repair. Practically, both laptop and desktop computers will be used for these sessions. While these materials were primarily designed for users of Windows operating systems, open source operating systems are also discussed.
This module introduces students to the essentials of understanding how programming practices can introduce vulnerabilities into software, the different types of attacks on software and the factors that make passwords secure or insecure.