Flashcards in Support Essentials 10.9 Deck (192)
Which OS X application is responsible for the creation and management of disk images?
Disk Utility is the primary application for creating and managing disk images.
Why would one use an archive file over a disk image? Why would one use a disk image over an archive file?
Archive files are much simpler to create in the Finder and are compatible with third-party operating systems. Disk images are more difficult to create and manage, but they offer greater flexibility. Primarily, disk images can be easily modified and converted. However, OS X style disk images aren’t compatible with third-party operating systems.
What backup destination disks does Time Machine support?
Time Machine can back up to any Mac OS Extended volume or network shares hosted from Time Capsule or OS X Server.
How does Time Machine maintain a backup history of the file system?
Time Machine starts with a full copy of the file system to the backup disk. Then it maintains a list of changes to the file system, and every hour copies only the changes to the backup disk. In the backup, it creates a simulation of the full file system using hard links for files that haven’t changed.
What types of files are omitted from Time Machine backups?
Time Machine always ignores temporary files, Spotlight indexes, items in the Trash, log files, and anything else that can be considered a cache. Time Machine also ignores any files an application has defined as exempt, or any files you have defined as exempt in Time Machine preferences.
Why is Time Machine inefficient at backing up large databases?
Time Machine is inefficient at backing up large databases because it must back up the entire database file every time any change, no matter how small, is made to the database.
Why might a previously backed-up item no longer be available in Time Machine?
A previously backed-up item won’t be available if your backup volume filled up and Time Machine had to start deleting older items to make room for newer items.
What four methods can be used to restore from a Time Machine backup?
Methods for restoring from a Time Machine backup include:
• Navigating through the backup history via the Time Machine application
• Restoring a user account via Migration Assistant
• Restoring an entire system via OS X Recovery
• Manually restoring items via the Finder
What are the requirements for purchasing applications via the Mac App Store?
The requirements to purchase items from the Mac App Store are OS X v10.6.6 or later, an Apple ID, an Internet connection, and authorization as a local administrator.
In the Mac App Store, how can you verify which Apple ID is being used for purchases?
In the Mac App Store, you can view the current Apple ID by selecting Store from the menu bar. You can get further details regarding this Apple ID, by selecting View My Account in the same menu.
What are the four primary application environments supported by OS X? Which ones require an additional download and installation?
The four primary application environments supported by OS X are:
• Native OS X applications, which are created using Cocoa
• UNIX applications, which are primarily accessed via Terminal
• Java applications, which work as cross-platform applications
• X Window System applications, which run inside the popular UNIX windowing environment
OS X doesn’t include the Java application or X Window System runtime, so they must be downloaded and installed after the OS X initial installation.
What are the advantages of application sandboxing?
Sandboxed applications are only allowed access to specific items. They’re otherwise completely cut off from the rest of the system, so they can’t cause harm. All Mac App Store applications are required to be sandboxed.
What are the advantages of code signing?
Code-signed items include a digital signature that the system can use to verify the authenticity and integrity of the application or process and its resources.
Which items fall under the file quarantine system?
Any item downloaded using one of the built-in OS X applications will be marked for quarantine. Third-party applications may not mark downloaded items for quarantine.
What three security options does the Gatekeeper system allow? Which Gatekeeper option is the OS X default?
Gatekeeper can restrict software to Mac App Store applications only, or Mac App Store and identified developer applications only (this is the default option), or any application regardless of origin.
What are the two primary traditional installation methods in OS X?
Traditional installation methods are generally categorized as either a drag-and-drop installation, where the user simply copies the application to the local system; or as an installation package, where an installer process places the items on the local system.
What three methods can be used to uninstall applications?
Three methods for uninstalling applications include:
• Open Launchpad, hold down the Option key, and click the “X” button
• In the Finder, drag the primary application to the Trash and then empty the Trash
• Use a custom-built uninstaller package
In OS X, what’s used to identify the type of application that should open when you double-click a document?
OS X uses a document’s filename extension to determine the document’s type. The Launch Services process maintains a database of installed applications and which document types they’re capable of opening.
How do you engage Quick Look? Which applications support it?
Quick Look is engaged by simply pressing the Space bar when a document is selected. Applications that support Quick Look include the Finder, Time Machine, Mail, and most open and save browser dialogs.
How is Quick Look able to preview so many file types?
Quick Look uses a number of plug-ins that give it the capability to preview documents. These plug-ins live in Quick Look folders in any Library folder on OS X.
What’s Auto Save? How can you identify an application that supports Auto Save?
Auto Save allows compatible OS X applications to automatically save changes to users’ documents. A user just saves a document once, then never has to think about saving changes again. Applications that support Auto Save feature a Duplicate function in the File menu as opposed to a default Save As function.
How deep is the version history of a file when shared via email?
Documents sent via email or otherwise copied to a shared location don’t retain any version history.
Which applications can manage document locking?
Any application that supports Auto Save and the Finder can manage document locking.
What interface is the default location for managing documents in iCloud?
Documents saved to iCloud can be managed from the application that was used to create and save the document. iCloud documents don’t appear anywhere in the Finder that a user would normally look
Where can you adjust application Auto Save and Resume options?
You can deselect the option to “Reopen windows when logging back in” from the logout verification dialog. You can deselect the option to “Close windows when quitting an application” from General preferences. Also from General preferences, you can select the option to “Ask to keep changes when closing documents,” which turns off the Auto Save feature.
What’s protected memory? What’s 64-bit memory addressing?
The system keeps applications from interfering with one another by segregating their memory usage using protected memory. Mac computers with 64-bit-capable processors allow processes to run in 64-bit mode, which allows them to individually access more than 4 GB of memory.
Why would you want to open an application in 32-bit mode?
Using the Finder Info window you can force an application to open in 32-bit mode. This step is necessary for a 64-bit application to support older 32-bit plug-ins or application resources.
How can you identify which applications are installed on your Mac?
You can use the System Information application to easily scan all the appropriate application locations and return a list of installed applications.
Which application is used to examine open applications on OS X?
The Activity Monitor application is used to monitor open processes and applications.