SlideShare a Scribd company logo
1 of 21
P5 (PART 2): SET UP A
STANDALONE COMPUTER
SYSTEM, INSTALLING
HARDWARE AND
SOFTWARE
COMPONENTS
By George Smith-Moore
INSTALLING OPEN OFFICE
DOWNLOAD THE PROGRAM
I have loaded
up the
program and I
have followed
the on-screen
instructions to
download the
program.
DOWNLOAD THE PROGRAM
It has taken
me to the
download
section, The
download is in
process.
INSTALL OPEN OFFICE The program
has
downloaded,
The installer
has booted
up
automatically,
open office is
a free
alternative to
Microsoft
office word.
INSTALL OPEN OFFICE
Now the
program has
to be installed,
I have used
the default
path that it has
asked for. Yet
you can
change this to
another
destination if
required. This
location will be
where all of
the program
files will be
stored.
INSTALL OPEN OFFICE I have used an
example name
and business.
This allows me
to tailor the
software to suit
a particular
use. It would
improve the
professionalism
of his service.
INSTALLING OPENOFFICE
The program is now
installing.
The software will
allow him to create
spreadsheets,
letters/invoices,
presentations,
calculations, and
much more. Once
installed the
program will
launch at your
will.
INSTALLING AVG
DOWNLOADING THE PROGRAM
AVG is an
antivirus
program, it is
vital for any
online device
as it protects
the user from
hackers and
malicious
attacks.
DOWNLOADING AVG
As before, after
downloading,
the program will
install.
 The screenshots above show the first stages of the
installation of AVG free, he doesn’t need the paid
version as the main feature that you pay for is
support, this can be found freely online. Bonus
features like disk clean-up functions would not be
needed due to the free alternatives available.
 This is the final installation part, the computer is
almost protected, after the installation is
complete it is recommended that you check for
updates, and then perform a full system scan.
 I chose express install as the custom install just
lets you change the installation path. And
perhaps some extras (such as a shortcut on the
home screen).
AFTERWARDS
 After the program has installed, you would need
to check for updates, I have not provided
pictures for this, but I also created a ‘routine task’
so the antivirus system will check for updates
everyday automatically.
 The same goes for anti-virus scans, which are set
routinely. This ensures that the system would be
safe from any new threats that may appear.
INSTALLING SKYPE
DOWNLOADING SKYPE
 I have gone onto www.skype.com to download the
program.
 The program will allow free communication with
others that have the program. This program supports
unlimited interpersonal voice only calls, and an
allocated amount of time for face to face
communication. Also it allows for conference calls.
INSTALLING SKYPE SKYPE
 Click ‘yes’, to let the
program install
 Once it has
downloaded this will
pop-up, it is to say
that the program is
installing software
ONCE DOWNLOADED…
 The setup
program will
make sure the
correct settings
are adjusted for
your software.
 Click the
correct
language.
INSTALLATION PROCESS
 The page that
comes up next
shows some add-
ons that are not
required.
 If you feel that
they are not
necessary, don’t
tick the boxes.
NOW THE INSTALLATION!
 While this installs
all you can do is
wait.
COMPLETE!
 Now you can sign
in using a
Microsoft
account.
 You can now use
Skype as a free,
easy method of
communication.

More Related Content

What's hot (20)

Conducting test on the installed computer system
Conducting test on the installed computer systemConducting test on the installed computer system
Conducting test on the installed computer system
 
Troubleshooting
TroubleshootingTroubleshooting
Troubleshooting
 
Lesson 1.6
Lesson 1.6Lesson 1.6
Lesson 1.6
 
Lesson 3
Lesson 3Lesson 3
Lesson 3
 
Computer maintenance work plan
Computer maintenance  work plan Computer maintenance  work plan
Computer maintenance work plan
 
TYPES OF COMPUTER SYSTEM ERRORS
TYPES OF COMPUTER SYSTEM ERRORSTYPES OF COMPUTER SYSTEM ERRORS
TYPES OF COMPUTER SYSTEM ERRORS
 
Lesson 2.2
Lesson 2.2Lesson 2.2
Lesson 2.2
 
How to speed up your pc
How to speed up your pcHow to speed up your pc
How to speed up your pc
 
Pc dianosing
Pc dianosingPc dianosing
Pc dianosing
 
Computer fault
Computer fault Computer fault
Computer fault
 
Remote monitoring of pc- Project
Remote monitoring of pc- ProjectRemote monitoring of pc- Project
Remote monitoring of pc- Project
 
Lo1.2 types of computer system error
Lo1.2 types of computer system errorLo1.2 types of computer system error
Lo1.2 types of computer system error
 
Types of computer system error
Types of computer system errorTypes of computer system error
Types of computer system error
 
Computer maintenance
Computer maintenanceComputer maintenance
Computer maintenance
 
How to speed up your PC
How to speed up your PCHow to speed up your PC
How to speed up your PC
 
Computer maintenance lesson 4
Computer maintenance lesson 4Computer maintenance lesson 4
Computer maintenance lesson 4
 
Window
WindowWindow
Window
 
Presentation about virus part 1
Presentation about virus part 1Presentation about virus part 1
Presentation about virus part 1
 
Basic computer maintenance
Basic computer maintenanceBasic computer maintenance
Basic computer maintenance
 
Diagnosing and troubleshooting
Diagnosing and troubleshootingDiagnosing and troubleshooting
Diagnosing and troubleshooting
 

Similar to UNIT 2 P5 part 2

Software preparation
Software preparationSoftware preparation
Software preparationOriginalGSM
 
Installing software
Installing softwareInstalling software
Installing softwareAjay Jassi
 
Testing software
Testing softwareTesting software
Testing softwareAjay Jassi
 
Free tools for rapidly deploying software
Free tools for rapidly deploying softwareFree tools for rapidly deploying software
Free tools for rapidly deploying softwareConcentrated Technology
 
1.2-4 apps.pptx
1.2-4 apps.pptx1.2-4 apps.pptx
1.2-4 apps.pptxmardy10
 
Types of software, advantages and disadvantages
Types of software, advantages and disadvantagesTypes of software, advantages and disadvantages
Types of software, advantages and disadvantagesRocket11986
 
INSTALLING APPLICATION SOFTWARE - 10.pptx
INSTALLING APPLICATION SOFTWARE - 10.pptxINSTALLING APPLICATION SOFTWARE - 10.pptx
INSTALLING APPLICATION SOFTWARE - 10.pptxJohnnexterGubat3
 
MacBook Air Reference Guide
MacBook Air Reference GuideMacBook Air Reference Guide
MacBook Air Reference GuideMike Glennon
 
Components of computer
Components of computerComponents of computer
Components of computernirmeennimmu
 
How to install dragon naturally speaking on your
How to install dragon naturally speaking on yourHow to install dragon naturally speaking on your
How to install dragon naturally speaking on yourmcafee a
 
User guide - Scentys controller : Programming our ScentysBox
User guide - Scentys controller : Programming our ScentysBoxUser guide - Scentys controller : Programming our ScentysBox
User guide - Scentys controller : Programming our ScentysBoxspecimens
 
Make a portable application with thin app
Make a portable application with thin appMake a portable application with thin app
Make a portable application with thin appAnand Giri
 
Copy of LESSON 9 - INSTALLING DEVICE DRIVER.pptx
Copy of LESSON 9 - INSTALLING DEVICE DRIVER.pptxCopy of LESSON 9 - INSTALLING DEVICE DRIVER.pptx
Copy of LESSON 9 - INSTALLING DEVICE DRIVER.pptxJeirahTigas
 
TechMentor Fall, 2011 - Packaging Software for Automated Deployment with Wind...
TechMentor Fall, 2011 - Packaging Software for Automated Deployment with Wind...TechMentor Fall, 2011 - Packaging Software for Automated Deployment with Wind...
TechMentor Fall, 2011 - Packaging Software for Automated Deployment with Wind...Concentrated Technology
 

Similar to UNIT 2 P5 part 2 (20)

Software preparation
Software preparationSoftware preparation
Software preparation
 
Installing software
Installing softwareInstalling software
Installing software
 
INSTALLING SOFTWARE
INSTALLING SOFTWAREINSTALLING SOFTWARE
INSTALLING SOFTWARE
 
Testing software
Testing softwareTesting software
Testing software
 
Prepping software for w7 deployment
Prepping software for w7 deploymentPrepping software for w7 deployment
Prepping software for w7 deployment
 
Free tools for rapidly deploying software
Free tools for rapidly deploying softwareFree tools for rapidly deploying software
Free tools for rapidly deploying software
 
1.2-4 apps.pptx
1.2-4 apps.pptx1.2-4 apps.pptx
1.2-4 apps.pptx
 
Types of software, advantages and disadvantages
Types of software, advantages and disadvantagesTypes of software, advantages and disadvantages
Types of software, advantages and disadvantages
 
Unit 111: M3
Unit 111: M3Unit 111: M3
Unit 111: M3
 
Installation testing
Installation testingInstallation testing
Installation testing
 
Wolfeye monitor
Wolfeye monitorWolfeye monitor
Wolfeye monitor
 
INSTALLING APPLICATION SOFTWARE - 10.pptx
INSTALLING APPLICATION SOFTWARE - 10.pptxINSTALLING APPLICATION SOFTWARE - 10.pptx
INSTALLING APPLICATION SOFTWARE - 10.pptx
 
MacBook Air Reference Guide
MacBook Air Reference GuideMacBook Air Reference Guide
MacBook Air Reference Guide
 
Components of computer
Components of computerComponents of computer
Components of computer
 
How to install dragon naturally speaking on your
How to install dragon naturally speaking on yourHow to install dragon naturally speaking on your
How to install dragon naturally speaking on your
 
User guide - Scentys controller : Programming our ScentysBox
User guide - Scentys controller : Programming our ScentysBoxUser guide - Scentys controller : Programming our ScentysBox
User guide - Scentys controller : Programming our ScentysBox
 
Make a portable application with thin app
Make a portable application with thin appMake a portable application with thin app
Make a portable application with thin app
 
Skype
Skype Skype
Skype
 
Copy of LESSON 9 - INSTALLING DEVICE DRIVER.pptx
Copy of LESSON 9 - INSTALLING DEVICE DRIVER.pptxCopy of LESSON 9 - INSTALLING DEVICE DRIVER.pptx
Copy of LESSON 9 - INSTALLING DEVICE DRIVER.pptx
 
TechMentor Fall, 2011 - Packaging Software for Automated Deployment with Wind...
TechMentor Fall, 2011 - Packaging Software for Automated Deployment with Wind...TechMentor Fall, 2011 - Packaging Software for Automated Deployment with Wind...
TechMentor Fall, 2011 - Packaging Software for Automated Deployment with Wind...
 

More from OriginalGSM

UNIT 2 P6 part 2
UNIT 2 P6 part 2UNIT 2 P6 part 2
UNIT 2 P6 part 2OriginalGSM
 
UNIT 2 P4 and m2
UNIT 2 P4 and m2UNIT 2 P4 and m2
UNIT 2 P4 and m2OriginalGSM
 
UNIT 2 M3 and d2 v2
UNIT 2 M3 and d2 v2UNIT 2 M3 and d2 v2
UNIT 2 M3 and d2 v2OriginalGSM
 
ICT BTEC UNIT 2 P4 and M2
ICT BTEC UNIT 2 P4 and M2ICT BTEC UNIT 2 P4 and M2
ICT BTEC UNIT 2 P4 and M2OriginalGSM
 
ICT BTEC UNIT 2 P3 and D1
ICT BTEC UNIT 2 P3 and D1ICT BTEC UNIT 2 P3 and D1
ICT BTEC UNIT 2 P3 and D1OriginalGSM
 
ICT BTEC UNIT 2 P2
ICT BTEC UNIT 2 P2ICT BTEC UNIT 2 P2
ICT BTEC UNIT 2 P2OriginalGSM
 
ICT BTEC UNIT 2 P1
ICT BTEC UNIT 2 P1ICT BTEC UNIT 2 P1
ICT BTEC UNIT 2 P1OriginalGSM
 
ICT BTEC UNIT 2 M1
ICT BTEC UNIT 2 M1ICT BTEC UNIT 2 M1
ICT BTEC UNIT 2 M1OriginalGSM
 
Managing i.t security
Managing i.t securityManaging i.t security
Managing i.t securityOriginalGSM
 
Impact of i.t system breaches
Impact of i.t system breachesImpact of i.t system breaches
Impact of i.t system breachesOriginalGSM
 
Personalising desktop
Personalising desktopPersonalising desktop
Personalising desktopOriginalGSM
 
Software licences
Software licencesSoftware licences
Software licencesOriginalGSM
 
Preperation for the installation of computer hardware
Preperation for the installation of computer hardwarePreperation for the installation of computer hardware
Preperation for the installation of computer hardwareOriginalGSM
 
Installation of a selected piece of hardware
Installation of a selected piece of hardwareInstallation of a selected piece of hardware
Installation of a selected piece of hardwareOriginalGSM
 

More from OriginalGSM (20)

UNIT 2 P8
UNIT 2 P8UNIT 2 P8
UNIT 2 P8
 
UNIT 2 P6 part 2
UNIT 2 P6 part 2UNIT 2 P6 part 2
UNIT 2 P6 part 2
 
UNIT 2 P5
UNIT 2 P5UNIT 2 P5
UNIT 2 P5
 
UNIT 2 P4 and m2
UNIT 2 P4 and m2UNIT 2 P4 and m2
UNIT 2 P4 and m2
 
UNIT 2 P2
UNIT 2 P2UNIT 2 P2
UNIT 2 P2
 
UNIT 2 P1
UNIT 2 P1UNIT 2 P1
UNIT 2 P1
 
UNIT 2 M3 and d2 v2
UNIT 2 M3 and d2 v2UNIT 2 M3 and d2 v2
UNIT 2 M3 and d2 v2
 
UNIT 2 M1
UNIT 2 M1UNIT 2 M1
UNIT 2 M1
 
ICT BTEC UNIT 2 P4 and M2
ICT BTEC UNIT 2 P4 and M2ICT BTEC UNIT 2 P4 and M2
ICT BTEC UNIT 2 P4 and M2
 
ICT BTEC UNIT 2 P3 and D1
ICT BTEC UNIT 2 P3 and D1ICT BTEC UNIT 2 P3 and D1
ICT BTEC UNIT 2 P3 and D1
 
ICT BTEC UNIT 2 P2
ICT BTEC UNIT 2 P2ICT BTEC UNIT 2 P2
ICT BTEC UNIT 2 P2
 
ICT BTEC UNIT 2 P1
ICT BTEC UNIT 2 P1ICT BTEC UNIT 2 P1
ICT BTEC UNIT 2 P1
 
ICT BTEC UNIT 2 M1
ICT BTEC UNIT 2 M1ICT BTEC UNIT 2 M1
ICT BTEC UNIT 2 M1
 
Security plan
Security planSecurity plan
Security plan
 
Managing i.t security
Managing i.t securityManaging i.t security
Managing i.t security
 
Impact of i.t system breaches
Impact of i.t system breachesImpact of i.t system breaches
Impact of i.t system breaches
 
Personalising desktop
Personalising desktopPersonalising desktop
Personalising desktop
 
Software licences
Software licencesSoftware licences
Software licences
 
Preperation for the installation of computer hardware
Preperation for the installation of computer hardwarePreperation for the installation of computer hardware
Preperation for the installation of computer hardware
 
Installation of a selected piece of hardware
Installation of a selected piece of hardwareInstallation of a selected piece of hardware
Installation of a selected piece of hardware
 

Recently uploaded

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 

Recently uploaded (20)

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 

UNIT 2 P5 part 2

  • 1. P5 (PART 2): SET UP A STANDALONE COMPUTER SYSTEM, INSTALLING HARDWARE AND SOFTWARE COMPONENTS By George Smith-Moore
  • 3. DOWNLOAD THE PROGRAM I have loaded up the program and I have followed the on-screen instructions to download the program.
  • 4. DOWNLOAD THE PROGRAM It has taken me to the download section, The download is in process.
  • 5. INSTALL OPEN OFFICE The program has downloaded, The installer has booted up automatically, open office is a free alternative to Microsoft office word.
  • 6. INSTALL OPEN OFFICE Now the program has to be installed, I have used the default path that it has asked for. Yet you can change this to another destination if required. This location will be where all of the program files will be stored.
  • 7. INSTALL OPEN OFFICE I have used an example name and business. This allows me to tailor the software to suit a particular use. It would improve the professionalism of his service.
  • 8. INSTALLING OPENOFFICE The program is now installing. The software will allow him to create spreadsheets, letters/invoices, presentations, calculations, and much more. Once installed the program will launch at your will.
  • 10. DOWNLOADING THE PROGRAM AVG is an antivirus program, it is vital for any online device as it protects the user from hackers and malicious attacks.
  • 11. DOWNLOADING AVG As before, after downloading, the program will install.
  • 12.  The screenshots above show the first stages of the installation of AVG free, he doesn’t need the paid version as the main feature that you pay for is support, this can be found freely online. Bonus features like disk clean-up functions would not be needed due to the free alternatives available.
  • 13.  This is the final installation part, the computer is almost protected, after the installation is complete it is recommended that you check for updates, and then perform a full system scan.  I chose express install as the custom install just lets you change the installation path. And perhaps some extras (such as a shortcut on the home screen).
  • 14. AFTERWARDS  After the program has installed, you would need to check for updates, I have not provided pictures for this, but I also created a ‘routine task’ so the antivirus system will check for updates everyday automatically.  The same goes for anti-virus scans, which are set routinely. This ensures that the system would be safe from any new threats that may appear.
  • 16. DOWNLOADING SKYPE  I have gone onto www.skype.com to download the program.  The program will allow free communication with others that have the program. This program supports unlimited interpersonal voice only calls, and an allocated amount of time for face to face communication. Also it allows for conference calls.
  • 17. INSTALLING SKYPE SKYPE  Click ‘yes’, to let the program install  Once it has downloaded this will pop-up, it is to say that the program is installing software
  • 18. ONCE DOWNLOADED…  The setup program will make sure the correct settings are adjusted for your software.  Click the correct language.
  • 19. INSTALLATION PROCESS  The page that comes up next shows some add- ons that are not required.  If you feel that they are not necessary, don’t tick the boxes.
  • 20. NOW THE INSTALLATION!  While this installs all you can do is wait.
  • 21. COMPLETE!  Now you can sign in using a Microsoft account.  You can now use Skype as a free, easy method of communication.