• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Explain the requirements in preparing for a software installation and upgrade

Extracts from this document...


Transfer-Encoding: chunked ´╗┐The small charity has accepted my proposal of upgrading their anti-virus to a fully integrated Internet security suite. They currently have five computers, all of which require the software upgrade. They have asked me to create a comprehensive plan showing the procedures I will be following when upgrading the software. Firstly, it?s important to plan before you start any software installation or upgrade so that everything works the way you want it to. To start, it?s important to have a clearly defined sequence of activities to follow in order to ensure the installation is completed successfully. You need to check that the system meets the requirements for the software, decide if a fresh installation is needed or if it?s okay to install over previous software. Also you need to ensure that the installation method is suitable. For example if the files are stored on a DVD, you need to have accesses to a DVD slot and to make sure the hardware is compatible to that format. ...read more.


End users who are the people who will be using the system. Management who will be interested in how it is going. And Software vendors because if there are any problems with the installation then they will need to be contacted. Additionally, back out procedures need to be considered. Sometimes the upgrade will cause problems to the system and you may not have planned for it. For example, some of the applications are not compatible with the new software. To help recover from the situation you will need to have a clearly defined back-out procedure. You can have your software and data backed up before you complete the installation or to uninstall the new software or upgrade. Moreover, you may need permission or access. Due to the importance of security within an organisation it is usual for workstations to be kept secure by requiring staff to use usernames and passwords and by limiting access right to software and data they do not need. ...read more.


Without having these procedures it can be frustrating for the users because they are being passed from one team to another. One last factor to consider is materials. When preparing for installation, it is important to ensure that you have a clear understanding of the materials and resources that you require. First you will need to obtain and allocate the required materials. You will need to check the requirments of the software to make sure that you have everything that works with the system. As well as allocating the correct materials it is also important to allocate the correct resources. This includeds manuals, installation guides and licence keyes. The guides are really useful and can help if you are unfamilar with the software. Correctly allocating the license keys is important because you will need a valid key for each installation. If you install more than one copy you will be running it illegally. In conclusion, its important to follow these steps to ensure that everything runs smoothly. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Information Systems and Communication section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Information Systems and Communication essays

  1. Marked by a teacher

    Database Coursework on a Vehicle Rental System: Analysis

    5 star(s)

    the customer; * System will hold returns details; * A returned vehicle can be entered into the system in less than 2 minutes * Return records can be located and amended in less than 1 minute; * Return records can be located and deleted in less than 30 seconds; *

  2. Marked by a teacher

    Application Software

    Type cd pub to enter the directory. Web Browsers The most commonly used web browsers used were internet explorer 7 Mozilla Firefox and Apple Safari. In addition, a growing number of users excess the www through other devices, such as games consoles and mobile phones. The Nintendo wii, for example, allows users access the WWW via Opera.

  1. ict as level coursework

    Checked the spread sheet and all information was there and was accurate. None required 9 When a new customer is registered ensure that they have a unique customer number. Create a new customer The customer will have a unique customer number.

  2. Installing and Upgrading Software

    * The disadvantage is that when you uninstall it some of the files may not be removed. This means that the computer will have less free space and also be slightly slowed down. What are the potential risks of installing or upgrading software?

  1. ICT support

    This is more likely if a piece of hardware is not plug and play compatible. The ICT support staff will have to make notes about the software versions and the model of the hardware in order to find the appropriate driver.

  2. Database Coursework on a Rental System: Design

    Customer: Customer ID, Forename, Surname, Street Address, Town, County, Nationality, Sex, Postcode, Telephone Number, Mobile Number, E-mail Address, Date of Birth, Age, Date of Membership. Customer_Rental: Customer ID, Rental ID, Vehicle ID, Date Rented Out, Number of Days, Return ID, Date Returned, Staff ID, Forename, Surname, Street Address, Town, County,

  1. Network Security

    Furthermore, accessing data and applications from another person's workstation can cause performance problems for that user. Client/Server Networks Client/server networks are a lot more than peer-to-peer networks. The presence of a dedicated server in the network ensures that the users are able to access information and share peripherals without being dependent upon other user(s)systems.

  2. report for organisation

    These improvements are mentioned below: * Add colours to the letter so it becomes not boring to read. * Add more graphics like a table or a graph in order to make it look eye catching. * Try not to make a massive amount of blank areas and this can be done by inserting some graphics for example.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work