• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Plan an installation and an upgrade of security software.

Extracts from this document...

Introduction

Transfer-Encoding: chunked ´╗┐The small charity has accepted my proposal of upgrading their anti-virus to a fully integrated Internet security suite. They currently have five computers, all of which require the software upgrade. They have asked me to create a comprehensive plan showing the procedures I will be following when upgrading the software. First, I will plan everything ahead of the installation of the software so everything works how I want it to work. To start, I will make a defined sequence of activities to follow in order to ensure the installation is completed successfully. I will check that the system meets the requirements for the software and decide if I will install a fresh copy or install over the previous software. Also I will ensure that the installation method is suitable. For example if the files are stored on a DVD, I will need to have accesses to a DVD slot and to make sure the hardware is compatible to that format. ...read more.

Middle

End users who are the people who will be using the system. Management who will be interested in how it is going. And Software vendors because if there are any problems with the installation then I will need to contact them. Additionally I will need to have a back out procedure that will be considered if there?s any issues. Sometimes the upgrade will cause problems to the system and you may not have planned for it. For example, some of the applications are not compatible with the new software. To help recover from the situation I will need to have a clearly defined back-out procedure. I can either have the software and data backed up before I complete the installation or to uninstall the new software or upgrade. I have decided to back up all the data. ...read more.

Conclusion

In the preparation stage I will check that you have the correct software loading facilities so that it can work correctly. One last factor to consider is materials. When preparing for installation, it is important to ensure that i have a clear understanding of the materials and resources that you require. First I will obtain and allocate the required materials. I will check the requirments of the software to make sure that you have everything that works with the system. As well as allocating the correct materials it is also important to allocate the correct resources. This includeds manuals, installation guides and licence keyes. The guides are really useful and can help if you are unfamilar with the software. Correctly allocating the license keys is also important because I will need a valid key for each installation. This company want 5 copies ad therefore I will need to make sure I have a licence. If I follow this plan then the installation will be a success. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Information Systems and Communication section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Information Systems and Communication essays

  1. Marked by a teacher

    Database Coursework on a Vehicle Rental System: Analysis

    5 star(s)

    less than 30 seconds; * Date to be returned will be calculated automatically from the fields Number of Nights and Date of Rental; * Total price of the rental will be calculated automatically from the fields Number of Nights and Daily Rental rate, taking into account the miles travelled by

  2. Marked by a teacher

    Application Software

    Unlike integrated packages, office suites are often a combination of stand-alone applications. 1. All programs have the same look and feel and the same basic functionality. Internet Software The internet is a very important ICT tool for many business and private individuals.

  1. Installing and Upgrading Software

    The potential risks of installing or upgrading new software is that it can cause problems to other software's, the installation or upgrading may not be successful and it may cause the problem to the existing system. There is always a risk that something will go wrong when you install or update a new software.

  2. Database Coursework on a Rental System: Design

    All of the non-composite key attributes in the Rental_Staff entity are dependant on Staff ID but not Rental ID. Therefore, a staff entity is created with these attributes and that key. The non-composite key attribute in the Rental_Return entity is dependant on Return ID but not Rental ID, so a Rental entity is created.

  1. Network Security

    Business data communication and networking. Classification of Networks Classification of Networks by: -Geographic Coverage (LANs, MANs, WANs, GANs) -Method of Accessing the Network (Demand, Polled, Multiaccess) -Architecture Types of Networks Used In Business Organizations Networks for small and growing businesses generally come in two types: Peer-to-Peer Networks A peer-to-peer network lacks a central server.

  2. report for organisation

    Suitability: I think that this letter doesn't suit its purpose to a certain point with its poor layout appearance, house style and style of writing. The layout appearance is very poor as there are a huge amount of blank areas.

  1. Performance Evaluation of an End-to-End Measurement Based Call Admission Control Method

    2.1. DiffServ Differentiated Services (DiffServ) [7] is a way of providing a preferential treatment for a subset of flows in IP-networks. In a DiffServ network there are neither per-flow admission control nor per-flow reservations, which enables to provide scalable service differentiation.

  2. Personal Learning Plan for IT

    But I still struggle with some common mistake. 4 Access support resources on Frog VLE and the ICT shared area I need to find out how to get support resources on Frog and ICT share area. I don?t know how to use the Frog to help me get the support resources.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work