Level 4 Software Installation Notes
Level 4 Software Installation Notes
Computer Software
Computer software refers to a set of instructions that direct a computer on what to do. The
computer software can be classified into three ways according to purpose, acquisition and End–
user – License (EUL).
Classification according to purpose
Computer software is classified into two main categories:
- System software
- Application software
1) System software
Manages the operation of the computer itself, and makes sure that the computer works efficiently.
It enables the user to communicate with the computer and its hardware e.g. mouse.
ii). Firmware: also referred to as stored logic, It’s a combination of both hardware and software
etched on a single silicon chip which accepts and interprets external commands from the user.
iii). Utility software: also called service programs, is a software that provides support to the
application software. It perform commonly used services that make certain aspects of computing
to go on more smoothly. Can also be defined as special programs used to enhance performance of
the system.
COMPUTER SOFTWARE
Application Software
System Software
- Word processor
- Operating system - Spreadsheets
- Firmware - Database
- Utility software - Desktop Publishing Computer
- Networking software aided design
- Graphics software
Classification according to Acquisition
An application software can be either in-house developed or an off-shelf software.
a). In-house developed (Custom program/ bespoke/ tailor – made / standard software )
These programs are designed/tailored to meet specific needs within the organization. e.g in banks
for managing their operations, airlines for booking, school for grading and test analysis etc.
Disadvantages
May not meet special needs
They are not as efficient as user made programs
When changes occur extra costs is usually needed from user
Not all packages are compatible with all computer system
They may have some features not needed by user which may take extra storage
c). General purpose software – are not written to solve any particular problem, and can be used
in different ways depending on the problem to be solved
Freeware are software products that are freely made available to the user. Some may be malicious
software.
Software Considerations
i). Authenticity
This is genuineness, validity or legitimacy of an item. Software is an intangible product, and its
quite easy to pirate software (make illegal copies of software). When purchasing software, get the
original software that will be supported by the developer’s license and certificate of authenticity.
This is because some people illegally produce pirated copies which are an offense.
ii). Documentation
It include user manuals, trouble shooting and installation guides as well as on-line help. A good
software product must be accompanied with these documentation.
iii). User needs
It must meet users need e.g. if the user needs to type documents most often would go for a word
processor.
iv). User friendliness
This is how easy the users can be able to operate the computer. The ease of use of a program will
(most likely) influence whether the user will prefer it or not.
v). System requirements
Are basically the hardware specifications required to run a particular program and are usually
indicated on the package e.g. you need a minimum of 16MB of RAM to run an Access Dbase, but
32MB is recommended. The system requirements will usually include the amount of Ram, Hard
disk space, monitor type, processor type and peripheral.
vi). Cost
Software tend to be more expensive than the hardware. The cost of acquiring software product
must be carefully considered before acquiring it against the benefits that it is likely to bring. The
cost of software is a major contributing factor in deciding whether to purchase it or not. It is
usually cheaper to purchase general purpose software if it can meet the users need.
vii). Compatibility and system configuration
Software compatibility refers to the ability of a computer to run the software depending on the
system setup (configuration). The new package should read and process files created by the
existing package. When upgrading software the upgrades are backwards compatible e.g. Ms
Access 2000 can convert MS Access 97 files to Access 2000 format and use them. It often does
not work the other way round e.g. Ms Access 2000 file cannot be opened in Access 97.
Therefore, a software product must be compatible with the existing hardware, operating system or
application programs and should be readily upgradable.
viii). Portability
Software portability refers to ability of a program to be copied or installed in more than one
computer. Data is said to be portable if it can be transferred from one application to another in
electronic form. Most software’s in the market are portable.
ix). Reliability
Good software must be reliable and secure
TOPIC 2 INSTALL THE SOFTWARE
Installation refers to the particular configuration of software or hardware with a view to
making it usable with the computer. A soft or digital copy of the piece of software (program)
is needed to install it. There are different processes of installing a piece of software
(program).
Acquisition of Software
The act or process of acquiring software in different ways like purchase, download free from
internet or get it bundled along with hardware is called software acquisition. It is the way in
which the software are made available to users.
Installation Media
This section will help you determine which different media types you can use to install
software. This include-
Software options
Types of software Installation
1. Custom installation-A custom installation allows the installer to choose to select
components or parts that are required to be installed. This is sometimes preferred as
opposed to installing the full suite of software components. Some situations that
require the need for a custom install might be where only the basic components are
required which are smaller in size instead of the full components which may take up
too much hard drive space.
2. Attended installation-On Windows systems, this is the most common form of
installation. An installation process usually needs a user who attend it to make
choices, such as accepting or declining an end-user license agreement (EULA),
specifying preferences such as the installation location, supplying passwords or
assisting in product activation. In graphical environments, installers that offer
a wizard-based interface are common. Attended installers may ask users to help
mitigate the errors. For instance, if the disk in which the computer program is being
installed was full, the installer may ask the user to specify another target path or clear
enough space in the disk. A common misconception is unarchivation, which is not
considered an installation action because it does not include user choices, such as
accepting or declining EULA.
3. Silent installation-A "silent installation" is an installation that does not display
messages or windows during its progress. "Silent installation" is not the same as
"unattended installation, All silent installations are unattended but not all unattended
installations are silent. The reason behind a silent installation may be convenience or
subterfuge. Malware and viruses can be installed silently when a person clicks on a
link while working at a business they think is real but is a hacker's program download.
For normal users silent installation is not of much use, but in bigger organizations
where thousands of users work, deploying the applications becomes a typical task and
for that reason silent installation is performed so that the application is installed in the
background without affecting the work of the user. Silent parameters can vary from
software to software; if a software/application has silent parameters, it can be checked
by " <software.exe> /? " or " <software.exe> /help " or " <software.exe> -help
".Silently installing a software program can be used to deploy a program on networks
in educational institutions, including primary and secondary education and
universities, in addition to business, government, and corporate networks. The person
managing the silent installation can choose to add a desktop shortcut, for example, to
silently install Google Drive with a desktop shortcut]:GoogleDrive.exe --silent --
desktop_shortcut=true
4. Unattended installation-Installation that is performed without user interaction during
its progress or with no user present at all. One of the reasons to use this approach is to
automate the installation of a large number of systems. An unattended installation
either does not require the user to supply anything or has received all necessary input
prior to the start of installation. Such input may be in the form of command
line switches or an answer file, a file that contains all the necessary
parameters. Windows XP and most Linux distributions are examples of operating
systems that can be installed with an answer file. In unattended installation, it is
assumed that there is no user to help mitigate errors. For instance, if the installation
medium was faulty, the installer should fail the installation, as there is no user to fix
the fault or replace the medium. Unattended installers may record errors in a computer
log for later review.
5. Headless installation-Installation performed without using a computer
monitor connected. In attended forms of headless installation, another machine
connects to the target machine (for instance, via a local area network) and takes over
the display output. Since a headless installation does not need a user at the location of
the target computer, unattended headless installers may be used to install a program
on multiple machines at the same time.
6. Scheduled or automated installation-An installation process that runs on a preset
time or when a predefined condition transpires, as opposed to an installation process
that starts explicitly on a user's command. For instance, a system administrator willing
to install a later version of a computer program that is being used can schedule that
installation to occur when that program is not running. An operating system may
automatically install a device driver for a device that the user connects. (See plug and
play.) Malware may also be installed automatically. For example, the
infamous Conficker was installed when the user plugged an infected device to their
computer.
7. Clean installation-A clean installation is one that is done in the absence of any
interfering elements such as old versions of the computer program being installed or
leftovers from a previous installation. In particular, the clean installation of an
operating system is an installation in which the target disk partition is erased before
installation. Since the interfering elements are absent, a clean installation may succeed
where an unclean installation may fail or may take significantly longer.
8. Network installation-Not to be confused with network booting .Network installation,
shortened netinstall, is an installation of a program from a shared network
resource that may be done by installing a minimal system before proceeding to
download further packages over the network. This may simply be a copy of the
original media but software publishers which offer site licenses for institutional
customers may provide a version intended for installation over a network.
Types of Documentation
1. Requirements documentation-Requirements documentation is the description of
what a particular software does or shall do. It is used throughout development to
communicate how the software functions or how it is intended to operate. It is also
used as an agreement or as the foundation for agreement on what the software will do.
Requirements are produced and consumed by everyone involved in the production of
software, including: endusers, customers, project,managers, sales, marketing, software
architects, usability engineers, interaction designers, developers,
and testers.Requirements come in a variety of styles, notations and formality.
Requirements can be goal-like (e.g., distributed work environment), close to design
(e.g., builds can be started by right-clicking a configuration file and selecting the
'build' function), and anything in between. They can be specified as statements
in natural language, as drawn figures, as detailed mathematical formulas, or as a
combination of them all.
2. Architecture design documentation-Architecture documentation (also known
as software architecture description) is a special type of design document. In a way,
architecture documents are third derivative from the code (design document being
second derivative, and code documents being first). Very little in the architecture
documents is specific to the code itself. These documents do not describe how to
program a particular routine, or even why that particular routine exists in the form that
it does, but instead merely lays out the general requirements that would motivate the
existence of such a routine. A good architecture document is short on details but thick
on explanation. It may suggest approaches for lower level design, but leave the actual
exploration trade studies to other documents.
3. Technical documentation-It is important for the code documents associated with the
source code (which may include README files and API documentation) to be
thorough, but not so verbose that it becomes overly time-consuming or difficult to
maintain them. Various how-to and overview documentation guides are commonly
found specific to the software application or software product being documented
by API writers. This documentation may be used by developers, testers, and also end-
users. Today, a lot of high-end applications are seen in the fields of power, energy,
transportation, networks, aerospace, safety, security, industry automation, and a
variety of other domains. Technical documentation has become important within such
organizations as the basic and advanced level of information may change over a
period of time with architecture changes.
4. User documentation-Unlike code documents, user documents simply describe how a
program is used. In the case of a software library, the code documents and user
documents could in some cases be effectively equivalent and worth conjoining, but
for a general application this is not often true. Typically, the user documentation
describes each feature of the program, and assists the user in realizing these features.
It is very important for user documents to not be confusing, and for them to be up to
date. User documents don't need to be organized in any particular way, but it is very
important for them to have a thorough index. Consistency and simplicity are also very
valuable. User documentation is considered to constitute a contract specifying what
the software will do. API Writers are very well accomplished towards writing good
user documents as they would be well aware of the software architecture and
programming techniques used.
5. Marketing documentation-For many applications it is necessary to have some
promotional materials to encourage casual observers to spend more time learning
about the product. This form of documentation has three purposes:
i. To excite the potential user about the product and instill in them a
desire for becoming more involved with it.
ii. To inform them about what exactly the product does, so that their
expectations are in line with what they will be receiving.
iii. To explain the position of this product with respect to other
alternatives.
1. Defining Direction:
Goals and Objectives: Clearly define what you want users to achieve with the training. Do
you want them to complete specific tasks, solve common problems, or understand core
concepts? Having clear goals helps tailor training content and delivery methods.
Target Audience: Assess your users' needs by understanding their existing knowledge, skill
levels, and learning preferences. This ensures training materials are suitable and cater to their
learning styles.
Content Development: Focus on clear, concise, and user-friendly materials. Use real-world
examples, case studies, and visuals like screenshots, diagrams, and infographics for better
understanding. Break down complex topics into manageable steps.
Engagement and Interaction: Incorporate interactive elements like quizzes, hands-on
activities, and group discussions to keep users engaged and promote knowledge retention.
Training Implementation: Plan the training rollout effectively, considering factors like user
schedules, availability of trainers, and preferred access methods (online, offline, etc.). Pilot
testing with a small group can yield valuable feedback.
Support and Sustainability: Offer ongoing support and resources after initial training, like
FAQs, help desks, and refresher courses. Encourage feedback mechanisms to adapt and
improve the program continuously.
Evaluation and Measurement: Track key metrics like user performance, task completion
rates, and feedback to assess the training's effectiveness. Identify areas for improvement and
adapt the program as needed.
Continuous Improvement: Embrace a growth mindset and adapt the training based on user
feedback, evolving technologies, and changing needs. This ensures the program remains
relevant and effective over time.
Remember, an effective end user training plan is not a one-time event; it's a continuous
journey of defining goals, building content, creating engaging experiences, measuring impact,
and adapting to achieve user success.
1. Formative Feedback:
Pre-training assessments: Gauge existing knowledge and skills to tailor the training
accordingly.
Formative evaluations: In-progress checks with quizzes, polls, or discussions to identify areas
needing clarification or additional practice.
Observations: Watching trainees during activities to assess their understanding and skill
mastery.
Focus groups: Gather qualitative feedback and discussions from a small group of trainees.
2. Summative Feedback:
Post-training assessments: Evaluate knowledge and skill acquisition after the program.
Surveys: Gather overall feedback on the training content, delivery method, and trainer
effectiveness.
Exit interviews: One-on-one conversations with trainees to understand their experience and
suggestions for improvement.
Performance metrics: Track on-the-job application of learned skills and measure their impact
on productivity, efficiency, or other KPIs.
3. Additional Elements:
Feedback from trainers: Trainers' reflections on trainee engagement, challenges faced, and
areas for improvement in the program.
Subject matter expert (SME) feedback: Insights from experts on the content accuracy and
relevance to the field.
Customer feedback: If the training relates to customer-facing processes or skills, their
feedback can be valuable.
Clear goal setting: Define what you want to learn from the feedback and use it to improve the
program.
Variety of methods: Use a mix of quantitative and qualitative methods to capture different
perspectives and insights.
Timeliness: Gather feedback throughout the training cycle, not just at the end.
Actionable feedback: Analyze the feedback and translate it into concrete improvements for
the program.
Transparency: Share the feedback results with stakeholders and trainees to demonstrate
commitment to improvement.