Information Sheet 3.4 Installing Software: Learning Objectives
Information Sheet 3.4 Installing Software: Learning Objectives
Information Sheet 3.4 Installing Software: Learning Objectives
4
Installing Software
Learning Objectives:
After reading this Information Sheet, you should be able to:
1. Identify the installation of computer programs.
2. Install and uninstall a software in a computer.
Installation typically involves code (program) being copied/generated from the installation files
to new files on the local computer for easier access by the operating system, creating necessary
directories, registering environment variables, providing separate program for un-installation etc.
Because code is generally copied/generated in multiple locations, uninstallation usually involves
more than just erasing the program folder. For example, registry files and other system code may
need to be modified or deleted for a complete uninstallation.
OVERVIEW
Some computer programs can be executed by simply copying them into a folder stored on a
computer and executing them. Other programs are supplied in a form unsuitable for immediate
execution and therefore need an installation procedure. Once installed, the program can be
executed again and again, without the need to reinstall before each execution.
Common operations performed during software installations include:
Making sure that necessary system requirements are met
Checking for existing versions of the software
Creating or updating program files and folders
Adding configuration data such as configuration files, Windows registry entries or environment
variables
Making the software accessible to the user, for instance by creating links,
shortcuts or bookmarks
Configuring components that run automatically, such as daemons or Windows services
Performing product activation
Updating the software versions
These operations may require some charges or be free of charge. In case of payment,
installation costs mean the costs connected and relevant to or incurred as a result of installing the
drivers or the equipment in the customers' premises.
Some installers may attempt to trick users into installing junkware such as various forms
of adware, toolbars, trialware or software of partnering companies. To prevent this, extra caution on
what exactly is being asked to be installed is needed. The installation of additional software then can
simply be skipped or unchecked (this may require the user to use the "custom", "detailed" or
"expert" version of the installation procedure).
Such malicious conduct is not necessarily a decision by the software developers or their
company but can also be an issue of external installers such as the Download.com installer by CNET.
TYPES INSTALLATION
Attended installation
On Windows systems, this is the most common form of installation. An installation process
usually needs a user who attends it to make choices, such as accepting or declining an end-user
license agreement (EULA), specifying preferences such as the installation location, supplying
passwords or assisting in product activation. In graphical environments, installers that offer
a wizard-based interface are common. Attended installers may ask users to help mitigate the
errors. For instance, if the disk in which the computer program is being installed was full, the
installer may ask the user to specify another target path or clear enough space in the disk. A
common misconception is unarchivation, which is not considered an installation action because
it does not include user choices, such as accepting or declining EULA.
Silent installation
Installation that does not display messages or windows during its progress. "Silent
installation" is not the same as "unattended installation": All silent installations are unattended
but not all unattended installations are silent. The reason behind a silent installation may be
convenience or subterfuge. Malware is almost always installed silently.
Unattended installation
Installation that is performed without user interaction during its progress or with no user
present at all. One of the reasons to use this approach is to automate the installation of a large
number of systems. An unattended installation either does not require the user to supply
anything or has received all necessary input prior to the start of installation. Such input may be
in the form of command line switches or an answer file, a file that contains all the necessary
parameters. Windows XP and most Linux distributions are examples of operating systems that
can be installed with an answer file. In unattended installation, it is assumed that there is no
user to help mitigate errors. For instance, if the installation medium was faulty, the installer
should fail the installation, as there is no user to fix the fault or replace the medium. Unattended
installers may record errors in a computer log for later review.
Headless installation
Installation performed without using a computer monitor connected. In attended forms of
headless installation, another machine connects to the target machine (for instance, via a local
area network) and takes over the display output. Since a headless installation does not need a
user at the location of the target computer, unattended headless installers may be used to
install a program on multiple machines at the same time.
Clean installation
A clean installation is one that is done in the absence of any interfering elements such as old
versions of the computer program being installed or leftovers from a previous installation. In
particular, the clean installation of an operating system is an installation in which the target disk
partition is erased before installation. Since the interfering elements are absent, a clean installation
may succeed where an unclean installation may fail or may take significantly longer.
Network installation
Network installation, shortened netinstall, is an installation of a program from a shared network
resource that may be done by installing a minimal system before proceeding to download further
packages over the network. This may simply be a copy of the original media but software publishers
which offer site licenses for institutional customers may provide a version intended for installation
over a network.
INSTALLERS
BOOTSTRAPPER
During the installation of computer programs, it is sometimes necessary to update the installer
or package manager itself. To make this possible, a technique called bootstrapping is used. The
common pattern for this is to use small executable files which update the installer and starts the real
installation after the update. This small executable is called bootstrapper. Sometimes the
bootstrapper installs other prerequisites for the software during the bootstrapping process too.
Your computer allows you to do some really amazing things. Digital photo editing, sophisticated
computer gaming, video streaming—all of these things are possible because of different types
of software. Developers are always creating new software applications, which allow you to do even
more with your computer.
3. A dialog box will appear. Follow the instructions to install the software.
4. The software will be installed. You can now open the application from the Start
menu (Windows 7) or the Start Screen (Windows 8).
Tips for finding software
In our experience, the easiest way to find new software is to search the Web. For example,
if you were looking for a way to edit some personal photos on your computer, you could run a
Google search for free photo-editing software. If you're not exactly sure what kind of software
you're looking for, try describing the tasks you want to complete. For example, if you wanted a
way to create to-do lists and organize your appointments, you might search for something
like free calendar organizer software.
If you find that you no longer use an application, you can uninstall the software to remove it
from your computer. This is a good way to clear up space on your hard drive and keep your
computer free of clutter.
1. Open the Control Panel.
2. Select Uninstall a program (in the Programs category).
A. Identification
Directions: Read each statement and write your answer on the space provided before the number.
_________ 1. Refers to the p articular configuration of a software or hardware with a view to making it
usable with the computer.
_________ 2. Some of these can be executed by simply copying them into a folder stored on a computer
and executing them
_________ 3. These are various forms of adware, toolbars, trialware or software of partnering
companies
_________ 4. The common pattern for this is to use small executable files which update the installer and
starts the real installation after the update.
_________ 5. This is the standard extension for installation files on Windows computers.
B.
Directions: Classify the following installations. Write “A” for Attended, “S” for Silent, “U” for Unattended,
“H” for headless, “SA” for Scheduled or Automated, “C” for Clean and “N” for Network.
__________ 6. An installation process usually needs a user who attends it to make choices specifying
preferences such as the installation location, supplying passwords or assisting in product
activation
__________ 7. Installation that does not display messages or windows during its progress
__________ 8. Installation that is performed without user interaction during its progress or with no user
present at all
__________ 9. An installation process that runs on a preset time or when a predefined condition
transpires, as opposed to an installation process that starts explicitly on a user's
command
__________ 10. An installation that is done in the absence of any interfering elements such as old
versions of the computer program being installed or leftovers from a previous
installation
Compare your answers with the Answer Key on the next page. If you get 80% and above, then you
may proceed to the next activity but if not, master the lesson and take the Self-Check again
ANSWER KEY NO. 3.4
A. Identification
1. Installation
2. Computer programs
3. Junkware
4. Bootstrapper
5. .exe
B.
6. A
7. S
8. U
9. SA
10. C
TASK SHEET 1.17
Directions:
1. Utilizing the internet, watch video presentation about Software Installers to broaden your ideas
and skills. You can use the following URLs for your reference.
Rubrics
Completeness 40 pts
Correctness 20 pts
Informative 30 pts
Neatness 10 pts
100 pts