• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

VAGINAL DISCHARGE

Extracts from this document...

Introduction

Task 3 - Maintenance 1. There are numerous pieces of software that help you to keep you're computer running efficient and safe. Some of these pieces of software are included on your operating system, but also some are 3rd party, which means you have to purchase them from someone else, whether it is a download or on a disc. One type of software is a registry cleaner. The registry cleaner goes through your windows operating system registry, and deletes unwanted or redundant files, causing an increase in your computers performance. However you should be careful to ensure that the software is recommended, as if it deletes a wrong file, then your operating system might not run correctly. An example of a registry cleaner is "Eusing Free Registry Cleaner" which is recommended by PC World, and can be obtained for free from the Eusing website. Another type of software utility is a disk defragmenter. A disk defragmenter basically collects partial pieces of the same file from all over your hard drive, and puts them back together into one file. There is a disk defragmenter program available for your use on every Windows OS that has been released, which is fairly simple to use, however if you prefer a more thorough disk defrag, you are better ...read more.

Middle

Formatting basically erases all data and also prepares the disk to store your data magnetically. If you have a version of Windows that is XP or under, then there is a handy tool to use that formats your C drive for you, this is called FDISK which can be run from command prompt. If you have a Vista powered computer, then you can use a 3rd party formatting software or partitioning software, such as Norton Partition Magic. 2. How to use disk defragmenter First of all go to Start - Programs - Accessories - System Tools - Disk Defragmenter. You will then get to this screen. From this screen you can choose which volume that you want to defragment. For example if you take a look in the above picture, you can see the E: drive highlighted. To continue, you can either go straight ahead with the defragmentation, or ask for an analysis of the volume you are defragmenting. If you choose the analysis then you will receive this report, which shows you all of the fragmented files on the volume that you have analyzed. When you have received the analysis you can either choose to defragment the volume or just leave it. ...read more.

Conclusion

5. How to install and clean peripherals First of all I will tell you how to install your peripheral. To install the printer, first plug the power cable into the plug socket in the wall. Next plug the USB cable into your computers USB port. Now insert the CD that came with the printer and run the setup file from the CD. When the setup is complete, turn the power on, on the printer and it will configure itself. Now to clean your screen, mouse and keyboard. Take a screen wipe and gently rub it against the screen in a side-to-side motion and cover the whole surface of it. Certain types of monitor will require different types of wipes, as not to damage the monitor. To clean the keyboard and mouse you can simply use the same screen wipe to clean around the keys on the keyboard and the buttons on the mouse. If you want to go more in depth with the cleaning, you can remove the keyboards keys to clean underneath and hard to reach places, and with the mouse, you can remove the ball and clean the dirt from the rollers that the ball rolls on (if you have a ball mouse). 6. For my agenda and minutes see the attached sheet. ?? ?? ?? ?? Kieran Egan Unit 2 - Task 3 Maintenance ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Computer Maintainance - anti-virus, cookie deletion, drive scanning

    - Secure your network. - Stop attacks on your PC from nefarious websites. - Prevent access to inappropriate websites. - Validate wireless hotspots and Wi-Fi networks. - Protect your information from online theft. 2. Firewall Firewalls protect private local area networks from threats from the Internet.

  2. Ways of Promoting a Website

    Client side: This type of programming language is downloaded by the web browser and run using the browser. To do so this needs a compiler, therefore a plug in is needed. Server side: Server side means programs or languages that reside on the server and that a user can interact with through the Web server itself.

  1. Hardware and Software

    Word, Excel, PowerPoint, and Outlook are the only programs to get the full interface upgrade. Outlook gets the new interface upgrade only in its content-creation screens. Xara Xtreme Xara Xtreme is a top class graphics tool, It does not matter what the level of graphics experience.

  2. Firewall Protection

    This allow the web site to customize itself for you, and to keep track on everything that you did on that site. It does not have to keep that information on your computer. All it has to save on your computer is a unique identifying number, and then it can

  1. Ict Analysis

    Describing the current system The current data handling system used in the Fusion restaurant is just a filing system and is not a digital application program on the computer. Unlike, the other restaurants where they all have a digital application program.

  2. Smart Card System

    It is an extension for the Java Cryptography Architecture (JCA) APIs available in the Java 2 platform. In our project topic, Control Access of lab computer in a client server environment needs encryption for administrator database and smart card as well.

  1. Flexible Architectures in Communication Security Application

    way into many popular software systems including SSH, OpenSSL, FreeBSD, and the Mozilla web browser. The optimized IDEA implementation was provided by Ascom, inventors of the algorithm. Operation of the algorithms can be tailored significantly, e.g., number of rounds, block size, and key size.

  2. CP3 - Proposed Solution to a Realistic Problem - Apartment Administration software

    It does everything it is intended to do. You can manage the availability of the apartment and store customer details. With simple user input the spreadsheet functions well as part of the system it is able to calculate the profit of the apartment.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work