Some of the most common forms of mobile computing devices are as given below: These classes are expected to endure and to complement each other, none replacing another completely.
Indeed, smartphones collect and compile an increasing amount of sensitive information to which access must be controlled to protect the privacy of the user and the intellectual property of the company.
These attacks exploit weaknesses related to smartphones that can come from means of wireless telecommunication like WiFi networks and GSM.
There are good practices to be observed at all levels, from design to use, through the development of operating systems, software layers, and downloadable apps.
For example, the OQO UMPC is also a PDA-sized tablet PC; the Apple eMate had the clamshell form factor of a laptop but ran PDA software.
The HP Omnibook line of laptops included some devices small enough to be called ultra mobile PCs.
[11] Cellular data service uses technologies GSM, CDMA or GPRS, 3G networks such as W-CDMA, EDGE or CDMA2000.