• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

(Unit 2) M1 - Windows 7 and Mac OS X comparison

Extracts from this document...

Introduction

´╗┐Windows 7 Enterprise Mac OS X Security More likely to get viruses because more people use Windows 7. However has greater drive encryption due to BitLocker which helps keep files, documents and passwords safe. Compared to Windows 7, Mac OS is less likely to get viruses because more people work on Windows OS. Mac OS is only used on one computer and apple hardware. Mac OS is based on Linux, ?it is considered to be more secure than Windows 7 because of its Unix origins?. [1] Features Windows 7 has less features then Mac OS X. ...read more.

Middle

Example of applications on the Mac OS X are iDVD, iMovie, iPhoto, iTunes and GarageBand. Mac OS has better photo and video editing than Windows Live Photo Gallery and Windows Live Movie Maker. Third Party Applications Windows 7 is more compatible compared to Mac OS because more people use it. It can also install and work with old programs. Mac OS isn?t very compatible compared to Windows 7. Apple changed the ?OS codebase and switched from PowerPC to x86 processors making programs which were compatible with PowerPc not compatible with x86?. [3] And due to the small market share, it isn?t really compatible. Cost PC?s itself are fairly cheap compared to Mac?s. ...read more.

Conclusion

However, software cost is less expensive than PC software as the price of the Mac?s are expensive, therefore software for Mac?s are less. Search Windows has a search called Windows search. You can find nearly anything on your PC incredibly fast. You can find files, documents, photo?s, songs, video?s etc. To search on Mac OS X you have to use a search called ?Spotlight? which is a desktop search feature. It is an index of all items and files on the system. It is designed to allow people to quickly find files, items. Specific words in documents and in web pages can be searched. [4] [1] Available from - http://www.ghacks.net/2011/08/08/windows-7-enterprise-security-is-better-than-os-x/ [2] Available from - http://windows.microsoft.com/en-GB/windows7/products/features [3] Available from - http://www.itpro.co.uk/635602/head-to-head-mac-os-x-10-7-lion-vs-windows-7/10 [4] Available from - http://en.wikipedia.org/wiki/Spotlight_(software) ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Information Systems and Communication section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Information Systems and Communication essays

  1. Peer reviewed

    Ecommerce (M) BETC IT

    4 star(s)

    A commitment to e-business will probably require taking on extra staff, because it is unlikely that your current employees will have sufficient experience or skills to cope with a significant shift into e-business, so they need to be prepared to recruit more specialist staff.

  2. Assignment 1 unit 7 Security Assessment Report (.coursework.info)

    This is like putting your fishing rod into the water and hoping a fish may bite. They are very convincing but you must not open emails of this type . Banks would never address you as Dear Customer. Piggybacking is when someone else uses some sort of software of yours

  1. PC comparison and Specification

    1.3 Motion Pictures max. Resolution (pixels) 1280 x 1024 Keyboard Function Keys 7 Multimedia Built-in Stereo Speakers YES 3D Surround Dolby Home Theatre Software Solution Guide VAIO Gate Audio Windows Media Player 11 Video & TV Picture Motion Browser, VAIO Content Importer / Exporter, VAIO Movie Story, Adobe Premiere Elements 7 Photo Picture Motion

  2. GCE APPLIED ICT - UNIT 4 - TASK A

    The employees will be able to change their passwords so it is easy for them to remember. The two employees that will not have access to the computer system will be moving and transporting the equipment. They will partially have to deal with the administrative side but this is only to acknowledge that the equipment has been received.

  1. Using Search Engines

    is further options if someone wants to enhance their search results by clicking on the advanced search hyperlink. This is located near the Google search bar on the right. Below is a screenshot showing the different features that the Google search engine provides.

  2. High-context vs. Low-context Culture

    The low-context cultures can be found in Switzerland, Germany, and North America including the United States (Jandt 2004:62). There are several key differences between these two types of cultures, among which the way a message transmitted is the most obvious one.

  1. Network Security

    This type of network is essentially designed for a very limited number of users (five or less) in a business organisation. Some of the benefits of a peer-to-peer network are low-cost and easy-to-install solution. If anyone of the user turns of its workstation the other users are not able to access this particular user's information and peripherals.

  2. Communication & Employability Skills for IT. OCR Cambridge Technicals Unit 1 LO1-P1

    work long hours or even come in the weekends, the employees must be able to accept this and work efficiently without any hesitation as this will show the employer that the employee is dedicated to the work. In some cases the employees may not get paid, they may have to be flexible and accept the fact.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work