Chapter 5 Flashcards

1
Q

What are the three areas that software developers need to think about?

A

Platforms

Delivery Methods

Architecture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the two ways to approach the development of cross-platform software?

A

Write complete sets of code for each platform

Use a special development toolkit or environments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the three options where the application can be installed and from what will it be executed?

A

Locally installed

Hosted on a local network (key data backed on server)

The Cloud (web based applications)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Application architecture:

A

defines how the app is executed- if it will run on one computer or if different components will run on different systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

n-tier architecture:

A

n is intended to be variable (number)

multiple tiers can help with scalability

each tier hosted on a different system (client server)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Presentation tier:

A

user interface (UI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Business logic tier:

A

coordinates between presentation and data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Data tier:

A

database or file system holding the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the advantages of a three-tier model?

A

Security

Scalability

Flexibility

Load balancing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Describe a two-tier architecture:

A

Usually a client-server model

has a workstation with a UI and the server hosting the other layers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the six alternatives to commercial software sales?

A

Freeware

Open Source

Shareware

Single Use

Concurrent

Corporate, Campus, Group, or Site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Freeware:

A

software that is completely free

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Open Source:

A

software that is free and the source code is shared and editable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Shareware:

A

software that provides a free trial, with the expectation that you’ll pay for it if you like and decide to keep it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Single Use Program:

A

commercial software for with the license restricts installation to a single user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Concurrent License:

A

allows software to be installed on may PCs but used concurrently by a smaller number them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Corporate, Campus, Group, or Site:

A

permits an organization to install the application on an agreed-upon number of PCs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Control Panel:

A

used to manage software that is already installed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are the three ways to get an application?

A

Optical disc

Flash drive

The Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Exe. or Msi. extension:

A

an executable Setup file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What are the three things you should do when installing software?

A

Read the instructions

Read the agreements

Be aware of advanced options

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is the trade-off of registering software?

A

Companies want to collect your personal information for marketing purposes

You may be eligible for discounts on new versions, free updates, and other goods

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Activation:

A

examines the hardware on your system and generates a code that describes the hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What the steps for an unclean uninstallation?

A

Make sure that the application isn’t running

Delete the folder containing the program files

Delete the program’s icons or folders from the Start menu

If you have enough information to know what to delete in the registry, start the Registry Editor and make the needed changes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Load balancing:
load can be shared among servers in case one server gives up
26
Service pack:
typically alters the inner workings of the OS in a deeper way than a regular update
27
What are the three groups of software to know?
Productivity Collaboration Business
28
File extension:
tells you a little about the file tells the OS what to do with the file
29
Executables
Extensions designed to execute a program directly
30
Common executable file extensions: .exe
Execute a program with Windows
31
Common executable file extensions: .msi
Microsoft Installation for installation and removal
32
Common executable file extensions: .app
Execute a program with macOS
33
Common executable file extensions: .bat
Batch file used to execute multiple commands from the Windows command prompt within one file
34
Common executable file extensions: .scexe
Self-extracting firmware updates that Hewlett-Packard produces commonly associated with Linux machines
35
Multipurpose Internet Mail Extensions (MIME):
Windows ignores MIME type UNIX, Linux, and macOS read the MIME type when a file is opened
36
Productivity Software
software that helps get more work done easier
37
What software makes up productivity software?
Word processing software Spreadsheet software Presentation software Visual Diagramming Software
38
What are commercial offerings of word processing software?
Corel WordPerfect Corel Write Microsoft Word
39
What are free offerings of word processing software?
Google Docs AbiWord Jarte LibreOffice
40
Word processing file extensions: .txt
Basic text file Almost all word processors will open
41
Word processing file extensions: .rtf
Rich-text format develops by Microsoft and generally more compatible than .doc files
42
Spreadsheet Software:
Mostly used for managing numbers or lists of data mostly bundled with word processing software
43
Presentation software:
designed to help put your ideas in slides so you can share a full-screen slide show from your computer
44
Visual diagramming software:
can also create charts and graphs, as well as floor plans or circuit paths etc.
45
What are some popular Visual Diagramming software?
SmartDraw Microsoft Visio Gliffy Creatly Lucidchart
46
What are examples of Collaboration software?
Email Client Software Conferencing Software
47
Email client Software:
lets you send and receive messages, manage your contacts and calendar, and assign yourself tasks with deadlines, with reminders given
48
What are the two giants in the commercial email client section?
Microsoft Outlook IBM Notes
49
Conferencing Software:
can be phone calls or video calls
50
Videoconferencing:
making a call using your computer has the ability to share screen and record
51
Telepresence:
making a video call seem like an authentic in person experience
52
What are commercial options for videoconferencing software?
Cisco WebEx GoToMeeting Fuze join.me Slack Mikogo Adobe Connect
53
What are free options for videoconferencing software?
Skype Google Hangouts Duo UberConference FaceTime Camfrog
54
Voice over Internet Protocol (VoIP)
a group of technologies that work to deliver voice communications over the Internet or other data networks
55
Instant messaging:
sending a text note to another user in real-time
56
Online workspace:
means that multiple people can collaborate on the same file at the same time involves sharing the screen of the file on which you are working with others
57
What are examples of cloud-based services?
Google Drive Microsoft Office Online Dropbox IDrive OpenDrive
58
What are some key features to look for when considering online document storage and sharing?
Storage and Upload Maximums Backups File Synchronization File Encryption Maintained Servers Security Mechanisms Mobile Platforms Help and Support
59
Database:
contains data in a logical structure, which should make it easy to access
60
Project Management software:
provides a visual representation of tasks needed to complete a project will let you create tasks and set dependencies
61
What are some popular project management software?
Zoho Projects LiquidPlanner Microsoft Project Teamwork Projects
62
What are three examples of Business-Specific Software?
Desktop Publishing Computer-Aided Drafting Medical or Scientific Software
63
Desktop Publishing:
used to create books, magazines, pamphlets or flyers for distribution
64
What are examples of Desktop Publishing?
Microsoft Publisher Adobe InDesign QuarkXPress Apple Pages
65
Image file Extensions: .jpg
j-peg defines how images are compressed and stored
66
Image file Extensions: .gif
Graphics Interchange Format better compression than .jpg and .gif
67
Image file Extensions: .png
Portable Network Graphics Designed to replace .gif
68
Image file Extensions: .bmp
Bitmap One of the oldest and simplest image formats
69
Computer-aided design (CAD):
used by designers of building and other structures as well as artists to create 2d and 3d drawings
70
Electronic Medical Records (EMR) or Electronic Health Records (EHR) package:
hold the patient's medical records but also allow the provider to interface with medical testing equipment
71
What are the two major divisions of accounting (financial) software?
Professional use Small business/home use
72
What are examples of accounting software?
Quicken QuickBooks Microsoft Money iCash
73
Accounting (financial) software:
allows you to set and track budgets, manage your banking, plan investment choices and retirement savings, generate reports, and pay bills automatically
74
Utility Software:
used to manage services that are handy but not necessary to get a project done
75
Malware:
software that does harm to the computer
76
Anti-malware:
software that keeps malware off the machine
77
What are some popular anti-malware programs?
Symantec's Norton Security McAfee AVG Avast Bitdefender Kaspersky Malwarebytes
78
Inoculating:
running an antivirus program on a computer to fight against virus
79
What do you need to know for removing bad software?
Identify malware symptoms Quarantine the infected system Remediate infect systems Schedule scans and updates Educate the end user
80
Firewall:
hardware or software solution that serves as your network's security guard configured to allow only packets (network data) that pass specific security restrictions to get through
81
What are the two ways that firewalls can protect you?
They protect your network resources from hackers They prevent computers on your network from accessing undesirable content on the Internet
82
What are the two types of firewalls?
Network-based Host-based
83
Network-based firewall:
designed to protect a whole network of computers
84
Host-based firewalls:
protect only one computer and are almost always software solutions
85
What are the two network connections that most network-based firewalls have?
the Internet (public side) the internal network (private side)
86
Demilitarized Zone (DMZ):
the third network port for a second semi-internal network used to connect servers that can be considered both public and private. such as web and email servers
87
Access Control List (ACL)
a set of rules that determines which traffic gets through the firewall and which traffic is blocked
88
Compression software:
removes redundant information within files and by doing so makes them smaller than their original size can also take multiple files and compress them into the same archive, which can be uncompressed later and the original files retrieved
89
What are some popular compression software?
WinZip WinRAR PKZIP 7-Zip gzip Express Zip
90
File compression formats: .rar
generated by Win RAR program
91
File compression formats: .tar
Tape archive used in UNIX and Linux
92
File compression formats: .zip
the most common compression format
93
File compression formats: .dmg
macOS disk image files
94
File compression formats: .iso
Disk image archive files for optical media, such as CD-ROMs
95
File compression formats: ..7z
generated by 7-Zip program
96
File compression formats: .gz
generated by gzip program
97
File compression formats: .jar
Java archive
98
Portable Document Format (.pdf)
created in 1990s by Adobe Systems document format that would work regardless of the user's computer platform normally read-only can edit certain parts
99
International Organization for Standardization (ISO):
establishes standards for .pdf
100
Legacy browsers:
may have security holes or fewer features that can protect you as you browse the web might not be compatible with some web applications
101
Plugin:
a piece of software that gives your browser additional functionality
102
What software components can be added to a browser to give it additional functionality?
Plugins Add-ons Toolbars Extensions
103
Internet Service Providers (ISPs):
require users to access Internet sites through a proxy server
104
Proxy Server:
a server that makes requests on behalf of other computers a gatekeeper for Internet access can also block access to websites based on potentially dangerous or inappropriate content and log all traffic
105
Cookie:
a plain-text file that a web page stores on your hard disk for tracking purposes can tell an advertiser that you've previously viewed a certain ad can create rules for cookie handling
106
What are the two risks involved with cookies?
A cookie can deliver personally identifiable information to a website (privacy threat) a virus or Trojan horse may copy a stored password from a cookie and deliver it to someone who can steal your login information for a site to commit identity theft or some other type of fraud (security threat)
107
Cache:
a temporary copy of settings that you had configured on websites, similar to preferences on the site
108
Scripts:
is rendered as a formatted web page by your web browser on your local PC can create opportunities for hackers can compromise privacy can contain malicious code that infects your system
109
Client-side script:
the script executes on the client machine within the web browser
110
Pop-up:
an extra window that appears automatically when you display a certain web page or click a certain button on a page often used to display advertisements or fake dialog boxes
111
Secure website:
uses Secure Sockets Layer (SSL) or Transport Layer Security (TLS) to encrypt transmission between the server and the client
112
How do you identify a secure website?
https: a lock icon the address bar or some text in green
113
Certificate authority (CA):
provides owners of sites a security certificate