1.7 Given a scenario, apply application installation and configuration concepts

//1.7 Given a scenario, apply application installation and configuration concepts
1.7 Given a scenario, apply application installation and configuration concepts2022-08-21T06:50:31+00:00

1.7 Given a scenario, apply application installation and configuration concepts

  • System Requirements for Applications
    • 32-bit vs 64-bit Dependent Application Requirements
    • Dedicated Graphics Cards vs Integrated
    • Video Random-Access Memory (VRAM) Requirements
    • RAM Requirements
    • Central Processing Unit (CPU) Requirements
    • External Hardware Tokens
    • Storage Requirements
  • OS Requirements for Applications
    • Application to OS Compatibility
    • 32-bit vs 64-bit OS
  • Distribution Methods
    • Physical Media vs Downloadable
    • ISO Mountable
  • Other Considerations for New Applications
    • Impact to Device
    • Impact to Network
    • Impact to Operation
    • Impact to Business

Installation Consideration

Before you install a new program, check the following

  • Ensure that your computer has adequate hardware

    • Do you have enough hard drive space to install the program?  Do you have enough space to store all the user data that the program is going to generate?  Do you require a solid-state drive (how much hard drive activity will the program generate)?

    • Do you have enough RAM?

    • Is your processor fast enough?  Does it have enough cores?

    • Do you need other hardware such as a dedicated graphics card?  If so, how much RAM does your graphics card require?  Applications that handle video editing or CAD require dedicated graphics cards.  Other applications might be happy with an integrated graphics card.

    • Does your program require an external hardware token?  Some programs force you to connect a USB security token to use the program.  This helps prevent piracy.  The USB token requires special drivers.

  • Ensure that you have the correct OS Requirements

    • Do you have the correct operating system (Windows, macOS, Linux, etc.)?

    • Do you have correct operating system version (Windows 7, Windows 10, etc.)?  Some programs will only run on Windows Pro.

    • Do you have the correct operating system type (32-bit, 64-bit)?  Some programs will only run on 32-bit operating systems, and some will only run on 64-bit operating systems, and some will run on both.

  • How will you install the software?

    • Back in the day, the most common method was via a CD/DVD.  The internet was not a good way to distribute software because connections were slow.

    • You might also get a copy of the program via USB.

      • We can make an exact copy of a CD/DVD or USB and distribute it over the network.  This copy is stored in a file called an ISO. 

        To open the ISO, we use another application – this process is called mounting the ISO.  When we mount the ISO, it appears like a separate drive and behaves like the original USB.

    • Most programs are now available for download via the internet.  Just download the program and install it. 

    • In a Windows enterprise environment, the IT department might set up software “packages”.  A package is a software application bundled with updates and specific configurations.  The package can be “pushed” to a user’s computer via the network and installed in the background.

  • Local User Permissions

    • You must have administrator rights to install the program.

    • You must also have permission to write to the folders that the program files will be copied to

  • Security Considerations

    • Before you install the program, make sure that it is digitally signed and from a reputed publisher.  The digital signature allows us to verify that the program was not modified.  Windows will warn you if you try to install an unsigned application.

    • After installation, some programs want to run with administrator privileges.  If the program requires administrator privileges, then so do you.  Running a program with administrator privileges may pose a security risk.

    • A program might send data over the network or leak data.  Verify whether the program has modified any firewall rules.

  • Other Implications

    • Impact to Device.  How will the program impact the device’s RAM, processor, and hard disk drive?

    • Impact to Network.  How will the program impact the network?  How much data will the program transmit and receive?

Impact to Business.  How will the program impact the business?  Are there security risks?  How much value will the program deliver to the business?  What is the risk if we don’t install it?