Compare And Contrast Apple And Iphone

807 Words2 Pages

Apple and Android phones are currently the preferred mobile devices among many consumers. The two share the common feature of being smartphones in that they share the general functionality similarities such as application capability whereby more operations apart from the mainstream phone functions can be performed on the devices. Such operations include: downloading and installing applications, file sharing via applications and email, taking pictures and video recording in addition to better screen display far better than the original dot matrix.
These smartphones also share the similarity of higher processing speed that is made possible by installing higher RAM speeds and memory storage in their operating systems. They also have bigger screens …show more content…

To begin with, Apple has a closed operating system implying that there are limited app options for iPhone users. For instance, the Adobe Flash player is not available on the Apple app store. Hence users are unable to play flash games or flash videos on their devices. Another drawback to using applications on the iPhone is that the apps have to be purchased from the Apple store yet Android offers most of the popular and basic apps free of charge.
The Android operating system, on the other hand, is highly open to an array of applications that are available on the Google play store courtesy of their partnership with Google. Android users can also download and install applications that are not available on the Google play store with ease.
System security:
Regarding system security, the iPhone operating system is more secure due to its stringent control measures on applications that can be downloaded or installed in it. The iPhone is, therefore, the best choice for users that desire more security on their mobile devices to avoid falling victim to cyber crime. Android devices, on the other hand, are less secure given that most of the applications that can be readily installed on them have security problems (Gronli, 2014). This is a disadvantage in an era where cyber security is

Open Document