SlideShare a Scribd company logo
Next Slide
Before starting the installation process, it is important to back up the
computer as a precaution, just in case during the process, data and
files are lost. This can be done, simply by using a blank disk or a USB
stick.
To complete this task, I used a program called ‘Virtual Box’ which
allows you to use a Windows Computer and operating system. First of
all, I created a file in ‘Notepad’, renamed it and saved it onto the
Desktop. After, I went to the ‘Start Menu’, clicked on the link for ‘Control
Panel’ and then clicked on ‘Backup and Restore Centre.’ When I had
reached that step, I followed the steps and on each stage, I took a
screenshot, which can be found on the two previous slides.
These two pictures shows AVG (the anti-virus software that was installed)
performing a scan after it was installed, to see whether there were any viruses
or security threats on the computer.
It is extremely important to download anti-virus software onto the computer, in
order to protect data and files from being corrupted or destroyed. It is better to
install the full version of the software to ensure maximum protection, but there
are basic versions which still protect your computer, and you can find them on
their original websites. There are many security threats that can be found
which can damage data and files, and even your computer. Threats such as
viruses, malware, adware, Trojans and Phishing sites are the most common
type, so it is the best idea to protect your computer.
Viruses- They can be found on different websites and even sent in emails,
which can reproduce to cause harm to files and data found on the computer.
Malware- This software is programmed to damage the computer or it’s system.
Trojans- This computer threat hides itself within files or data on the computer,
in order to damage the computer.
Phishing Websites- These are websites that act like the original websites, with
the intention of getting your credit/debit card details or your bank details.
If for any reason, during the installation process, the files were deleted
or corrupted, the back-up from the disk or USB stick can be restored
onto the computer. They will be exactly the same and unharmed when
they are restored. This can be done in the same way as backing up the
files.
First of all, you insert the Disk or the USB stick in the correct place, and
then you go to ‘Control Panel’, just like with the back-up, and click on
‘Back-up and Restore Centre’ and click on ‘Restore Files’ and then just
follow the steps. The screenshots on the previous slides were taken
when I was doing the task.
A scan can be scheduled at a certain time in order to the latest updates and to see
whether there are any security threats found on the computer.
After installing the Wireless NIC, you need to install the Network Driver
in order for it to work and connect to the internet. In order to do
this, you need to insert the disk and follow the on-screen instructions.
After the set-up has been completed, you can check by clicking on the
little network icon, located at the bottom of the screen.

More Related Content

What's hot

Unit III - Basics of Computer Science
Unit III - Basics of Computer ScienceUnit III - Basics of Computer Science
Unit III - Basics of Computer Science
Hepsijeba
 
Basic pc trouble shooting
Basic pc trouble shootingBasic pc trouble shooting
Basic pc trouble shooting
Gener Luis Morada
 
Computer maintenance
Computer maintenanceComputer maintenance
Computer maintenance
Celia Bandelier
 
COMPUTER Trouble shooting
COMPUTER Trouble shootingCOMPUTER Trouble shooting
COMPUTER Trouble shooting
argusacademy
 
Lesson 3.2
Lesson 3.2Lesson 3.2
Windows 10: How to reset default settings
Windows 10: How to reset default settings Windows 10: How to reset default settings
Windows 10: How to reset default settings
Xoom Telecom
 
Troubleshooting
TroubleshootingTroubleshooting
Troubleshooting
Syed Fuzail
 
Photo Upload Utility2
Photo Upload Utility2Photo Upload Utility2
Photo Upload Utility2
CGIIBS
 
Forgot windows 10 laptop password? How to unlock?
Forgot windows 10 laptop password? How to unlock?Forgot windows 10 laptop password? How to unlock?
Forgot windows 10 laptop password? How to unlock?
kolden
 
Computer fault
Computer fault Computer fault
Computer maintenance
Computer maintenanceComputer maintenance
Computer maintenance
ramsashu15
 
Computer maintenance lesson 4
Computer maintenance lesson 4Computer maintenance lesson 4
Computer maintenance lesson 4
capjjj
 
PC Maintenance Security and Troubleshooting
PC Maintenance Security and TroubleshootingPC Maintenance Security and Troubleshooting
PC Maintenance Security and Troubleshooting
The Toolbox, Inc.
 
How to Fix DDORes.dll Error
How to Fix DDORes.dll Error How to Fix DDORes.dll Error
How to Fix DDORes.dll Error
Sheree Barrentine
 
Lesson 1.6
Lesson 1.6Lesson 1.6
How to remove malware from pc?
How to remove malware from pc?How to remove malware from pc?
How to remove malware from pc?
Patrick Presley
 
BASIC MAINTENANCE OF COMPUTER
BASIC MAINTENANCE OF COMPUTERBASIC MAINTENANCE OF COMPUTER
BASIC MAINTENANCE OF COMPUTER
Johndion Ruloma
 
Trouble shooting a computer
Trouble shooting a computerTrouble shooting a computer
Trouble shooting a computer
heidirobison
 
What is sethc.exe?
What is sethc.exe?What is sethc.exe?
What is sethc.exe?
FileInspect
 
Windows 7 What's Next
Windows 7 What's NextWindows 7 What's Next
Windows 7 What's Next
Vasu Jain
 

What's hot (20)

Unit III - Basics of Computer Science
Unit III - Basics of Computer ScienceUnit III - Basics of Computer Science
Unit III - Basics of Computer Science
 
Basic pc trouble shooting
Basic pc trouble shootingBasic pc trouble shooting
Basic pc trouble shooting
 
Computer maintenance
Computer maintenanceComputer maintenance
Computer maintenance
 
COMPUTER Trouble shooting
COMPUTER Trouble shootingCOMPUTER Trouble shooting
COMPUTER Trouble shooting
 
Lesson 3.2
Lesson 3.2Lesson 3.2
Lesson 3.2
 
Windows 10: How to reset default settings
Windows 10: How to reset default settings Windows 10: How to reset default settings
Windows 10: How to reset default settings
 
Troubleshooting
TroubleshootingTroubleshooting
Troubleshooting
 
Photo Upload Utility2
Photo Upload Utility2Photo Upload Utility2
Photo Upload Utility2
 
Forgot windows 10 laptop password? How to unlock?
Forgot windows 10 laptop password? How to unlock?Forgot windows 10 laptop password? How to unlock?
Forgot windows 10 laptop password? How to unlock?
 
Computer fault
Computer fault Computer fault
Computer fault
 
Computer maintenance
Computer maintenanceComputer maintenance
Computer maintenance
 
Computer maintenance lesson 4
Computer maintenance lesson 4Computer maintenance lesson 4
Computer maintenance lesson 4
 
PC Maintenance Security and Troubleshooting
PC Maintenance Security and TroubleshootingPC Maintenance Security and Troubleshooting
PC Maintenance Security and Troubleshooting
 
How to Fix DDORes.dll Error
How to Fix DDORes.dll Error How to Fix DDORes.dll Error
How to Fix DDORes.dll Error
 
Lesson 1.6
Lesson 1.6Lesson 1.6
Lesson 1.6
 
How to remove malware from pc?
How to remove malware from pc?How to remove malware from pc?
How to remove malware from pc?
 
BASIC MAINTENANCE OF COMPUTER
BASIC MAINTENANCE OF COMPUTERBASIC MAINTENANCE OF COMPUTER
BASIC MAINTENANCE OF COMPUTER
 
Trouble shooting a computer
Trouble shooting a computerTrouble shooting a computer
Trouble shooting a computer
 
What is sethc.exe?
What is sethc.exe?What is sethc.exe?
What is sethc.exe?
 
Windows 7 What's Next
Windows 7 What's NextWindows 7 What's Next
Windows 7 What's Next
 

Similar to Amie:Unit 3 P6

Software utilities p3 - unit 2
Software utilities   p3 - unit 2Software utilities   p3 - unit 2
Software utilities p3 - unit 2
Jack Bishop
 
so big 22
so big 22so big 22
so big 22
cainem
 
so big ppt
so big pptso big ppt
so big ppt
cainem
 
so big
so bigso big
so big
cainem
 
Operating systems 2
Operating systems 2Operating systems 2
Operating systems 2
mariacalji
 
Usb Control
Usb ControlUsb Control
Usb Control
tafinley
 
How To Keep Your Computer Running Fast
How To Keep Your Computer Running FastHow To Keep Your Computer Running Fast
How To Keep Your Computer Running Fast
Joel May
 
Computer virus
Computer virusComputer virus
Computer virus
dhamankar92
 
BASIC ICT SKILLS.docx
BASIC ICT SKILLS.docxBASIC ICT SKILLS.docx
BASIC ICT SKILLS.docx
NayanDeepDebnath
 
Intermediate computer skills
Intermediate computer skillsIntermediate computer skills
Intermediate computer skills
THickox
 
Assignment;
Assignment;Assignment;
Assignment;
Lukkather
 
Training Computer
Training ComputerTraining Computer
Training Computer
cmonasmith
 
Basic computer and RAM troubleshooting
Basic computer and RAM troubleshootingBasic computer and RAM troubleshooting
Basic computer and RAM troubleshooting
Leah Gonzales
 
Top 10 PC Maintenance Tasks That You Need To Remember
Top 10 PC Maintenance Tasks That You Need To RememberTop 10 PC Maintenance Tasks That You Need To Remember
Top 10 PC Maintenance Tasks That You Need To Remember
sherireid89
 
glary utilities pra que serve
glary utilities pra que serveglary utilities pra que serve
glary utilities pra que serve
Helbo46Helbo
 
UNIT 2 P3 and d1
UNIT 2 P3 and d1UNIT 2 P3 and d1
UNIT 2 P3 and d1
OriginalGSM
 
Operating systems
Operating systemsOperating systems
Operating systems
sandrahezro
 
ICT Skills.pptx
ICT Skills.pptxICT Skills.pptx
ICT Skills.pptx
Ankita Shirke
 
Efective computing
Efective computingEfective computing
Efective computing
Naveen Sihag
 
Efective computing
Efective computingEfective computing
Efective computing
Naveen Sihag
 

Similar to Amie:Unit 3 P6 (20)

Software utilities p3 - unit 2
Software utilities   p3 - unit 2Software utilities   p3 - unit 2
Software utilities p3 - unit 2
 
so big 22
so big 22so big 22
so big 22
 
so big ppt
so big pptso big ppt
so big ppt
 
so big
so bigso big
so big
 
Operating systems 2
Operating systems 2Operating systems 2
Operating systems 2
 
Usb Control
Usb ControlUsb Control
Usb Control
 
How To Keep Your Computer Running Fast
How To Keep Your Computer Running FastHow To Keep Your Computer Running Fast
How To Keep Your Computer Running Fast
 
Computer virus
Computer virusComputer virus
Computer virus
 
BASIC ICT SKILLS.docx
BASIC ICT SKILLS.docxBASIC ICT SKILLS.docx
BASIC ICT SKILLS.docx
 
Intermediate computer skills
Intermediate computer skillsIntermediate computer skills
Intermediate computer skills
 
Assignment;
Assignment;Assignment;
Assignment;
 
Training Computer
Training ComputerTraining Computer
Training Computer
 
Basic computer and RAM troubleshooting
Basic computer and RAM troubleshootingBasic computer and RAM troubleshooting
Basic computer and RAM troubleshooting
 
Top 10 PC Maintenance Tasks That You Need To Remember
Top 10 PC Maintenance Tasks That You Need To RememberTop 10 PC Maintenance Tasks That You Need To Remember
Top 10 PC Maintenance Tasks That You Need To Remember
 
glary utilities pra que serve
glary utilities pra que serveglary utilities pra que serve
glary utilities pra que serve
 
UNIT 2 P3 and d1
UNIT 2 P3 and d1UNIT 2 P3 and d1
UNIT 2 P3 and d1
 
Operating systems
Operating systemsOperating systems
Operating systems
 
ICT Skills.pptx
ICT Skills.pptxICT Skills.pptx
ICT Skills.pptx
 
Efective computing
Efective computingEfective computing
Efective computing
 
Efective computing
Efective computingEfective computing
Efective computing
 

More from AmieBodkin

Unit 111: M3
Unit 111: M3Unit 111: M3
Unit 111: M3
AmieBodkin
 
Unit 1 M1
Unit 1 M1Unit 1 M1
Unit 1 M1
AmieBodkin
 
Cisco: Unit 111- D1 OS
Cisco: Unit 111- D1 OS Cisco: Unit 111- D1 OS
Cisco: Unit 111- D1 OS
AmieBodkin
 
Unit 111 D1
Unit 111 D1 Unit 111 D1
Unit 111 D1
AmieBodkin
 
Amie- Cisco: Unit 3 P2
Amie- Cisco: Unit 3 P2Amie- Cisco: Unit 3 P2
Amie- Cisco: Unit 3 P2
AmieBodkin
 
Cisco: Unit 3 P1
Cisco: Unit 3 P1Cisco: Unit 3 P1
Cisco: Unit 3 P1
AmieBodkin
 
Amie- Unit 1 P6 and M2
Amie- Unit 1 P6 and M2Amie- Unit 1 P6 and M2
Amie- Unit 1 P6 and M2
AmieBodkin
 
Amie: Unit 3 P5
Amie: Unit 3 P5Amie: Unit 3 P5
Amie: Unit 3 P5
AmieBodkin
 
iPod Non-Technical Presentation
iPod Non-Technical PresentationiPod Non-Technical Presentation
iPod Non-Technical Presentation
AmieBodkin
 

More from AmieBodkin (9)

Unit 111: M3
Unit 111: M3Unit 111: M3
Unit 111: M3
 
Unit 1 M1
Unit 1 M1Unit 1 M1
Unit 1 M1
 
Cisco: Unit 111- D1 OS
Cisco: Unit 111- D1 OS Cisco: Unit 111- D1 OS
Cisco: Unit 111- D1 OS
 
Unit 111 D1
Unit 111 D1 Unit 111 D1
Unit 111 D1
 
Amie- Cisco: Unit 3 P2
Amie- Cisco: Unit 3 P2Amie- Cisco: Unit 3 P2
Amie- Cisco: Unit 3 P2
 
Cisco: Unit 3 P1
Cisco: Unit 3 P1Cisco: Unit 3 P1
Cisco: Unit 3 P1
 
Amie- Unit 1 P6 and M2
Amie- Unit 1 P6 and M2Amie- Unit 1 P6 and M2
Amie- Unit 1 P6 and M2
 
Amie: Unit 3 P5
Amie: Unit 3 P5Amie: Unit 3 P5
Amie: Unit 3 P5
 
iPod Non-Technical Presentation
iPod Non-Technical PresentationiPod Non-Technical Presentation
iPod Non-Technical Presentation
 

Amie:Unit 3 P6

  • 1.
  • 3.
  • 4. Before starting the installation process, it is important to back up the computer as a precaution, just in case during the process, data and files are lost. This can be done, simply by using a blank disk or a USB stick. To complete this task, I used a program called ‘Virtual Box’ which allows you to use a Windows Computer and operating system. First of all, I created a file in ‘Notepad’, renamed it and saved it onto the Desktop. After, I went to the ‘Start Menu’, clicked on the link for ‘Control Panel’ and then clicked on ‘Backup and Restore Centre.’ When I had reached that step, I followed the steps and on each stage, I took a screenshot, which can be found on the two previous slides.
  • 5.
  • 6.
  • 7. These two pictures shows AVG (the anti-virus software that was installed) performing a scan after it was installed, to see whether there were any viruses or security threats on the computer.
  • 8. It is extremely important to download anti-virus software onto the computer, in order to protect data and files from being corrupted or destroyed. It is better to install the full version of the software to ensure maximum protection, but there are basic versions which still protect your computer, and you can find them on their original websites. There are many security threats that can be found which can damage data and files, and even your computer. Threats such as viruses, malware, adware, Trojans and Phishing sites are the most common type, so it is the best idea to protect your computer. Viruses- They can be found on different websites and even sent in emails, which can reproduce to cause harm to files and data found on the computer. Malware- This software is programmed to damage the computer or it’s system. Trojans- This computer threat hides itself within files or data on the computer, in order to damage the computer. Phishing Websites- These are websites that act like the original websites, with the intention of getting your credit/debit card details or your bank details.
  • 9.
  • 10.
  • 11. If for any reason, during the installation process, the files were deleted or corrupted, the back-up from the disk or USB stick can be restored onto the computer. They will be exactly the same and unharmed when they are restored. This can be done in the same way as backing up the files. First of all, you insert the Disk or the USB stick in the correct place, and then you go to ‘Control Panel’, just like with the back-up, and click on ‘Back-up and Restore Centre’ and click on ‘Restore Files’ and then just follow the steps. The screenshots on the previous slides were taken when I was doing the task.
  • 12. A scan can be scheduled at a certain time in order to the latest updates and to see whether there are any security threats found on the computer.
  • 13.
  • 14. After installing the Wireless NIC, you need to install the Network Driver in order for it to work and connect to the internet. In order to do this, you need to insert the disk and follow the on-screen instructions. After the set-up has been completed, you can check by clicking on the little network icon, located at the bottom of the screen.