• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month


Extracts from this document...


Task 3 - Maintenance 1. There are numerous pieces of software that help you to keep you're computer running efficient and safe. Some of these pieces of software are included on your operating system, but also some are 3rd party, which means you have to purchase them from someone else, whether it is a download or on a disc. One type of software is a registry cleaner. The registry cleaner goes through your windows operating system registry, and deletes unwanted or redundant files, causing an increase in your computers performance. However you should be careful to ensure that the software is recommended, as if it deletes a wrong file, then your operating system might not run correctly. An example of a registry cleaner is "Eusing Free Registry Cleaner" which is recommended by PC World, and can be obtained for free from the Eusing website. Another type of software utility is a disk defragmenter. A disk defragmenter basically collects partial pieces of the same file from all over your hard drive, and puts them back together into one file. There is a disk defragmenter program available for your use on every Windows OS that has been released, which is fairly simple to use, however if you prefer a more thorough disk defrag, you are better ...read more.


Formatting basically erases all data and also prepares the disk to store your data magnetically. If you have a version of Windows that is XP or under, then there is a handy tool to use that formats your C drive for you, this is called FDISK which can be run from command prompt. If you have a Vista powered computer, then you can use a 3rd party formatting software or partitioning software, such as Norton Partition Magic. 2. How to use disk defragmenter First of all go to Start - Programs - Accessories - System Tools - Disk Defragmenter. You will then get to this screen. From this screen you can choose which volume that you want to defragment. For example if you take a look in the above picture, you can see the E: drive highlighted. To continue, you can either go straight ahead with the defragmentation, or ask for an analysis of the volume you are defragmenting. If you choose the analysis then you will receive this report, which shows you all of the fragmented files on the volume that you have analyzed. When you have received the analysis you can either choose to defragment the volume or just leave it. ...read more.


5. How to install and clean peripherals First of all I will tell you how to install your peripheral. To install the printer, first plug the power cable into the plug socket in the wall. Next plug the USB cable into your computers USB port. Now insert the CD that came with the printer and run the setup file from the CD. When the setup is complete, turn the power on, on the printer and it will configure itself. Now to clean your screen, mouse and keyboard. Take a screen wipe and gently rub it against the screen in a side-to-side motion and cover the whole surface of it. Certain types of monitor will require different types of wipes, as not to damage the monitor. To clean the keyboard and mouse you can simply use the same screen wipe to clean around the keys on the keyboard and the buttons on the mouse. If you want to go more in depth with the cleaning, you can remove the keyboards keys to clean underneath and hard to reach places, and with the mouse, you can remove the ball and clean the dirt from the rollers that the ball rolls on (if you have a ball mouse). 6. For my agenda and minutes see the attached sheet. ?? ?? ?? ?? Kieran Egan Unit 2 - Task 3 Maintenance ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Hardware and Software

    3. Enhanced layer control. It can combine images, text, and effects on hundreds of layers that can be organise with up to five levels of nesting and save in different combinations as Layer. 4. Improved File Browser. It can quickly preview, tag, and sort images; search and edit keywords; and automatically share batches of files from the improved File Browser.

  2. Smart Card System

    Lock-and-key is configured using IP dynamic extended access lists. Lock-and-key can be used in conjunction with other standard access lists and static extended access lists. When lock-and-key is configured, designated users whose IP traffic is normally blocked at a router can gain temporary access through the router.

  1. CP3 - Proposed Solution to a Realistic Problem - Apartment Administration software

    processed in transaction files would be input with a keyboard through the computer. However, batch processing can also be used with 'On-line' processing and for example data can be stored in transaction files from items such as barcode readers. This process is often used at supermarkets when code controls have

  2. Introduction to Viruses

    The Latest Known Viruses: Last update 2/27/2002 02/25/2002 I-Worm.Wargame: This is a virus-worm that spreads via the internet attached to infected E-mails. The worm itself is a Windows PE EXE file about 77kb in length. 02/19/2002 I-Worm.Yamer: This is a virus-worm that spreads via the internet attached to infected E-mails.

  1. You need to discuss the advantages and disadvantages of someone in your

    The database should enable me to save the database. I will create an 'Exit' button which will automatically save all changes before it exits. SECTION D: Specification D Design of the ICT system This section will include a 'database planning sheet' which shows all the fields in my 3 tables.

  2. Systems Analysis

    It is an extremely important activity if the system's effectiveness is to be maximised and if staff are to feel happy and confident in its operation. * Introduction of new clerical procedures. If the whole system is to function correctly, the computer processing aspect has to be supported by the clerical procedures designed to work with it.

  1. Flexible Architectures in Communication Security Application

    We further extended this approach through the design of a fast and flexible cryptographic coprocessor. Our design, called the CryptoManiac, addresses the primary bottleneck in secret-key ciphers, namely efficiency, through the application of an efficient VLIW architecture with a well-matched instruction set and functional unit resources.

  2. How do you configure hardware and software

    In the early days of computing, things such as punched cards, paper tape and magnetic drums were used, but modern examples are things like: * Hard discs * Floppy discs * ZIP Drives * CD-ROMs * DAT or other data cartridges Secondary storage is usually much cheaper per byte than

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work