Chapter 5 Flashcards
What are the three areas that software developers need to think about?
Platforms
Delivery Methods
Architecture
What are the two ways to approach the development of cross-platform software?
Write complete sets of code for each platform
Use a special development toolkit or environments
What are the three options where the application can be installed and from what will it be executed?
Locally installed
Hosted on a local network (key data backed on server)
The Cloud (web based applications)
Application architecture:
defines how the app is executed- if it will run on one computer or if different components will run on different systems
n-tier architecture:
n is intended to be variable (number)
multiple tiers can help with scalability
each tier hosted on a different system (client server)
Presentation tier:
user interface (UI)
Business logic tier:
coordinates between presentation and data
Data tier:
database or file system holding the data
What are the advantages of a three-tier model?
Security
Scalability
Flexibility
Load balancing
Describe a two-tier architecture:
Usually a client-server model
has a workstation with a UI and the server hosting the other layers
What are the six alternatives to commercial software sales?
Freeware
Open Source
Shareware
Single Use
Concurrent
Corporate, Campus, Group, or Site
Freeware:
software that is completely free
Open Source:
software that is free and the source code is shared and editable
Shareware:
software that provides a free trial, with the expectation that you’ll pay for it if you like and decide to keep it
Single Use Program:
commercial software for with the license restricts installation to a single user
Concurrent License:
allows software to be installed on may PCs but used concurrently by a smaller number them
Corporate, Campus, Group, or Site:
permits an organization to install the application on an agreed-upon number of PCs
Control Panel:
used to manage software that is already installed
What are the three ways to get an application?
Optical disc
Flash drive
The Internet
Exe. or Msi. extension:
an executable Setup file
What are the three things you should do when installing software?
Read the instructions
Read the agreements
Be aware of advanced options
What is the trade-off of registering software?
Companies want to collect your personal information for marketing purposes
You may be eligible for discounts on new versions, free updates, and other goods
Activation:
examines the hardware on your system and generates a code that describes the hardware
What the steps for an unclean uninstallation?
Make sure that the application isn’t running
Delete the folder containing the program files
Delete the program’s icons or folders from the Start menu
If you have enough information to know what to delete in the registry, start the Registry Editor and make the needed changes
Load balancing:
load can be shared among servers in case one server gives up
Service pack:
typically alters the inner workings of the OS in a deeper way than a regular update
What are the three groups of software to know?
Productivity
Collaboration
Business
File extension:
tells you a little about the file
tells the OS what to do with the file
Executables
Extensions designed to execute a program directly
Common executable file extensions:
.exe
Execute a program with Windows
Common executable file extensions:
.msi
Microsoft Installation for installation and removal
Common executable file extensions:
.app
Execute a program with macOS
Common executable file extensions:
.bat
Batch file
used to execute multiple commands from the Windows command prompt within one file
Common executable file extensions:
.scexe
Self-extracting firmware updates that Hewlett-Packard produces
commonly associated with Linux machines
Multipurpose Internet Mail Extensions (MIME):
Windows ignores MIME type
UNIX, Linux, and macOS read the MIME type when a file is opened
Productivity Software
software that helps get more work done easier
What software makes up productivity software?
Word processing software
Spreadsheet software
Presentation software
Visual Diagramming Software
What are commercial offerings of word processing software?
Corel WordPerfect
Corel Write
Microsoft Word
What are free offerings of word processing software?
Google Docs
AbiWord
Jarte
LibreOffice
Word processing file extensions:
.txt
Basic text file
Almost all word processors will open
Word processing file extensions:
.rtf
Rich-text format
develops by Microsoft and generally more compatible than .doc files
Spreadsheet Software:
Mostly used for managing numbers or lists of data
mostly bundled with word processing software
Presentation software:
designed to help put your ideas in slides so you can share a full-screen slide show from your computer
Visual diagramming software:
can also create charts and graphs, as well as floor plans or circuit paths etc.
What are some popular Visual Diagramming software?
SmartDraw
Microsoft Visio
Gliffy
Creatly
Lucidchart
What are examples of Collaboration software?
Email Client Software
Conferencing Software
Email client Software:
lets you send and receive messages, manage your contacts and calendar, and assign yourself tasks with deadlines, with reminders given
What are the two giants in the commercial email client section?
Microsoft Outlook
IBM Notes
Conferencing Software:
can be phone calls or video calls
Videoconferencing:
making a call using your computer
has the ability to share screen and record
Telepresence:
making a video call seem like an authentic in person experience
What are commercial options for videoconferencing software?
Cisco WebEx
GoToMeeting
Fuze
join.me
Slack
Mikogo
Adobe Connect
What are free options for videoconferencing software?
Skype
Google Hangouts
Duo
UberConference
FaceTime
Camfrog
Voice over Internet Protocol (VoIP)
a group of technologies that work to deliver voice communications over the Internet or other data networks
Instant messaging:
sending a text note to another user in real-time
Online workspace:
means that multiple people can collaborate on the same file at the same time
involves sharing the screen of the file on which you are working with others
What are examples of cloud-based services?
Google Drive
Microsoft Office Online
Dropbox
IDrive
OpenDrive
What are some key features to look for when considering online document storage and sharing?
Storage and Upload Maximums
Backups
File Synchronization
File Encryption
Maintained Servers
Security Mechanisms
Mobile Platforms
Help and Support
Database:
contains data in a logical structure, which should make it easy to access
Project Management software:
provides a visual representation of tasks needed to complete a project
will let you create tasks and set dependencies
What are some popular project management software?
Zoho Projects
LiquidPlanner
Microsoft Project
Teamwork Projects
What are three examples of Business-Specific Software?
Desktop Publishing
Computer-Aided Drafting
Medical or Scientific Software
Desktop Publishing:
used to create books, magazines, pamphlets or flyers for distribution
What are examples of Desktop Publishing?
Microsoft Publisher
Adobe InDesign
QuarkXPress
Apple Pages
Image file Extensions:
.jpg
j-peg
defines how images are compressed and stored
Image file Extensions:
.gif
Graphics Interchange Format
better compression than .jpg and .gif
Image file Extensions:
.png
Portable Network Graphics
Designed to replace .gif
Image file Extensions:
.bmp
Bitmap
One of the oldest and simplest image formats
Computer-aided design (CAD):
used by designers of building and other structures as well as artists to create 2d and 3d drawings
Electronic Medical Records (EMR) or Electronic Health Records (EHR) package:
hold the patient’s medical records but also allow the provider to interface with medical testing equipment
What are the two major divisions of accounting (financial) software?
Professional use
Small business/home use
What are examples of accounting software?
Quicken
QuickBooks
Microsoft Money
iCash
Accounting (financial) software:
allows you to set and track budgets, manage your banking, plan investment choices and retirement savings, generate reports, and pay bills automatically
Utility Software:
used to manage services that are handy but not necessary to get a project done
Malware:
software that does harm to the computer
Anti-malware:
software that keeps malware off the machine
What are some popular anti-malware programs?
Symantec’s Norton Security
McAfee
AVG
Avast
Bitdefender
Kaspersky
Malwarebytes
Inoculating:
running an antivirus program on a computer to fight against virus
What do you need to know for removing bad software?
Identify malware symptoms
Quarantine the infected system
Remediate infect systems
Schedule scans and updates
Educate the end user
Firewall:
hardware or software solution that serves as your network’s security guard
configured to allow only packets (network data) that pass specific security restrictions to get through
What are the two ways that firewalls can protect you?
They protect your network resources from hackers
They prevent computers on your network from accessing undesirable content on the Internet
What are the two types of firewalls?
Network-based
Host-based
Network-based firewall:
designed to protect a whole network of computers
Host-based firewalls:
protect only one computer and are almost always software solutions
What are the two network connections that most network-based firewalls have?
the Internet (public side)
the internal network (private side)
Demilitarized Zone (DMZ):
the third network port for a second semi-internal network
used to connect servers that can be considered both public and private. such as web and email servers
Access Control List (ACL)
a set of rules that determines which traffic gets through the firewall and which traffic is blocked
Compression software:
removes redundant information within files and by doing so makes them smaller than their original size
can also take multiple files and compress them into the same archive, which can be uncompressed later and the original files retrieved
What are some popular compression software?
WinZip
WinRAR
PKZIP
7-Zip
gzip
Express Zip
File compression formats:
.rar
generated by Win RAR program
File compression formats:
.tar
Tape archive
used in UNIX and Linux
File compression formats:
.zip
the most common compression format
File compression formats:
.dmg
macOS disk image files
File compression formats:
.iso
Disk image archive files for optical media, such as CD-ROMs
File compression formats:
..7z
generated by 7-Zip program
File compression formats:
.gz
generated by gzip program
File compression formats:
.jar
Java archive
Portable Document Format (.pdf)
created in 1990s by Adobe Systems
document format that would work regardless of the user’s computer platform
normally read-only
can edit certain parts
International Organization for Standardization (ISO):
establishes standards for .pdf
Legacy browsers:
may have security holes or fewer features that can protect you as you browse the web
might not be compatible with some web applications
Plugin:
a piece of software that gives your browser additional functionality
What software components can be added to a browser to give it additional functionality?
Plugins
Add-ons
Toolbars
Extensions
Internet Service Providers (ISPs):
require users to access Internet sites through a proxy server
Proxy Server:
a server that makes requests on behalf of other computers
a gatekeeper for Internet access
can also block access to websites based on potentially dangerous or inappropriate content and log all traffic
Cookie:
a plain-text file that a web page stores on your hard disk for tracking purposes
can tell an advertiser that you’ve previously viewed a certain ad
can create rules for cookie handling
What are the two risks involved with cookies?
A cookie can deliver personally identifiable information to a website (privacy threat)
a virus or Trojan horse may copy a stored password from a cookie and deliver it to someone who can steal your login information for a site to commit identity theft or some other type of fraud (security threat)
Cache:
a temporary copy of settings that you had configured on websites, similar to preferences on the site
Scripts:
is rendered as a formatted web page by your web browser on your local PC
can create opportunities for hackers
can compromise privacy
can contain malicious code that infects your system
Client-side script:
the script executes on the client machine within the web browser
Pop-up:
an extra window that appears automatically when you display a certain web page or click a certain button on a page
often used to display advertisements or fake dialog boxes
Secure website:
uses Secure Sockets Layer (SSL) or Transport Layer Security (TLS) to encrypt transmission between the server and the client
How do you identify a secure website?
https:
a lock icon
the address bar or some text in green
Certificate authority (CA):
provides owners of sites a security certificate