• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Explain the requirements in preparing for a software installation and upgrade

Extracts from this document...

Introduction

Transfer-Encoding: chunked ´╗┐The small charity has accepted my proposal of upgrading their anti-virus to a fully integrated Internet security suite. They currently have five computers, all of which require the software upgrade. They have asked me to create a comprehensive plan showing the procedures I will be following when upgrading the software. Firstly, it?s important to plan before you start any software installation or upgrade so that everything works the way you want it to. To start, it?s important to have a clearly defined sequence of activities to follow in order to ensure the installation is completed successfully. You need to check that the system meets the requirements for the software, decide if a fresh installation is needed or if it?s okay to install over previous software. Also you need to ensure that the installation method is suitable. For example if the files are stored on a DVD, you need to have accesses to a DVD slot and to make sure the hardware is compatible to that format. ...read more.

Middle

End users who are the people who will be using the system. Management who will be interested in how it is going. And Software vendors because if there are any problems with the installation then they will need to be contacted. Additionally, back out procedures need to be considered. Sometimes the upgrade will cause problems to the system and you may not have planned for it. For example, some of the applications are not compatible with the new software. To help recover from the situation you will need to have a clearly defined back-out procedure. You can have your software and data backed up before you complete the installation or to uninstall the new software or upgrade. Moreover, you may need permission or access. Due to the importance of security within an organisation it is usual for workstations to be kept secure by requiring staff to use usernames and passwords and by limiting access right to software and data they do not need. ...read more.

Conclusion

Without having these procedures it can be frustrating for the users because they are being passed from one team to another. One last factor to consider is materials. When preparing for installation, it is important to ensure that you have a clear understanding of the materials and resources that you require. First you will need to obtain and allocate the required materials. You will need to check the requirments of the software to make sure that you have everything that works with the system. As well as allocating the correct materials it is also important to allocate the correct resources. This includeds manuals, installation guides and licence keyes. The guides are really useful and can help if you are unfamilar with the software. Correctly allocating the license keys is important because you will need a valid key for each installation. If you install more than one copy you will be running it illegally. In conclusion, its important to follow these steps to ensure that everything runs smoothly. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Information Systems and Communication section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Information Systems and Communication essays

  1. Marked by a teacher

    Database Coursework on a Vehicle Rental System: Analysis

    5 star(s)

    less than 30 seconds; * Date to be returned will be calculated automatically from the fields Number of Nights and Date of Rental; * Total price of the rental will be calculated automatically from the fields Number of Nights and Daily Rental rate, taking into account the miles travelled by

  2. Marked by a teacher

    Application Software

    Drawing lines of various thicknesses 2. Smudging 3. Spray painting 4. Collage layers 5. Altering brightness 6. Colour levels Web Authoring Examples include Macromedia Dreamweaver, KompoZer and Microsoft Front Page. Ten years ago anybody wanting to create a webpage had to write the HTML code manually.

  1. ict as level coursework

    security level is usually high which is why you are having problems opening it. Therefore a more appropriate security level is medium however low level can be enabled as well. Every time the programme opens the software will ask whether I want to enable or disable macros.

  2. report for organisation

    that could make it boring and the font size that's not big enough for all readers to see. Sheffield teaching hospital letter Purpose: The purpose of this letter is to tell the person it's aiming at that an appointment has been made for her.

  1. Installing and Upgrading Software

    * The disadvantage is that if you encounter a bug, it could be due to the upgrade as previous files present may have a conflict with newer versions or the settings for the previous version may not work well with the newer version.

  2. Database Coursework on a Rental System: Design

    Code can also be created to compliment reports. Advantages of Microsoft Access I shall now discuss the advantages of Access in comparison to the other packages considered. Obviously, all of the aforementioned features of Access are all advantages, so I will be discussing a few general advantages.

  1. Performance Evaluation of an End-to-End Measurement Based Call Admission Control Method

    Service Level Agreement (SLA) is the contract between the customer and the provider that specifies the service the customer's traffic should receive. SLA may specify packet classification and remarking rules, traffic profiles and actions to be performed, when monitoring shows that the SLA is violated.

  2. Plan an installation and an upgrade of security software.

    I will also have a well-defined communication procedures planned for every installation. This means I will consider who needs to be communicated with during the installation stage. It?s important to keep the following people informed during the installation.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work