Install Apps Flashcards
What are the six Apple services that are bundled with Apple One?
- Apple Music
- Apple TV+
- Apple Arcade
- iCloud
- Apple News+
- Apple Fitness+
What are the 8 tabs that you can click through in the App Store?
- Discover (Command-1)
- Arcade (Command-2)
- Create (Comand-3)
- Work (Command-4)
- Play (Command-5)
- Develop (Command-6)
- Categories (Command-7)
- Updates (Command-8)
True/False: If you have a Mac with Apple silicon, you can install apps designed for iPhone and iPad
True
True/False: To download free apps from the App Store, you don’t need to have an Apple ID
False. You still need an Apple ID for free apps
How can apps purchased on one Mac be installed on another Mac you use?
- You can enable Automatica downloads of purchased apps on your other Mac.
- If you are signed into the App Store with the same Apple ID as the other Mac, the app will be able to be re-downloaded.
Which programs allow business and educational institutions to acquire multiple licenses for App Store items?
Apple Business Manager and Apple School Manager
What are the 5 apps that come preinstalled on new Mac computers?
- iMovie
- Garageband
- Pages
- Numbers
- Keynote
What are three unique things about the preinstalled Apps that come installed with new Macs?
- They aren’t automatically installed when you erase a volume and reinstall macOS
- Are available in the App Store for free
- Require someone to adopt them (enter an Apple ID to associate the app license with that Apple ID) before you can install an update to them.
How many Apple ID’s can be part of a Family Sharing group?
Up to 6
How can you view/download apps purchased by other people in your Family Sharing plan?
In the App Store, you can switch between family members under the “Purchased By” tab
From which two sources does macOS allow you to open apps by default?
- The App Store
2. Trusted developers
What are the 6 security technologies the Mac uses to help protect users when they install third-party apps?
- Process security
- App sandboxing
- Code signing
- Notarization
- File quarantine
- Maleware detection
In regards to security technologies, what is Process Security?
Security mechanisms, including SIP, that prevent access to resources unless specifically allowed. Systemwide privileges are allowed only when needed
In regards to security technologies, what is App Sandboxing?
When apps are granted access only to the items they need, which helps prevent an app from accessing files owned by a user.
In regards to security technologies, what is Code signing?
When the system needs to verify the authenticity and integrity of the software.