1/61
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Operating System
is the backbone of a computer system, serving as the intermediary between the user and the computer hardware.e refers to a collection of instructions and data that tell a computer how to perform specific tasks.
Software
refers to a collection of instructions and data that tell a computer how to perform specific tasks.
System software
which includes the operating system and utility programs, is designed to manage, and control the hardware and provide a platform for running application software
Application software
is software that is written to supplement the commands available to a particular OS. This type of software refers to programs that perform specific tasks for users.
Drivers
are specific software components written for the purpose of instructing a particular operating system or other software applications on how to access a piece of hardware.
Command Line Interface (CLI)
is text-based, requiring users to type commands into a terminal or command prompt to perform tasks.
Graphical User Interface (GUI)
is a method by which a person communicates with a computer using visual components, such as menus and icons.
Network
refers to the interconnection of a group/collection of computing devices (such as computers, servers, printers, and other devices) to share resources and communicate with each other.
Domain
is a network of computers and devices that are controlled by one set authority and have specific guidelines.
Software Version
A particular revision of a piece of software.
Source Code
The actual code that defines how a piece of software works.
Shell
A software program used to interpret commands that are input via a command-line interface, enabling users to interact with a computer by giving it instructions.
Local Computer
This is the computer you are using.
32-Bit Operating System
This refers to how it handles data. __________ can handle a maximum of 4GB of RAM. (This is calculated by 232 which equates to 4GB)
64-Bit Operating System
can address significantly more RAM, often TB worth. Offers improved performance such as video editing and 3D rendering.
Server operating systems
allow for the sharing of information and applications by workstation operating systems
Workstation operating systems
allow end users to access information and applications on server operating systems as well as independently run applications locally
Mobile operating systems
are found on mobile devices such as phones and tablets
Cloud-based operating systems
designed for operating within cloud computing and virtualization environments.
Hardware Compatibility List (HCL)
is a list of all the hardware that works with the operating system.
Remote Access Tools (RATs)
are software applications that allow users to access and control a computer or device from a distance.
Remote Desktop Protocol (RDP)
is a proprietary protocol developed by Microsoft which provides a user with a graphical interface to connect to another computer over a network connection.
Base Software License Management (BSLM) Program
is a structured initiative designed to ensure that all software used within the base complies with licensing agreements and regulatory requirements.
Commercial off the Shelf (COTS)
Personnel are required to use these software to increase productivity and overall organizational effectiveness.
Government off the Shelf (GOTS)
Organizations must maintain a hard or soft copy of the software license inventory and “Proof-of-License Ownership” of these software in use within their organization.
System Software
is used for operating computer hardware and is installed on the computer when the operating system is installed.
Application Software
is used by a user to perform a specific task and is installed according to a user's requirements.
CS Commander
Who implements licensed commercial-off-the-shelf (COTS) or other software for local requirements not fulfilled by enterprise software licensing?
BSLM
Who ensures outgoing and incoming USLMs conduct a joint inventory of all licensed software and endorse all inventories upon departures?
Software Development Life Cycle (SDLC)
outlines the major phases to developing an application.
Requirements gathering and analysis
The first phase involves collecting the requirements for the application.
Design
you then work on designing the application based on the requirements.
Implementation
also known as the coding phase. During this phase, you write the code for the application.
Testing
you then must test the code to verify the code does what it is supposed to.
Deployment
After testing, you are ready to install (deploy) the application to the system or systems that need to have the application.
Maintenance
You will need to fix any problems that arise with the application in this phase.
Waterfall
In this model, you progress through each phase of the SDLC without the capability of going backward in phases at any time. The point is that you must be sure to complete each phase to its fullest so that there is no need to go back.
Agile
In this model, you can take a more iterative approach and go to a previous phase if you realize something was missed or needs to be reworked.
Copyright
The legal right granted to an author or inventor to exclusive publication, production, sale, or distribution of a literary, musical, dramatic, or artistic work
License Agreements
Contracts between the software publisher and the user that defines and limits the software use.
Enterprise License
This allows the purchasing organization to use multiple copies of a specific COTS software program, usually up to a specified number.
Enterprise Software Agreement (ESA)
Agreements, such as contracts or blanket purchase agreements list
Air Force Evaluated Product List (AEAPL)
One of the essential tools for any CST is the enterprise product
Certification
The act of determining that software performs without defects and viruses and certifies that that software will do what it is intended to do.
Software Piracy
Unauthorized copying or distribution of copyrighted software
Corporate or end-user piracy
Making additional copies of the software without having the proper number of licenses. For instance, one licensed copy is available, yet five additional copies are made from it.
Internet Piracy
Providing access to software, key generators,and activation keys; the provider is offering a copy; back-up copies may not be distributed. The product is unreleased or beta version.
Subscription Licensing piracy
Using subscription licensed software past the expiration date.
Counterfeiting
Where one attempts to copy the product and packaging so that it looks like an original.
Windows Update Tool
Ensures the most current security updates/patches are being pushed to your computer.
Task Scheduler
accessible through the Computer Management console, allows IT administrators to automate essential maintenance tasks such as system updates, backups, and disk defragmentation
Event Viewer
is another vital tool for enterprises. This tool enables IT staff to monitor and analyze system, application, and security logs across the network.
Disk Management
within the Computer Management console allows administrators to efficiently manage storage resources by creating, formatting, and resizing partitions, ensuring optimal use of disk space across the enterprise’s IT infrastructure.
Device Manager
a key component of Computer Management, provides detailed information about all hardware components and peripherals connected to each workstation. IT administrators can use it to update drivers, troubleshoot hardware issues, and manage device settings, ensuring that all hardware operates correctly and efficiently.
Services and Applications tool
allows administrators to control and configure system services, manage startup programs, and monitor system performance.