{"id":82,"date":"2026-04-23T15:55:31","date_gmt":"2026-04-23T15:55:31","guid":{"rendered":"https:\/\/www.indianatech.edu\/sdl\/?page_id=82"},"modified":"2026-04-23T23:14:45","modified_gmt":"2026-04-23T23:14:45","slug":"using-smartphones-effectively","status":"publish","type":"page","link":"https:\/\/www.indianatech.edu\/sdl\/using-smartphones-effectively\/","title":{"rendered":"Using Smartphones Effectively"},"content":{"rendered":"\n<section class=\"wp-block-group pixels seafoam-pixels has-white-background-color has-background is-layout-constrained wp-block-group-is-layout-constrained\">\n<h1 class=\"wp-block-heading pixels\">Using Smartphones Effectively<\/h1>\n\n\n\n<p>This module discusses how to use your phone safely and securely through configuring a lock screen, recognizing scam messages and links, and avoiding dangerous apps.<\/p>\n\n\n\n<div style=\"height:2em\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n\n\n\n\n<div class=\"wp-block-buttons is-content-justification-space-between is-layout-flex wp-container-core-buttons-is-layout-3d213aab wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link has-dark-blue-background-color has-background wp-element-button\" href=\"https:\/\/www.indianatech.edu\/sdl\/online-safety-and-cybersecurity\/\"><span class=\"fa fa-chevron-left\"><\/span>&nbsp; Previous Lesson<\/a><\/div>\n\n\n\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link has-dark-blue-background-color has-background wp-element-button\" href=\"https:\/\/www.indianatech.edu\/sdl\/ai-in-everyday-life\/\">Next Lesson &nbsp;<span class=\"fa fa-chevron-right\"><\/span><\/a><\/div>\n<\/div>\n<\/section>\n\n\n\n<section class=\"wp-block-group has-mist-gray-background-color has-background is-layout-constrained wp-block-group-is-layout-constrained\">\n<h2 class=\"wp-block-heading\">Lesson Content<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">Password Protection and Lock Screen<\/h3>\n\n\n\n<p>Every phone should be password protected. This is done through the usage of a pin, password, fingerprint, or facial recognition.<\/p>\n\n\n\n<p>What is a pin?<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>A pattern of numbers used to unlock a phone or tablet.<\/li>\n\n\n\n<li>Can be four (4) or six (6) digits<\/li>\n<\/ul>\n\n\n\n<p>What is a passcode?<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>A pattern of letters and numbers to unlock a phone or tablet<\/li>\n<\/ul>\n\n\n\n<p>Fingerprint<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Using your unique fingerprint, placing it on the home button of a phone, unlocks it.<\/li>\n<\/ul>\n\n\n\n<p>Facial Recognition<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Like using a fingerprint, the camera of the phone or tablet scans your face to ensure it matches the owner.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Phishing and Scam Messages<\/h3>\n\n\n\n<p>Phishing is not only included in email. Many people will receive phishing text messages or even phone calls. <\/p>\n\n\n\n<p>Avoid interacting with anyone you do not know online. Usually, they will text you first to start a conversation.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Be cautious of links, do not automatically click them<\/li>\n\n\n\n<li>Take time to understand what the message is saying or asking for, avoid urgency<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Avoiding Dangerous Apps<\/h3>\n\n\n\n<p>Most phones have a trusted \u201capp store\u201d. This could be the Apple App Store or the Google Play Store.<\/p>\n\n\n\n<p>Only download apps from these trusted places.<\/p>\n<\/section>\n\n\n\n<section class=\"wp-block-group has-white-background-color has-background is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-media-text is-stacked-on-mobile\" style=\"grid-template-columns:24% auto\"><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"831\" height=\"1024\" src=\"https:\/\/www.indianatech.edu\/sdl\/wp-content\/uploads\/sites\/91\/1-1-831x1024-1.png\" alt=\"Maggie Trowbridge\" class=\"wp-image-54 size-full\" srcset=\"https:\/\/www.indianatech.edu\/sdl\/wp-content\/uploads\/sites\/91\/1-1-831x1024-1.png 831w, https:\/\/www.indianatech.edu\/sdl\/wp-content\/uploads\/sites\/91\/1-1-831x1024-1-243x300.png 243w, https:\/\/www.indianatech.edu\/sdl\/wp-content\/uploads\/sites\/91\/1-1-831x1024-1-768x946.png 768w\" sizes=\"auto, (max-width: 831px) 100vw, 831px\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<h2 class=\"wp-block-heading\">Maggie Trowbridge<\/h2>\n\n\n\n<p class=\"subtitle\">Digital Literacy Educator<\/p>\n\n\n\n<p>Maggie focuses on helping older adults feel confident and capable in today\u2019s digital world. She enjoys breaking down complex technology into simple, practical skills; whether that\u2019s navigating smartphones, recognizing online scams, or using digital tools to stay connected with family and community. Her goal is to make technology feel less intimidating and more empowering, meeting learners with patience, clarity, and understanding.<\/p>\n\n\n\n<p>Looking ahead, Maggie hopes to continue working at the intersection of cybersecurity and public service, building secure systems while staying committed to the people those systems are meant to protect and support.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.linkedin.com\/in\/maggie-trowbridge\/\"><span class=\"fa fa-linkedin-in\"><\/span><span class=\"sr-only\">Maggie Trowbridge on LinkedIn<\/span><\/a><\/p>\n<\/div><\/div>\n<\/section>\n","protected":false},"excerpt":{"rendered":"<p>Using Smartphones Effectively This module discusses how to use your phone safely and securely through configuring a lock screen, recognizing scam messages and links, and avoiding dangerous apps. Lesson Content Password Protection and Lock Screen Every phone should be password protected. This is done through the usage of a pin, password, fingerprint, or facial recognition. [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"full-width-no-margins.php","meta":{"_acf_changed":false,"footnotes":"","_links_to":"","_links_to_target":""},"class_list":["post-82","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Using Smartphones Effectively - Senior Digital Literacy<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.indianatech.edu\/sdl\/using-smartphones-effectively\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Using Smartphones Effectively - Senior Digital Literacy\" \/>\n<meta property=\"og:description\" content=\"Using Smartphones Effectively This module discusses how to use your phone safely and securely through configuring a lock screen, recognizing scam messages and links, and avoiding dangerous apps. Lesson Content Password Protection and Lock Screen Every phone should be password protected. This is done through the usage of a pin, password, fingerprint, or facial recognition. [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.indianatech.edu\/sdl\/using-smartphones-effectively\/\" \/>\n<meta property=\"og:site_name\" content=\"Senior Digital Literacy\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-23T23:14:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.indianatech.edu\/sdl\/wp-content\/uploads\/sites\/91\/1-1-831x1024-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"831\" \/>\n\t<meta property=\"og:image:height\" content=\"1024\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.indianatech.edu\\\/sdl\\\/using-smartphones-effectively\\\/\",\"url\":\"https:\\\/\\\/www.indianatech.edu\\\/sdl\\\/using-smartphones-effectively\\\/\",\"name\":\"Using Smartphones Effectively - Senior Digital Literacy\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.indianatech.edu\\\/sdl\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.indianatech.edu\\\/sdl\\\/using-smartphones-effectively\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.indianatech.edu\\\/sdl\\\/using-smartphones-effectively\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.indianatech.edu\\\/sdl\\\/wp-content\\\/uploads\\\/sites\\\/91\\\/1-1-831x1024-1.png\",\"datePublished\":\"2026-04-23T15:55:31+00:00\",\"dateModified\":\"2026-04-23T23:14:45+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.indianatech.edu\\\/sdl\\\/using-smartphones-effectively\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.indianatech.edu\\\/sdl\\\/using-smartphones-effectively\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.indianatech.edu\\\/sdl\\\/using-smartphones-effectively\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.indianatech.edu\\\/sdl\\\/wp-content\\\/uploads\\\/sites\\\/91\\\/1-1-831x1024-1.png\",\"contentUrl\":\"https:\\\/\\\/www.indianatech.edu\\\/sdl\\\/wp-content\\\/uploads\\\/sites\\\/91\\\/1-1-831x1024-1.png\",\"width\":831,\"height\":1024,\"caption\":\"Maggie Trowbridge\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.indianatech.edu\\\/sdl\\\/using-smartphones-effectively\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.indianatech.edu\\\/sdl\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Using Smartphones Effectively\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.indianatech.edu\\\/sdl\\\/#website\",\"url\":\"https:\\\/\\\/www.indianatech.edu\\\/sdl\\\/\",\"name\":\"Senior Digital Literacy\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.indianatech.edu\\\/sdl\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Using Smartphones Effectively - Senior Digital Literacy","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.indianatech.edu\/sdl\/using-smartphones-effectively\/","og_locale":"en_US","og_type":"article","og_title":"Using Smartphones Effectively - Senior Digital Literacy","og_description":"Using Smartphones Effectively This module discusses how to use your phone safely and securely through configuring a lock screen, recognizing scam messages and links, and avoiding dangerous apps. Lesson Content Password Protection and Lock Screen Every phone should be password protected. This is done through the usage of a pin, password, fingerprint, or facial recognition. [&hellip;]","og_url":"https:\/\/www.indianatech.edu\/sdl\/using-smartphones-effectively\/","og_site_name":"Senior Digital Literacy","article_modified_time":"2026-04-23T23:14:45+00:00","og_image":[{"width":831,"height":1024,"url":"https:\/\/www.indianatech.edu\/sdl\/wp-content\/uploads\/sites\/91\/1-1-831x1024-1.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.indianatech.edu\/sdl\/using-smartphones-effectively\/","url":"https:\/\/www.indianatech.edu\/sdl\/using-smartphones-effectively\/","name":"Using Smartphones Effectively - Senior Digital Literacy","isPartOf":{"@id":"https:\/\/www.indianatech.edu\/sdl\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.indianatech.edu\/sdl\/using-smartphones-effectively\/#primaryimage"},"image":{"@id":"https:\/\/www.indianatech.edu\/sdl\/using-smartphones-effectively\/#primaryimage"},"thumbnailUrl":"https:\/\/www.indianatech.edu\/sdl\/wp-content\/uploads\/sites\/91\/1-1-831x1024-1.png","datePublished":"2026-04-23T15:55:31+00:00","dateModified":"2026-04-23T23:14:45+00:00","breadcrumb":{"@id":"https:\/\/www.indianatech.edu\/sdl\/using-smartphones-effectively\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.indianatech.edu\/sdl\/using-smartphones-effectively\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.indianatech.edu\/sdl\/using-smartphones-effectively\/#primaryimage","url":"https:\/\/www.indianatech.edu\/sdl\/wp-content\/uploads\/sites\/91\/1-1-831x1024-1.png","contentUrl":"https:\/\/www.indianatech.edu\/sdl\/wp-content\/uploads\/sites\/91\/1-1-831x1024-1.png","width":831,"height":1024,"caption":"Maggie Trowbridge"},{"@type":"BreadcrumbList","@id":"https:\/\/www.indianatech.edu\/sdl\/using-smartphones-effectively\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.indianatech.edu\/sdl\/"},{"@type":"ListItem","position":2,"name":"Using Smartphones Effectively"}]},{"@type":"WebSite","@id":"https:\/\/www.indianatech.edu\/sdl\/#website","url":"https:\/\/www.indianatech.edu\/sdl\/","name":"Senior Digital Literacy","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.indianatech.edu\/sdl\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.indianatech.edu\/sdl\/wp-json\/wp\/v2\/pages\/82","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.indianatech.edu\/sdl\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.indianatech.edu\/sdl\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.indianatech.edu\/sdl\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.indianatech.edu\/sdl\/wp-json\/wp\/v2\/comments?post=82"}],"version-history":[{"count":5,"href":"https:\/\/www.indianatech.edu\/sdl\/wp-json\/wp\/v2\/pages\/82\/revisions"}],"predecessor-version":[{"id":149,"href":"https:\/\/www.indianatech.edu\/sdl\/wp-json\/wp\/v2\/pages\/82\/revisions\/149"}],"wp:attachment":[{"href":"https:\/\/www.indianatech.edu\/sdl\/wp-json\/wp\/v2\/media?parent=82"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}