Chapt 5 Flashcards
peripheral hardware requires a(n) _______ to be installed
driver (or device driver)
word processing and spreadsheet programs are considered _____ software
productivity
conferencing and instant messaging are considered ______ software
collaboration
if you want to protect your computer against bad software you should install ______ software.
anti-malware
to make a file smaller in size or to package multiple files together into one archive, use _______ software
compression
the three application delivery methods are ________, _________, and _________.
locally installed, local network hosted, and cloud hosted
when assessing software compatibility, check what two things?
make sure it runs on your OS, and make sure you meet the minimum hardware requirements
to install or run a purchased application, you need a(n) _________ _______
product key
__________ is the process of letting you use the software by linking it to your computer
activation
__________ is the process by which you provide your name and contact info to the software manufacturer.
registration
in windows, the best way to uninstall applications is through _____
control panel
if you want your windows OS to be continually updated, what do you need to configure?
windows update
to make your hardware work, what type of software do you need?
a driver (or device driver)
who should you contact to get updated device drivers?
the hardware manufacturer
to use purchased software you need a(n) _____ _______, which stipulates the conditions of use.
software license
how often should you update your security software?
at least once a week
what are two locations from which you might receive an installation file?
a CD-ROM from the manufacturer, or download from the internet
to ensure that your OS gets the most important security updates, even if you don’t know they were released, you should enable _________.
automatic updates (or windows update or software update)
the three tiers of a three-tier application architecture are what?
database layer
business logic layer
presentation layer
to remove temporary internet files from your web browser, you should _______
clear the cache
if you want to prevent a button on a web page from working on a web browser, what should you do?
deactivate client-side scripting or use a script blocker
what adds functionality to a web browser?
add-on or extension
what allows you to browse the internet without your normal browser settings and identification?
private browsing
what settings would you configure if your web server needs to go through a secure server to access the internet?
proxy settings
a secure website requires a(n) _____
valid certificate
how do you prevent extra web browser windows from appearing when a website wants them to?
pop-up blocker
what type of software is not free and requires a license?
proprietary ( or commercial)
what type of software license requires you to pay every year?
subscription
access the database layer directly through the application layer
one tier, two tier, or three tier
two tier
stores data in a database or file system securely
one tier, two tier, or three tier
three tier
processes commands, performs calculations, and can make decisions
one tier, two tier, or three tier
three tier
presents data to the user and allows the user to interact with the system
one tier, two tier, or three tier
three tier
runs all components of the application from a single computer
one tier, two tier, or three tier
one tier