This document discusses installing, uninstalling, and preventing piracy of computer software. It describes different methods of software installation, such as using auto load from a CD, Add/Remove programs, self-extracting zip files, and reading documentation files. It also outlines steps for uninstalling programs using Windows Add/Remove programs, a program's uninstall file, or manually by deleting files and folders. The document defines various types of software piracy and provides guidelines for preventing piracy, such as only using authorized sellers and properly licensing software.
Introduction
• Once softwareis selected and purchased it must be copied onto the
computer. The process involved is called installation.
Auto load:
• Today’s many software comes on CD. When the CD is inserted
in the drive, it automatically start the installation process.
3.
Add/Remove programs
Add/Remove programs:
•The CD programs that do not automatic it can be installed through
Add/Remove programs.
• Steps to install programs using Add/Remove programs
1. Open the control panel
2. Double click the add/remove program icon.
3. On the install/uninstall tab click the install button.
4. A/R programs will prompt to insert the CD. Now press the next button.
5. A/R program look a file named setup or install.
6. A/R programs finds the file, click the finish button.
4.
Program documentation orReadme file
Program documentation or Readme file
When the A/R program failed to install, a file called README should
be used.
Executable files they are small utility or game program.
Installation of these programs is to simply copy them to a folder and
double click the programs icon.
• Zipped files: these files require special program for unzipping. Eg.
Win Zip
5.
Self-extracting Zip files
They are special type of zip file.
It does not require special software for unzipping.
Steps to unzip a self-extracting zip file.
Create a new folder to hold the unzipped files.
Move the self-extracting zip file to the new folder.
Double click the self-extracting zip file.
Respond to any prompts displayed by the unzip process.
The program is unzipped. Now go through the setup process.
If the program file is found, double click to execute the program.
If the program is not found, look for the README file. It contains instruction for executing the
program.
6.
Steps to openzipped files
Create a new folder to hold unzipped files.
Move the zip file to the new folder.
Zip file have winzip icon. Double click it.
Read the on-screen instructions to unzip the file.
The program is unzipped. Now go through the setup process.
If the program is not found, look for the README file.
7.
Uninstalling software
• Removalof a program from the system is called uninstalling. Most
programs come with uninstall programs, some can be uninstall by
windows.
• Use windows:
• Programs that are licensed by Microsoft for windows can be
uninstalled using the Add/Remove programs component of the control
panel.
8.
• Steps:
Openthe control panel.
Double click Add/Remove programs
Look for the programs name in the installed list
If the program’s name doesnot appear, this technique cannot be
used.
If the program’s name appear, click it to select it.
Click the Add/Remove button at the bottom of the dialog box.
Follow the on screen instructions to uninstall the program
9.
• Use theprogram’s own uninstall program
• This program is found in the program’s folder.
• Steps:
• Open the program’s folder in either the explorer or my computer look for
the file called uninstall.
Double click the file and follow the onscreen instructions.
Uninstall the program manually
• If no uninstall option exists, the program must be uninstalled manually.
• Steps:
Locate the programs folder
Delete the program’s folder
Locate program’s short cut and delete them.
10.
• Software piracy
Software piracy is the illegal distribution and/or reproduction of
registered software applications for business on personal use.
• Types of software piracy:
• Soft lifting: it means sharing a licensed program with unauthorized
fellows.
• Eg: purchasing a single licensed copy of software and leading the
software onto several computers.
• Software counterfeiting:
It is illegal duplication or sale of copy righted material with the intent
of directly imitating the copyrighted product.
11.
• Online piracyor internet piracy
Online piracy can take the following forms
Pirate websites that make software available for free download or in
exchange for uploaded programs.
Internet auction sites that offer counterfeit, out of channel,
infringing copyright software
Peer to peer networks that enable unauthorized transfer of copy
righted programs.
12.
• Renting: itis renting out a copy of software for temporary use
without the permission of copyright holder.
• Hard disk loading: this type of piracy is installing unauthorized
copies of software on to the hard disks of personal computers.
• End user piracy: this occur when a company employee reproduces
copies of software without authorization.
• Eg: using one licensed copy to install a program on multiple
computers copying disks for installation and distribution swapping
disks for installation and distribution.
• Swapping disks in or outside the work place.
13.
• Client serveroveruse:
• This type of piracy occurs when too many employees on a network
are using a central copy of a program at a time. If there are more users
than allowed by the license, that is” over use’.
• License misuse
Eg:
• 1. Academic product misuse: In this type licensed educational
institutions at low prices is diverted into normal commercial channels
of distribution.
• 2. Not for resale product misuse: In this, a licensed product marked
not for resale is distributed to commercial channels.
14.
Preventing software piracy:
•Some guide lines to prevent software piracy:
1. Always buy software from authorized sellers. If any doubt contact
the software manufacturer.
2. Consumer should purchase authenticate licensed software.
3. One should use software allowed by the license agreement.
4. Software reselling and renting should be prohibited.
5. One should report to the copy right holder, when unauthorized
software is used.
15.
Software technologies
• Publicdomain software:
• It refers to software that is not having a copy right
• Free ware: it is copyrighted software offered free of charge by its
author. Eg: Adobe Reader, Internet Explorer, Google Chrome etc.
• Shareware: it is a software readily available to download. We should
either uninstall the software or pay for its continued use.
• Commercial software: it requires payment before it can be used. It
includes all the programs,, with no restriction or time limits.
16.
• Open sourcesoftware: it is a program, where the source code is available
to the general public for use or modification of its design free of charge.
• Proprietary software: it is a program, where the source code is available to
the general public for use or modification of its design free of charge.
• Proprietary software: It can be distributed at no cast.
• Eg: Adobe Reader
• Firmware: it is a combination of software and hardware computer chips
have recorded firmware data or programs. It designed to be updated.
• Eg: ROM, PROM, EPROM.