CHAPTER 11: Application Support Flashcards
A logical description of how different components, services, and resources work together to run applications.
application architecture
A collection of tools, advice, and methodologies that guides the IT administrator in determining which legacy applications are compatible with Windows 7 and how to help make them compatible.
Application Compatibility Toolkit
An abbreviation for Component Object Model, which is a generalized method used by some applications to cross-link to and access each other. This is a broader method than OLE
COM
Support systems designed for specifi c types of applications, such as Win32 applications. The environment hides the details of how the application must communicate with lower-level operating system components such as the Executive Services. Environment subsystems operate on a user-mode basis but have awareness of kernel mode services hosted through Executive Services.
environment subsystems
A collection of kernel model support modules to manage low-level duties in the operating system such as scheduling processes, managing memory, managing virtual environments, and running core kernel programming.
Executive Services
Part of the operating system that understands how to talk to the specifi c computer hardware on which the operating system is installed. This portion of the operating system runs at the lowest level of the application hierarchy in kernel mode.
Hardware Abstraction Layer (HAL)
A discrete body of registry keys and values stored in fi les as part of the operating system.
hives
The operating system software that runs in kernel mode on the computer?s processor and which provides low-level intelligence for the operating system.
kernel
An access mode for applications while they are running on the CPU that allows full access to all hardware devices and memory in the computer.
kernel mode
An abbreviation for Object Linking and Embedding, which is a method used by some applications to cross-link to each other.
OLE
A level in a hive?s hierarchy defi ned by its name and position relative to other keys in the hive hierarchy. A registry key can contain subkeys (other registry keys), values, or both.
registry key
An option to start an application with elevated security privileges.
Run as administrator
A coded value assigned to a user account when it is fi rst created to act as a unique identifi er that is not duplicated for any other account. The security identifi er is unique, regardless of what name is assigned to the user?s account.
security identifi er (SID)
A subordinate or lower level registry key within a hive that can contain values and other subkeys.
subkey
A method where data and parameters passed from 16-bit software to 32-bit software is translated in a bidirectional manner.
thunking