Lesson 16: Install Applications Flashcards

1
Q

What are the requirements for purchasing applications via the Mac App Store?

A

To purchase items from the Mac App Store you need Mac OS X Snow Leopard v10.6.6 or later, an Apple ID, an Internet connection, and authorization as a local administrator.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

In the Mac App Store, how can you verify which Apple ID is currently being used for purchases?

A

In the Mac App Store, you can view the current Apple ID by selecting Store from the menu bar.

You can get further details on this Apple ID by selecting View My Account in the same menu.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How many Apple IDs can be part of a Family Sharing group?

A

Up to six Apple IDs can be part of one Family Sharing group.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the four primary application environments supported by macOS? Which ones require an additional download and installation?

A

The four primary application environments supported by macOS are:

  1. Native macOS applications
  2. UNIX applications, which are primarily accessed via Terminal
  3. Java applications, which work as cross-platform applications
  4. X Window System applications (X Window is a popular UNIX windowing environment).

macOS does not include the Java application runtime or the X Window System runtime, so they must be downloaded and installed after the macOS initial installation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the advantages of application sandboxing?

A

Sandboxed applications are allowed access only to specific items.

They are otherwise completely cut off from the rest of the system, and are therefore unable to cause undue harm.

All Mac App Store applications are required to be sandboxed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the advantages of code signing?

A

Code-signed items include a digital signature that the system can use to verify the authenticity and integrity of the application or process and its resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which items fall under the file quarantine system?

A

Any item downloaded using one of the built-in macOS applications will be marked for quarantine.

Third-party applications may not mark downloaded items for quarantine.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What two Gatekeeper options are available in Security & Privacy preferences?

Which Gatekeeper option is the macOS default?

A

The Gatekeeper options in Security & Privacy preferences limit downloaded software to Mac App Store applications, or to Mac App Store and identified developer applications (this latter option is the default).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the two primary traditional installation methods in macOS?

A

Traditional installation methods are generally categorized as either a drag-and-drop installation, where you copy the application to the local system, or as an installation package, where an installer process places the items on the local system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What three methods can be used to uninstall applications?

A

Three methods for uninstalling applications are to:

  1. Open Launchpad, hold down the Option button, and then click the X button
  2. In the Finder, drag the primary application to the Trash and then empty the Trash
  3. Open a custom-built uninstaller package (most rare)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly