SlideShare a Scribd company logo
1 of 14
 First of all, before you perform any
installation, make sure that you have
disconnected the power supply.
 We then had to take the wireless NIC card out of
the anti – static bag to get ready to install it into
the computer.
 Then you will need to slot your card into the
motherboard slot, make sure you have placed it
into the correct slot and don’t try to force it into
the wrong slot.
 Then you will need to lock the card into
place by pushing the locking arm down until
you have heard it click into place.
 Once it has then been installed, you will be
able to then screw the antenna onto the
card.
 Once you have done this, you are finished
installing the wireless NIC card.
 First of all, you will need to choose the
correct model and type of your wireless NIC
card.
 Once you have chosen your card, you will
then need to click on ‘Auto Run’ to start the
installation.
 You will then want to click on the ‘Repair’
option and then click next.
 Once you have done that, it will start to
install the driver for your wireless NIC card.
 You will then need to choose what network
you want your card to connect to. If your
network doesn’t appear, try pressing the
‘Refresh’ button.
 You will then start to connect to your chosen
network.
 Once you have done that, you have finished.
The following picture is an example of what
it will look like when your wireless NIC card
has connected to your chosen network.

More Related Content

More from Ryan-Parish

Unit 1 - Threats – M2
Unit 1 - Threats – M2Unit 1 - Threats – M2
Unit 1 - Threats – M2Ryan-Parish
 
Unit 1 - P6 - impact of ict
Unit 1 - P6 - impact of ictUnit 1 - P6 - impact of ict
Unit 1 - P6 - impact of ictRyan-Parish
 
Unit 1 - P5 - Twitter
Unit 1 - P5 - TwitterUnit 1 - P5 - Twitter
Unit 1 - P5 - TwitterRyan-Parish
 
Unit 1 - P4 – how to tweet
Unit 1 - P4 – how to tweetUnit 1 - P4 – how to tweet
Unit 1 - P4 – how to tweetRyan-Parish
 
D1 - virtual desktop and simulated xp installation
D1 - virtual desktop and simulated xp installationD1 - virtual desktop and simulated xp installation
D1 - virtual desktop and simulated xp installationRyan-Parish
 
Step by steps unit 3
Step by steps unit 3 Step by steps unit 3
Step by steps unit 3 Ryan-Parish
 
M1 – different ways to connect to a network
M1 – different ways to connect to a networkM1 – different ways to connect to a network
M1 – different ways to connect to a networkRyan-Parish
 
How to install skype
How to install skype   How to install skype
How to install skype Ryan-Parish
 
M3 - how to download norton
M3 - how to download nortonM3 - how to download norton
M3 - how to download nortonRyan-Parish
 
How to install a Wireless NIC
How to install a Wireless NICHow to install a Wireless NIC
How to install a Wireless NICRyan-Parish
 
P2 computer systems
P2 computer systemsP2 computer systems
P2 computer systemsRyan-Parish
 

More from Ryan-Parish (14)

Unit 1 - Threats – M2
Unit 1 - Threats – M2Unit 1 - Threats – M2
Unit 1 - Threats – M2
 
Unit 1 - P6 - impact of ict
Unit 1 - P6 - impact of ictUnit 1 - P6 - impact of ict
Unit 1 - P6 - impact of ict
 
Unit 1 - P5 - Twitter
Unit 1 - P5 - TwitterUnit 1 - P5 - Twitter
Unit 1 - P5 - Twitter
 
Unit 1 - P4 – how to tweet
Unit 1 - P4 – how to tweetUnit 1 - P4 – how to tweet
Unit 1 - P4 – how to tweet
 
D1 - virtual desktop and simulated xp installation
D1 - virtual desktop and simulated xp installationD1 - virtual desktop and simulated xp installation
D1 - virtual desktop and simulated xp installation
 
Step by steps unit 3
Step by steps unit 3 Step by steps unit 3
Step by steps unit 3
 
M1 – different ways to connect to a network
M1 – different ways to connect to a networkM1 – different ways to connect to a network
M1 – different ways to connect to a network
 
How to install skype
How to install skype   How to install skype
How to install skype
 
M3 - how to download norton
M3 - how to download nortonM3 - how to download norton
M3 - how to download norton
 
How to install a Wireless NIC
How to install a Wireless NICHow to install a Wireless NIC
How to install a Wireless NIC
 
P3 - data flow
P3  - data flowP3  - data flow
P3 - data flow
 
P2 computer systems
P2 computer systemsP2 computer systems
P2 computer systems
 
P1 – Unit 3
P1 – Unit 3P1 – Unit 3
P1 – Unit 3
 
Threats – m2
Threats – m2Threats – m2
Threats – m2
 

Recently uploaded

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 

Recently uploaded (20)

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 

Unit 7 - Task 3 – P4,P5,M2

  • 1.
  • 2.  First of all, before you perform any installation, make sure that you have disconnected the power supply.
  • 3.  We then had to take the wireless NIC card out of the anti – static bag to get ready to install it into the computer.
  • 4.  Then you will need to slot your card into the motherboard slot, make sure you have placed it into the correct slot and don’t try to force it into the wrong slot.
  • 5.  Then you will need to lock the card into place by pushing the locking arm down until you have heard it click into place.
  • 6.  Once it has then been installed, you will be able to then screw the antenna onto the card.
  • 7.  Once you have done this, you are finished installing the wireless NIC card.
  • 8.  First of all, you will need to choose the correct model and type of your wireless NIC card.
  • 9.  Once you have chosen your card, you will then need to click on ‘Auto Run’ to start the installation.
  • 10.  You will then want to click on the ‘Repair’ option and then click next.
  • 11.  Once you have done that, it will start to install the driver for your wireless NIC card.
  • 12.  You will then need to choose what network you want your card to connect to. If your network doesn’t appear, try pressing the ‘Refresh’ button.
  • 13.  You will then start to connect to your chosen network.
  • 14.  Once you have done that, you have finished. The following picture is an example of what it will look like when your wireless NIC card has connected to your chosen network.