IOS uses an All Apps button whereas Android uses a Home button.
IOS has a physical Home button, but Android uses navigation icons.
In iOS, the icon for an app represents the app itself. Deleting the icon in iOS deletes the app. In Android, the icon on the Home screen is a shortcut to the app.
In iOS, apps can only appear on screens, whereas in Android, apps can appear on screens and in folders.
In iOS, folders are created by dragging one app on top of another app, but in Android folders must be created from the home screen menu.
The apple App Store
The area that is highlighted contains navigation icons.
The area that is highlighted displays background processes and indicators.
The area that is highlighted contains the system icons.
This is an Android screen.
This is an iOS screen.
This is a Windows Phone screen.
It is an alert badge that indicates the number of items requiring attention for that app.
It indicates the number of instances of the app that are running on the device.
It indicates how frequently the app has been used within a period of time.
It indicates the number of items in the app folder.
A method used to push apps to smartphones
A convenient way to securely and digitally make payments with mobile devices
A government emergency alert service for smartphones
A way to make mobile phone calls over a wireless data network
A method for sharing data between two mobile devices
It can save lives by sending emergency text messages to mobile phones.
It can simplify commerce by allowing payments to be made from a mobile phone.
It is a method of securing a mobile device that has been lost or stolen.
It allows a user to search for resources that are located near the current location.
To help prevent theft of private information
To prevent unauthorized use of the device
To erase all personal data from the device
To return the device to the default factory state
To restore and re-synchronize the device
To remotely lock the device if it is stolen
The device must be powered on.
The device must be connected to a network.
The passcode must be disabled.
The GPS locator must be enabled.
Sandboxing must be enabled.
An app source
The user interface can be extensively customized.
The operating system can be fine-tuned to improve the speed of the device.
The root directory of the device is blocked.
The operation of the carrier cellular network may be affected.
A custom OS may reduce sandboxing features.
If the network SSID is not being broadcast, the device will not be able to connect to the network.
When the device roams out of the range of any Wi-Fi networks, it can connect to the cellular data network if this feature is enabled.
If a Wi-Fi network is secured with a password, the network must be manually configured on the device.
The Android OS does not support wireless connectivity that uses WPA2 security.
Connecting a mobile device to another mobile device or computer to share a network connection
Connecting a mobile device to a hands-free headset
Connecting a mobile device to a 4G cellular network
Connecting a mobile device to a USB port on a computer in order to charge the mobile device
Cell phones that use a single standard can often only be used in specific geographic areas.
Cellular standards have made it more difficult and expensive to make calls to people that are on a different network.
First generation cellular standards are mostly digital standards.
Third generation cellular standards require a maximum of 1 Gb/s for devices moving slowly, such as when a user has a mobile device and is walking.
It manages antivirus signature files, encryption keys, and certificates when a device boots.
It automates the POST and checks the disk for bad sectors during a boot.
It checks the validity of hardware and software on the device after a factory reset.
It allows the user to select the OS to use to boot the device.
It allows the user to determine which apps are automatically opened during the boot process.
They contain a record of historical and pending firmware and software updates.
They contain a list of all user passwords.
They contain a log of digital certificates and encryption keys associated with the user.
They contain sample code from known viruses and malware that is used by security software to identify malicious software.
The user has full access to the file.
Members of the group have read and execute access to the file.
Other people have read and execute access to the file.
Group members are able to modify the file.
The user is able to read and modify the file.
Other people have no access to the file.
The operating system will be updated with the most recent updates and patches.
All user data and settings will be deleted.
The operating system will be deleted and all user data is transferred to the Cloud.
A complete backup of the device is done and all viruses and malware are removed.
Cell tower analyzer
Toner generator and probe