Planning an Installation and d Upgrade. Learning Objectives  To learn how to plan an upgrade and installation.

Slides:



Advertisements
Similar presentations
SOIN Administrators New School Year Review Marking Period Setup Event and Holiday setup Website Content check: add photo galleries and newsletters Staff.
Advertisements

IT Technical Support South Nottingham College. Aims Knowledge of the Registry Discuss the tools available to support a technician Gain an understanding.
MOSS 2007 Document Management Adam McCarthy 1 st April 2009.
Windows XP Tutorial Securing Windows. Introduction This presentation will guide you through basic security principles for Windows XP.
IT Support IT Support Help… Bath University Computing Services (BUCS)Bath University Computing Services (BUCS)Bath University Computing Services (BUCS)Bath.
P3, M2,M3,M4.
 Minimum System Requirements  Updates to Proctor Caching  Updates to Configure TestNav  Setting Up Your Infrastructure  System Check Utility  Resources.
Module 1: Installing Windows XP Professional
Mr C Johnston ICT Teacher
A Quick Review of Unit 2 – Using Windows 7 Computing Fundamentals © CCI Learning Solutions.
BTEC Unit 29 – Lesson 02 Preparing to Change
Installation and Deployment in Microsoft Dynamics CRM 4.0
Hackers They can u Read the data files u Run the application programs u Modify some files which may cause damages Individuals who gain unauthorized access.
Spring Definitions  Virus  A virus is a piece of computer code that attaches itself to a program or file so it can spread.
 Contents 1.Introduction about operating system. 2. What is 32 bit and 64 bit operating system. 3. File systems. 4. Minimum requirement for Windows 7.
Administrative Practices Outcome 1.1 Tasks, Skills and Qualities of an Administrative Assistant Administration and IT National 4 and National 5.
No.24 Prerawat Denvutivorkarn M.2/2. Definition: "antivirus" is protective software designed to defend your computer against malicious software. Malicious.
Lesson 10 Operating System Customization
VMWare Workstation Installation. Starting Vmware Workstation Go to the start menu and start the VMware Workstation program. *Note: The following instructions.
Cyber Patriot Training
Staying Safe. Files can be added to a computer by:- when users are copying files from a USB stick or CD/DVD - downloading files from the Internet - opening.
Term 2, 2011 Week 3. CONTENTS The physical design of a network Network diagrams People who develop and support networks Developing a network Supporting.
Copyright© 2003 Avaya Inc. All rights reserved Upgrade to Communication Manager 2.0 with Migration to Linux 8.0 Purpose: This presentation was prepared.
Tutorial 11 Installing, Updating, and Configuring Software
Computer Information Use your own login and password if possible. To get a password, you must turn in the AUP sheet handed out at registration or sent.
Technical Training Manual Adding & Updating Boring Information HTMLHTTPTLSTCP CSSFTPWANLAN DDoSCMSNATIP David White Web Developer / Systems Administrator.
Lesson 14: Installing and Uninstalling Programs how to install a new program what to do if the new program doesn’t work how to uninstall a program © CCI.
Section 6 Theory Software Copyright, Viruses and Hacking.
Chapter SIx Maintaining a Computer Part I: Configuring, Updating, and Upgrading the OS.
Home Media Network Hard Drive Training for Update to 2.0 By Erik Collett Revised for Firmware Update.
Please Note: Information contained in this document is considered LENOVO CONFIDENTIAL For Lenovo Internal Use Only Do Not Copy or Distribute!! For Lenovo.
Gorman, Stubbs, & CEP Inc. 1 Introduction to Operating Systems Lesson 4 Microsoft Windows XP.
Managing User Desktops with Group Policy
A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, Sixth Edition Chapter 9, Part 9 Satisfying Customer Needs.
Installing SIGNZ on a stand- alone machine. These slides will guide you through the installation of the SIGNZ ‘server’ and ‘client’ components on one machine.
The Handover Process P6.
1 NTTC/NTC ERO Training 2011 Tax Year 2007 ERO TRAINING ELECTRONIC RETURN ORIGINATOR (ERO) (Transmitter in Tax-Wise)
Module 2.4 Computer management 1. Contents Initial maintenance Setting up accounts Configuring the desktop Security settings Ongoing maintenance Adding.
DATA PROTECTION & FREEDOM OF INFORMATION. What is the difference between Data Protection & Freedom of Information? The Data Protection Act allows you.
ICT development office ICT research, planning and training dept. Network development and administration dept. System development and operation dept. President.
 Most current version 1.3  Will review some basic and advanced portions of the software  Only have 50 minutes including questions  Please write down.
Mr C Johnston ICT Teacher BTEC IT Unit 05 - Lesson 12 Network Security Policy.
Mr C Johnston ICT Teacher BTEC IT Unit 05 - Lesson 13 Routine Network Management Tasks.
Jeny Carrasco and Jai Nayar English 393 Process Manual Assignment 12/08/04 McAfee 7.1 Process Manual.
P3 - prepare a computer for installation/upgrade By Ridjauhn Ryan.
VMWare Workstation Installation. Starting Vmware Workstation Go to the start menu and start the VMware Workstation program. *Note: The following instructions.
IT1001 – Personal Computer Hardware & system Operations Week7- Introduction to backup & restore tools Introduction to user account with access rights.
Computer Basics Boot Camp HPCSD Instructional Technology Department.
Page 1 of 38 Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential Please Note: Information contained in.
Objectives  Legislation:  Understand that implementation of legislation will impact on procedures within an organisation.  Describe.
Understand why software needs installing or upgrading
HOW TO INSTALL WINDOWS 7? This step-by-step guide demonstrates how to install Windows 7 Ultimate. The guide is similar for other versions of Windows 7.
A DVANTAGES AND D ISADVANTAGES OF CAG. A DVANTAGES AND D ISADVANTAGES OF CAD As with all new things there are good points and bad points. The introduction.
TESTING UPDATES for 2016 Office of Assessment
FILE SHARING USING SHARED FOLDER WIZARD. OBJECTIVES Determine the Shared Folder Wizard Demonstrate the step-by-step procedure in using the Shared Folder.
Mr C Johnston ICT Teacher BTEC IT Unit 09 - Lesson 11 Network Security.
Learning Outcomes 1. Know software installation processes 2. Be able to prepare for software installation 3. Be able to install and configure software.
Active-HDL Server Farm Course 11. All materials updated on: September 30, 2004 Outline 1.Introduction 2.Advantages 3.Requirements 4.Installation 5.Architecture.
John Samuels October, Why Now?  Vista Problems  New Features  >4GB Memory Support  Experience.
Computer Security Sample security policy Dr Alexei Vernitski.
Environment Manager Troubleshooting and Debugging.
Maintaining and Updating Windows Server 2008 Lesson 8.
Downloading and Installing GRASP-AF Workshop Ian Robson Information Analyst, North of England Cardiovascular Network.
Applications Software. Is a software used to carry out a particular task e.g. a game or word processor.
ELECTRONIC RETURN ORIGINATOR (ERO) (Transmitter in Tax-Wise)
Welcome © GTM Software. Welcome © GTM Software.
STEPS Assessment System
DEPLOYING SECURITY CONFIGURATION
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
Presentation transcript:

Planning an Installation and d Upgrade

Learning Objectives  To learn how to plan an upgrade and installation

Assessment Objectives  Plan and Installation and Upgrade

Starter  In groups of 4  Individually list as many jobs as you think is required from start to finish and plan and carry out an upgrade

Group Task Step 1  Consider Planning Tasks, Guidance, and procedures, Materials  Use an A3 sheet and draw 3 Columns.  Write 3 column headers: Pre Installation, Installation and Post Installation Step 2  Compare with other group and improve your answers Step 4  Both groups share with Teacher Step 3  Individually place tasks in the correct order

Planning Tasks  Check system meets requirements  Decide if fresh install or installing over existing software  Installation media and does this support it  Which location on the computer will you be installing it  Create tasks and procedures to follow for installation and upgrade e.g. Checking contents, reading manuals, performing virus scans, backing up data, configuring the software, problem solving

Materials  Check you have the correct materials  Computer System  Software media  Installation guides  Licence Keys

Timings  What time and date will you be installing – please note this is included in the assignment and is Wednesday

Communications  You must have good communication procedures  Who needs to be told and when:  Normally:  End Users  Management  Software Venders – Only if a problem with upgrade  This is normally done by

Gaining Permissions and Access  Make sure that you can get logged on and have permissions to update and install software

Guidance For End Users  Train users in new software  What software is to be used  Escalation Procedures – Who to ask if installation goes wrong

Installation Process  Backing up  Installing Disc – What is read speed is it a SATA drive or is it being installed on a network  Agreeing to software licence  Deciding where installed  Creating Links and shortcuts  Configuraton – Antil virus – how often will virus scan run and when, How often and how will virus definitions be updated, Are s to be scanned, what rules for quarantine etc  Configuration Office – Typical or Custom Install, Language, Template Path

Testing  Does the application run  Are all configuration settings correct  Do other programs and configurations still work  Are temp files deleted  Have you restored any files that you backed up if needed

Confidentiality & Security  Keeping any user files confidential from any other person whilst installing or upgrading system  Making sure that administrator rights and login details are kept secure