• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Installation of a computer.

Extracts from this document...

Introduction

Basic Procedure for Setting up Equipment Connecting it all together Connect up your cables for the keyboard, mouse, VDU and other hardware devices. Once you have done this, plug the computer into the main electricity supply to ensure the system powers up properly before connecting any accessories such as printers or scanners and so on. Installation When the basic system is connected, switched on and running smoothly you are ready to start to install the software and prepare the system for use. Most systems comes with the operating system pre- installed and configured so all you have to do is install drivers for the display, the printer and other peripherals, as well as application software. ...read more.

Middle

Most computers come with a CD-ROM drive and so therefore, software is usually loaded from a CD-ROM. Before they invented the CD-ROM software came on floppy disk and you used to have to load several disks before the application was complete. When installing new applications software, the program setup usually asks the user if you would like to create a new directory folder to store the new program in. it then suggests a name for the folder and a path, for example, if a program is called Cubase, it might suggest C:\Cubase. Testing Your installation and setup is only successful once you have tested it. ...read more.

Conclusion

Accessing the applications If your software has been loaded successfully you should be able to open up the program from Start, Programs and then by selecting the program you want to use or you could click on the desktop icon. To ensure that each application is functioning properly, you need to test it and the following procedure would be adequate. 1. Open the application 2. Type <Test 1> with your initials and the date. 3. Save the file as <Test 1> with an appropriate extension. 4. Exit the application 5. Restore the application 6. Open the file 7. Select print 8. Save and close the file 9. Exit the application Your computer is now set up. Tyson Burke: T079718 Leytonstone: School 13411 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Peer reviewed

    Principles of Computer Networks

    3 star(s)

    So after a random interval it will retransmit and then if there a collision again the transmission stop and retransmits at the random waiting time by there are increased every time. CSMA/CA Carrier Sense Multiple Access/Collision Avoidance is used to improve the performance of CSMA, by being less hungry on the channel.

  2. Hardware and Software

    The pictures can be moved from the phone memory to the computer hard disk. Resolution is very important for any type of output device. Resolution Refers to the sharpness and clarity of an image. The term is most often used to describe how well an image matches with the original.

  1. White Soul System Designs - creating a computer system.

    It is not the actual writing of these documents such as the sorting, filing and invoicing. This method of arranging is slow and costly as my staffs are paid on an hourly basis. Also the quality, because it is handwritten, is poor.

  2. Creating a computer system for Wooten Basset Rugby Club

    * System will be run from head coach's lap top computer and therefore not need any network capabilities. * Head coach has copies of Microsoft Access already stored on his computer.

  1. Smart Card System

    Conversely, Microsoft's Win32s installs a 32-bit wsock32.dll thunk layer in 16-bit Windows environments (Windows version 3.1 and Windows for Workgroups 3.11) over any vendor's WinSock DLL currently in use. LANs are capable of transmitting data at very fast rates, much faster than data can be transmitted over a telephone line;

  2. Flexible Architectures in Communication Security Application

    Secret-key ciphers have the advantage of running as much as 1000 times faster than comparable public-key ciphers [30]. To maximize security and performance, most secure protocols use both forms of cryptography. Public key encryption is used at the start of a session to authenticate communicating parties and to securely distribute a shared secret key.

  1. CP3 - Proposed Solution to a Realistic Problem - Apartment Administration software

    My client currently relies on bookings through e-mail and telephone so it would be quite appropriate to have software that the client would be able to use to automatically check availability in real time rather than rely on paper records or print outs which could be subject to human error

  2. Designing a computer system for the Enfield hotel.

    Rooms can also be booked 6 months in advance. What actually happens when booking a room is the following; * Customer asks to book room * Secretary asks the following, , when you would like to stay. , what type of room would you like. , for how many persons.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work