SlideShare une entreprise Scribd logo
1  sur  8
Ajay Jassi
Benefits of Installing expansion
• Expansion

on a computer system are the graphics card, PCI
cards, Wi-Fi card, video cards and sound cards.

• These can

be installed as an upgrade to make the computer
system faster and updated.

• Nowadays these

are mostly inputted and already installed onto
the motherboard. An example that is commonly upgraded is the
graphics card.

• Another

reasons it might be installed is too replace faults in the
computer system and repair the machine.
Potential problems
• Before

dealing with a computer system in the workshop, training
must be done for installing, disposing and dealing with computer
components safely.

• It’s

important for an technician to understand and know the risks
that can occur, so it can be prevented and dealt with.

• There are

many problems that could happen when installing
hardware. This can be caused by a small accident.
Effects
• This

can effect data, damage to computer components and
electrostatic charge.

• Electrostatic

charge: This is the electricity between the technician
and the computer component.

• Damage to

damaged.

• Data:

computer components: This is when the component is

information that is stored onto the computer. (HDD)
Electrostatic charge
• The electricity

in the circuit on the components are harmless to
users/technicians, but they are very sensitive and could be
damaged.

• This can

cause damage to the component when they build up
static electricity which is released on the technician and becomes
discharged.
Component damage
• When

handling with any component and computer, they is as
chance that it may get damaged, as there is many ways.

• The

common ways a component can get damaged is by dropping
the component, turning screws too much ruining the
treads, bending a pin or socket, and by loosening a cable in a plug.
Data
• The two

main risk that may occur is data corruption and data loss.

• Data

corruption is when data is damaged by errors. This means the
data is still recognised by the system but cannot be viewed or
usable. The cause of this may be from not copying the file
completely or correctly.

• Data

loss happens when the HDD is damaged or formatted. If
data is lost, it cannot be retrieved without a backup.
Precautions to avoid problems
• Electrostatic charge: A

antistatic wristband must be worn, which is
attached to a metal part inside the tower and an antistatic mat
should be used, which is placed underneath the computer.

• Damage to

computer components: Use tools and equipment
correctly, to be careful, concentrate all times and to take time
when handling.

• Data:

It is important to backup all data from the computer, as
anything could happen.

Contenu connexe

En vedette

Health & Safety 12.11
Health & Safety 12.11Health & Safety 12.11
Health & Safety 12.11Meg Thompson
 
Safety in the home
Safety in the homeSafety in the home
Safety in the homeBeth Rogers
 
Home Safety Presentation_September 22, 2016
Home Safety Presentation_September 22, 2016Home Safety Presentation_September 22, 2016
Home Safety Presentation_September 22, 2016Bethany Anderson, MPH
 
palomabarrientos8aepe2015@gmail.com
palomabarrientos8aepe2015@gmail.compalomabarrientos8aepe2015@gmail.com
palomabarrientos8aepe2015@gmail.comPaloma8a
 
Esd control-in-electronic-assembly
Esd control-in-electronic-assemblyEsd control-in-electronic-assembly
Esd control-in-electronic-assemblyTransformingTech
 
Isang Pagsusuri sa Akdang Canal dela Reina sa Pananaw Realismo
Isang Pagsusuri sa Akdang Canal dela Reina sa Pananaw RealismoIsang Pagsusuri sa Akdang Canal dela Reina sa Pananaw Realismo
Isang Pagsusuri sa Akdang Canal dela Reina sa Pananaw RealismoIris Joy Yabyabin
 
ESD Basics By Transforming Technologies
ESD Basics By Transforming TechnologiesESD Basics By Transforming Technologies
ESD Basics By Transforming TechnologiesEric Puszczewicz
 
Control de Electrostatica en la Industria Electronica Alumnas del 5 AMRH
Control de Electrostatica en la Industria Electronica Alumnas del 5 AMRH Control de Electrostatica en la Industria Electronica Alumnas del 5 AMRH
Control de Electrostatica en la Industria Electronica Alumnas del 5 AMRH Nallely Almazan
 
Safety in the home
Safety in the homeSafety in the home
Safety in the homesiobhanpdst
 
Electro Static Discharge Basics
Electro Static Discharge BasicsElectro Static Discharge Basics
Electro Static Discharge BasicsTransformingTech
 
ELECTROSTATICA
ELECTROSTATICAELECTROSTATICA
ELECTROSTATICAsaulino27
 
Programa de Control de ESD
Programa de Control de ESDPrograma de Control de ESD
Programa de Control de ESDMario Jose
 

En vedette (17)

Health & Safety 12.11
Health & Safety 12.11Health & Safety 12.11
Health & Safety 12.11
 
Safety in the home
Safety in the homeSafety in the home
Safety in the home
 
Home Safety Presentation_September 22, 2016
Home Safety Presentation_September 22, 2016Home Safety Presentation_September 22, 2016
Home Safety Presentation_September 22, 2016
 
palomabarrientos8aepe2015@gmail.com
palomabarrientos8aepe2015@gmail.compalomabarrientos8aepe2015@gmail.com
palomabarrientos8aepe2015@gmail.com
 
Esd control-in-electronic-assembly
Esd control-in-electronic-assemblyEsd control-in-electronic-assembly
Esd control-in-electronic-assembly
 
Pagbasa
PagbasaPagbasa
Pagbasa
 
Isang Pagsusuri sa Akdang Canal dela Reina sa Pananaw Realismo
Isang Pagsusuri sa Akdang Canal dela Reina sa Pananaw RealismoIsang Pagsusuri sa Akdang Canal dela Reina sa Pananaw Realismo
Isang Pagsusuri sa Akdang Canal dela Reina sa Pananaw Realismo
 
ESD Basics By Transforming Technologies
ESD Basics By Transforming TechnologiesESD Basics By Transforming Technologies
ESD Basics By Transforming Technologies
 
Presentation1
Presentation1Presentation1
Presentation1
 
Home safety awareness
Home safety awarenessHome safety awareness
Home safety awareness
 
ESD PRESENTATION
ESD PRESENTATIONESD PRESENTATION
ESD PRESENTATION
 
Control de Electrostatica en la Industria Electronica Alumnas del 5 AMRH
Control de Electrostatica en la Industria Electronica Alumnas del 5 AMRH Control de Electrostatica en la Industria Electronica Alumnas del 5 AMRH
Control de Electrostatica en la Industria Electronica Alumnas del 5 AMRH
 
Safety in the home
Safety in the homeSafety in the home
Safety in the home
 
Hazard
HazardHazard
Hazard
 
Electro Static Discharge Basics
Electro Static Discharge BasicsElectro Static Discharge Basics
Electro Static Discharge Basics
 
ELECTROSTATICA
ELECTROSTATICAELECTROSTATICA
ELECTROSTATICA
 
Programa de Control de ESD
Programa de Control de ESDPrograma de Control de ESD
Programa de Control de ESD
 

Similaire à Reasons why Hardware is Installed and Potential Problems and the Precautions

Ch 2 maintenance and safety
Ch 2 maintenance and safetyCh 2 maintenance and safety
Ch 2 maintenance and safetymekashaw tizazu
 
lesson 3; inspect and test the configured cs and network handouts
lesson 3; inspect and test the configured cs and network handoutslesson 3; inspect and test the configured cs and network handouts
lesson 3; inspect and test the configured cs and network handoutslorbz
 
ComputerAssembly
ComputerAssemblyComputerAssembly
ComputerAssemblyjay decelo
 
Installation and Testing of Hardware
Installation and Testing of HardwareInstallation and Testing of Hardware
Installation and Testing of HardwareAjay Jassi
 
GENERAL H and S plus tools Pre-Practical ITE6_Instructor_Materials_Chapter2.pptx
GENERAL H and S plus tools Pre-Practical ITE6_Instructor_Materials_Chapter2.pptxGENERAL H and S plus tools Pre-Practical ITE6_Instructor_Materials_Chapter2.pptx
GENERAL H and S plus tools Pre-Practical ITE6_Instructor_Materials_Chapter2.pptxAmanda Weaver
 
Why Install Hardware?
Why Install Hardware?Why Install Hardware?
Why Install Hardware?trisson255
 
precision-15-7530-laptop_setup-guide2_en-us.pdf
precision-15-7530-laptop_setup-guide2_en-us.pdfprecision-15-7530-laptop_setup-guide2_en-us.pdf
precision-15-7530-laptop_setup-guide2_en-us.pdfssuserad36061
 
Css grade 11 week 3
Css grade 11 week 3Css grade 11 week 3
Css grade 11 week 3Danilo Anos
 
Fixsmith pc repair fundamentals
Fixsmith pc repair fundamentalsFixsmith pc repair fundamentals
Fixsmith pc repair fundamentalsFixSmith
 
It technician
It technicianIt technician
It technicianEdz Gapuz
 
vostro-3888-desktop_owners-manual5_en-us.pdf
vostro-3888-desktop_owners-manual5_en-us.pdfvostro-3888-desktop_owners-manual5_en-us.pdf
vostro-3888-desktop_owners-manual5_en-us.pdfMohamedAAmin2
 
1. advantages and applications of embedded system
1. advantages and applications of embedded system1. advantages and applications of embedded system
1. advantages and applications of embedded systemVikas Dongre
 
Hardware Lecture_PPT_WK01_Computer_Parts_Tools.pptx
Hardware Lecture_PPT_WK01_Computer_Parts_Tools.pptxHardware Lecture_PPT_WK01_Computer_Parts_Tools.pptx
Hardware Lecture_PPT_WK01_Computer_Parts_Tools.pptxclement swarnappa
 

Similaire à Reasons why Hardware is Installed and Potential Problems and the Precautions (20)

Ch 2 maintenance and safety
Ch 2 maintenance and safetyCh 2 maintenance and safety
Ch 2 maintenance and safety
 
lesson 3; inspect and test the configured cs and network handouts
lesson 3; inspect and test the configured cs and network handoutslesson 3; inspect and test the configured cs and network handouts
lesson 3; inspect and test the configured cs and network handouts
 
Ch02
Ch02Ch02
Ch02
 
Computer basic
Computer basicComputer basic
Computer basic
 
Assembling.pptx
Assembling.pptxAssembling.pptx
Assembling.pptx
 
ComputerAssembly
ComputerAssemblyComputerAssembly
ComputerAssembly
 
Installation and Testing of Hardware
Installation and Testing of HardwareInstallation and Testing of Hardware
Installation and Testing of Hardware
 
GENERAL H and S plus tools Pre-Practical ITE6_Instructor_Materials_Chapter2.pptx
GENERAL H and S plus tools Pre-Practical ITE6_Instructor_Materials_Chapter2.pptxGENERAL H and S plus tools Pre-Practical ITE6_Instructor_Materials_Chapter2.pptx
GENERAL H and S plus tools Pre-Practical ITE6_Instructor_Materials_Chapter2.pptx
 
Hardware Book BTI.pdf
Hardware Book BTI.pdfHardware Book BTI.pdf
Hardware Book BTI.pdf
 
Computer Assembly
Computer AssemblyComputer Assembly
Computer Assembly
 
Why Install Hardware?
Why Install Hardware?Why Install Hardware?
Why Install Hardware?
 
Assembling
AssemblingAssembling
Assembling
 
precision-15-7530-laptop_setup-guide2_en-us.pdf
precision-15-7530-laptop_setup-guide2_en-us.pdfprecision-15-7530-laptop_setup-guide2_en-us.pdf
precision-15-7530-laptop_setup-guide2_en-us.pdf
 
Css grade 11 week 3
Css grade 11 week 3Css grade 11 week 3
Css grade 11 week 3
 
Fixsmith pc repair fundamentals
Fixsmith pc repair fundamentalsFixsmith pc repair fundamentals
Fixsmith pc repair fundamentals
 
It technician
It technicianIt technician
It technician
 
vostro-3888-desktop_owners-manual5_en-us.pdf
vostro-3888-desktop_owners-manual5_en-us.pdfvostro-3888-desktop_owners-manual5_en-us.pdf
vostro-3888-desktop_owners-manual5_en-us.pdf
 
1. advantages and applications of embedded system
1. advantages and applications of embedded system1. advantages and applications of embedded system
1. advantages and applications of embedded system
 
Module 4 unit 1
Module 4  unit 1Module 4  unit 1
Module 4 unit 1
 
Hardware Lecture_PPT_WK01_Computer_Parts_Tools.pptx
Hardware Lecture_PPT_WK01_Computer_Parts_Tools.pptxHardware Lecture_PPT_WK01_Computer_Parts_Tools.pptx
Hardware Lecture_PPT_WK01_Computer_Parts_Tools.pptx
 

Plus de Ajay Jassi

Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices Ajay Jassi
 
Managing IT Security
Managing IT SecurityManaging IT Security
Managing IT SecurityAjay Jassi
 
Impact on IT system breaches
Impact on IT system breachesImpact on IT system breaches
Impact on IT system breachesAjay Jassi
 
Testing software
Testing softwareTesting software
Testing softwareAjay Jassi
 
Configuring personal desktop
Configuring personal desktopConfiguring personal desktop
Configuring personal desktopAjay Jassi
 
Preaparation for new software application
Preaparation for new software applicationPreaparation for new software application
Preaparation for new software applicationAjay Jassi
 
Software Licences
Software LicencesSoftware Licences
Software LicencesAjay Jassi
 
Hardware Documentation and Benefits of Hardware Provider
Hardware Documentation and Benefits of Hardware ProviderHardware Documentation and Benefits of Hardware Provider
Hardware Documentation and Benefits of Hardware ProviderAjay Jassi
 
IT job role description for Technical Support Engineer
IT job role description for Technical Support EngineerIT job role description for Technical Support Engineer
IT job role description for Technical Support EngineerAjay Jassi
 
Characteristics for IT Employee (P1)
Characteristics for IT Employee (P1)Characteristics for IT Employee (P1)
Characteristics for IT Employee (P1)Ajay Jassi
 
Preparation for Installing Hardware
Preparation for Installing HardwarePreparation for Installing Hardware
Preparation for Installing HardwareAjay Jassi
 
Installation of Windows 7 using USB
Installation of Windows 7 using USBInstallation of Windows 7 using USB
Installation of Windows 7 using USBAjay Jassi
 
Building Computer System
Building Computer SystemBuilding Computer System
Building Computer SystemAjay Jassi
 
Installation and configuration of Wireless NIC
Installation and configuration of Wireless NICInstallation and configuration of Wireless NIC
Installation and configuration of Wireless NICAjay Jassi
 
Comparison between Windows 8 and Mavericks OS X
Comparison between Windows 8 and Mavericks OS XComparison between Windows 8 and Mavericks OS X
Comparison between Windows 8 and Mavericks OS XAjay Jassi
 
Upgrade Invoice
Upgrade InvoiceUpgrade Invoice
Upgrade InvoiceAjay Jassi
 
Personalising Desktop
Personalising DesktopPersonalising Desktop
Personalising DesktopAjay Jassi
 
Health and safety requirements for computer maintenance
Health and safety requirements for computer maintenanceHealth and safety requirements for computer maintenance
Health and safety requirements for computer maintenanceAjay Jassi
 
Computer Invoice
Computer InvoiceComputer Invoice
Computer InvoiceAjay Jassi
 
Test Table for Wireless NIC
Test Table for Wireless NIC Test Table for Wireless NIC
Test Table for Wireless NIC Ajay Jassi
 

Plus de Ajay Jassi (20)

Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices
 
Managing IT Security
Managing IT SecurityManaging IT Security
Managing IT Security
 
Impact on IT system breaches
Impact on IT system breachesImpact on IT system breaches
Impact on IT system breaches
 
Testing software
Testing softwareTesting software
Testing software
 
Configuring personal desktop
Configuring personal desktopConfiguring personal desktop
Configuring personal desktop
 
Preaparation for new software application
Preaparation for new software applicationPreaparation for new software application
Preaparation for new software application
 
Software Licences
Software LicencesSoftware Licences
Software Licences
 
Hardware Documentation and Benefits of Hardware Provider
Hardware Documentation and Benefits of Hardware ProviderHardware Documentation and Benefits of Hardware Provider
Hardware Documentation and Benefits of Hardware Provider
 
IT job role description for Technical Support Engineer
IT job role description for Technical Support EngineerIT job role description for Technical Support Engineer
IT job role description for Technical Support Engineer
 
Characteristics for IT Employee (P1)
Characteristics for IT Employee (P1)Characteristics for IT Employee (P1)
Characteristics for IT Employee (P1)
 
Preparation for Installing Hardware
Preparation for Installing HardwarePreparation for Installing Hardware
Preparation for Installing Hardware
 
Installation of Windows 7 using USB
Installation of Windows 7 using USBInstallation of Windows 7 using USB
Installation of Windows 7 using USB
 
Building Computer System
Building Computer SystemBuilding Computer System
Building Computer System
 
Installation and configuration of Wireless NIC
Installation and configuration of Wireless NICInstallation and configuration of Wireless NIC
Installation and configuration of Wireless NIC
 
Comparison between Windows 8 and Mavericks OS X
Comparison between Windows 8 and Mavericks OS XComparison between Windows 8 and Mavericks OS X
Comparison between Windows 8 and Mavericks OS X
 
Upgrade Invoice
Upgrade InvoiceUpgrade Invoice
Upgrade Invoice
 
Personalising Desktop
Personalising DesktopPersonalising Desktop
Personalising Desktop
 
Health and safety requirements for computer maintenance
Health and safety requirements for computer maintenanceHealth and safety requirements for computer maintenance
Health and safety requirements for computer maintenance
 
Computer Invoice
Computer InvoiceComputer Invoice
Computer Invoice
 
Test Table for Wireless NIC
Test Table for Wireless NIC Test Table for Wireless NIC
Test Table for Wireless NIC
 

Dernier

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 

Dernier (20)

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 

Reasons why Hardware is Installed and Potential Problems and the Precautions

  • 2. Benefits of Installing expansion • Expansion on a computer system are the graphics card, PCI cards, Wi-Fi card, video cards and sound cards. • These can be installed as an upgrade to make the computer system faster and updated. • Nowadays these are mostly inputted and already installed onto the motherboard. An example that is commonly upgraded is the graphics card. • Another reasons it might be installed is too replace faults in the computer system and repair the machine.
  • 3. Potential problems • Before dealing with a computer system in the workshop, training must be done for installing, disposing and dealing with computer components safely. • It’s important for an technician to understand and know the risks that can occur, so it can be prevented and dealt with. • There are many problems that could happen when installing hardware. This can be caused by a small accident.
  • 4. Effects • This can effect data, damage to computer components and electrostatic charge. • Electrostatic charge: This is the electricity between the technician and the computer component. • Damage to damaged. • Data: computer components: This is when the component is information that is stored onto the computer. (HDD)
  • 5. Electrostatic charge • The electricity in the circuit on the components are harmless to users/technicians, but they are very sensitive and could be damaged. • This can cause damage to the component when they build up static electricity which is released on the technician and becomes discharged.
  • 6. Component damage • When handling with any component and computer, they is as chance that it may get damaged, as there is many ways. • The common ways a component can get damaged is by dropping the component, turning screws too much ruining the treads, bending a pin or socket, and by loosening a cable in a plug.
  • 7. Data • The two main risk that may occur is data corruption and data loss. • Data corruption is when data is damaged by errors. This means the data is still recognised by the system but cannot be viewed or usable. The cause of this may be from not copying the file completely or correctly. • Data loss happens when the HDD is damaged or formatted. If data is lost, it cannot be retrieved without a backup.
  • 8. Precautions to avoid problems • Electrostatic charge: A antistatic wristband must be worn, which is attached to a metal part inside the tower and an antistatic mat should be used, which is placed underneath the computer. • Damage to computer components: Use tools and equipment correctly, to be careful, concentrate all times and to take time when handling. • Data: It is important to backup all data from the computer, as anything could happen.