RA2. Know the distinct operating systems used by the mobile devices. |
A2 A5
|
|
C4 C5 C27 C28 C36
|
D4 D5 D6 D7 D8 D9 D11
|
RA4. Understand the specific needs of this type of devices because of his architecture. |
A2 A4 A5
|
B5 B6 B9
|
C4 C5 C27 C28 C36
|
D4 D5 D6 D7 D8 D9 D11 D13
|
RA6. Assume the responsibility of the information integrity and the unauthorised access to the same. |
A2 A4 A5
|
B5 B9
|
|
D4 D5 D6 D7 D8 D9 D11 D14
|