Skip to main content

Xiaomi Redmi Note 5A

Latest Tricks-Xiaomi Redmi Note 5A


Important note:-LatestTrickes can not guarantee that the information on this page is 100% correct.

Xiaomi Redmi Note 5A

NETWORK

LAUNCH
2017, August
Coming soon. Exp. release 2017, September

BODY
153 x 76.2 x 7.7 mm (6.02 x 3.00 x 0.30 in)
153 g (5.40 oz)
Dual SIM (Nano-SIM, dual stand-by)

DISPLAY
IPS LCD capacitive touchscreen, 16M colors
5.5 inches (~71.5% screen-to-body ratio)
1080 x 1920 pixels (~401 ppi pixel density)
Yes

- MIUI 9.0

PLATFORM
Android 7.0 (Nougat)
Qualcomm MSM8940 Snapdragon 435
Octa-core Cortex-A53
Adreno 505

MEMORY
microSD, up to 256 GB (dedicated slot)
32 GB, 3 GB RAM or 64 GB, 4 GB RAM

CAMERA
13 MP, f/2.2, phase detection autofocus, LED flash
Geo-tagging, touch focus, face detection, HDR, panorama
1080p@30fps
16 MP, f/2.0, 1080p

SOUND
Vibration; MP3, WAV ringtones
Yes
Yes

- Active noise cancellation with dedicated mic

COMMS
Wi-Fi 802.11 b/g/n, Wi-Fi Direct, hotspot
4.2, A2DP, LE
Yes, with A-GPS, GLONASS, BDS
Yes
FM radio
microUSB 2.0

FEATURES
Fingerprint (rear-mounted), accelerometer, gyro, proximity, compass
SMS(threaded view), MMS, Email, Push Mail, IM
HTML5
No

- XviD/MP4/H.264 player
- MP3/WAV/eAAC+/Flac player
- Photo/video editor
- Document viewer

BATTERY

Non-removable Li-Ion 3080 mAh battery
Up to 240 h (3G)
Up to 32 h (3G)
Up to 75 h

MISC
Silver, Gold, Rose Gold



Photo



Comments

Popular posts from this blog

The Web Application Hackers Handbook(Full Pdf)

DISCLAIMER: Following data/info/files are not owned/made/uploaded by latesttrickes On our last article about a lot of people asked about  Advanced Penetration Testing.  This book is a practical guide to discovering and exploiting security flaws in web applications. By “web applications” we mean those that are accessed using a web browser to communicate with a web server. We examine a wide variety of different technologies, such as databases, file systems, and web services, but only in the context in which these are employed by web applications. If you want to learn how to run port scans, attack firewalls, or break into servers in other ways, we suggest you look elsewhere. But if you want to know how to hack into a web application, steal sensitive data, and perform unauthorized actions, this is the book for you. There is enough that is interesting and fun to say on that subject without straying into any other territory. Contents:- Chapter 1 Web Application (In)secu

HACKING - GUIDE Learn Ethical Hacking Within 12 Hours!(PDF Tutorial)

DISCLAIMER: Following data/info/files are not owned/made/uploaded by latesttrickes On our last article about a lot of people asked about  Ethical Hacking Guild. Table of Contents:- Hour 1: Introduction to Hacking and Types of Hackers 1.1 What is hacking? 1.2 Types of Hackers 1.3 What is Cybercrime? 1.4 What is ethical hacking? 1.5 Do we need ethical hackers? 1.6 Legality of ethical hacking Hour 2: Build your Kali Linux hacking environment! 2.1 Caution for Beginners: Do not be ‘that guy.' 2.2 What is Kali Linux? Step 1: Download the software you need Step 2: Install VMware Station Player Step 3: Set up Kali Linux on VMware Step 4: Install Kali Linux Step 5: Login to Kali Linux on VMware Hour 3: An Introduction to the Linux Terminal and CLI 3.1 The Terminal Emulator 3.2 The Shell 3.3 The Command Prompt 3.4 Executing Commands 3.4.1 Execute commands without arguments or options 3.4.2 Execute commands with arguments 3.4.3 Execut

Computer Security Fundamentals(3rd Edition)

DISCLAIMER: Following data/info/files are not owned/made/uploaded by latesttrickes On our last article about a lot of people asked about   Computer Security and this book is best for learning about Computer Security and Fundamentals of hackings. content 1 Introduction to Computer Security 2 Networks and the Internet 3 Cyber Stalking, Fraud, and Abuse 4 Denial of Service Attacks  5 Malware  6 Techniques Used by Hackers 7 Industrial Espionage in Cyberspace 8 Encryption  9 Computer Security Software  10 Security Policies  11 Network Scanning and Vulnerability Scanning  12 Cyber Terrorism and Information Warfare 13 Cyber Detective 14 Introduction to Forensics  This book is not a cookbook for hackers. You will see exactly how hackers target a system and get information about it. You will also see step-by-step instructions on how to use some password cracking utilities and some network-scanning utilities. You will also be given a reasonably in-depth exp