Block 3 - Unit 1

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/61

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

62 Terms

1
New cards

Operating System

is the backbone of a computer system, serving as the intermediary between the user and the computer hardware.e refers to a collection of instructions and data that tell a computer how to perform specific tasks.

2
New cards

Software

refers to a collection of instructions and data that tell a computer how to perform specific tasks.

3
New cards

System software

which includes the operating system and utility programs, is designed to manage, and control the hardware and provide a platform for running application software

4
New cards

Application software

is software that is written to supplement the commands available to a particular OS. This type of software refers to programs that perform specific tasks for users.

5
New cards

Drivers

are specific software components written for the purpose of instructing a particular operating system or other software applications on how to access a piece of hardware.

6
New cards

Command Line Interface (CLI)

is text-based, requiring users to type commands into a terminal or command prompt to perform tasks.

7
New cards

Graphical User Interface (GUI)

is a method by which a person communicates with a computer using visual components, such as menus and icons.

8
New cards

Network

refers to the interconnection of a group/collection of computing devices (such as computers, servers, printers, and other devices) to share resources and communicate with each other.

9
New cards

Domain

is a network of computers and devices that are controlled by one set authority and have specific guidelines.

10
New cards

Software Version

A particular revision of a piece of software.

11
New cards

Source Code

The actual code that defines how a piece of software works.

12
New cards

Shell

A software program used to interpret commands that are input via a command-line interface, enabling users to interact with a computer by giving it instructions.

13
New cards

Local Computer

This is the computer you are using.

14
New cards

32-Bit Operating System

This refers to how it handles data. __________ can handle a maximum of 4GB of RAM. (This is calculated by 232 which equates to 4GB)

15
New cards

64-Bit Operating System

can address significantly more RAM, often TB worth. Offers improved performance such as video editing and 3D rendering.

16
New cards

Server operating systems

allow for the sharing of information and applications by workstation operating systems

17
New cards

Workstation operating systems

allow end users to access information and applications on server operating systems as well as independently run applications locally

18
New cards

Mobile operating systems

are found on mobile devices such as phones and tablets

19
New cards

Cloud-based operating systems

designed for operating within cloud computing and virtualization environments.

20
New cards

Hardware Compatibility List (HCL)

is a list of all the hardware that works with the operating system.

21
New cards

Remote Access Tools (RATs)

are software applications that allow users to access and control a computer or device from a distance.

22
New cards

Remote Desktop Protocol (RDP)

is a proprietary protocol developed by Microsoft which provides a user with a graphical interface to connect to another computer over a network connection.

23
New cards

Base Software License Management (BSLM) Program

is a structured initiative designed to ensure that all software used within the base complies with licensing agreements and regulatory requirements.

24
New cards

Commercial off the Shelf (COTS)

Personnel are required to use these software to increase productivity and overall organizational effectiveness.

25
New cards

Government off the Shelf (GOTS)

Organizations must maintain a hard or soft copy of the software license inventory and “Proof-of-License Ownership” of these software in use within their organization.

26
New cards

System Software

is used for operating computer hardware and is installed on the computer when the operating system is installed.

27
New cards

Application Software

is used by a user to perform a specific task and is installed according to a user's requirements.

28
New cards

CS Commander

Who implements licensed commercial-off-the-shelf (COTS) or other software for local requirements not fulfilled by enterprise software licensing?

29
New cards

BSLM

Who ensures outgoing and incoming USLMs conduct a joint inventory of all licensed software and endorse all inventories upon departures?

30
New cards

Software Development Life Cycle (SDLC)

outlines the major phases to developing an application.

31
New cards

Requirements gathering and analysis

The first phase involves collecting the requirements for the application.

32
New cards

Design

you then work on designing the application based on the requirements.

33
New cards

Implementation

also known as the coding phase. During this phase, you write the code for the application.

34
New cards

Testing

you then must test the code to verify the code does what it is supposed to.

35
New cards

Deployment

After testing, you are ready to install (deploy) the application to the system or systems that need to have the application.

36
New cards

Maintenance

You will need to fix any problems that arise with the application in this phase.

37
New cards

Waterfall

In this model, you progress through each phase of the SDLC without the capability of going backward in phases at any time. The point is that you must be sure to complete each phase to its fullest so that there is no need to go back.

38
New cards

Agile

In this model, you can take a more iterative approach and go to a previous phase if you realize something was missed or needs to be reworked.

39
New cards

Copyright

The legal right granted to an author or inventor to exclusive publication, production, sale, or distribution of a literary, musical, dramatic, or artistic work

40
New cards

License Agreements

Contracts between the software publisher and the user that defines and limits the software use.

41
New cards

Enterprise License

This allows the purchasing organization to use multiple copies of a specific COTS software program, usually up to a specified number.

42
New cards

Enterprise Software Agreement (ESA)

Agreements, such as contracts or blanket purchase agreements list

43
New cards

Air Force Evaluated Product List (AEAPL)

One of the essential tools for any CST is the enterprise product

44
New cards

Certification

The act of determining that software performs without defects and viruses and certifies that that software will do what it is intended to do.

45
New cards

Software Piracy

Unauthorized copying or distribution of copyrighted software

46
New cards

Corporate or end-user piracy

Making additional copies of the software without having the proper number of licenses. For instance, one licensed copy is available, yet five additional copies are made from it.

47
New cards

Internet Piracy

Providing access to software, key generators,and activation keys; the provider is offering a copy; back-up copies may not be distributed. The product is unreleased or beta version.

48
New cards

Subscription Licensing piracy

Using subscription licensed software past the expiration date.

49
New cards

Counterfeiting

Where one attempts to copy the product and packaging so that it looks like an original.

50
New cards

Windows Update Tool

Ensures the most current security updates/patches are being pushed to your computer.

51
New cards

Task Scheduler

accessible through the Computer Management console, allows IT administrators to automate essential maintenance tasks such as system updates, backups, and disk defragmentation

52
New cards

Event Viewer

is another vital tool for enterprises. This tool enables IT staff to monitor and analyze system, application, and security logs across the network.

53
New cards

Disk Management

within the Computer Management console allows administrators to efficiently manage storage resources by creating, formatting, and resizing partitions, ensuring optimal use of disk space across the enterprise’s IT infrastructure.

54
New cards

Device Manager

a key component of Computer Management, provides detailed information about all hardware components and peripherals connected to each workstation. IT administrators can use it to update drivers, troubleshoot hardware issues, and manage device settings, ensuring that all hardware operates correctly and efficiently.

55
New cards

Services and Applications tool

allows administrators to control and configure system services, manage startup programs, and monitor system performance.

56
New cards
57
New cards
58
New cards
59
New cards
60
New cards
61
New cards
62
New cards