Installing applications allow you to enhance the functionality of the operating system.
System requirements
Not every computer can run every application. You’ll need to check the requirements of the software to see if it is compatible with your system.
Drive space
You’ll need to make sure that you have enough drive space to accommodate the actual size of the application. But you also need to take into account the drive space that will be needed when you actually use the application. For example, a word processing application needs a place to store the created word documents. Some applications can use a lot of drive space after installation. Video editing projects can take up gigabytes of storage.
RAM
RAM is also important when examining software requirements. You’ll need enough RAM to run your operating system in addition to the amount of RAM needed to run the application. The amount of RAM needed varies depending on the application. If you’re running multiple applications simultaneously, you’ll need enough memory to support all these applications running at hte same time.
OS requirements
Before installing an application, check to see what its operating system requirements are.
Compatibility
Many applications are written for a specific edition or type of operating system. For example, an application might have been written for 64 bit versions of Windows, and therefore 32 bit versions of WIndows may be incompatible. Additionally, programs developed for Windows 10 may not work on Windows 7 operating systems.
Methods of installation and deployment
Once you’ve established that your hardware is compatible and meets the requirements of the software, you then have multiple methods of actually installing the application.
Local (CD/USB)
The first method of installing an application is locally. THe installation program and the computer are all in the same place. You can download the executable from the Internet and install the application from the computer’s hard drive or a storage device on that computer.
If you buy an application from a third party, they may provide you with the application on a CD-ROM, DVD-ROM, or other form of optical media.
Large programs might even be distributed on a USB flash drive. The flash drive can then be plugged into any USB port and then you’d install the application on your local machine.
Network-based
Network based installation methods are commonly used in organizational business environments where it would be inconvenient for someone to physically visit each workstation to install an application for a large number of computers. Instead, the applications may be located on one central server, and applications are then staged and deployed from that central server. Application installations are taking place across the network rather than locally taking the media to the computer.
Network based installation allows for central management so that an administrator can go to one place to manage the application, such as when there is an update or upgrade to the application.
Local user permissions
Folder/file access for installation
During installation, the program that installs the application needs proper access to store the files on the computer. In some cases, especially in business organizations, the user doesn’t have permission, so that the user is unable to install unauthorized applications. Therefore a system administrator would be needed to provide credentials so that the application can be installed.
Some applications may need to install additional drivers or services, and thus the application installer may need to be run as Administrator.
Security considerations
Security should always be taken into account when installing an application. Applications have the same rights and permission as the user. Every program has the potential to do something bad to the operating system, data, or your applications. Make sure you know exactly where your application came from.
Impact to device
A malicious application can cause the operating system to slow down or stop functioning. It can delete or encrypt files.
Impact to network
Malicous applications can even go across the network to access even more data. The user could have access to internal services or shared files, and the malicious software would then have access to that data as well.