answersLogoWhite

0


Best Answer

The role is bury MBA students in research

User Avatar

Wiki User

12y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What is the role of protocols in mobile computing and their limitation?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

What are the basic building blocks for Mobile Computing?

The basic building blocks for mobile computing include: Mobile Devices: These are the physical devices we use for mobile computing, such as smartphones, tablets, and wearable devices like smartwatches. They are designed to be portable and allow us to access information and perform tasks on the go. Operating Systems: Mobile devices run on operating systems specifically designed for mobile computing, such as Android and iOS. These operating systems provide the foundation for running mobile applications, managing device resources, and enabling communication capabilities. Mobile Applications: Mobile applications, or apps, are software programs designed to perform specific tasks on mobile devices. They can be downloaded and installed from app stores and provide functionalities like social media, games, productivity tools, and more. Wireless Networks: Mobile computing relies on wireless networks, such as cellular networks (3G, 4G, 5G), Wi-Fi, and Bluetooth, to connect mobile devices to the internet and facilitate data exchange. These networks allow us to access online services, browse the web, send messages, and make phone calls. Cloud Computing: Cloud computing plays a significant role in mobile computing by providing storage, processing power, and services over the internet. Mobile devices can access cloud-based applications and store data remotely, allowing for seamless synchronization and access from multiple devices. Location-Based Services: Mobile computing leverages location-based services that utilize GPS or other location technologies to provide information and services based on the user's current location. These services include navigation, mapping, local search, and location-based advertising. Mobile Security: As mobile devices handle sensitive information and connect to various networks, mobile security is crucial. It involves measures like device encryption, secure authentication, app permissions, and data backup to protect against unauthorized access and data breaches. By understanding these basic building blocks, we can appreciate how mobile computing has revolutionized the way we communicate, access information, and perform tasks on the move.


What is the difference between hard computing and soft computing?

Soft computing differs from conventional (hard) computing in that, unlike hard computing, it is tolerant of imprecision, uncertainty, partial truth, and approximation. In effect, the role model for soft computing is the human mind.


What is cloud computing implementation?

Cloud computing is part of technology. It helps with electronics and monitor screens. It plays a huge role in the current technology. There is a cycle with cloud computing.


How many companies are involved in cloud computing?

Well there are so many companies involved in cloud computing and some of the giants like Microsoft, apple are playing a major role in implementing the cloud computing


What is the role of computer on industries?

Computing things. Managing information flow and storage.


What is the role of a computing services departments at a university?

The role of computing services departments at university is to provide to both the stuff and students with digital communication services. Some of the most common services are internet access and database services.


Discuss role of protocols at different layers of the OSI model?

Protocols at each of the OSI layers govern how they are to talk to each other. Each layer of the OSI model has different responsibilities and they may have multiple protocols that they could use. The sender and receiver in networks must agree on a common ground for communication, which is the protocol. Depending on what you are trying to accomplish there are different protocols at different layers of the OSI model. Basically, you need the two systems to agree on how to do that. That is the role of a protocol.


What do transport layer protocols use to identify the application needed to process data?

They don't do that. That is the role of the operating system.


What is the role of the security department in an organization?

wiretapping to obtain data in network is ......... threat to the secuirty of computing system


What is role of logic?

Logic is important in computing as it is part of computer language and without it, mathematics in the computer will be impossible.


What role did Mobile Alabama play in the US Civil War?

The role of Mobile, Alabama was a significant role in the US Civil War. The city passed several resolutions even passed a resolution to succeed from the Union.


What role does blackberry appear to be playing in the development of the mobile handset market in the middle east?

what role does the blackberry appear to be playing in the development of the mobile handset market in the arab world