Lesson Information 1 Installing Device Drivers Device Driver
Lesson Information 1 Installing Device Drivers Device Driver
Lesson Information 1 Installing Device Drivers Device Driver
Lesson Information 1
Installing Device Drivers Device driver
More commonly known as a driver, a device driver or hardware driver is a group of files that enable
one or more hardware devices to communicate with the computer's operating system.
Before searching for the drivers or software of a device, make sure you know the manufacturer and
model of the device.You can often find the drivers available for download from the manufacturer's web
page or the drivers and utilities CD shipped with your computer. You can find a listing of computer
manufacturers in the internet.
After reinstalling Windows or your operating system you may find that you have to reinstall many if
not all of the drivers for your computer components. Microsoft Windows and all other operating
systems will not require you install drivers in order. As long as you are installing the correct drivers for
your computer you should have no issues installing the drivers in any order.
https://www.youtube.com/watch?v=BDtwfRnEl7I
Lesson Information 2
Installing an Application Software
Application software consists of programs designed to perform specific tasks for users.
How To Start A Software Application?
Both the Microsoft Windows and the Apple Macintosh operating systems use the concept of a desktop.
The desktop is an on-screen work area with common graphical elements such as icons, buttons, menus,
links, windows, and dialog boxes. A software application can be started by clicking its program name
on a menu, or list of commands.
1. People use productivity software to become more effective and efficient while performing daily
activities. Word processing software allows users to create and manipulate documents that contain text
and graphics. With word processing software, you can insert clip art into a document; change margins;
find and replace text; use a spelling checker to check spelling; place a header and footer at the top and
the bottom of a page; and vary font (character design), font size (character scale), and font style
(character appearance).
2. With spreadsheet software, data is organized in rows and columns, which collectively are called
a worksheet. The intersection of a row and column, called a cell, can contain a label (text), a value
(number), or a formula or function that performs calculations on the data and displays the result.
3. Database software allows you to create and manage a database. A database is a collection of
data organized to allow access, retrieval, and use of that data. A query is used to retrieve data according
to specified criteria, which are restrictions the data must meet.
4. Presentation graphics software is used to create presentations that communicate ideas,
messages, and other information to a group through a slide show. You can use a clip gallery to enhance
your presentation with clip art images, pictures, video clips, and audio clips.
2. Power users often use software that allows them to work with graphics and multimedia.
Computer-aided design (CAD) software assists in creating engineering, architectural, and scientific
designs. Desktop publishing (DTP) software is used to design and produce sophisticated documents.
DTP is developed specifically to support page layout, which is the process of arranging text and
graphics in a document. Paint software is used to draw graphical images with various on-screen tools.
Image editing software provides the capability to modify existing images. Video editing software and
audio editing software can be used to modify video and audio segments.
3. Multimedia authoring software is used to create electronic interactive presentations that can
include text, images, video, audio, and animation. Web page authoring software is designed to create
Web pages and to organize, manage, and maintain Web sites.
4. Integrated software combines several productivity software applications that share a similar
interface and common features into a single package. Personal finance software is an accounting
program that helps pay bills, balance a checkbook, track income and expenses, follow investments, and
evaluate financial plans. Legal software assists in the creation of legal documents and provides legal
advice. Tax preparation software guides users through the process of filing federal taxes. Personal DTP
software helps develop conventional documents by asking questions, presenting predefined layouts, and
supplying standard text.
6. One of the main reasons people use computers is to communicate and share information. E-mail
software is used to create, send, receive, forward, store, print, and delete e-mail (electronic mail). A
Web browser is a software application used to access and view Web pages. A chat client is software
that allows you to connect to a chat room, which permits users to chat via the computer.
7. A newsreader is a software program used to participate in a newsgroup, which is an online area
on the Web where users conduct written discussion about a particular subject. An instant messenger is a
software program installed to use instant messaging (IM), a real-time communications service that
notifies you when one or more people are online and then allows you to exchange messages or files.
Groupware is a software application that helps groups of people on a network work together and share
information. A videoconference is a meeting between two or more geographically separated people
who use a network or the Internet to transmit audio and video data.
Lesson Information 3
Various Products Available As Web Applications
A Web application is a software application that exists on a Web site. To access the Web application,
you visit the Web site that offers the program.
The Learning Aids Available With Many Software Applications
Many software applications and Web sites provide learning aids. Online Help is the electronic
equivalent of a user manual. Usually integrated into an application software package, online Help often
is context-sensitive, meaning that the Help information is related to the current task being attempted.
Most online Help also provide links to Web sites that have a FAQs page. FAQs (Frequently Asked
Questions) supply answers to common queries. Many books are available to help you learn to use the
features of a personal computer application package. A wizard is an automated assistant that helps
complete a task by asking questions and then performing actions based on the answers.
productivity software,
graphics design/multimedia software,
home/personal/educational software,
and communications software.
An application can belong to more than one category. For example, an e-mail program can be
considered both productivity software and communications software.
Lesson Information 4
Anti-Virus Overview
Anti-virus is a security program you install on your computer or mobile device to protect it from getting
infected by malware. The term “malware” is a catch-all phrase for any type of malicious software, such
as viruses, worms, Trojans and spyware. In fact, the term
malware comes from combining the words malicious and software. If your computer has become
infected by malware, a cyber attacker can capture all of your keystrokes, steal your documents or use
your computer to attack others. Contrary to what some people believe, any operating system, including
Mac OS X and Linux, can be infected.
Directory Virus
A second type of virus is known as a Directory Virus and are also called File System Virus or Cluster
Virus. This virus works by changing the path that indicates the files location by infecting the directory
of your computer. These infect the entire directory but are usually found in a location in the disk. An
example is Dir-2 virus. These make it difficult to locate your files and may seem that files have
disappeared.
Trojan
Trojan or Trojan horse is sent to your computer by a program that it is hidden inside . A trojan disguises
itself to make one believe it is an important or useful program. These are often in highly desirable
downloads like games, free software, and even movies or music. Trojans are different that other
viruses, because they don’t multiply or spread. However, they are very dangerous because they can
capture your login information on sites that you input your information.
Memory Resident Virus
Memory Resident Virus are put on your computers memory. When the operating system runs the virus
gets activated and every file that was opened gets infected. Even after execution of the malicious code
the virus stays hidden in the RAM. This virus corrupts programs and files that are used in any way.
Randex, Meve and MrKlunky are some, just to name a few.
Overwrite Virus
Another type is Overwrite Virus. This virus takes a file and infects it and the information in it is
deleted, once that happens the file is partially useless or totally. The file size is not changed even
though the content has been replaced. The file needs to be deleted, and you will lose the content
originally in it.
Anti-Virus Tips
1. Obtain anti-virus software only from known, trusted sources and vendors. It is a common ploy
of cyber attackers to distribute fake anti-virus programs that are really malware.
2. Make sure you have the latest version of your anti-virus software installed, that your annual
subscription is paid for and active and that your anti-virus is configured to update automatically. If your
computer has been offline or powered off for a while, your anti-virus software will need to update itself
when you turn it back on or reconnect it to the Internet. Do not postpone these updates.
3. Make sure your anti-virus automatically scans portable media, such as USB sticks, and ensure
real-time protection is on.
4. Pay attention to the on-screen warnings and alerts generated by your anti-virus software. Most
alerts include the option of getting more information or a recommendation about what to do next. If you
get an alert on a work-supplied computer, be sure to contact the help desk or your supervisor
immediately.
5. Do not disable or uninstall your anti-virus software because you feel it is slowing down your
computer, blocking a website or preventing you from installing an app or program. Disabling your anti-
virus will expose you to unnecessary risk and could result in a serious security incident. If problems
persist on a work computer, contact your help desk. If the problems persist on your personal computer,
try contacting the anti-virus vendor, visiting their website for more information or replacing your anti-
virus with another product.
6. Do not install multiple anti-virus programs on your computer at the same time. Doing so will
most likely cause the programs to conflict with each other and may actually reduce the security of your
computer.
7. Learn to recognize the warnings that your anti-virus software produces. Cyber attackers can set
up malicious websites that post very realistic but fake anti-virus warnings and offer to help you “fix”
your computer. Clicking on the links or buttons on these websites can actually harm your computer.
Generalization
This module gave you the opportunity to develop your knowledge, hone your skills, behavior and
motivations required in Installing and Configuring Computer Systems that is in line with the industry
standards.
You learned to Assemble computer hardware, Prepare installer, Install operating system and drivers for
peripherals/devices, install application software and conduct testing and documentation.
This will prepare you to move on to the next lessons to improve and gain important knowledge and
skills in Setting up Computer Networks.
Soldering - is a term that describes the process of joining two pieces of metal using a filler metal.
Memory - Memory is a temporary storage area that holds data and instructions for an electronic device
to function.
Motherboard -A motherboard is a printed circuit board containing the components of an electronic
device.
Processor -This is the hardware within a computer that executes programs.
Microprocessor-A microprocessor is a central processing unit, or CPU, contained on a single
integrated circuit.
Power Supply -The power supply converts main AC current to low-voltage regulated DC current used
to power an electronic device.
Expansion Card -An expansion card is a circuit board that can be added to the motherboard to give
extra memory for processing data.
RAM-Random Access Memory, or RAM, is the term given to computer data storage used to store
frequently accessed data to increase the speed of the system.
Firmware-Firmware is permanent software programmed into a read-only memory that controls,
monitors, and manipulates the data stored in an electronic device.
Peripherals- are devices used to input or output data to and from the user and an electronic device. The
most widely used peripheral devices include mice, keyboards, monitors, and printers.
I/O stands for input/output. This term refers to the communication between an electronic device and a
person, the internet, or another information processing system.
VGA-Video Graphics Array, or VGA, is the connector typically used to plug a peripheral, most likely a
monitor, to an electronic device.
HDMI-High-Definition Multimedia Interface, or HDMI, is used to transmit data between components,
typically an electronic device and monitor or television.
PS/2 -PS/2 is a six-pin mini-DIN connector used to connect some PC compatible computers with
keyboards and mice.
USB-USB stands for Universal Serial Bus. It is used to connect a computer to devices and peripherals.
Serial Ports-A serial port is a communication interface that transfers one bit of data in or out to
modems, terminals, and peripherals.
Parallel Ports- A parallel port is a communication interface that transfers several bits of data
simultaneously to peripherals.
Disk Cleanups -Disk cleanups are designed to free up disk space on a computer’s hard drive.
Antivirus Software -Antivirus software detects and destroys computer viruses. A computer virus is code
that is capable of copying itself to corrupt a system or destroy data.
Antimalware-Antimalware is software that protects a computer from infections that are aimed at
stealing data from the user or computer.
Visit: https://www.youtube.com/watch?v=6ZGhDPfSXXA
https://www.youtube.com/watch?v=TyvNWL4QaQw