chapter six maintaining a computer part ii: installing, repairing, and removing applications
TRANSCRIPT
Chapter Six
Maintaining a ComputerPart II: Installing, Repairing, and
Removing Applications
© 2006-2011 Wiley, Inc. All Rights Reserved.
Strata Objectives Covered
1.6 (21.2 FC0-U11 U.K.) Identify the risks associated with upgrading the following technologies and equipment:–Applications–Automatic applications and operating system updates
3.1 (2.1 FC0-U11 U.K.) Conduct basic software installation, removal, and/or upgrading–Follow basic installation/upgrade procedures–Documentation–Digital rights management–Software removal–Re-installation
2
© 2006-2011 Wiley, Inc. All Rights Reserved.
Installing Applications Overview
• Assess minimum requirements• Assess compatibility• Secure administrative rights and
firewall access• Back up important files• Run Setup program• Reboot if necessary
3
© 2006-2011 Wiley, Inc. All Rights Reserved.
Assessing Compatibility and Minimum Requirements
• Minimum requirements are listed on the retail box for each application
• Same information is also available on product web site
• Compatibility issues can be researched in application’s Support forums before purchase– Incompatibilities with certain hardware– Incompatibilities with other applications
4
© 2006-2011 Wiley, Inc. All Rights Reserved.
Administrative Rights
Only an Administrator account can install new applications
If logged in as a Standard user, right-click Setup file and click Run as Administrator
5
© 2006-2011 Wiley, Inc. All Rights Reserved.
Windows Firewall Settings
For applications that require Internet connectivity to install, adjust firewall settings as needed to permit that
6
© 2006-2011 Wiley, Inc. All Rights Reserved.
Creating a New Rule in Windows Firewall
7
© 2006-2011 Wiley, Inc. All Rights Reserved.
Internet Access Issues
• Bandwidth: the connection’s ability to send data swiftly and in large quantities
• Contention: competition with other Internet users for shared bandwidth
8
© 2006-2011 Wiley, Inc. All Rights Reserved.
Applications that Require Substantial Bandwidth
• Voice over IP (VoIP): phone and video conferencing service over the Internet
• Music and video streaming• Web-delivered applications• Online gaming• Remote desktop services• Virtual Private Networking (VPN)
9
© 2006-2011 Wiley, Inc. All Rights Reserved.
What Does Installing Do?
• Windows– Copies application files to Program Files
folder of the hard disk– Creates shortcut on Start menu– Makes changes to Registry
• Mac– Copies application files to Applications
folder of the hard disk
10
© 2006-2011 Wiley, Inc. All Rights Reserved.
Ways to Begin Installing a New Application
• Insert the disc and follow the prompts
• Double-click the Setup file and follow the prompts
• Double-click a ZIP file containing the setup files, and extract them to a new location. Then double-click the Setup file in that location
11
© 2006-2011 Wiley, Inc. All Rights Reserved.
License Agreements
• You aren’t buying the application; you’re buying the right to use it in a limited ay
• You can return the software for a refund if you don’t agree to the license agreement
12
© 2006-2011 Wiley, Inc. All Rights Reserved.
Types of Licensing
• Commercial– Single User– Multi-User– Concurrent– Site License
• Shareware• Freeware• Open Source
13
© 2006-2011 Wiley, Inc. All Rights Reserved.
Registering Software
• Provides your contact information to the software maker
• Not usually required• May result in you receiving ads and
marketing materials • You may be eligible for discounts on
new versions
14
© 2006-2011 Wiley, Inc. All Rights Reserved.
Activating Software
• Locks the copy of the software to the PC on which it is installed (by installation key code)
• Prevents software piracy• You usually have 15 to 30 days to
activate new software• If you get a PC, you may be able to
transfer your activation to the new PC by calling Support
15
© 2006-2011 Wiley, Inc. All Rights Reserved.
Digital Rights Management
• Digital content is frequently pirated– Music, videos, e-books
• Digital Rights Management (DRM) is software that tries to prevent unauthorized sharing of content
• Usually involves encryption placed on data files that locks them to a particular PC or digital music device
16
© 2006-2011 Wiley, Inc. All Rights Reserved.
Repairing or Reinstalling an Application
• Removing and reinstalling an application can repair it if it’s not working
• Some applications have a Repair option in their Setup program
• In Windows, look under Programs in Control Panel for list of installed apps
17
© 2006-2011 Wiley, Inc. All Rights Reserved.
Removing an Application
• Can free up hard disk space• Can clean up Start menu and reduce
the size of the Registry• Windows: Use the Programs list in
the Control Panel to uninstall• Mac OS X: Drag application folder to
the Trash• Ubuntu Linux: Uninstall from
Software Center window
18
© 2006-2011 Wiley, Inc. All Rights Reserved.
Removing an Application in Windows
19