Upload
sai-srinivas
View
558
Download
5
Tags:
Embed Size (px)
DESCRIPTION
cell ppt
Citation preview
WELCOME
SEMINOR
ON
CELLPHONES BEYOND CALLS AND SMSs
By
Pavan Kumar .B
CONTENTS1. INTRODUCTION
2. SHRT N SWT MSG
3. STAY CONNECTED
4. CHEAT CODES
5. MAKE IT SECURE
6. CELLPHONE MEETS THE PC
7. MANAGING CALLS
8. EXTEND YOUR PERSONA
9. CELLULAR NETWORKS
10. CONCLUSION
INTRODUCTION
In 1973 The first cellphone was hefty and clumsy box of circuitry, wires and batteries weighing two pounds.
They can be used to do things far beyond making calls and sending SMSs.
The MARTIN COOPER he is the director and development in motorola.
First private cellular phone call done while walking down a street in MANHATTAN.
SHRT N SWT MSG
SMS, the happening thing in communication today, is now not just a service of sending simple text messages, but also encompasses message broadcasting, chatting and even e-mail.
To log onto you Yahoo Messenger,
Send“In Yahoo ID password”, to the number 8242.
STEPS TO LOG ONTO YOUR YAHOO MESSENGER
You will get a reply with your online contact list displayed
Now to send a message to any contact type “to Id Message” and again send it to 8242
To logout simply send “out” to the same number I.e 8242
E-MAIL ID FORMATS FOR POPULAR SERVICES IN INDIA
Airtel, Delhi:[email protected]
Hutch,Delhi:[email protected]
BPL Mobile, Mumbai: [email protected]
Airtel, Mumbai: about to start
Orange, Mumbai: abut to start
Dolphin, Mumbai:about to star
STAY CONNECTED
Use your cellphone with your PDA and note book to remain in remain in touch with anyone at any time
CHEAT CODES
tips on accessing some unknown stuff on most cellphones.
*#06# IMEI (international Mobile Equipment Identity) information.
*#0000# 1st line: software version 2nd line: date of software released. 3rd line : phone type
*#92702689# here is a big one!
First, it will display the serial number.
Second the monther and year of manufacture
Third the date of purchase
Third the date of purchase
Fifth, the option to transfer user data if you have the hardware for it.
Sixth, the number of hours the phone has been on
MAKE IT SECURE
Cellphones come with a lot of security features that restrict the use of the phone to unauthorized people and unwanted calls.
The phone’s serial number, lock code, PIN, PIN2, PUK, PUK2, SIM lock are a few of these great features.
THE CELLPHONE MEETS THE PC
Use a pc to manage your phone's address books, send SMSs create ring tones and more.
MANAGING CALLS
You can do a whole lot more with your cellphone than make and receive regular phone calls.
Together with your service provider, you can perform a range of call-management operations
EXTEND YOUR PERSONATHIS ALL ABOUT CELLPHONE LOGOS, SCREEN\SAVERS AND RING TONES
Free evaluation copy of Composer for Ringtones
Www.free-nokia-ringtones.uk.com/ringtoneconvert.exe
Free evaluation copy of Logomanager
Www.enpi.co.uk/logomanager.zip
Design a logo guide
www.1st-free-ringtones4 nokia.com/zips/designlogoguide.zip
CELLULAR NETWORKS-INSIDE OUT
what the different pairs of the cellphone network are and how they work
A
GF
ED
C
B
A
GF
ED
C
BA
GF
ED
C
B
CELLS ARE USUALLY DENOTED IN THE SHAPE OF HEXAGONS FOR EASE OF PLANNING
CONCLUSION
In present day situations cellphones are becoming highly useful and at the same time there is a rapid development in cellphone technologies.
But if we use any technology it should be used in a good path, otherwise it leads to distractions of using those technologies.
In the rapid development of cell technology it is becoming “HELL PHONES” technology due to misuse of that technology.
So be a good user of cell phone technology.
THANK Q