You are on page 1of 2

Name: Ian James V.

Calanza BSIT-3A Subject: Mobile Computing

1. What are the difference between Fixed and Wireless Networks?


- Fixed networks and wireless networks are two different types of network infrastructures that
offer connectivity and communication capabilities.

 Connectivity:
- Fixed Network: In a fixed network, devices are connected through physical cables,
such as Ethernet cables or fiber-optic cables. These cables establish a stable and
reliable connection between devices.
- Wireless Network: In a wireless network, devices connect to the network using radio
waves or infrared signals. There is no need for physical cables, providing more flexibility
and mobility.
 Mobility:
- Fixed Network: Devices in a fixed network are generally stationary and do not have
the ability to move around freely without losing the connection. For example, desktop
computers connected via Ethernet cables.
- Wireless Network: Devices in a wireless network have the ability to move around
freely while staying connected. Examples include laptops, smartphones, and other
portable devices connected via Wi-Fi.
 Infrastructure:
- Fixed Network: Fixed networks require physical infrastructure such as cables, routers,
switches, and access points to provide connectivity. These networks are usually installed
and managed by professionals.
- Wireless Network: Wireless networks depend on access points or routers that
transmit and receive signals wirelessly. These networks are easier and quicker to deploy
in different locations.
 Speed and Bandwidth:
- Fixed Network: Fixed networks generally offer higher speeds and bandwidth
compared to wireless networks. Fiber-optic cables, for example, can provide extremely
fast speeds.
- Wireless Network: Wireless networks have lower speeds and bandwidth compared to
fixed networks due to limitations in wireless technology. However, advancements in
wireless standards (like Wi-Fi 6) have significantly improved wireless speeds.\
 Security:
- Fixed Network: Fixed networks are generally considered more secure because the
physical nature of the connection makes it harder for unauthorized access. However,
proper security measures such as firewalls and encryption are still necessary.
- Wireless Network: Wireless networks are more vulnerable to unauthorized access
and attacks if not properly secured. Encryption protocols like WPA2 or WPA3 are
commonly used to enhance security in wireless networks.
2. What are the advantage and disadvantage of Mobile Computing Technology?

Advantages of Mobile Computing Technology:


1. Portability: Mobile devices like smartphones and tablets are lightweight and portable,
allowing users to easily carry them anywhere and access information on the go.
2. Connectivity: Mobile computing technology allows users to stay connected to the internet
and communicate with others through various means like calls, messaging, emails, and social
media, irrespective of their location.
3. Flexibility and Mobility: Users can perform tasks and access information while being
mobile. They have the freedom to work or browse the internet from different locations without
being confined to a fixed workspace.
4. Access to Information: With mobile devices and internet connectivity, users have access to
a vast amount of information at their fingertips. They can search for information, read news,
access online databases, and utilize various productivity tools.
5. Enhanced Productivity: Mobile computing technology enables users to complete tasks,
respond to emails, attend virtual meetings, and collaborate with others, even when they are
away from their desks. This improves productivity and efficiency.

Disadvantages of Mobile Computing Technology:


1. Limited Battery Life: Mobile devices have limited battery life, and frequent usage can drain
the battery quickly. This requires users to have access to charging points or carry power banks
to ensure uninterrupted usage.
2. Reliance on Network Coverage: Mobile computing depends on network coverage to
establish connectivity. In areas with weak or no network coverage, users may experience
difficulties in accessing the internet, making calls, or sending messages.
3. Security Risks: Mobile devices are prone to security risks such as data breaches, malware
attacks, and unauthorized access. Users need to take precautionary measures like using secure
networks, installing reliable antivirus software, and practicing safe browsing habits.
4. Limited Screen Size: Mobile devices generally have smaller screens compared to desktop
computers or laptops. This can limit the user experience, especially when engaging in tasks that
require extensive viewing or multitasking.
5. Processing Power and Storage: Mobile devices may have limited processing power and
storage capacity compared to traditional computers. Running resource-intensive applications or
storing large files can be challenging on mobile devices.

You might also like