• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

VAGINAL DISCHARGE

Extracts from this document...

Introduction

Task 3 - Maintenance 1. There are numerous pieces of software that help you to keep you're computer running efficient and safe. Some of these pieces of software are included on your operating system, but also some are 3rd party, which means you have to purchase them from someone else, whether it is a download or on a disc. One type of software is a registry cleaner. The registry cleaner goes through your windows operating system registry, and deletes unwanted or redundant files, causing an increase in your computers performance. However you should be careful to ensure that the software is recommended, as if it deletes a wrong file, then your operating system might not run correctly. An example of a registry cleaner is "Eusing Free Registry Cleaner" which is recommended by PC World, and can be obtained for free from the Eusing website. Another type of software utility is a disk defragmenter. A disk defragmenter basically collects partial pieces of the same file from all over your hard drive, and puts them back together into one file. There is a disk defragmenter program available for your use on every Windows OS that has been released, which is fairly simple to use, however if you prefer a more thorough disk defrag, you are better ...read more.

Middle

Formatting basically erases all data and also prepares the disk to store your data magnetically. If you have a version of Windows that is XP or under, then there is a handy tool to use that formats your C drive for you, this is called FDISK which can be run from command prompt. If you have a Vista powered computer, then you can use a 3rd party formatting software or partitioning software, such as Norton Partition Magic. 2. How to use disk defragmenter First of all go to Start - Programs - Accessories - System Tools - Disk Defragmenter. You will then get to this screen. From this screen you can choose which volume that you want to defragment. For example if you take a look in the above picture, you can see the E: drive highlighted. To continue, you can either go straight ahead with the defragmentation, or ask for an analysis of the volume you are defragmenting. If you choose the analysis then you will receive this report, which shows you all of the fragmented files on the volume that you have analyzed. When you have received the analysis you can either choose to defragment the volume or just leave it. ...read more.

Conclusion

5. How to install and clean peripherals First of all I will tell you how to install your peripheral. To install the printer, first plug the power cable into the plug socket in the wall. Next plug the USB cable into your computers USB port. Now insert the CD that came with the printer and run the setup file from the CD. When the setup is complete, turn the power on, on the printer and it will configure itself. Now to clean your screen, mouse and keyboard. Take a screen wipe and gently rub it against the screen in a side-to-side motion and cover the whole surface of it. Certain types of monitor will require different types of wipes, as not to damage the monitor. To clean the keyboard and mouse you can simply use the same screen wipe to clean around the keys on the keyboard and the buttons on the mouse. If you want to go more in depth with the cleaning, you can remove the keyboards keys to clean underneath and hard to reach places, and with the mouse, you can remove the ball and clean the dirt from the rollers that the ball rolls on (if you have a ball mouse). 6. For my agenda and minutes see the attached sheet. ?? ?? ?? ?? Kieran Egan Unit 2 - Task 3 Maintenance ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Computer Maintainance - anti-virus, cookie deletion, drive scanning

    -The glass monitor screen can be cleaned with ordinary household glass cleaner. -Be sure to remove power from the monitor. -Spray the cleaner onto a cloth so the fluid doesn't leak into the electrical components inside the monitor. -Vacuum off any dust that has settled on top of the monitor.

  2. Ways of Promoting a Website

    JavaScript allows the web page designer greater control and allows additional features to be incorporated that you couldn't just get with the standard HTML package. An example of Java script could be a link on a website that when clicked automatically opens up the favourites menu on the users computer to allow it to be book marked.

  1. Hardware and Software

    Task One (M1) I have outlined the following two hardware and stated the limitations of each hardware in terms of capture, manipulation and storage of graphics. 1. LCD (Liquid Crystal Display) Monitors 2. Inkjet Printer LCD (Liquid Crystal Display) Monitors: LCD (Liquid Crystal Display)

  2. Firewall Protection

    and through the NetBIOS communication. The NetBIOS is a standard for naming computers in small networks, developed long ago by IBM and Microsoft. There are a few communication standards which are used in relation to the NetBIOS. The ones that are relevant for Microsoft Windows operating systems, are: NBT (NetBIOS over TCP/IP), IPX/SPX, and NetBEUI.

  1. Ict Analysis

    * Also, if one member of staff fills up one form and another member of staff has to use it the next day it will be very hard to understand some peoples handwriting. This may cause inconvenience for the customer.

  2. Smart Card System

    Some of the smart card benefits are it has the ability to manage and control expenditures more effectively, fraud reduction, reduced paperwork and elimination of the need to complete redundant, time consuming forms. Now with Java Card technology, it has the ability to create smart card that can be run only platform.

  1. Flexible Architectures in Communication Security Application

    The dataflow experiments represent the maximum performance that the original code can achieve. Encryption performance is shown in bytes per 1000 clock cycles executed. This is a convenient metric because it represents the encryption performance in MB/s on a 1GHz machine.

  2. CP3 - Proposed Solution to a Realistic Problem - Apartment Administration software

    * To eliminate the use of pen and paper * Reduce the risk of human error by using a well constructed computer application * The ability to quickly create outputs for customers at a touch of a button. Outputs will include invoices which can be created either in word processing formats to send as letters or as emails.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work