SlideShare a Scribd company logo
1 of 21
P5 (PART 2): SET UP A
STANDALONE COMPUTER
SYSTEM, INSTALLING
HARDWARE AND
SOFTWARE
COMPONENTS
By George Smith-Moore
INSTALLING OPEN OFFICE
DOWNLOAD THE PROGRAM
I have loaded
up the
program and I
have followed
the on-screen
instructions to
download the
program.
DOWNLOAD THE PROGRAM
It has taken
me to the
download
section, The
download is in
process.
INSTALL OPEN OFFICE The program
has
downloaded,
The installer
has booted
up
automatically,
open office is
a free
alternative to
Microsoft
office word.
INSTALL OPEN OFFICE
Now the
program has
to be installed,
I have used
the default
path that it has
asked for. Yet
you can
change this to
another
destination if
required. This
location will be
where all of
the program
files will be
stored.
INSTALL OPEN OFFICE I have used an
example name
and business.
This allows me
to tailor the
software to suit
a particular
use. It would
improve the
professionalism
of his service.
INSTALLING OPENOFFICE
The program is now
installing.
The software will
allow him to create
spreadsheets,
letters/invoices,
presentations,
calculations, and
much more. Once
installed the
program will
launch at your
will.
INSTALLING AVG
DOWNLOADING THE PROGRAM
AVG is an
antivirus
program, it is
vital for any
online device
as it protects
the user from
hackers and
malicious
attacks.
DOWNLOADING AVG
As before, after
downloading,
the program will
install.
 The screenshots above show the first stages of the
installation of AVG free, he doesn’t need the paid
version as the main feature that you pay for is
support, this can be found freely online. Bonus
features like disk clean-up functions would not be
needed due to the free alternatives available.
 This is the final installation part, the computer is
almost protected, after the installation is
complete it is recommended that you check for
updates, and then perform a full system scan.
 I chose express install as the custom install just
lets you change the installation path. And
perhaps some extras (such as a shortcut on the
home screen).
AFTERWARDS
 After the program has installed, you would need
to check for updates, I have not provided
pictures for this, but I also created a ‘routine task’
so the antivirus system will check for updates
everyday automatically.
 The same goes for anti-virus scans, which are set
routinely. This ensures that the system would be
safe from any new threats that may appear.
INSTALLING SKYPE
DOWNLOADING SKYPE
 I have gone onto www.skype.com to download the
program.
 The program will allow free communication with
others that have the program. This program supports
unlimited interpersonal voice only calls, and an
allocated amount of time for face to face
communication. Also it allows for conference calls.
INSTALLING SKYPE SKYPE
 Click ‘yes’, to let the
program install
 Once it has
downloaded this will
pop-up, it is to say
that the program is
installing software
ONCE DOWNLOADED…
 The setup
program will
make sure the
correct settings
are adjusted for
your software.
 Click the
correct
language.
INSTALLATION PROCESS
 The page that
comes up next
shows some add-
ons that are not
required.
 If you feel that
they are not
necessary, don’t
tick the boxes.
NOW THE INSTALLATION!
 While this installs
all you can do is
wait.
COMPLETE!
 Now you can sign
in using a
Microsoft
account.
 You can now use
Skype as a free,
easy method of
communication.

More Related Content

What's hot (20)

Conducting test on the installed computer system
Conducting test on the installed computer systemConducting test on the installed computer system
Conducting test on the installed computer system
 
Troubleshooting
TroubleshootingTroubleshooting
Troubleshooting
 
Lesson 1.6
Lesson 1.6Lesson 1.6
Lesson 1.6
 
Lesson 3
Lesson 3Lesson 3
Lesson 3
 
Computer maintenance work plan
Computer maintenance  work plan Computer maintenance  work plan
Computer maintenance work plan
 
TYPES OF COMPUTER SYSTEM ERRORS
TYPES OF COMPUTER SYSTEM ERRORSTYPES OF COMPUTER SYSTEM ERRORS
TYPES OF COMPUTER SYSTEM ERRORS
 
Lesson 2.2
Lesson 2.2Lesson 2.2
Lesson 2.2
 
How to speed up your pc
How to speed up your pcHow to speed up your pc
How to speed up your pc
 
Pc dianosing
Pc dianosingPc dianosing
Pc dianosing
 
Computer fault
Computer fault Computer fault
Computer fault
 
Remote monitoring of pc- Project
Remote monitoring of pc- ProjectRemote monitoring of pc- Project
Remote monitoring of pc- Project
 
Lo1.2 types of computer system error
Lo1.2 types of computer system errorLo1.2 types of computer system error
Lo1.2 types of computer system error
 
Types of computer system error
Types of computer system errorTypes of computer system error
Types of computer system error
 
Computer maintenance
Computer maintenanceComputer maintenance
Computer maintenance
 
How to speed up your PC
How to speed up your PCHow to speed up your PC
How to speed up your PC
 
Computer maintenance lesson 4
Computer maintenance lesson 4Computer maintenance lesson 4
Computer maintenance lesson 4
 
Window
WindowWindow
Window
 
Presentation about virus part 1
Presentation about virus part 1Presentation about virus part 1
Presentation about virus part 1
 
Basic computer maintenance
Basic computer maintenanceBasic computer maintenance
Basic computer maintenance
 
Diagnosing and troubleshooting
Diagnosing and troubleshootingDiagnosing and troubleshooting
Diagnosing and troubleshooting
 

Similar to UNIT 2 P5 part 2

Software preparation
Software preparationSoftware preparation
Software preparationOriginalGSM
 
Installing software
Installing softwareInstalling software
Installing softwareAjay Jassi
 
Testing software
Testing softwareTesting software
Testing softwareAjay Jassi
 
Free tools for rapidly deploying software
Free tools for rapidly deploying softwareFree tools for rapidly deploying software
Free tools for rapidly deploying softwareConcentrated Technology
 
1.2-4 apps.pptx
1.2-4 apps.pptx1.2-4 apps.pptx
1.2-4 apps.pptxmardy10
 
Types of software, advantages and disadvantages
Types of software, advantages and disadvantagesTypes of software, advantages and disadvantages
Types of software, advantages and disadvantagesRocket11986
 
INSTALLING APPLICATION SOFTWARE - 10.pptx
INSTALLING APPLICATION SOFTWARE - 10.pptxINSTALLING APPLICATION SOFTWARE - 10.pptx
INSTALLING APPLICATION SOFTWARE - 10.pptxJohnnexterGubat3
 
MacBook Air Reference Guide
MacBook Air Reference GuideMacBook Air Reference Guide
MacBook Air Reference GuideMike Glennon
 
Components of computer
Components of computerComponents of computer
Components of computernirmeennimmu
 
How to install dragon naturally speaking on your
How to install dragon naturally speaking on yourHow to install dragon naturally speaking on your
How to install dragon naturally speaking on yourmcafee a
 
User guide - Scentys controller : Programming our ScentysBox
User guide - Scentys controller : Programming our ScentysBoxUser guide - Scentys controller : Programming our ScentysBox
User guide - Scentys controller : Programming our ScentysBoxspecimens
 
Make a portable application with thin app
Make a portable application with thin appMake a portable application with thin app
Make a portable application with thin appAnand Giri
 
Copy of LESSON 9 - INSTALLING DEVICE DRIVER.pptx
Copy of LESSON 9 - INSTALLING DEVICE DRIVER.pptxCopy of LESSON 9 - INSTALLING DEVICE DRIVER.pptx
Copy of LESSON 9 - INSTALLING DEVICE DRIVER.pptxJeirahTigas
 
TechMentor Fall, 2011 - Packaging Software for Automated Deployment with Wind...
TechMentor Fall, 2011 - Packaging Software for Automated Deployment with Wind...TechMentor Fall, 2011 - Packaging Software for Automated Deployment with Wind...
TechMentor Fall, 2011 - Packaging Software for Automated Deployment with Wind...Concentrated Technology
 

Similar to UNIT 2 P5 part 2 (20)

Software preparation
Software preparationSoftware preparation
Software preparation
 
Installing software
Installing softwareInstalling software
Installing software
 
INSTALLING SOFTWARE
INSTALLING SOFTWAREINSTALLING SOFTWARE
INSTALLING SOFTWARE
 
Testing software
Testing softwareTesting software
Testing software
 
Prepping software for w7 deployment
Prepping software for w7 deploymentPrepping software for w7 deployment
Prepping software for w7 deployment
 
Free tools for rapidly deploying software
Free tools for rapidly deploying softwareFree tools for rapidly deploying software
Free tools for rapidly deploying software
 
1.2-4 apps.pptx
1.2-4 apps.pptx1.2-4 apps.pptx
1.2-4 apps.pptx
 
Types of software, advantages and disadvantages
Types of software, advantages and disadvantagesTypes of software, advantages and disadvantages
Types of software, advantages and disadvantages
 
Unit 111: M3
Unit 111: M3Unit 111: M3
Unit 111: M3
 
Installation testing
Installation testingInstallation testing
Installation testing
 
Wolfeye monitor
Wolfeye monitorWolfeye monitor
Wolfeye monitor
 
INSTALLING APPLICATION SOFTWARE - 10.pptx
INSTALLING APPLICATION SOFTWARE - 10.pptxINSTALLING APPLICATION SOFTWARE - 10.pptx
INSTALLING APPLICATION SOFTWARE - 10.pptx
 
MacBook Air Reference Guide
MacBook Air Reference GuideMacBook Air Reference Guide
MacBook Air Reference Guide
 
Components of computer
Components of computerComponents of computer
Components of computer
 
How to install dragon naturally speaking on your
How to install dragon naturally speaking on yourHow to install dragon naturally speaking on your
How to install dragon naturally speaking on your
 
User guide - Scentys controller : Programming our ScentysBox
User guide - Scentys controller : Programming our ScentysBoxUser guide - Scentys controller : Programming our ScentysBox
User guide - Scentys controller : Programming our ScentysBox
 
Make a portable application with thin app
Make a portable application with thin appMake a portable application with thin app
Make a portable application with thin app
 
Skype
Skype Skype
Skype
 
Copy of LESSON 9 - INSTALLING DEVICE DRIVER.pptx
Copy of LESSON 9 - INSTALLING DEVICE DRIVER.pptxCopy of LESSON 9 - INSTALLING DEVICE DRIVER.pptx
Copy of LESSON 9 - INSTALLING DEVICE DRIVER.pptx
 
TechMentor Fall, 2011 - Packaging Software for Automated Deployment with Wind...
TechMentor Fall, 2011 - Packaging Software for Automated Deployment with Wind...TechMentor Fall, 2011 - Packaging Software for Automated Deployment with Wind...
TechMentor Fall, 2011 - Packaging Software for Automated Deployment with Wind...
 

More from OriginalGSM

UNIT 2 P6 part 2
UNIT 2 P6 part 2UNIT 2 P6 part 2
UNIT 2 P6 part 2OriginalGSM
 
UNIT 2 P4 and m2
UNIT 2 P4 and m2UNIT 2 P4 and m2
UNIT 2 P4 and m2OriginalGSM
 
UNIT 2 M3 and d2 v2
UNIT 2 M3 and d2 v2UNIT 2 M3 and d2 v2
UNIT 2 M3 and d2 v2OriginalGSM
 
ICT BTEC UNIT 2 P4 and M2
ICT BTEC UNIT 2 P4 and M2ICT BTEC UNIT 2 P4 and M2
ICT BTEC UNIT 2 P4 and M2OriginalGSM
 
ICT BTEC UNIT 2 P3 and D1
ICT BTEC UNIT 2 P3 and D1ICT BTEC UNIT 2 P3 and D1
ICT BTEC UNIT 2 P3 and D1OriginalGSM
 
ICT BTEC UNIT 2 P2
ICT BTEC UNIT 2 P2ICT BTEC UNIT 2 P2
ICT BTEC UNIT 2 P2OriginalGSM
 
ICT BTEC UNIT 2 P1
ICT BTEC UNIT 2 P1ICT BTEC UNIT 2 P1
ICT BTEC UNIT 2 P1OriginalGSM
 
ICT BTEC UNIT 2 M1
ICT BTEC UNIT 2 M1ICT BTEC UNIT 2 M1
ICT BTEC UNIT 2 M1OriginalGSM
 
Managing i.t security
Managing i.t securityManaging i.t security
Managing i.t securityOriginalGSM
 
Impact of i.t system breaches
Impact of i.t system breachesImpact of i.t system breaches
Impact of i.t system breachesOriginalGSM
 
Personalising desktop
Personalising desktopPersonalising desktop
Personalising desktopOriginalGSM
 
Software licences
Software licencesSoftware licences
Software licencesOriginalGSM
 
Preperation for the installation of computer hardware
Preperation for the installation of computer hardwarePreperation for the installation of computer hardware
Preperation for the installation of computer hardwareOriginalGSM
 
Installation of a selected piece of hardware
Installation of a selected piece of hardwareInstallation of a selected piece of hardware
Installation of a selected piece of hardwareOriginalGSM
 

More from OriginalGSM (20)

UNIT 2 P8
UNIT 2 P8UNIT 2 P8
UNIT 2 P8
 
UNIT 2 P6 part 2
UNIT 2 P6 part 2UNIT 2 P6 part 2
UNIT 2 P6 part 2
 
UNIT 2 P5
UNIT 2 P5UNIT 2 P5
UNIT 2 P5
 
UNIT 2 P4 and m2
UNIT 2 P4 and m2UNIT 2 P4 and m2
UNIT 2 P4 and m2
 
UNIT 2 P2
UNIT 2 P2UNIT 2 P2
UNIT 2 P2
 
UNIT 2 P1
UNIT 2 P1UNIT 2 P1
UNIT 2 P1
 
UNIT 2 M3 and d2 v2
UNIT 2 M3 and d2 v2UNIT 2 M3 and d2 v2
UNIT 2 M3 and d2 v2
 
UNIT 2 M1
UNIT 2 M1UNIT 2 M1
UNIT 2 M1
 
ICT BTEC UNIT 2 P4 and M2
ICT BTEC UNIT 2 P4 and M2ICT BTEC UNIT 2 P4 and M2
ICT BTEC UNIT 2 P4 and M2
 
ICT BTEC UNIT 2 P3 and D1
ICT BTEC UNIT 2 P3 and D1ICT BTEC UNIT 2 P3 and D1
ICT BTEC UNIT 2 P3 and D1
 
ICT BTEC UNIT 2 P2
ICT BTEC UNIT 2 P2ICT BTEC UNIT 2 P2
ICT BTEC UNIT 2 P2
 
ICT BTEC UNIT 2 P1
ICT BTEC UNIT 2 P1ICT BTEC UNIT 2 P1
ICT BTEC UNIT 2 P1
 
ICT BTEC UNIT 2 M1
ICT BTEC UNIT 2 M1ICT BTEC UNIT 2 M1
ICT BTEC UNIT 2 M1
 
Security plan
Security planSecurity plan
Security plan
 
Managing i.t security
Managing i.t securityManaging i.t security
Managing i.t security
 
Impact of i.t system breaches
Impact of i.t system breachesImpact of i.t system breaches
Impact of i.t system breaches
 
Personalising desktop
Personalising desktopPersonalising desktop
Personalising desktop
 
Software licences
Software licencesSoftware licences
Software licences
 
Preperation for the installation of computer hardware
Preperation for the installation of computer hardwarePreperation for the installation of computer hardware
Preperation for the installation of computer hardware
 
Installation of a selected piece of hardware
Installation of a selected piece of hardwareInstallation of a selected piece of hardware
Installation of a selected piece of hardware
 

Recently uploaded

Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 

Recently uploaded (20)

Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 

UNIT 2 P5 part 2

  • 1. P5 (PART 2): SET UP A STANDALONE COMPUTER SYSTEM, INSTALLING HARDWARE AND SOFTWARE COMPONENTS By George Smith-Moore
  • 3. DOWNLOAD THE PROGRAM I have loaded up the program and I have followed the on-screen instructions to download the program.
  • 4. DOWNLOAD THE PROGRAM It has taken me to the download section, The download is in process.
  • 5. INSTALL OPEN OFFICE The program has downloaded, The installer has booted up automatically, open office is a free alternative to Microsoft office word.
  • 6. INSTALL OPEN OFFICE Now the program has to be installed, I have used the default path that it has asked for. Yet you can change this to another destination if required. This location will be where all of the program files will be stored.
  • 7. INSTALL OPEN OFFICE I have used an example name and business. This allows me to tailor the software to suit a particular use. It would improve the professionalism of his service.
  • 8. INSTALLING OPENOFFICE The program is now installing. The software will allow him to create spreadsheets, letters/invoices, presentations, calculations, and much more. Once installed the program will launch at your will.
  • 10. DOWNLOADING THE PROGRAM AVG is an antivirus program, it is vital for any online device as it protects the user from hackers and malicious attacks.
  • 11. DOWNLOADING AVG As before, after downloading, the program will install.
  • 12.  The screenshots above show the first stages of the installation of AVG free, he doesn’t need the paid version as the main feature that you pay for is support, this can be found freely online. Bonus features like disk clean-up functions would not be needed due to the free alternatives available.
  • 13.  This is the final installation part, the computer is almost protected, after the installation is complete it is recommended that you check for updates, and then perform a full system scan.  I chose express install as the custom install just lets you change the installation path. And perhaps some extras (such as a shortcut on the home screen).
  • 14. AFTERWARDS  After the program has installed, you would need to check for updates, I have not provided pictures for this, but I also created a ‘routine task’ so the antivirus system will check for updates everyday automatically.  The same goes for anti-virus scans, which are set routinely. This ensures that the system would be safe from any new threats that may appear.
  • 16. DOWNLOADING SKYPE  I have gone onto www.skype.com to download the program.  The program will allow free communication with others that have the program. This program supports unlimited interpersonal voice only calls, and an allocated amount of time for face to face communication. Also it allows for conference calls.
  • 17. INSTALLING SKYPE SKYPE  Click ‘yes’, to let the program install  Once it has downloaded this will pop-up, it is to say that the program is installing software
  • 18. ONCE DOWNLOADED…  The setup program will make sure the correct settings are adjusted for your software.  Click the correct language.
  • 19. INSTALLATION PROCESS  The page that comes up next shows some add- ons that are not required.  If you feel that they are not necessary, don’t tick the boxes.
  • 20. NOW THE INSTALLATION!  While this installs all you can do is wait.
  • 21. COMPLETE!  Now you can sign in using a Microsoft account.  You can now use Skype as a free, easy method of communication.