KEMBAR78
Installing and uninstalling computer software | PPTX
Installing and
uninstalling computer
software
Introduction
• Once software is selected and purchased it must be copied onto the
computer. The process involved is called installation.
Auto load:
• Today’s many software comes on CD. When the CD is inserted
in the drive, it automatically start the installation process.
Add/Remove programs
Add/Remove programs:
• The CD programs that do not automatic it can be installed through
Add/Remove programs.
• Steps to install programs using Add/Remove programs
1. Open the control panel
2. Double click the add/remove program icon.
3. On the install/uninstall tab click the install button.
4. A/R programs will prompt to insert the CD. Now press the next button.
5. A/R program look a file named setup or install.
6. A/R programs finds the file, click the finish button.
Program documentation or Readme file
Program documentation or Readme file
 When the A/R program failed to install, a file called README should
be used.
 Executable files they are small utility or game program.
 Installation of these programs is to simply copy them to a folder and
double click the programs icon.
• Zipped files: these files require special program for unzipping. Eg.
Win Zip
Self-extracting Zip files
 They are special type of zip file.
 It does not require special software for unzipping.
Steps to unzip a self-extracting zip file.
 Create a new folder to hold the unzipped files.
 Move the self-extracting zip file to the new folder.
 Double click the self-extracting zip file.
 Respond to any prompts displayed by the unzip process.
 The program is unzipped. Now go through the setup process.
 If the program file is found, double click to execute the program.
 If the program is not found, look for the README file. It contains instruction for executing the
program.
Steps to open zipped files
 Create a new folder to hold unzipped files.
 Move the zip file to the new folder.
 Zip file have winzip icon. Double click it.
 Read the on-screen instructions to unzip the file.
 The program is unzipped. Now go through the setup process.
 If the program is not found, look for the README file.
Uninstalling software
• Removal of a program from the system is called uninstalling. Most
programs come with uninstall programs, some can be uninstall by
windows.
• Use windows:
• Programs that are licensed by Microsoft for windows can be
uninstalled using the Add/Remove programs component of the control
panel.
• Steps:
 Open the control panel.
 Double click Add/Remove programs
 Look for the programs name in the installed list
 If the program’s name doesnot appear, this technique cannot be
used.
 If the program’s name appear, click it to select it.
 Click the Add/Remove button at the bottom of the dialog box.
 Follow the on screen instructions to uninstall the program
• Use the program’s own uninstall program
• This program is found in the program’s folder.
• Steps:
• Open the program’s folder in either the explorer or my computer look for
the file called uninstall.
 Double click the file and follow the onscreen instructions.
 Uninstall the program manually
• If no uninstall option exists, the program must be uninstalled manually.
• Steps:
 Locate the programs folder
 Delete the program’s folder
 Locate program’s short cut and delete them.
• Software piracy
 Software piracy is the illegal distribution and/or reproduction of
registered software applications for business on personal use.
• Types of software piracy:
• Soft lifting: it means sharing a licensed program with unauthorized
fellows.
• Eg: purchasing a single licensed copy of software and leading the
software onto several computers.
• Software counterfeiting:
 It is illegal duplication or sale of copy righted material with the intent
of directly imitating the copyrighted product.
• Online piracy or internet piracy
 Online piracy can take the following forms
 Pirate websites that make software available for free download or in
exchange for uploaded programs.
 Internet auction sites that offer counterfeit, out of channel,
infringing copyright software
 Peer to peer networks that enable unauthorized transfer of copy
righted programs.
• Renting: it is renting out a copy of software for temporary use
without the permission of copyright holder.
• Hard disk loading: this type of piracy is installing unauthorized
copies of software on to the hard disks of personal computers.
• End user piracy: this occur when a company employee reproduces
copies of software without authorization.
• Eg: using one licensed copy to install a program on multiple
computers copying disks for installation and distribution swapping
disks for installation and distribution.
• Swapping disks in or outside the work place.
• Client server overuse:
• This type of piracy occurs when too many employees on a network
are using a central copy of a program at a time. If there are more users
than allowed by the license, that is” over use’.
• License misuse
Eg:
• 1. Academic product misuse: In this type licensed educational
institutions at low prices is diverted into normal commercial channels
of distribution.
• 2. Not for resale product misuse: In this, a licensed product marked
not for resale is distributed to commercial channels.
Preventing software piracy:
• Some guide lines to prevent software piracy:
1. Always buy software from authorized sellers. If any doubt contact
the software manufacturer.
2. Consumer should purchase authenticate licensed software.
3. One should use software allowed by the license agreement.
4. Software reselling and renting should be prohibited.
5. One should report to the copy right holder, when unauthorized
software is used.
Software technologies
• Public domain software:
• It refers to software that is not having a copy right
• Free ware: it is copyrighted software offered free of charge by its
author. Eg: Adobe Reader, Internet Explorer, Google Chrome etc.
• Shareware: it is a software readily available to download. We should
either uninstall the software or pay for its continued use.
• Commercial software: it requires payment before it can be used. It
includes all the programs,, with no restriction or time limits.
• Open source software: it is a program, where the source code is available
to the general public for use or modification of its design free of charge.
• Proprietary software: it is a program, where the source code is available to
the general public for use or modification of its design free of charge.
• Proprietary software: It can be distributed at no cast.
• Eg: Adobe Reader
• Firmware: it is a combination of software and hardware computer chips
have recorded firmware data or programs. It designed to be updated.
• Eg: ROM, PROM, EPROM.

Installing and uninstalling computer software

  • 1.
  • 2.
    Introduction • Once softwareis selected and purchased it must be copied onto the computer. The process involved is called installation. Auto load: • Today’s many software comes on CD. When the CD is inserted in the drive, it automatically start the installation process.
  • 3.
    Add/Remove programs Add/Remove programs: •The CD programs that do not automatic it can be installed through Add/Remove programs. • Steps to install programs using Add/Remove programs 1. Open the control panel 2. Double click the add/remove program icon. 3. On the install/uninstall tab click the install button. 4. A/R programs will prompt to insert the CD. Now press the next button. 5. A/R program look a file named setup or install. 6. A/R programs finds the file, click the finish button.
  • 4.
    Program documentation orReadme file Program documentation or Readme file  When the A/R program failed to install, a file called README should be used.  Executable files they are small utility or game program.  Installation of these programs is to simply copy them to a folder and double click the programs icon. • Zipped files: these files require special program for unzipping. Eg. Win Zip
  • 5.
    Self-extracting Zip files They are special type of zip file.  It does not require special software for unzipping. Steps to unzip a self-extracting zip file.  Create a new folder to hold the unzipped files.  Move the self-extracting zip file to the new folder.  Double click the self-extracting zip file.  Respond to any prompts displayed by the unzip process.  The program is unzipped. Now go through the setup process.  If the program file is found, double click to execute the program.  If the program is not found, look for the README file. It contains instruction for executing the program.
  • 6.
    Steps to openzipped files  Create a new folder to hold unzipped files.  Move the zip file to the new folder.  Zip file have winzip icon. Double click it.  Read the on-screen instructions to unzip the file.  The program is unzipped. Now go through the setup process.  If the program is not found, look for the README file.
  • 7.
    Uninstalling software • Removalof a program from the system is called uninstalling. Most programs come with uninstall programs, some can be uninstall by windows. • Use windows: • Programs that are licensed by Microsoft for windows can be uninstalled using the Add/Remove programs component of the control panel.
  • 8.
    • Steps:  Openthe control panel.  Double click Add/Remove programs  Look for the programs name in the installed list  If the program’s name doesnot appear, this technique cannot be used.  If the program’s name appear, click it to select it.  Click the Add/Remove button at the bottom of the dialog box.  Follow the on screen instructions to uninstall the program
  • 9.
    • Use theprogram’s own uninstall program • This program is found in the program’s folder. • Steps: • Open the program’s folder in either the explorer or my computer look for the file called uninstall.  Double click the file and follow the onscreen instructions.  Uninstall the program manually • If no uninstall option exists, the program must be uninstalled manually. • Steps:  Locate the programs folder  Delete the program’s folder  Locate program’s short cut and delete them.
  • 10.
    • Software piracy Software piracy is the illegal distribution and/or reproduction of registered software applications for business on personal use. • Types of software piracy: • Soft lifting: it means sharing a licensed program with unauthorized fellows. • Eg: purchasing a single licensed copy of software and leading the software onto several computers. • Software counterfeiting:  It is illegal duplication or sale of copy righted material with the intent of directly imitating the copyrighted product.
  • 11.
    • Online piracyor internet piracy  Online piracy can take the following forms  Pirate websites that make software available for free download or in exchange for uploaded programs.  Internet auction sites that offer counterfeit, out of channel, infringing copyright software  Peer to peer networks that enable unauthorized transfer of copy righted programs.
  • 12.
    • Renting: itis renting out a copy of software for temporary use without the permission of copyright holder. • Hard disk loading: this type of piracy is installing unauthorized copies of software on to the hard disks of personal computers. • End user piracy: this occur when a company employee reproduces copies of software without authorization. • Eg: using one licensed copy to install a program on multiple computers copying disks for installation and distribution swapping disks for installation and distribution. • Swapping disks in or outside the work place.
  • 13.
    • Client serveroveruse: • This type of piracy occurs when too many employees on a network are using a central copy of a program at a time. If there are more users than allowed by the license, that is” over use’. • License misuse Eg: • 1. Academic product misuse: In this type licensed educational institutions at low prices is diverted into normal commercial channels of distribution. • 2. Not for resale product misuse: In this, a licensed product marked not for resale is distributed to commercial channels.
  • 14.
    Preventing software piracy: •Some guide lines to prevent software piracy: 1. Always buy software from authorized sellers. If any doubt contact the software manufacturer. 2. Consumer should purchase authenticate licensed software. 3. One should use software allowed by the license agreement. 4. Software reselling and renting should be prohibited. 5. One should report to the copy right holder, when unauthorized software is used.
  • 15.
    Software technologies • Publicdomain software: • It refers to software that is not having a copy right • Free ware: it is copyrighted software offered free of charge by its author. Eg: Adobe Reader, Internet Explorer, Google Chrome etc. • Shareware: it is a software readily available to download. We should either uninstall the software or pay for its continued use. • Commercial software: it requires payment before it can be used. It includes all the programs,, with no restriction or time limits.
  • 16.
    • Open sourcesoftware: it is a program, where the source code is available to the general public for use or modification of its design free of charge. • Proprietary software: it is a program, where the source code is available to the general public for use or modification of its design free of charge. • Proprietary software: It can be distributed at no cast. • Eg: Adobe Reader • Firmware: it is a combination of software and hardware computer chips have recorded firmware data or programs. It designed to be updated. • Eg: ROM, PROM, EPROM.