1 Computer Maintenance Software Configuration: Evaluating Software Packages, Software Licensing, and Computer Protection through the Installation and Maintenance.

Slides:



Advertisements
Similar presentations
Chapter 3: Software Basics Section I: Preparing to Use Technology.
Advertisements

A Quick Review of Unit 2 – Using Windows 7 Computing Fundamentals © CCI Learning Solutions.
HOW WELL DO YOU KNOW THE BASICS OF USING YOUR COMPUTER?
5-9/12/2005 CPE How to format your computer and re-install Windows XP.
What Is Malwarebytes? Malwarebytes is a free anti- malware program. Anti-malware programs are specifically designed to find and remove malware on your.
Application Software: Essentials for knowledge workers
 Contents 1.Introduction about operating system. 2. What is 32 bit and 64 bit operating system. 3. File systems. 4. Minimum requirement for Windows 7.
Installing software on personal computer
General concepts of ICT systems.  Know what is meant by the terms ‘hardware’ and ‘software’  Understand the difference between systems software and.
Using Anti-virus Software A SeniorNet Workshop SeniorNet is a service program of the Lutheran Service Society of Western Pennsylvania.
11 MAINTAINING THE OPERATING SYSTEM Chapter 5. Chapter 5: MAINTAINING THE OPERATING SYSTEM2 CHAPTER OVERVIEW Understand the difference between service.
11 MAINTAINING THE OPERATING SYSTEM Chapter 5. Chapter 5: MAINTAINING THE OPERATING SYSTEM2 CHAPTER OVERVIEW  Understand the difference between service.
With Microsoft Windows 7© 2012 Pearson Education, Inc. Publishing as Prentice Hall1 PowerPoint Presentation to Accompany GO! with Microsoft ® Windows 7.
Digital Logic and State Machine Design Installing Xilinx WebPACK 12.4 CS 2204 Digital Hardware.
Section 2.1 Identify hardware Describe processing components Compare and contrast input and output devices Compare and contrast storage devices Section.
Fundamentals of Networking Discovery 1, Chapter 2 Operating Systems.
By: Dwayne Burl.  The Central Processing Unit (CPU) is responsible for interpreting and executing most of the commands from the computer's hardware and.
Submitted by Ravi Prakash PGT(Computer Sc.) KV39 GTC Varanasi
Introduction to HP LoadRunner Getting Familiar with LoadRunner >>>>>>>>>>>>>>>>>>>>>>
Hands-On Microsoft Windows Server 2008
Today’s Agenda: Computer Basics Review Hardware: The physical components of a computer, any internal or external computer part that you can touch. Software:
Hacker Zombie Computer Reflectors Target.
Tutorial 11 Installing, Updating, and Configuring Software
Computer Maintenance Unit Subtitle: Basic Input/Output System (BIOS) Excerpted from 1 Copyright © Texas Education Agency, All.
November 2014Prepared by the Computer Lab Montgomery County-Norristown Public Library.
Networks and Hackers Copyright © Texas Education Agency, All rights reserved. 1.
Learning Targets Identify the external parts of the computer Identify examples of input devices Identify examples of output devices Define basic computer.
Chapter SIx Maintaining a Computer Part I: Configuring, Updating, and Upgrading the OS.
How to remove spyware from your PC using Spybot S&D? A SeniorNet Workshop SeniorNet is a service program of the Lutheran Service Society of Western Pennsylvania.
Utility Programs Lesson Objective: Understanding the functions of an operating system. Learning Outcome: Answer some basic questions on operating systems.
What does a Computer Do?. What is a Computer? A computer is an electronic device, operating under the control of instructions stored in its own memory,
Gorman, Stubbs, & CEP Inc. 1 Introduction to Operating Systems Lesson 4 Microsoft Windows XP.
Section 2 Section 2.1 Identify hardware Describe processing components Compare and contrast input and output devices Compare and contrast storage devices.
Software. Software or Programs A set of detailed directions telling the computer exactly what to do, one step at a time. Can be one line of code or several.
Chapter 5 Protecting Your PC from Viruses Prepared by: Khurram N. Shamsi.
MCTS Guide to Microsoft Windows Server 2008 Applications Infrastructure Configuration (Exam # ) Chapter Four Windows Server 2008 Remote Desktop Services,
How to Install Malwarebytes Anti- Malware Software Khushbu Shah ENG 393 May 4 th, 2010.
1 Computer Maintenance Upgrading Your PC: Flash Memory and Gathering User Information Copyright © Texas Education Agency, All rights reserved.
Chapter Six Maintaining a Computer Part II: Installing, Repairing, and Removing Applications.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Installing Linux. Module 1 – Installing Linux ♦ Overview This module introduces you to the hardware and software terminology necessary to install a Linux.
Presenter: Le Quoc Thanh SPYWARE ANALYSIS AND DETECTION.
 Hardware compatibility means that software will run properly on the computer in which it is installed.  When purchasing software, look for one of these.
CSC190 Introduction to Computing Operating Systems and Utility Programs.
1 Computer Technician Computer Software: Failures, Corruptions, Repair, and the Future of Computing Copyright © Texas Education Agency, All rights.
1 Computer Technician Computer Software: Types, Setup, and Ethical Boundaries Copyright © Texas Education Agency, All rights reserved.
Unit 1: Computing Fundamentals. Computer Tour-There are 7 major components inside a computer  Write down each major component as it is discussed.  Watch.
Optimization Written by: Tim Keyser Georgia CTAE Resource Network 2010.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
By: Dwayne Burl. 1. The definition and its history of a computer 2. The components that are needed for the built of a computer. 3. The step of the built.
Software Installation and Copyrights Basic Computer Concepts Installation Basics  Installation Process  Copy files from distribution disks.
2: Operating Systems Networking for Home & Small Business.
Automating Installations by Using the Microsoft Windows 2000 Setup Manager Create setup scripts simply and easily. Create and modify answer files and UDFs.
John Samuels October, Why Now?  Vista Problems  New Features  >4GB Memory Support  Experience.
AVG Customer Support Dial Toll Free:- +1(800) Avg.antivirussupportphonenumber.com Login:-
ICAICT201A USE COMPUTER OPERATING SYSTEM. USING THE CONTROL PANEL The Control Panel contains many options for configuring your computer, including: adding.
Computer Basics and Vocabulary Lecture: 1 Mrs. Najwa Almazroei1.
Computer Maintenance Software Configuration: Evaluating Software Packages, Software Licensing, and Computer Protection through the Installation and Maintenance.
Introduction to Computers Mrs. Gambucci
Managing Windows Security
Section 2.1 Section 2.2 Identify hardware
Operating System Review
HOW WELL DO YOU KNOW THE BASICS OF USING YOUR COMPUTER?
Lecture 4 : Windows 7 By MSc. Manar Joundy Hazar 2017
Computers Are Your Future
Operating System Review
Computer Maintenance Software Configuration: Evaluating Software Packages, Software Licensing, and Computer Protection through the Installation and Maintenance.
CHAPTER 2: OPERATING SYSTEMS (Part 2) COMPUTER SKILLS.
Upgrading Your PC: Flash Memory and Gathering User Information
Windows Operating System
Presentation transcript:

1 Computer Maintenance Software Configuration: Evaluating Software Packages, Software Licensing, and Computer Protection through the Installation and Maintenance of Security Software Copyright © Texas Education Agency, All rights reserved.

Course Objectives Evaluate software packages to determine the compatibility of the software to the hardware on the computer Determine that the software is properly licensed prior to installation Define, install, and maintain security software Copyright © Texas Education Agency, All rights reserved.2

Software Configuration: Functionality, and Compatibility Computer software: A program made up of bits and bytes of information that is loaded and used on the computer Also known as an application Many different types of of software programs Each piece of software serves a a particular purpose in making the computer function Copyright © Texas Education Agency, All rights reserved.3

Software Configuration: Functionality, and Compatibility Computer hardware: A collection of components put together to form a functioning computer Components include the CPU (Central Processing Unit), motherboard, graphics card, power supply, memory, hard drive, optical drive, fan, monitor, keyboard, mouse, and other optional components like speakers Copyright © Texas Education Agency, All rights reserved.4

Software Configuration: Functionality, and Compatibility Software compatibility: The ability for a software application to function with a computer’s hardware Copyright © Texas Education Agency, All rights reserved.5

Software Compatibility Things to look for and consider when selecting a software application package Compatible operating systems The software’s minimum system requirements The software’s recommended system requirements The hardware specifications of the computer The level of functionality that can be expected based on the hardware it is installed on End users licensing agreement Copyright © Texas Education Agency, All rights reserved.6

Software Compatibility Copyright © Texas Education Agency, All rights reserved.7 Minimum system requirements Tends to increase over time as hardware becomes more powerful Tells you if the software will run on the computer Helps gauge the level of performance that can be expected once installed

Software Compatibility Recommended hardware specifications Has a higher requirement than the minimum system requirements Ensures the optimal performance intended by the manufacturer Targets the mid point of computer hardware capabilities at the time the software was released Copyright © Texas Education Agency, All rights reserved.8

Software Compatibility Assessing the level of functionality for application software Know the computer’s hardware When gathering data, compile a list of information including the following: Operating system, CPU and speed, amount of installed memory, hard drive capacity, video card, sound card, network cards, optical drives, and other hardware Copyright © Texas Education Agency, All rights reserved.9

Software Compatibility Assessing the level of functionality for application software includes the following: Ensures the computer’s specifications meet or exceed the listed system requirements on the software for baseline performance The software package will run, but it will likely be slow to respond or run very slowly Compares the recommended specifications to the computer hardware if it exceeds the software’s system requirements The higher the hardware capability is, the more responsive you can expect the application to be Copyright © Texas Education Agency, All rights reserved.10

Software Licensing Software license: A legal contract that regulates the usage and distribution of software. The user is presented with the specified terms at installation. Copyright © Texas Education Agency, All rights reserved.11

Software licenses indicate the number of computers that can legally have the software installed. Licenses will also indicate the number of authorized users (Ex. A photographer looking for a photo editing package would not be eligible for the student pricing unless he or she was a student.) Copyright © Texas Education Agency, All rights reserved.12 Software Licensing

End User License Agreement (EULA) States the rights of the end user and how the software may be used EULA is the agreement that must be accepted prior to the installation of the software. It is designed to limit the unlawful use or distribution of the software. Copyright © Texas Education Agency, All rights reserved.13

Security Software Security software: General terminology used to define different computer applications that are designed to protect a computer or computer system in a specific way Copyright © Texas Education Agency, All rights reserved.14

Security Software Different types of security software Anti-virus software Prevents infection, detects and removes malware that may allow unwanted changes to the computer Firewall software Controls data traffic flow while securing a network Internet security software Anti-malware software that monitors the Internet browser, and other applications that open connectivity to the Internet Anti-spyware software Removes programs that monitor and report the user’s actions on a computer Copyright © Texas Education Agency, All rights reserved.15

Security Software Important things to note about security software It is never 100% effective You must exercise caution when visiting websites, opening s, and handling files that are downloaded. Security software can scan these files, but they only detect what has already been identified. Some types of malware are not able to be removed and can require a reinstallation of the operating system. Copyright © Texas Education Agency, All rights reserved.16

Security Software Installing security software Two ways to install security software: Download and install the software from the Internet Purchase a retail package of the software and install it by the CD-ROM Maintaining security software Security software should auto update During installation, the auto update and scan should default to “enabled.” Use this setting. When security software is being updated afterwards, there will be a pop-up window to let you know about the update. Copyright © Texas Education Agency, All rights reserved.17

Security Software Downloading security software (Some security applications are free) Click to download or purchase the software. On completion of download, open the download folder where the download was saved. Double click the installer icon or executable (Exe.) Follow onscreen prompts and accept the (EULA). The software should run a complete scan of the computer’s hard drive once it is installed. Copyright © Texas Education Agency, All rights reserved.18

Security Software Installing security software (CD-ROM) Insert disk. Double click the install icon on the desktop and again if necessary when the installer window appears. Follow the on-screen prompts and accept the (EULA). The software should run an updater for current security definitions and perform a complete scan of the computer’s hard drive. Eject the disk. Copyright © Texas Education Agency, All rights reserved.19

Independent or Group Work Group Get into your groups. Obtain one of the boxes that contains the various software applications and notecards describing 5 different computer hardware specifications. Match the notecard with the software application that would be best suited to run that software. Once complete, all the groups will review their matches with the teacher. Take detailed notes on each group’s research as it is being presented. Individual Log into the demo computer in the classroom. You will have the choice of downloading a free anti-virus program or installing it by CD-ROM. Install the antivirus program and run a complete scan of the computer’s hard drive. When you are finished, raise your hand for the teacher to come and inspect your work. Copyright © Texas Education Agency, All rights reserved.20

Exam Preparation An exam will be given over the material presented in this lesson. Make sure to review your class notes and these slides. Questions will be multiple choice and true or false. Copyright © Texas Education Agency, All rights reserved.21