Title: SEMINOR
1WELCOME
2SEMINOR
ON
CELLPHONES BE
YOND CALLS AND SMSs
By Pavan Kumar .B
3CONTENTS
- INTRODUCTION
- SHRT N SWT MSG
- STAY CONNECTED
- CHEAT CODES
- MAKE IT SECURE
- CELLPHONE MEETS THE PC
- MANAGING CALLS
- EXTEND YOUR PERSONA
- CELLULAR NETWORKS
- CONCLUSION
4INTRODUCTION
In 1973 The first cellphone was hefty and
clumsy box of circuitry, wires and batteries
weighing two pounds.
They can be used to do things far beyond making
calls and sending SMSs.
5The MARTIN COOPER he is the director and
development in motorola.
First private cellular phone call done while
walking down a street in MANHATTAN.
6SHRT N SWT MSG
SMS, the happening thing in communication today,
is now not just a service of sending simple text
messages, but also encompasses message
broadcasting, chatting and even e-mail.
7STEPS TO LOG ONTO YOUR YAHOO MESSENGER
To log onto you Yahoo Messenger, SendIn Yahoo
ID password, to the number 8242.
You will get a reply with your online contact
list displayed
8Now to send a message to any contact type to Id
Message and again send it to 8242
To logout simply send out to the same number
I.e 8242
9E-MAIL ID FORMATS FOR POPULAR SERVICES IN INDIA
Airtel, Delhinumber_at_airtelmail.com Hutch,Delhin
umber_at_delhi.hutch.co.in BPL Mobile, Mumbai
Number_at_bplmobile.com Airtel, Mumbai about to
start Orange, Mumbai abut to start Dolphin,
Mumbaiabout to star
10STAY CONNECTED
Use your cellphone with your PDA and note book to
remain in remain in touch with anyone at any time
11CHEAT CODES
tips on accessing some unknown stuff on most
cellphones.
06 IMEI (international Mobile Equipment
Identity) information.
0000 1st line software version 2nd
line date of software released. 3rd line
phone type
1292702689 here is a big one!
First, it will display the serial number.
Second the monther and year of manufacture
Third the date of purchase
Third the date of purchase
Fifth, the option to transfer user data if you
have the hardware for it.
Sixth, the number of hours the phone has been on
13MAKE IT SECURE
Cellphones come with a lot of security features
that restrict the use of the phone to
unauthorized people and unwanted calls.
The phones serial number, lock code, PIN, PIN2,
PUK, PUK2, SIM lock are a few of these great
features.
14THE CELLPHONE MEETS THE PC
Use a pc to manage your phone's address books,
send SMSs create ring tones and more.
15MANAGING CALLS
You can do a whole lot more with your cellphone
than make and receive regular phone calls.
Together with your service provider, you can
perform a range of call-management operations
16EXTEND YOUR PERSONA
THIS ALL ABOUT CELLPHONE LOGOS, SCREEN\SAVERS AND
RING TONES
Free evaluation copy of Composer for
Ringtones Www.free-nokia-ringtones.uk.com/rington
econvert.exe Free evaluation copy of
Logomanager Www.enpi.co.uk/logomanager.zip Desig
n a logo guide www.1st-free-ringtones4
nokia.com/zips/designlogoguide.zip
17CELLULAR NETWORKS-INSIDE OUT
what the different pairs of the cellphone network
are and how they work
18CELLS ARE USUALLY DENOTED IN THE SHAPE OF
HEXAGONS FOR EASE OF PLANNING
19CONCLUSION
In present day situations cellphones are becoming
highly useful and at the same time there is a
rapid development in cellphone technologies.
But if we use any technology it should be used in
a good path, otherwise it leads to distractions
of using those technologies.
20In the rapid development of cell technology it is
becoming HELL PHONES technology due to misuse
of that technology.
So be a good user of cell phone technology.
21THANK Q