• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Installation of a computer.

Extracts from this document...

Introduction

Basic Procedure for Setting up Equipment Connecting it all together Connect up your cables for the keyboard, mouse, VDU and other hardware devices. Once you have done this, plug the computer into the main electricity supply to ensure the system powers up properly before connecting any accessories such as printers or scanners and so on. Installation When the basic system is connected, switched on and running smoothly you are ready to start to install the software and prepare the system for use. Most systems comes with the operating system pre- installed and configured so all you have to do is install drivers for the display, the printer and other peripherals, as well as application software. ...read more.

Middle

Most computers come with a CD-ROM drive and so therefore, software is usually loaded from a CD-ROM. Before they invented the CD-ROM software came on floppy disk and you used to have to load several disks before the application was complete. When installing new applications software, the program setup usually asks the user if you would like to create a new directory folder to store the new program in. it then suggests a name for the folder and a path, for example, if a program is called Cubase, it might suggest C:\Cubase. Testing Your installation and setup is only successful once you have tested it. ...read more.

Conclusion

Accessing the applications If your software has been loaded successfully you should be able to open up the program from Start, Programs and then by selecting the program you want to use or you could click on the desktop icon. To ensure that each application is functioning properly, you need to test it and the following procedure would be adequate. 1. Open the application 2. Type <Test 1> with your initials and the date. 3. Save the file as <Test 1> with an appropriate extension. 4. Exit the application 5. Restore the application 6. Open the file 7. Select print 8. Save and close the file 9. Exit the application Your computer is now set up. Tyson Burke: T079718 Leytonstone: School 13411 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Hardware and Software

    When exporting an image for screen outputs, it's very important what format of the picture is exported. These are few formats that are mostly used for screen and printing outputs. 1. JPEG (Joint Photographic Experts Group) 2. GIF (Graphic Interchange Format) 3. PNG (Portable Network Graphics) 4. BMP (Bitmap) 5.

  2. Smart Card System

    For example a site may be interested in a count of the number of requests for a particular URI with a given referer: field but not be interested in recording information about individual requests such as the IP address. Log file parsers should be tolerant of errors.

  1. CP3 - Proposed Solution to a Realistic Problem - Apartment Administration software

    However, it may be difficult to navigate around a database, the user would have to open Access then select a database and the navigation within can be confusing unless you are experienced with using the program.

  2. Creating a computer system for Wooten Basset Rugby Club

    1.4 Data Requirements From the interview it has become apparent that I will need to store a considerable amount of data. I have divided this data into the following groups: Players, Fixtures, Rivals, Rival Players, Players-Fixtures and Rival Players-Fixtures. A primary key will be used in every case to uniquely

  1. Flexible Architectures in Communication Security Application

    The remainder of the session employs efficient secret key algorithms using the private key exchanged during authentication. We refer this type of key management as public-secret key cryptography. An example of a system that uses this particular session management strategy is the Secure Sockets Layer (SSL)

  2. Designing a computer system for the Enfield hotel.

    The details are written into the days when the customer is staying. * Secretary then tells the customer of the cancellation policy, and the checking in time. Then the secretary will ask weather they will be eating in the restaurant that night of arrival.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work