Amie:Unit 3 P6
Upcoming SlideShare
Loading in...5

Amie:Unit 3 P6






Total Views
Views on SlideShare
Embed Views



0 Embeds 0

No embeds



Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
Post Comment
Edit your comment

    Amie:Unit 3 P6 Amie:Unit 3 P6 Presentation Transcript

    • Next Slide
    • Before starting the installation process, it is important to back up thecomputer as a precaution, just in case during the process, data andfiles are lost. This can be done, simply by using a blank disk or a USBstick.To complete this task, I used a program called ‘Virtual Box’ whichallows you to use a Windows Computer and operating system. First ofall, I created a file in ‘Notepad’, renamed it and saved it onto theDesktop. After, I went to the ‘Start Menu’, clicked on the link for ‘ControlPanel’ and then clicked on ‘Backup and Restore Centre.’ When I hadreached that step, I followed the steps and on each stage, I took ascreenshot, which can be found on the two previous slides.
    • These two pictures shows AVG (the anti-virus software that was installed)performing a scan after it was installed, to see whether there were any virusesor security threats on the computer.
    • It is extremely important to download anti-virus software onto the computer, inorder to protect data and files from being corrupted or destroyed. It is better toinstall the full version of the software to ensure maximum protection, but thereare basic versions which still protect your computer, and you can find them ontheir original websites. There are many security threats that can be foundwhich can damage data and files, and even your computer. Threats such asviruses, malware, adware, Trojans and Phishing sites are the most commontype, so it is the best idea to protect your computer.Viruses- They can be found on different websites and even sent in emails,which can reproduce to cause harm to files and data found on the computer.Malware- This software is programmed to damage the computer or it’s system.Trojans- This computer threat hides itself within files or data on the computer,in order to damage the computer.Phishing Websites- These are websites that act like the original websites, withthe intention of getting your credit/debit card details or your bank details.
    • If for any reason, during the installation process, the files were deletedor corrupted, the back-up from the disk or USB stick can be restoredonto the computer. They will be exactly the same and unharmed whenthey are restored. This can be done in the same way as backing up thefiles.First of all, you insert the Disk or the USB stick in the correct place, andthen you go to ‘Control Panel’, just like with the back-up, and click on‘Back-up and Restore Centre’ and click on ‘Restore Files’ and then justfollow the steps. The screenshots on the previous slides were takenwhen I was doing the task.
    • A scan can be scheduled at a certain time in order to the latest updates and to seewhether there are any security threats found on the computer.
    • After installing the Wireless NIC, you need to install the Network Driverin order for it to work and connect to the internet. In order to dothis, you need to insert the disk and follow the on-screen instructions.After the set-up has been completed, you can check by clicking on thelittle network icon, located at the bottom of the screen.