0% found this document useful (0 votes)
12 views

Android Assignment.docx (1)

Uploaded by

Piyush
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views

Android Assignment.docx (1)

Uploaded by

Piyush
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

BCA General 5th Sem

Android Application Assignment

All Questions are compulsory:


Q-1 What is Mobile computing?
● Mobile Computing is a technology that provides an environment
that enables users to transmit data from one device to another
device without the use of any physical link or cables.
● In other words, you can say that mobile computing allows
transmission of data, voice and video via a computer or any other
wireless-enabled device without being connected to a fixed
physical link. In this technology, data transmission is done
wirelessly with the help of wireless devices such as mobiles,
laptops etc.

Q-2 Write down note Cellular overview, cellular network, mobile IP.
Cellular Overview:
Cellular technology allows mobile device users to perform a variety
of tasks, including:
● Placing calls
● Message transmission via short message service (SMS) and
multimedia message service (MMS)
● Web browsing
● Facebook updates
Cellular Networks:
A cellular network is used by the mobile phone operator to achieve
both coverage and capacity for their subscribers. Large geographic
areas are split into smaller cells to avoid line-of-sight signal loss and
to support a large number of active phones in that area.
Mobile IP:
Mobile IP (or MIP) is an Internet Engineering Task Force (IETF)
standard communications protocol that is designed to allow mobile
device users to move from one network to another while maintaining
a permanent IP address. Mobile IP for IPv4 is described in IETF RFC
5944, and extensions are defined in IETF RFC 4721. Mobile IPv6, the
IP mobility implementation for the next generation of the Internet
Protocol, IPv6, is described in RFC 6275.

Q-3 Explain History of mobile software development.


1. Early Beginnings (1970s-1990s): Mobile software development
traces its roots to the 1970s with early mobile devices like the IBM
Simon Personal Communicator in 1992. These devices featured basic
applications and were largely proprietary.

2. Java and Symbian Era (late 1990s-early 2000s): The late 1990s
saw the emergence of the Java platform for mobile development,
allowing developers to create cross-platform applications. Symbian
OS also gained popularity during this time.

3. iOS and Android Revolution (late 2000s): The launch of the


iPhone in 2007 and Android in 2008 revolutionized mobile software
development, introducing app stores and SDKs, enabling developers
to create a wide range of applications.

4. Rise of Cross-Platform Frameworks (2010s):** Cross-platform


development frameworks like Xamarin, React Native, and Flutter
gained prominence, simplifying the process of building apps for
multiple platforms.

5. Current Trends (2020s): Mobile software development in the


2020s is characterized by AI integration, 5G support, and a focus on
security and privacy, shaping the future of mobile apps and services.
.

Q-4 Write down short note android SDK.


● The Android SDK (Software Development Kit) is a set of
development tools that are used to develop applications for the
Android platform.
● This SDK provides a selection of tools that are required to build
Android applications and ensures the process goes as smoothly
as possible.
● Android SDK is a collection of libraries and Software
Development tools that are essential for Developing Android
Applications.
● Android SDK consists of some tools which are very essential for
the development of Android Application. These tools provide a
smooth flow of the development process from developing and
debugging.
● Android SDK is compatible with all operating systems such as
Windows, Linux, macOS, etc.

1. Explain Anatomy of an android applications

An android component is simply a piece of code that has a well defined life cycle e.g.
Activity, Receiver, Service etc.

The core building blocks or fundamental components of android are activities, views,
intents, services, content providers, fragments and AndroidManifest.xml.

2. Components of an Android Application


● There are many components but these 4 are main:
Activities
1 They dictate the UI and handle the user interaction to the smartphone
screen.

Services
2
They handle background processing associated with an application.

Broadcast Receivers
3
They handle communication between Android OS and applications.

Content Providers
4
They handle data and database management issues.

3. Write down Terminologies Correlated to Android


Terminologies Correlated to Android

● XML file

The preeminent file is used for the structure of an android project. It has complete
information about all the components and packages. It initializes the API that is
further used by an application.

● View

It is the component of the User Interface that occupies the rectangular area on the
screen.

● Layout

It properly aligned the views on the screen.

● Activity

Activity is a User interface screen through which the user interacts. Users have a right
to place the UI elements in any way according to the Users choice.

4. Explain Types of Context in Android

Mainly two types of context:

● Application Context: It is the application and we are present in the Application.


For example - MyApplication(which extends Application class). It is an
instance of MyApplication only.
● Activity Context: It is the activity and we are present in Activity. For example -
MainActivity. It is an instance of MainActivity only.

5. Explain Types of permissions


Android permissions are categorized into different types,
including:

● Install-time permissions
● Runtime permissions
● Special permissions
The three protection levels of permissions in Android are: Normal
Permissions, Signature Permissions, Dangerous Permissions.

Normal permissions are used when there is no risk of user privacy.


Dangerous permissions are used when you deal with data that may involve
user privacy.

Each protection level consists of a base permission type and zero or more
flags. For example, the "dangerous" protection level has no flags.

You might also like