• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Operating systems assignment 1

Extracts from this document...


Contents page Task 1 - P1, M2 Task 2 - P2, M1 Task 3 - P3, P4, P5, P6 Task 4 - M3, M4 Task 5 - D1 Task 6 - D2 Task 1 There are many possibilities when upgrading or installing software. We buy computers to help us with various tasks such as office work, school work or just for entertainment like games, music and films. All of the activities require different software pieces or packages to be installed on a computer so that it can perform the tasks desired. The applications we install are our choice and we install them according to our needs. For example installing an operating system allows users to do work on their computers. Without it nothing could be done on a computer. Within an operating system there are software packages which are bundled or come from an outside source. These can be of many types for example utility software packages are there to improve the efficiency of the operating system and secure it from threats. There are office environment software packages which allow user to perform tasks needed in office. ...read more.


The advantages are the target of a user. They could vary from improving the computer's performance like speed and quality to giving a set of new abilities to a computer system. Useful programs make using a computer much easier and pleasant for the user. There are various tasks that can be done on a computer and a good software package could enhance performing them. There is plenty of software to choose from and only the right applications will help. There are many disadvantages when upgrading or installing software. Disadvantage of installing a software package is of course taking up more and more hard disk space and slowing the computer a little bit by writing more entries into the registry. There are also performance issues when installing an upgrade such as using more processor and RAM. A disadvantage could be compatibility with older versions of another piece of software already installed on the computer. Task 3 Here is a plan of upgrading a software piece on a computer: First a user needs to find what they want to upgrade and if it is necessary. ...read more.


These applications are fully compatible with my computer and the requirements are exceeded. The reason for installing it is that it is fast to install, easy to use and useful, does not decrease the performance of my computer and overall it is essential in what I do. There are plenty applications to choose from and I chose the one that is right for me and my computer. Task 6 The risk that could occur during an upgrade can be minimized to prevent any damage to the computer system. For example if the files are corrupted there is an option of reversing the process of installation in control panel. If the software package user is installing is not compatible with the system and the installation causes software failure then there is an option to recover the operating system. If the upgrade does cause some bad effects on computer system then there is an option of downgrading it to the lower version which works properly and does not cause any problems. There are many other risks and they can all be prevented with a professional knowledge of software and/or an antivirus which will most likely detect the corrupted or broken files ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Peer reviewed

    information systems assignment 2

    4 star(s)

    serious trouble, all customers who loose there information can put a complain in to the company and take them to court. When the data protection act is concerned, Rufus supermarket must make sure they abide by all the rules included within the act.

  2. Computer systems assignment 1

    Double click on the CD icon with the driver software to explore the content of the disc. When done double click on a Setup icon to start the installation. A window will come up letting you choose the directory of the installation.

  1. Hardware and Software

    I have chose these because the company has the Microsoft Vista as their operating system and both of these work the best on and have been especially designed for Microsoft Windows Vista. Both of these can be used by professionals.

  2. Plan an installation and an upgrade - Requirements in preparing for a software installation ...

    If the user is a company you might want to try installing the software on one computer before you do it to the rest. This will allow you to see if the new software work properly and if it cause any damage it will be only to that one computer not all the computers in the company.

  1. With diagrams compare and contrast the relative advantages and disadvantages of digital transmission over ...

    (That's why you may sometimes find when you carry your notebook computer to another location that the wall jack connections won't match your plug.) This is a diagram shown below: Optical Fiber Optical fiber (or "fiber optic") refers to the medium and the technology associated with the transmission of

  2. Free essay

    Setting up and E-Commerce Site

    costing and on top of this we need to make and include the logo, which hopefully should already been created. Further more we need to understand what we need in the site, do we want any PHP, JavaScript or just standard HTML.

  1. Security Issues of E-Commerce

    * The data protection act * SSL (Secure Sockets Layer) * Encryption * Secure e-mails * Reliable credit card processing * Firewalls * Anti Virus Software * TPM (Trusted Platform Modules) When deciding if e-commerce has security flaws or not we need to consider if the above list has been implemented properly.

  2. Smart Card System

    Access lists should be used in "firewall" routers, which are often positioned between the internal network and an external network, such as the Internet. We may also use access lists on a router positioned between two parts of the network, to control traffic entering or exiting a specific part of the internal network.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work