14
P6 - CONFIGURE THE SOFTWARE

P6 - CONFIGURE THE SOFTWARE. CONFIGURE SOFTWARE Most software can be configured to suit an individual user, for example by changing the appearance of

Embed Size (px)

Citation preview

Page 1: P6 - CONFIGURE THE SOFTWARE. CONFIGURE SOFTWARE Most software can be configured to suit an individual user, for example by changing the appearance of

P6 - CONFIGURE THE SOFTWARE

Page 2: P6 - CONFIGURE THE SOFTWARE. CONFIGURE SOFTWARE Most software can be configured to suit an individual user, for example by changing the appearance of

CONFIGURE SOFTWARE

• Most software can be configured to suit an individual user, for example by changing the appearance of the user interface or the way it operates.

• The configuration choices the users make are often known as preferences.

• Both systems software and applications software can be configured in windows, this information is stored in the registry.

Page 3: P6 - CONFIGURE THE SOFTWARE. CONFIGURE SOFTWARE Most software can be configured to suit an individual user, for example by changing the appearance of

SYSTEM SOFTWARE TOOLS

• System software tools allows the system administrator to watch what the operating system is doing and make changes to the way it works.

• A user who is not a system administrator is also able to make certain changes to the way the operating system functions.

Page 4: P6 - CONFIGURE THE SOFTWARE. CONFIGURE SOFTWARE Most software can be configured to suit an individual user, for example by changing the appearance of

CONTROL PANEL

• To make changes to the system, go to start menu and select Control Panel You will be able to make changes to the core functions of the operating systems,.

• You can modify aspects of the display, add or remove fonts, manage fonts, manage folders, install new software, install new hardware drivers and change how the mouse responds, time & date.

Page 5: P6 - CONFIGURE THE SOFTWARE. CONFIGURE SOFTWARE Most software can be configured to suit an individual user, for example by changing the appearance of

CONTROL PANEL

• From the control panel you can also carry out the following tasks, and many more:

• Add or remove programs• Install printers• Check the performance of the system• Set up network connections• Drive formatting• The operating systems for mobile phones and

PDA’s

Page 6: P6 - CONFIGURE THE SOFTWARE. CONFIGURE SOFTWARE Most software can be configured to suit an individual user, for example by changing the appearance of
Page 7: P6 - CONFIGURE THE SOFTWARE. CONFIGURE SOFTWARE Most software can be configured to suit an individual user, for example by changing the appearance of

CONFIGURE APPLICATION SOFTWARE

• Word processing - country’s dictionary for spell checker. How often a document is auto saved [every 10 mins]. If spelling errors are corrected as a user types. How many recently opened documents it should list.

• Web browser e.g. Mozilla Firefox – The address of the home page, the folder to use for saving all downloads, ect

Page 8: P6 - CONFIGURE THE SOFTWARE. CONFIGURE SOFTWARE Most software can be configured to suit an individual user, for example by changing the appearance of

UTILITIES

• Utilities are complex tools and require some thought before they are configured, common utilities that can be configured simply:

• Compression tools• Defragmentation tools• Drive formatting• Internet clean up tools [for cookies, browsing

history ect]• Disk drive clean-up tools

Page 9: P6 - CONFIGURE THE SOFTWARE. CONFIGURE SOFTWARE Most software can be configured to suit an individual user, for example by changing the appearance of

DEFRAGGLER

• You can configure defraggler to run as a scheduled task at 11.p.m. each day.

• WinRAR is free & downloadable can be used to compress files. Although .ZIP support has long been integrated into operating systems.

• Win RAR has many options one is which type of compression file it is associated with.

http://www.rarlab.com/

Page 10: P6 - CONFIGURE THE SOFTWARE. CONFIGURE SOFTWARE Most software can be configured to suit an individual user, for example by changing the appearance of

CONFIGURE - GUI

• For many users the appearance of the desktop is important. – Control Panel

• Colour schemes, the screen resolution and colour depth – Control panel

• Back ground wall paper – operating systems has some available – can create your own study snc Gui a corporate image has been created in the design with logo

Page 11: P6 - CONFIGURE THE SOFTWARE. CONFIGURE SOFTWARE Most software can be configured to suit an individual user, for example by changing the appearance of

OPERATING SYSTEM

• Creating start up options a pass word to log in or which processes and applications start automatically.

• Creating configuring application toolbars – new tool bars containing new options modified toolbars.

• Changing folder management, how files are displayed, which files are visible, and which files can be accessed.

Page 12: P6 - CONFIGURE THE SOFTWARE. CONFIGURE SOFTWARE Most software can be configured to suit an individual user, for example by changing the appearance of

VIRUS PROTECTION

Configuration list for anti virus software

• Anti virus is automatically started at log in• Signatures regularly updated• Full scan every week• Emails scanned especially attachments• Resident shield is enabled this will scan a file

when you attempt to open it.

Page 13: P6 - CONFIGURE THE SOFTWARE. CONFIGURE SOFTWARE Most software can be configured to suit an individual user, for example by changing the appearance of

FIRE WALL

Microsoft comes pre installed permits the following configuration options:-Turn on or off firewallChoose which programs to blockChoose which network connection to firewall

Page 14: P6 - CONFIGURE THE SOFTWARE. CONFIGURE SOFTWARE Most software can be configured to suit an individual user, for example by changing the appearance of

P6 & D2 - CONFIGURE SOFTWARE

• P6 - Read the description of the user carefully, you should configure the software especially for them, not as you might like it.

• D2 –Discuss how the configuration of software will help a given user perform their tasks. Concentrate on the system you have set up but also think about potential security risks.