• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

VAGINAL DISCHARGE

Extracts from this document...

Introduction

Task 3 - Maintenance 1. There are numerous pieces of software that help you to keep you're computer running efficient and safe. Some of these pieces of software are included on your operating system, but also some are 3rd party, which means you have to purchase them from someone else, whether it is a download or on a disc. One type of software is a registry cleaner. The registry cleaner goes through your windows operating system registry, and deletes unwanted or redundant files, causing an increase in your computers performance. However you should be careful to ensure that the software is recommended, as if it deletes a wrong file, then your operating system might not run correctly. An example of a registry cleaner is "Eusing Free Registry Cleaner" which is recommended by PC World, and can be obtained for free from the Eusing website. Another type of software utility is a disk defragmenter. A disk defragmenter basically collects partial pieces of the same file from all over your hard drive, and puts them back together into one file. There is a disk defragmenter program available for your use on every Windows OS that has been released, which is fairly simple to use, however if you prefer a more thorough disk defrag, you are better ...read more.

Middle

Formatting basically erases all data and also prepares the disk to store your data magnetically. If you have a version of Windows that is XP or under, then there is a handy tool to use that formats your C drive for you, this is called FDISK which can be run from command prompt. If you have a Vista powered computer, then you can use a 3rd party formatting software or partitioning software, such as Norton Partition Magic. 2. How to use disk defragmenter First of all go to Start - Programs - Accessories - System Tools - Disk Defragmenter. You will then get to this screen. From this screen you can choose which volume that you want to defragment. For example if you take a look in the above picture, you can see the E: drive highlighted. To continue, you can either go straight ahead with the defragmentation, or ask for an analysis of the volume you are defragmenting. If you choose the analysis then you will receive this report, which shows you all of the fragmented files on the volume that you have analyzed. When you have received the analysis you can either choose to defragment the volume or just leave it. ...read more.

Conclusion

5. How to install and clean peripherals First of all I will tell you how to install your peripheral. To install the printer, first plug the power cable into the plug socket in the wall. Next plug the USB cable into your computers USB port. Now insert the CD that came with the printer and run the setup file from the CD. When the setup is complete, turn the power on, on the printer and it will configure itself. Now to clean your screen, mouse and keyboard. Take a screen wipe and gently rub it against the screen in a side-to-side motion and cover the whole surface of it. Certain types of monitor will require different types of wipes, as not to damage the monitor. To clean the keyboard and mouse you can simply use the same screen wipe to clean around the keys on the keyboard and the buttons on the mouse. If you want to go more in depth with the cleaning, you can remove the keyboards keys to clean underneath and hard to reach places, and with the mouse, you can remove the ball and clean the dirt from the rollers that the ball rolls on (if you have a ball mouse). 6. For my agenda and minutes see the attached sheet. ?? ?? ?? ?? Kieran Egan Unit 2 - Task 3 Maintenance ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Smart Card System

    and Java Foundation Classes (JFC) components. Forte for Java provides full support for multi-threaded debugging and standard debugging features such as breakpoints, watches, trace into, trace over, and trace out. With the use of the object browser in the Forte of Java, all the source codes are logically presented in one streamlined view.

  2. Hardware and Software

    Inkjet Printer: Inkjet printers have made rapid technological advances in recent years. The three-colour printer has been around for several years now and has succeeded in making colour printing an affordable option; but as the superior four-colour model became cheaper to produce, the replaceable cartridge model was gradually phased out.

  1. Computer Maintainance - anti-virus, cookie deletion, drive scanning

    Drive cleaning: Disc Cleanup utility is already available to use from the operating system. To use this features click on Start, All programs, Accessories, System Tools and Disc clean up. 3. Drive scanning: To run disc check on a hard drive: Open the Start Menu and click on the Computer button.

  2. Ways of Promoting a Website

    Task 2 Web pages can be created for many bespoke purposes and to be able to do this there are many differing net languages available to aid the user in creating a bespoke site. As you can imagine it is almost impossible to use one language to do every task.

  1. Firewall Protection

    is installed, is "how much time each advertisement is shown, which was the hosting adware, and whether the user clicked on the advertisement. This is important so that the advertisements server will be able to know how much money to get from each of the advertised companies, and how much from it to deliver to each of the adware maintainers.

  2. Ict Analysis

    What kind of storing system would you and your staff prefer? - I personally think the staff would prefer a data handling system on the computer as they will only have to learn it once and it would be really easy to use.

  1. Flexible Architectures in Communication Security Application

    can be confined to the cipher setup code. If the modulus of the operation is a power-of-two (as in RC6), it can be efficiently implemented using existing multiply instructions. A few algorithms (most notably IDEA) use a modulus of a 2N+1 prime number. This further improves diffusion properties of the operation at the expense of more computation.

  2. CP3 - Proposed Solution to a Realistic Problem - Apartment Administration software

    There are records located both on paper and as saved files on the computer. It would benefit from centralisation which could be achieved computerising the system. Also, if somebody else were to take over the running it may be difficult for them to understand how it works properly.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work