Terms in this set (29)
Why Mobile Application Development?
Mobile device acquisitions are expected to reach 1.3 billion this year.
Smartphones comprise 64% of all mobile phones and 80% of all new phones purchased.
Mobile application downloads are expected to reach 100,000 million in 2013 and increase 38% this year.
Over 3,000 jobs listed on careerbuilder.com
Difference btwn native and mobile apps?
1)A native mobile app is a smartphone application that is coded in a specific programming language, such as Objective C for iOS and Java for Android operating systems.
Describe Native Applications
-Installs directly on the device
-Typically acquire through online store "the app store" or "google play"
Describe Mobile Web Apps
-Internet-enabled apps that have specific functionality for mobile devices. They're accessed through the mobile device's web browser (i.e. on the iPhone, this is Safari by default) and they don't need to be downloaded and installed on the device.
-Require an Internet connection
Development Native vs Web
Strengths of Native and Mobile apps
Weaknesses of Native and Mobile Apps
What can you do with a DOM?
I want to get the text of the title.
I want to get the second paragraph element.
I want to get the third link in the menu and change how it's displaying, maybe hide it
change the background color of all paragraphs
get all the list item elements
find an image and start to move it
create new unordered lists, or creating paragraphs, or
creating menus and inserting them into the page on the fly
What is DOM?
"The Document Object Model is an application programming interface that defines logical structure of well-formed an XML and HTML documents
How do you access the DOM?
Document root provided as the 'document' object
Read from, and write to, elements in the DOM tree
Each document object model organizes objects into a hierarchy known as a document tree
What is AJAX?
-GMAIL, Flickr, GOOGLE maps
Benefits of AJAX?
-Does quick, incremental updates to the user interface without reloading the entire browser page. Thus improves bandwidth utilization.
-Ajax applications are browser and platform independent.
-Parse and work with XML documents.
Limitations of AJAX?
-Does not record user's browser history: cannot use browser's Back button to retrieve information or bookmark information returned by AJAX
-Can pose a problem for users with special needs
-If too many AJAX engines run simultaneously, making calls to the Web server, communication with the server may be compromised
What is a XMLHttpRequest Object?
Methods associated with XMLHttpRequest?
-Really Simple Syndication (RSS) language
-One of the more important XML vocabularies
-Used to distribute news articles, or any content that changes on a regular basis, to a group of subscribers
-Subscribers receive periodic updates using a feed reader or an aggregator (e.g., iTunes)
-A podcast delivers audio or video content, but the language that organizes and describes it is RSS
-RSS code follows conventions of all XML documents
What is JSON?
-is an open standard format that uses human-readabletext to transmit data objects consisting of attribute-value pairs. It is used primarily to transmit data between a server and web application, as an alternative to XML.
What is an Emulator/Simulator?
What is JQuery?
What is JQuery Mobile?
Benefits of JQuery?
-Ease of Use
-Strong opensource community
Disadvantages of JQuery?
Functionality maybe limited
Mobile Marketing Formats
Banner ads, rich media ads, and video ads
E-mail and text messaging
Quick Response (QR) codes
Mobile Marketing Features?
-Personal communicator and organizer
-Screen size and resolution
-Ultraportable and personal
-20% of all online marketing
-Dominant players are Google, Facebook
-Mobile device features
2 Types of Location Based Mobile Marketing?
--Identify location of user's device and target ads, recommending actions within reach
--Identify a perimeter around a location and target ads and recommendations within that perimeter
-Application Security (Desktop)
-End user Security
-Web Security tips
Keep OS updated
Keep CMS updated
Sql injection (use parameterised queries)
Require complex passwords
Use web security tools
Exploit & Vulnerability
-In computer security, a vulnerability is a weakness which allows an attacker to reduce a system's information assurance
-An exploit is a piece of software, a chunk of data, or a sequence of commands that takes advantage of a bug, glitch or vulnerability in order to cause unintended or unanticipated behavior to occur on computer software, hardware, or something electronic (usually computerize). S
Four dimensions of privacy (Smith et al. 1996)
-Unauthorized secondary use
-M-technologies Increase Concerns
-Five Features (Zhang at el. 2002)
YOU MIGHT ALSO LIKE...
NTAI: Chapter 8- Key Terms. IT Essentials: PC Hardware and Software
Mobile and Embedded Device Security ch 10
CNA 210 Chapter 10
OTHER SETS BY THIS CREATOR
THIS SET IS OFTEN IN FOLDERS WITH...
Rasmussen Pharmacology Test 3 part 2
Rasmussen Pharmacology Test 3 part 3
ASSESSMENT ONE: Health Assessment
Medical Terminology Systems: A Body Systems Approach: 7th Edition: Chapter 4-Body Structure