SlideShare a Scribd company logo
1 of 1
P3 – Prepare installation of a new software application
Ajay Jassi
What to take in consideration What should be done
When installing new software, an error may
occur that can cause damage to the
operating system and data.
Before installation, create a new updated
system restore point. This is because if an
error occurs, no system files will get corrupt
or lost.
Some features and software may not work
with the computer system.
Check the requirements before installing, to
ensure that it will work or not.
The software can be sluggish or broken. Check that that latest version is being
installed, as this fixes the bugs.
Type of installation. (clean or upgrade) Back-up data on a memory stick or disc, so
that data then can be transferred onto the
new software. (operating system) When
upgrading back-up isn’t necessary, but it is
recommended to in emergencies.
Previous software that are being replaced. Uninstall any previous version of the
software. This will prevent document clashes
and format errors.
The computer is clean from any viruses or
malware.
Run a full anti-virus scan, to see if there are
any harmful files on the system. If there is
software shouldn’t be installed, as this can
affected it. The viruses should be removed
before.
See if the computer system and drivers are
updated.
Update windows and all the drivers, so that
latest versions will enable the software and
system to run smother and it will meet the
recommendations and requirements.

More Related Content

What's hot

The complete guide for negative testing | David Tzemach
The complete guide for negative testing | David TzemachThe complete guide for negative testing | David Tzemach
The complete guide for negative testing | David TzemachDavid Tzemach
 
Work Examiner Overview
Work Examiner OverviewWork Examiner Overview
Work Examiner Overviewandrewstingray
 
Best practices for test automation
Best practices for test automationBest practices for test automation
Best practices for test automationDavid Tzemach
 
All you need to know about regression testing | David Tzemach
All you need to know about regression testing | David TzemachAll you need to know about regression testing | David Tzemach
All you need to know about regression testing | David TzemachDavid Tzemach
 
Fundamentals of testing jef (1)
Fundamentals of testing jef (1)Fundamentals of testing jef (1)
Fundamentals of testing jef (1)jefri_antoni
 
Software testing principles
Software testing principlesSoftware testing principles
Software testing principlesDonato Di Pierro
 
Fundamentals of testing (what is testing necessary)
Fundamentals of testing (what is testing necessary)Fundamentals of testing (what is testing necessary)
Fundamentals of testing (what is testing necessary)helfa safitri
 
4 Types of Load Testing That Everyone Should Know
4 Types of Load Testing That Everyone Should Know4 Types of Load Testing That Everyone Should Know
4 Types of Load Testing That Everyone Should KnowKiwiQA
 
Black Friday Is Approaching. Are You Prepared- Infographic
Black Friday Is Approaching. Are You Prepared- InfographicBlack Friday Is Approaching. Are You Prepared- Infographic
Black Friday Is Approaching. Are You Prepared- InfographicTestingXperts
 
Automation With A Tool Demo By Bhushan
Automation With A Tool Demo By BhushanAutomation With A Tool Demo By Bhushan
Automation With A Tool Demo By Bhushanbnehete
 
5 Ways to make load testing work for you
5 Ways to make load testing work for you5 Ways to make load testing work for you
5 Ways to make load testing work for youIsrael Rogoza
 
End to end testing - strategies
End to end testing - strategiesEnd to end testing - strategies
End to end testing - strategiesanuvip
 
fundamentals of testing (Fundamental of testing why)
fundamentals of testing (Fundamental of testing why)fundamentals of testing (Fundamental of testing why)
fundamentals of testing (Fundamental of testing why)diana fitri, S.Kom
 
Severity & priority in software testing
Severity & priority in software testingSeverity & priority in software testing
Severity & priority in software testingmedsherb
 
Phased conversion method of implementing new Information Systems ( By Jackson...
Phased conversion method of implementing new Information Systems ( By Jackson...Phased conversion method of implementing new Information Systems ( By Jackson...
Phased conversion method of implementing new Information Systems ( By Jackson...Jackson Tungamira
 
How Severe Is Your Bug?
How Severe Is Your Bug?How Severe Is Your Bug?
How Severe Is Your Bug?BugRaptors
 
Fundamentals of testing
Fundamentals of testingFundamentals of testing
Fundamentals of testingYusran5
 

What's hot (20)

The complete guide for negative testing | David Tzemach
The complete guide for negative testing | David TzemachThe complete guide for negative testing | David Tzemach
The complete guide for negative testing | David Tzemach
 
Work Examiner Overview
Work Examiner OverviewWork Examiner Overview
Work Examiner Overview
 
Best practices for test automation
Best practices for test automationBest practices for test automation
Best practices for test automation
 
Principles of software testing
Principles of software testingPrinciples of software testing
Principles of software testing
 
Testing introduction
Testing introductionTesting introduction
Testing introduction
 
All you need to know about regression testing | David Tzemach
All you need to know about regression testing | David TzemachAll you need to know about regression testing | David Tzemach
All you need to know about regression testing | David Tzemach
 
Fundamentals of testing jef (1)
Fundamentals of testing jef (1)Fundamentals of testing jef (1)
Fundamentals of testing jef (1)
 
Software testing principles
Software testing principlesSoftware testing principles
Software testing principles
 
Fundamentals of testing (what is testing necessary)
Fundamentals of testing (what is testing necessary)Fundamentals of testing (what is testing necessary)
Fundamentals of testing (what is testing necessary)
 
4 Types of Load Testing That Everyone Should Know
4 Types of Load Testing That Everyone Should Know4 Types of Load Testing That Everyone Should Know
4 Types of Load Testing That Everyone Should Know
 
Black Friday Is Approaching. Are You Prepared- Infographic
Black Friday Is Approaching. Are You Prepared- InfographicBlack Friday Is Approaching. Are You Prepared- Infographic
Black Friday Is Approaching. Are You Prepared- Infographic
 
Automation With A Tool Demo By Bhushan
Automation With A Tool Demo By BhushanAutomation With A Tool Demo By Bhushan
Automation With A Tool Demo By Bhushan
 
Patch management
Patch managementPatch management
Patch management
 
5 Ways to make load testing work for you
5 Ways to make load testing work for you5 Ways to make load testing work for you
5 Ways to make load testing work for you
 
End to end testing - strategies
End to end testing - strategiesEnd to end testing - strategies
End to end testing - strategies
 
fundamentals of testing (Fundamental of testing why)
fundamentals of testing (Fundamental of testing why)fundamentals of testing (Fundamental of testing why)
fundamentals of testing (Fundamental of testing why)
 
Severity & priority in software testing
Severity & priority in software testingSeverity & priority in software testing
Severity & priority in software testing
 
Phased conversion method of implementing new Information Systems ( By Jackson...
Phased conversion method of implementing new Information Systems ( By Jackson...Phased conversion method of implementing new Information Systems ( By Jackson...
Phased conversion method of implementing new Information Systems ( By Jackson...
 
How Severe Is Your Bug?
How Severe Is Your Bug?How Severe Is Your Bug?
How Severe Is Your Bug?
 
Fundamentals of testing
Fundamentals of testingFundamentals of testing
Fundamentals of testing
 

Similar to Preaparation for new software application

AV Comparatives 2013 (Comparación de Antivirus)
AV Comparatives 2013 (Comparación de Antivirus)AV Comparatives 2013 (Comparación de Antivirus)
AV Comparatives 2013 (Comparación de Antivirus)Doryan Mathos
 
Software utilities p3 - unit 2
Software utilities   p3 - unit 2Software utilities   p3 - unit 2
Software utilities p3 - unit 2Jack Bishop
 
UNIT 2 P3 and d1
UNIT 2 P3 and d1UNIT 2 P3 and d1
UNIT 2 P3 and d1OriginalGSM
 
Siri softwaretroubleshooting.doc
Siri softwaretroubleshooting.docSiri softwaretroubleshooting.doc
Siri softwaretroubleshooting.docsirikeshava
 
Software preparation
Software preparationSoftware preparation
Software preparationOriginalGSM
 
ANTIVIRUS
ANTIVIRUSANTIVIRUS
ANTIVIRUSfauscha
 
Amie:Unit 3 P6
Amie:Unit 3 P6Amie:Unit 3 P6
Amie:Unit 3 P6AmieBodkin
 
Uninstall program from window7
Uninstall program from window7Uninstall program from window7
Uninstall program from window7sean kingston
 
Window Desktop Application Testing
Window Desktop Application TestingWindow Desktop Application Testing
Window Desktop Application TestingTrupti Jethva
 
Software Management Iltce2007b
Software Management Iltce2007bSoftware Management Iltce2007b
Software Management Iltce2007bguest804df32c5
 
ICT BTEC UNIT 2 P3 and D1
ICT BTEC UNIT 2 P3 and D1ICT BTEC UNIT 2 P3 and D1
ICT BTEC UNIT 2 P3 and D1OriginalGSM
 
Chapter seven trouble and repair computer manual
Chapter seven trouble and repair computer manualChapter seven trouble and repair computer manual
Chapter seven trouble and repair computer manualMik Endale
 
Network Administrator Career
Network Administrator CareerNetwork Administrator Career
Network Administrator CareerBill Kuhl
 
Installing & Upgrading Software
Installing & Upgrading SoftwareInstalling & Upgrading Software
Installing & Upgrading SoftwareOmour Faruk Ali
 
Testing software
Testing softwareTesting software
Testing softwareAjay Jassi
 

Similar to Preaparation for new software application (20)

Avc per 201304_en
Avc per 201304_enAvc per 201304_en
Avc per 201304_en
 
AV Comparatives 2013 (Comparación de Antivirus)
AV Comparatives 2013 (Comparación de Antivirus)AV Comparatives 2013 (Comparación de Antivirus)
AV Comparatives 2013 (Comparación de Antivirus)
 
Installation testing
Installation testingInstallation testing
Installation testing
 
Software utilities p3 - unit 2
Software utilities   p3 - unit 2Software utilities   p3 - unit 2
Software utilities p3 - unit 2
 
UNIT 2 P3 and d1
UNIT 2 P3 and d1UNIT 2 P3 and d1
UNIT 2 P3 and d1
 
QuickHeal Anti-Virus
QuickHeal Anti-VirusQuickHeal Anti-Virus
QuickHeal Anti-Virus
 
Siri softwaretroubleshooting.doc
Siri softwaretroubleshooting.docSiri softwaretroubleshooting.doc
Siri softwaretroubleshooting.doc
 
Software preparation
Software preparationSoftware preparation
Software preparation
 
Pc dianosing
Pc dianosingPc dianosing
Pc dianosing
 
ANTIVIRUS
ANTIVIRUSANTIVIRUS
ANTIVIRUS
 
Amie:Unit 3 P6
Amie:Unit 3 P6Amie:Unit 3 P6
Amie:Unit 3 P6
 
Uninstall program from window7
Uninstall program from window7Uninstall program from window7
Uninstall program from window7
 
Window Desktop Application Testing
Window Desktop Application TestingWindow Desktop Application Testing
Window Desktop Application Testing
 
Software Management Iltce2007b
Software Management Iltce2007bSoftware Management Iltce2007b
Software Management Iltce2007b
 
ICT BTEC UNIT 2 P3 and D1
ICT BTEC UNIT 2 P3 and D1ICT BTEC UNIT 2 P3 and D1
ICT BTEC UNIT 2 P3 and D1
 
Computer is slow
Computer is slowComputer is slow
Computer is slow
 
Chapter seven trouble and repair computer manual
Chapter seven trouble and repair computer manualChapter seven trouble and repair computer manual
Chapter seven trouble and repair computer manual
 
Network Administrator Career
Network Administrator CareerNetwork Administrator Career
Network Administrator Career
 
Installing & Upgrading Software
Installing & Upgrading SoftwareInstalling & Upgrading Software
Installing & Upgrading Software
 
Testing software
Testing softwareTesting software
Testing software
 

More from Ajay Jassi

Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices Ajay Jassi
 
Managing IT Security
Managing IT SecurityManaging IT Security
Managing IT SecurityAjay Jassi
 
Impact on IT system breaches
Impact on IT system breachesImpact on IT system breaches
Impact on IT system breachesAjay Jassi
 
Configuring personal desktop
Configuring personal desktopConfiguring personal desktop
Configuring personal desktopAjay Jassi
 
Software Licences
Software LicencesSoftware Licences
Software LicencesAjay Jassi
 
Hardware Documentation and Benefits of Hardware Provider
Hardware Documentation and Benefits of Hardware ProviderHardware Documentation and Benefits of Hardware Provider
Hardware Documentation and Benefits of Hardware ProviderAjay Jassi
 
IT job role description for Technical Support Engineer
IT job role description for Technical Support EngineerIT job role description for Technical Support Engineer
IT job role description for Technical Support EngineerAjay Jassi
 
Characteristics for IT Employee (P1)
Characteristics for IT Employee (P1)Characteristics for IT Employee (P1)
Characteristics for IT Employee (P1)Ajay Jassi
 
Preparation for Installing Hardware
Preparation for Installing HardwarePreparation for Installing Hardware
Preparation for Installing HardwareAjay Jassi
 
Installation and Testing of Hardware
Installation and Testing of HardwareInstallation and Testing of Hardware
Installation and Testing of HardwareAjay Jassi
 
Reasons why Hardware is Installed and Potential Problems and the Precautions
Reasons why Hardware is Installed and Potential Problems and the PrecautionsReasons why Hardware is Installed and Potential Problems and the Precautions
Reasons why Hardware is Installed and Potential Problems and the PrecautionsAjay Jassi
 
Installation of Windows 7 using USB
Installation of Windows 7 using USBInstallation of Windows 7 using USB
Installation of Windows 7 using USBAjay Jassi
 
Potential problems that occur during hardware installation
Potential problems that occur during hardware installationPotential problems that occur during hardware installation
Potential problems that occur during hardware installationAjay Jassi
 
Building Computer System
Building Computer SystemBuilding Computer System
Building Computer SystemAjay Jassi
 
Installation and configuration of Wireless NIC
Installation and configuration of Wireless NICInstallation and configuration of Wireless NIC
Installation and configuration of Wireless NICAjay Jassi
 
Comparison between Windows 8 and Mavericks OS X
Comparison between Windows 8 and Mavericks OS XComparison between Windows 8 and Mavericks OS X
Comparison between Windows 8 and Mavericks OS XAjay Jassi
 
Upgrade Invoice
Upgrade InvoiceUpgrade Invoice
Upgrade InvoiceAjay Jassi
 
Personalising Desktop
Personalising DesktopPersonalising Desktop
Personalising DesktopAjay Jassi
 
Health and safety requirements for computer maintenance
Health and safety requirements for computer maintenanceHealth and safety requirements for computer maintenance
Health and safety requirements for computer maintenanceAjay Jassi
 
Computer Invoice
Computer InvoiceComputer Invoice
Computer InvoiceAjay Jassi
 

More from Ajay Jassi (20)

Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices
 
Managing IT Security
Managing IT SecurityManaging IT Security
Managing IT Security
 
Impact on IT system breaches
Impact on IT system breachesImpact on IT system breaches
Impact on IT system breaches
 
Configuring personal desktop
Configuring personal desktopConfiguring personal desktop
Configuring personal desktop
 
Software Licences
Software LicencesSoftware Licences
Software Licences
 
Hardware Documentation and Benefits of Hardware Provider
Hardware Documentation and Benefits of Hardware ProviderHardware Documentation and Benefits of Hardware Provider
Hardware Documentation and Benefits of Hardware Provider
 
IT job role description for Technical Support Engineer
IT job role description for Technical Support EngineerIT job role description for Technical Support Engineer
IT job role description for Technical Support Engineer
 
Characteristics for IT Employee (P1)
Characteristics for IT Employee (P1)Characteristics for IT Employee (P1)
Characteristics for IT Employee (P1)
 
Preparation for Installing Hardware
Preparation for Installing HardwarePreparation for Installing Hardware
Preparation for Installing Hardware
 
Installation and Testing of Hardware
Installation and Testing of HardwareInstallation and Testing of Hardware
Installation and Testing of Hardware
 
Reasons why Hardware is Installed and Potential Problems and the Precautions
Reasons why Hardware is Installed and Potential Problems and the PrecautionsReasons why Hardware is Installed and Potential Problems and the Precautions
Reasons why Hardware is Installed and Potential Problems and the Precautions
 
Installation of Windows 7 using USB
Installation of Windows 7 using USBInstallation of Windows 7 using USB
Installation of Windows 7 using USB
 
Potential problems that occur during hardware installation
Potential problems that occur during hardware installationPotential problems that occur during hardware installation
Potential problems that occur during hardware installation
 
Building Computer System
Building Computer SystemBuilding Computer System
Building Computer System
 
Installation and configuration of Wireless NIC
Installation and configuration of Wireless NICInstallation and configuration of Wireless NIC
Installation and configuration of Wireless NIC
 
Comparison between Windows 8 and Mavericks OS X
Comparison between Windows 8 and Mavericks OS XComparison between Windows 8 and Mavericks OS X
Comparison between Windows 8 and Mavericks OS X
 
Upgrade Invoice
Upgrade InvoiceUpgrade Invoice
Upgrade Invoice
 
Personalising Desktop
Personalising DesktopPersonalising Desktop
Personalising Desktop
 
Health and safety requirements for computer maintenance
Health and safety requirements for computer maintenanceHealth and safety requirements for computer maintenance
Health and safety requirements for computer maintenance
 
Computer Invoice
Computer InvoiceComputer Invoice
Computer Invoice
 

Recently uploaded

Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 

Recently uploaded (20)

Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 

Preaparation for new software application

  • 1. P3 – Prepare installation of a new software application Ajay Jassi What to take in consideration What should be done When installing new software, an error may occur that can cause damage to the operating system and data. Before installation, create a new updated system restore point. This is because if an error occurs, no system files will get corrupt or lost. Some features and software may not work with the computer system. Check the requirements before installing, to ensure that it will work or not. The software can be sluggish or broken. Check that that latest version is being installed, as this fixes the bugs. Type of installation. (clean or upgrade) Back-up data on a memory stick or disc, so that data then can be transferred onto the new software. (operating system) When upgrading back-up isn’t necessary, but it is recommended to in emergencies. Previous software that are being replaced. Uninstall any previous version of the software. This will prevent document clashes and format errors. The computer is clean from any viruses or malware. Run a full anti-virus scan, to see if there are any harmful files on the system. If there is software shouldn’t be installed, as this can affected it. The viruses should be removed before. See if the computer system and drivers are updated. Update windows and all the drivers, so that latest versions will enable the software and system to run smother and it will meet the recommendations and requirements.