Premium Essay

Computer Install

In:

Submitted By hilldakota
Words 329
Pages 2
The software can be installed in the local disk C where most of us install automatic applications however, there is an opportunity to save the files in other locations. All a client requires is to configure installation process. For example, I have saved the applications in my main disk that comprises all programs. This means that the location is able to run Microsoft Office suite as a single program. Microsoft Office entails an office suite of desktop application, servers and overhaul for the Microsoft windows and OS X operating system. The suite was introduced with three major applications i.e. Microsoft word, Microsoft Excel and Microsoft PowerPoint. Among the three applications, Microsoft Office is the least difficult application to learn while Microsoft Excel is the most difficult application to make use of. According to my understanding, I have reasonable ideas to put up on Microsoft word. Microsoft Word is the least difficult program to lean as I have all concepts regarding writing. As a learner, we were taught about project works and all processes involved. The current version is Office 2013 for widows’ released two years ago. Microsoft Word is the most popular in offices as it meets de facto standards. Additionally, the program is easy to use as it can be used in XML-based versions. My current machine is not a touch optimized version that comes with pre-installed on windows RT tablets and as a paid subscription service on the iPad. I have used Microsoft Office suite in my desktop for the last fifteen years to enhance office works. Microsoft excel is the most difficult program for me to learn as it involves a complex matrix. It entails spreadsheet applications that are similar to Lotus 1-2-3 the system was eventually sold out as a complex matrix that obligated learners to understand the ideas concisely.
Reference
David, D., Rick, S, & Serdar,

Similar Documents

Free Essay

Scince

.... . . . . . . . . . . . . . . . . . . . . . . . . . 6 Technical Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 Contact Information. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 System Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 Installing Deep Freeze . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 Attended Install or Uninstall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 Attended Install . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12...

Words: 1981 - Pages: 8

Free Essay

Case Analysis

... . . . . . . . . . . . . . . . . . . . . . . . . 6 Technical Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 Contact Information. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 System Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 Installing Deep Freeze . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 Attended Install or Uninstall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 Attended Install . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12...

Words: 1981 - Pages: 8

Free Essay

Deploying an Application Server

...Complete the following sentences by writing the correct word or words in the blanks provided. 1. The storage area networking technology supported by Windows Server 2008 as a lower cost alternative to Fibre Channel is called Internet Small Computer System Interface_(iSCSI). 2. The only server roles discussed in this lesson that are not included with the Windows Server 2008 product are __________ and __________. 3. DHCP and DNS are known as _Infrastructure_ services. 4. To create a searchable catalog of Web services on your network, you would install the Universal Description, Discovery, and Integration (UDDI) role. 5. To create Websites that people can use to collaborate on documents and tasks, you must install the sharepoint role. 6. The feature that enhances fault tolerance by providing multiple data paths to a single server storage device is called __Multipath I/O (MPIO) ___. 7. The Windows Server 2008 file server element that conserves disk space by eliminating duplicate copies of files is called __Single Instance Store (SIS)_. 8. The Application Server role is essentially a superset of the __Web Server (IIS)________ role. 9. To implement Windows Vista desktop themes on a Windows Server 2008 computer, you must install the __Desktop Experience_ feature. 10. The type of activation recommended by Microsoft for medium to large networks with volume licensing agreements is Key Management Service (KMS). Multiple Choice Select the correct answer for each...

Words: 697 - Pages: 3

Premium Essay

Operating System

...technician I will do everything we can to help you with the operating system problem. Everybody knows what is a Hard Disk or Hard Drive let me refresh your mind, with a simple explanation: Hard Disk/ Drive, is a device for storing and retrieving digital information, primarily computer data. It consists of one or more rigid rapidly rotating discs (platters) coated with magnetic material, and with magnetic heads arranged to write data to the surfaces and read it from them. With that been said, now move forward with Operating System and Hard Disk/ Drive. I would like to recommend you the best operating system is DOS (Disk Operating System), why? Because has everything you need. Let me tell you a little more about DOS. Disk Operating System: Most often abbreviated as DOS, refer to operating system software used in most computers that provides the abstraction and management of secondary storage devices and the information on them (e.g., file systems for organizing files of all sorts). Such software is referred to as a disk operating system when the storage devices it manages are made of rotating platters, such as floppy disks or hard disks. In the early days of microcomputers, computer memory space was often limited, so the disk operating system was an extension of the operating system. This component was only loaded if needed. Otherwise, disk access would be limited to low-level operations such as reading and writing disks at the sector-level. In some cases, the...

Words: 1780 - Pages: 8

Free Essay

Hello World

...Dell Precision Workstation T7600 Owner's Manual Regulatory Model: D02X Regulatory Type: D02X001 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your computer. CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the problem. WARNING: A WARNING indicates a potential for property damage, personal injury, or death. © 2013 Dell Inc. Trademarks used in this text: Dell™, the DELL logo, Dell Precision™, Precision ON™,ExpressCharge™, Latitude™, Latitude ON™, OptiPlex™, Vostro™, and Wi-Fi Catcher™ are trademarks of Dell Inc. Intel®, Pentium®, Xeon®, Core™, Atom™, Centrino®, and Celeron® are registered trademarks or trademarks of Intel Corporation in the U.S. and other countries. AMD® is a registered trademark and AMD Opteron™, AMD Phenom™, AMD Sempron™, AMD Athlon™, ATI Radeon™, and ATI FirePro™ are trademarks of Advanced Micro Devices, Inc. Microsoft®, Windows®, MS-DOS®, Windows Vista®, the Windows Vista start button, and Office Outlook® are either trademarks or registered trademarks of Microsoft Corporation in the United States and/or other countries. Blu-ray Disc™ is a trademark owned by the Blu-ray Disc Association (BDA) and licensed for use on discs and players. The Bluetooth® word mark is a registered trademark and owned by the Bluetooth® SIG, Inc. and any use of such mark by Dell Inc. is under license. Wi-Fi® is a registered trademark of Wireless...

Words: 10947 - Pages: 44

Premium Essay

Quartus Installation Instructions

...Altera Software Installation and Licensing Manual 101 Innovation Drive San Jose, CA 95134 www.altera.com MNL-1065-1.0 Subscribe © 2011 Altera Corporation. All rights reserved. ALTERA, ARRIA, CYCLONE, HARDCOPY, MAX, MEGACORE, NIOS, QUARTUS and STRATIX words and logos are trademarks of Altera Corporation and registered in the U.S. Patent and Trademark Office and in other countries. All other words and logos identified as trademarks or service marks are the property of their respective holders as described at www.altera.com/common/legal.html. Altera warrants performance of its semiconductor products to current specifications in accordance with Altera's standard warranty, but reserves the right to make changes to any products and services at any time without notice. Altera assumes no responsibility or liability arising out of the application or use of any information, product, or service described herein except as expressly agreed to in writing by Altera. Altera customers are advised to obtain the latest version of device specifications before relying on any published information and before placing orders for products or services. ISO 9001:2008 Registered November 2011 Altera Corporation Altera Software Installation and Licensing Manual Contents Chapter 1. Installing Altera Software Altera Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–1 System...

Words: 14842 - Pages: 60

Free Essay

It Guide

...[pic] Step-by-Step Guide to Getting Started with Hyper-V Microsoft Corporation Published: December 2007 Author: Kathy Davies Editor: Ron Loi Abstract This guide helps you become familiar with Hyper-V™ by providing instructions on installing this new technology and creating a virtual machine. [pic] Copyright Information This document supports a preliminary release of a software product that may be changed substantially prior to final commercial release, and is the confidential and proprietary information of Microsoft Corporation. It is disclosed pursuant to a non-disclosure agreement between the recipient and Microsoft. This document is provided for informational purposes only and Microsoft makes no warranties, either express or implied, in this document. Information in this document, including URL and other Internet Web site references, is subject to change without notice. The entire risk of the use or the results from the use of this document remains with the user. Unless otherwise noted, the example companies, organizations, products, domain names, e-mail addresses, logos, people, places, and events depicted herein are fictitious, and no association with any real company, organization, product, domain name, e-mail address, logo, person, place, or event is intended or should be inferred. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of this document...

Words: 1544 - Pages: 7

Free Essay

Sd1430 Final

...Software version 3. license agreement 4. machine 5. machine location 6. install date 7. software requests 8. availability 9. software location 10. access level (by who, e.g., student, teacher, admin user, etc.) STATEMENT OF WORK [Draft] History The law requires that any business, including a school, track its software. It is important to know what software the school owns, in what versions, and what the license agreement for that software is. Whatever the license agreement for particular software, it is essential for the institution to know which software is installed on which machine, where that machine is located, and which users have access to that machine. It is also important to track when the software is uninstalled from a machine and when a machine is retired. Grandfield college currently uses several spreadsheets to track this information. They also track requests for new software, software checkouts to faculty with administrative privileges on their machines, and if installs are successful or run into any problems. When requests for software are received, the software management team must manually access a spreadsheet to see if the school has the data. When new software arrives, they must manually check the licensing agreement online when they don’t know off the top of their head. These agreements vary between being accessible to any computer on site via a server install or having a limited number of copies that must be installed client-side. ...

Words: 2494 - Pages: 10

Premium Essay

Potential Benefit and Implications of the Software to the College

...Potential Benefit and implications of the software to the college Introduction: In this document I will be explaining the potential benefits and the implications of the software to the college. When the college installs a new piece of software there will be a lot of advantages and disadvantages once the piece of software is installed. The software that has been installed on to the computer in the college will be enabling the college students and the staff to do things that they may not have been able to do or not been able to do as well. But despite the advantage of the software product there are also some disadvantages associated with it. Benefits Additional Functionality When the college installs a new piece of software the college will be open to a variety of tools which have been available by the software product itself. The product has various tools to allow the students and staff to meet a certain criteria to meet a specified standard. The Additional feature of the software product is that the college will be open more tools than they were open to before so they have addition functionality as there are more tools made available to the college. For example if the college has installed Microsoft Office and they use Word they have various tools that they can use to produce a piece of work such as WordArt, Fonts, Text size, and many more tools are made available to the college. They may be open to specialist tools such as Mail Merge which will allow the staff at...

Words: 1189 - Pages: 5

Premium Essay

Replacing a Motherboard

...paragraphs, you will learn how to remove and replace a motherboard. It can be a simple process if all the steps are followed completely. These steps will allow a computer techie to “do it yourself” since these are simple and easy steps. The first step of replacing a motherboard is to remove the old motherboard. You will then need to remove all connectors to the rest of the components for easy access of removing the old motherboard and not damaging the new one. Next, unplug the power supply and the data cable from the hard drives. Remove the PCI adapters and the video card. All of the adapters that mount in motherboard slots are secured to the back rail of the case with a single screw. You may as well take all the screws out at the same time and put them aside in a glass jar or any other small container to keep them from getting lost. Then remove the data cables from the old motherboard. Lastly, remove the small screws that are keeping the motherboard attached to the case. To easily install the new motherboard, you will need to make sure the I/O cover matches the new motherboard. If not, use the new one that came with the motherboard and punch out the correct ports and then install it in the case. Make sure that the motherboard and the holes match up with the case before screwing the cover into place. Then install the motherboard at an angle with the I/O core first making sure everything will line up. Replace the small screws that were removed earlier that you saved in a jar...

Words: 360 - Pages: 2

Premium Essay

Lot2

...users of these resources. Connectivity attacks overflow a computer with a large amount of connection requests, consuming all available operating system resources so that the computer cannot process legitimate user's requests.” (EC-COUNCIL 6-3) Our network has suffered a type of DoS attack that was carried out by many computers throughout the campus network; this is called a Distributed Denial of Service (DDoS), or a DoS attack that was initiated by many computers. Our systems were attacked by computers owned by the school and the attack was carried out using computers on the internal network. The computers were compromised by an individual (or group of individuals) that gained access to the network by using a network administrator’s password. This password was obtained by a piece of software that logs key presses on the computers. They then used the password to install a piece of software with administrative privileges. That piece of software is what brought down the registration server. The attacking software asked the registration server for a webpage over and over again. This request was make with different ports on the individual computers and the server attempted to fulfill each request. Each computer that was infected by this software was able to make hundreds of requests in a matter of seconds and continued to do so for a lengthy period of time. With possibly hundreds of infected computers asking for the same information over and over again using...

Words: 589 - Pages: 3

Free Essay

Zytaba

...prevents any permanent changes being made to a machine. Deep Freeze has two states: Frozen and Thawed. When Deep Freeze is in a Frozen state, any changes made to the machine are forgotten when the machine is restarted. When Deep Freeze is in a Thawed state, any changes made to the machine are retained when the machine is restarted. When making changes to a machine, such as installing software or performing updates, the computer needs to be put into a Thawed state. A reboot is required every time the state of the computer is changed. Requirements Deep Freeze requires Windows 95/98/Me/2000/XP/Vista and 10% free hard drive space. The hardware requirements are the same as the recommended hardware requirements for the host operating system. Installing Deep Freeze Standard When installing Deep Freeze, close and disable all background utilities and antivirus software. Complete the following steps to install Deep Freeze Standard: 1. 2. Double-click the DeepFreezeSTDEval.exe file to begin the installation process. The Deep Freeze Standard Installation Dialog appears. Click Install to begin the installation. Follow the steps presented. Read and accept the license agreement. At the end of the installation, the machine reboots. After the reboot Deep Freeze is installed. After the reboot, a Password Initialization screen appears. This screen allows you to enter a password for Deep Freeze. This...

Words: 852 - Pages: 4

Premium Essay

Cloud Computing

...discussing what cloud computing is, what is the cloud computing system architecture like, what are its advantages, and disadvantages. The article reviewed shows that cloud computing is a network of computers that handles the brunt work of running applications. Companies need only to install one application that lets employees log onto a web-based service, such as the internet which hosts all the programs that users would need. The interface software which is like a browser, is the only thing that is needed. The network of the cloud will take care of everything else. The cloud architecture has a back end and a front end. The back end allows users to connect to the internet or network. It is also where numerous servers, computers, and storage systems are located that build the “cloud” of the computing system (Strickland, 1998-2014). The front end is what the user can view and it is where the client’s computer and the application that is the means of entry to the cloud system is located. It is important to note that each application acquires its own server. The central server manages the system where it audits traffic and demands of clients to guarantee everything runs properly. The central server also followings rules and uses middleware in order to do so. The middle ware ensures computers communicate with each other. Cloud computing create copies of client’s information and storage in other devices in case the system breaks down. The central server will use these copies to get ahold...

Words: 634 - Pages: 3

Premium Essay

Friends

...also important to track when the software is uninstalled from a machine and when a machine is retired. Grandfield college currently uses several spreadsheets to track this information. They also track requests for new software, software checkouts to faculty with administrative privileges on their machines, and if installs are successful or run into any problems. When requests for software are received, the software management team must manually access a spreadsheet to see if the school has the data. When new software arrives, they must manually check the licensing agreement online when they don’t know off the top of their head. These agreements vary between being accessible to any computer on site via a server install or having a limited number of copies that must be installed client-side. A database would allow Grandfield to effectively track all of these things in one place and to be able to draw a better view of what the demands are over time. Scope Grandfield College wants a database to track faculty and staff computers, what software is installed on each, who has access to each computer, and requests for new software. Being able to track install issues would also be of great benefit for easier troubleshooting. Constraints Software for student machines is a separate and complex issue and will be treated as a separate project at a later time. Objectives ● Track what software is installed and removed and the...

Words: 615 - Pages: 3

Premium Essay

Capstone Wbs Dictionary

...WBS Dictionary Team One Technologies Project Management | From start to finish lay out of the project | Scope / Requirements | Team One Technologies is determined to helping Greenway Bank develop an approach to examine their scale or level of risk management. | Design | The office will house a local LAN, create a revenue stream, a new inbound customer service call center | Headquarters and four branch locations | Four branches located in New York, Seattle, Orlando, and Los Angeles, corporate offices in St Louis | Budget breakdown / Materials | Total cost on parts, labor and time | Complete data network and communication to all locations | Networks connect large numbers of users to share information and resources | Physical Layout for Voice & Data | A building by building layout or diagram for the Physical layout for the voice and data network | Data storage and off site backups for all 5 locations | off-site data protection, or vaulting, is the strategy of sending critical data out of the main location (off the main site) as part of a disaster recovery plan.Example: Barracuda Networks | Network Configuration Plan | the activities, methods, procedures, and tools that pertain to the operation, administration, maintenance, and provisioning of networked systems. | Documentation for business continuity | The activities performed by Team One Technologies to ensure that critical business functions will be available to customers, suppliers, regulators, and...

Words: 655 - Pages: 3