• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Installation of a computer.

Extracts from this document...

Introduction

Basic Procedure for Setting up Equipment Connecting it all together Connect up your cables for the keyboard, mouse, VDU and other hardware devices. Once you have done this, plug the computer into the main electricity supply to ensure the system powers up properly before connecting any accessories such as printers or scanners and so on. Installation When the basic system is connected, switched on and running smoothly you are ready to start to install the software and prepare the system for use. Most systems comes with the operating system pre- installed and configured so all you have to do is install drivers for the display, the printer and other peripherals, as well as application software. ...read more.

Middle

Most computers come with a CD-ROM drive and so therefore, software is usually loaded from a CD-ROM. Before they invented the CD-ROM software came on floppy disk and you used to have to load several disks before the application was complete. When installing new applications software, the program setup usually asks the user if you would like to create a new directory folder to store the new program in. it then suggests a name for the folder and a path, for example, if a program is called Cubase, it might suggest C:\Cubase. Testing Your installation and setup is only successful once you have tested it. ...read more.

Conclusion

Accessing the applications If your software has been loaded successfully you should be able to open up the program from Start, Programs and then by selecting the program you want to use or you could click on the desktop icon. To ensure that each application is functioning properly, you need to test it and the following procedure would be adequate. 1. Open the application 2. Type <Test 1> with your initials and the date. 3. Save the file as <Test 1> with an appropriate extension. 4. Exit the application 5. Restore the application 6. Open the file 7. Select print 8. Save and close the file 9. Exit the application Your computer is now set up. Tyson Burke: T079718 Leytonstone: School 13411 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Peer reviewed

    Principles of Computer Networks

    3 star(s)

    The ring goes around and station wanting to transmit data will take control of it and send it to the destination and when the transmission is completed than the token ring is destroyed and new one is created. IEEE 802.11 Set of standards which put into operation WLAN communication in the 2.4, 3.6 and 5 GHz spectrum band.

  2. Hardware and Software

    When exporting an image for screen outputs, it's very important what format of the picture is exported. These are few formats that are mostly used for screen and printing outputs. 1. JPEG (Joint Photographic Experts Group) 2. GIF (Graphic Interchange Format) 3. PNG (Portable Network Graphics) 4. BMP (Bitmap) 5.

  1. Smart Card System

    Qualified providers are signed by a trusted entity.) JCE 1.2.1 supplements the JavaTM 2 platform, which already includes interfaces and implementations of digital signatures and message digests. This release of JCE is a non-commercial reference implementation that demonstrates a working example of the JCE 1.2.1 APIs. A reference implementation is similar to a proof-of-concept implementation of an API specification.

  2. Flexible Architectures in Communication Security Application

    a session cache, where authenticated private keys are held and can later be reused when users reconnect to view other web pages. As such, the focus of our design effort is on improving secret-key cipher performance. Section 1.2 Contribution of This Thesis Cryptography can be implemented with software routines, directly in hardware, or a combination of both.

  1. CP3 - Proposed Solution to a Realistic Problem - Apartment Administration software

    not been in place for long and the client has not managed to setup a suitable computer based system. Though the current system is mainly paper based there is limited use of computer resources. The aim of the current system for the user is to record the availability of the

  2. Creating a computer system for Wooten Basset Rugby Club

    * Create leagues of the club's leading scorers and those with the worst disciplinary records. * Store data about what type of training each player is on. For example some players may have fitness training or others forwards training. * Monitor finances for each fixture.

  1. Designing a computer system for the Enfield hotel.

    , for how many persons. , have you stayed here before. , tells them the price. Then if the customer is happy with the price, the following happens: * Secretary then takes down the customers, Name Contact number Credit card number This is written down in either book A1/ A2 depending on the month.

  2. White Soul System Designs - creating a computer system.

    by the bank uniquely given to the customer Documents used Customer application form (see appendix A1) Problems Some customers have poor handwriting or just handwriting that the staff members struggle to read. This may lead to miss filing or even a mistake made with the customer details.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work