SlideShare une entreprise Scribd logo
1  sur  19
IT Essentials PC Hardware
  and Software 4.1

  Instructional Resource
  Chapter 6: Fundamental
  Laptops and Portable
  Devices




Presentation_ID               © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   1
Chapter 6: Objectives
            Describe laptops and other portable devices.
            Identify and describe the components of a laptop.
            Compare and contrast desktop and laptop components.
            Explain how to configure laptops.
            Compare the different mobile phone standards.
            Identify common preventive maintenance techniques for laptops and portable
             devices.
            Describe how to troubleshoot laptops and portable devices.




Presentation_ID                                      © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   2
Chapter 6: Critical Concepts
            What is this chapter about and why is it important?
            This chapter describes laptops and other portable devices. Portable devices, such
             as smartphones and personal digital assistants, have very few parts that can be
             replaced. These devices usually require a technician with a brand-specific
             certification to repair them. In this chapter, the emphasis is on laptops, their
             components, and how to configure them. Laptop preventive maintenance and
             troubleshooting are also covered.
            This chapter is important because more people are using laptops in addition to, or
             instead of, desktop computers. There are differences across makes and models of
             laptops, but certain technologies apply to all. Today’s IT technicians are likely to
             spend much of their time maintaining and troubleshooting laptops. For those
             students who do not have access to a physical laptop computer in the lab, Chapter 6
             also provides a Virtual Laptop. The Virtual Laptop labs demonstrate laptop
             component installation and removal through animation and student interaction.




Presentation_ID                                      © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   3
Chapter 6: Activities
            What activities are associated with this chapter?
                  6.1.2 Worksheet: Research Laptops, Smartphones, and PDAs
                  6.2.1 Optional Activity: Virtual Laptop – Explore Laptop
                  6.2.2 Optional Activity: Virtual Laptop – Keyboard
                  6.2.3 Worksheet: Complete Docking Stations True or False Questions
                  6.2.3 Optional Activity: Virtual Laptop – Docking Station
                  6.3.4 Worksheet: Answer Laptop Expansion Questions
                  6.4.1 Worksheet: Match ACPI Standards
                  6.4.2 Optional Activity: Virtual Laptop – Components and Devices
                  6.7.2 Worksheet: Research Laptop Problems
                  Chapter 6 Quiz




Presentation_ID                                         © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   4
Chapter 6: New Terms
            What terms are introduced in this chapter?


                  AC power connector                                                                     6.2.1

                  Advanced Configuration and Power Interface (ACPI)                                      6.3.3

                  Advanced Power Management (APM)                                                        6.3.3

                  base station                                                                           6.2.3

                  battery                                                                                6.2.1

                  battery latch                                                                          6.2.1

                  battery status indicator LED                                                           6.2.1

                  Bluetooth                                                                              6.1.2

                  Caps lock indicator LED                                                                6.2.2

                  desktop computer                                                                       6.2.1




Presentation_ID                                                       © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   5
Chapter 6: New Terms (continued)
            What terms are introduced in this chapter?


                  docking connector                                                                  6.2.3

                  docking station                                                                    6.2

                  Ethernet                                                                           6.4.3

                  ExpressCard                                                                        6.3.4

                  fingerprint reader                                                                 6.2.2

                  function key (Fn key)                                                              6.2.2

                  Global System for Mobile Communications (GSM)                                      6.5

                  Hibernate/Standby indicator LED                                                    6.2.2

                  hot-swappable interface                                                            6.4.2

                  laptop                                                                             6.1




Presentation_ID                                                   © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   6
Chapter 6: New Terms (continued)
            What terms are introduced in this chapter?


                  power on indicator LED                                                                        6.2.2

                  security keyhole                                                                              6.2.1

                  smartphones                                                                                   6.1

                  Streaming Single-instruction-multi-data Extensions (SSE)                                      6.2.2

                  stylus                                                                                        6.2.2

                  touchpad                                                                                      6.2.2

                  ventilation                                                                                   6.2.1

                  volume control                                                                                6.2.2

                  wireless indicator LED                                                                        6.2.2

                  power on indicator LED                                                                        6.2.2




Presentation_ID                                                              © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   7
Chapter 6: Changes
            What has changed from the previous version (4.0) of ITEPC?
                  Page 6.2.2 Describe the components found on the inside of the laptop
                  • Input devices
                      •Stylus or digitizer
                      •Pointing devices
                      •Function keys


                  Page 6.2.3 Describe the components found on the laptop docking station
                  • Install, configure, and optimize laptop components and features.
                      •Docking station


                  Page 6.3.3 Compare and contrast desktop and laptop power management
                  • AC adapter




Presentation_ID                                       © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   8
Chapter 6: Changes (continued)
            What has changed from the previous version (4.0) of ITEPC?
              Page 6.3.4 Compare and contrast desktop and laptop expansion capabilities
              • Install, configure, and optimize laptop components and features.
                    •ExpressCard

                  Page 6.4.1 Describe how to configure power settings
                      •Wake on LAN
                      •Suspend
                      •Sleep timers

                  Page 6.4.2 Describe the safe installation and removal of laptop components
                  • Install, configure, and optimize laptop components and features.
                  • Power and electrical input devices
                        •Auto-switching
                        •Fixed input power supplies



Presentation_ID                                       © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   9
Chapter 6: Changes (continued)
            What has changed from the previous version (4.0) of ITEPC?
                  Page 6.4.3 Laptop communication hardware installation and configuration
                  • Communication connections
                      •Ethernet
                      •Bluetooth
                      •Infrared
                      •Cellular WAN




Presentation_ID                                       © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   10
Chapter 6: Changes (continued)
            What has changed from the previous version (4.0) of ITEPC?
                  Page 6.7.1 Review the troubleshooting process
                  • Identify the Problem
                  • Establish a Theory of Probable Causes
                  • Determine an Exact Cause
                  • Implement a Solution
                  • Verify Solution and Full System Functionality
                  • Document Findings




Presentation_ID                                         © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   11
Chapter 6: Changes (continued)
            What has changed from the previous version (4.0) of ITEPC?
              Page 6.7.2 Identify common problems and solutions
              • Issues
                    •Power condition
                    •Video
                    •Keyboard
                    •Pointer
                    •Stylus
                    •Wireless card
              • Methods
                    •Verify that the laptop has power.
                    •Remove unneeded peripherals.
                    •Plug in an external monitor.
                    •Toggle the Fn keys or hardware switches.
                    •Check the LCD cutoff switch.
                    •Verify backlight functionality.
                    •Check for a switch for built-in WiFi antennas.
Presentation_ID                                    © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   12
Chapter 6: Classroom Management
                   Plan for a lot of interaction and discussion in this chapter because many
                    schools may not have laptops to use in the classroom.
                   Use the virtual laptop labs if laptops are not available.
                   Disassemble a laptop in front of the class.
                   Provide a non-functioning laptop for students to practice assembling and to use
                    for part identification.




Presentation_ID                                          © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   13
Chapter 6: Teaching Analogies
            A laptop is like a mini-bike, whereas a desktop computer is like a motorcycle. The
             laptop may have all the same components, but it is not as big. You could also use
             the same type of analogy with a mini-refrigerator. It serves the same purpose and
             is easier to move.




Presentation_ID                                      © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   14
Chapter 6: Suggested Class Discussions
                 What do laptops and desktops have in common?
                 How do laptops and desktops differ?
                 What makes laptops more difficult for technicians to support?
                 How have cellular developments influenced the growth of laptop
                  technologies?




Presentation_ID                                     © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   15
Chapter 6: Best Practices
                 Obtain old laptops from the school or through donation when possible. Obtain
                  manuals for the laptops and disassemble one in front of the class. Use egg
                  cartons or small plastic bags to organize the screws and pieces. Take notes the
                  first time the laptop is disassembled, because laptops are more compact and each
                  brand is unique with their re-assembly steps.




Presentation_ID                                        © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   16
Chapter 6: Outside Reading
           Laptop Comparison Guides


           Laptop Manufacturer Websites




Presentation_ID                           © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   17
Presentation_ID   © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   18
Presentation_ID   © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   19

Contenu connexe

En vedette

CCNA RS_NB - Chapter 10
CCNA RS_NB - Chapter 10CCNA RS_NB - Chapter 10
CCNA RS_NB - Chapter 10Irsandi Hasan
 
CCNA Security - Chapter 9
CCNA Security - Chapter 9CCNA Security - Chapter 9
CCNA Security - Chapter 9Irsandi Hasan
 
CCNA Security 06- AAA
CCNA Security 06- AAACCNA Security 06- AAA
CCNA Security 06- AAAAhmed Habib
 
CCNA Security 03- network foundation protection
CCNA Security 03- network foundation protectionCCNA Security 03- network foundation protection
CCNA Security 03- network foundation protectionAhmed Habib
 
CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11Irsandi Hasan
 
VMware vShield - Overview
VMware vShield - OverviewVMware vShield - Overview
VMware vShield - OverviewIrsandi Hasan
 
CCNA Security 02- fundamentals of network security
CCNA Security 02-  fundamentals of network securityCCNA Security 02-  fundamentals of network security
CCNA Security 02- fundamentals of network securityAhmed Habib
 
CCNA Security - Chapter 1
CCNA Security - Chapter 1CCNA Security - Chapter 1
CCNA Security - Chapter 1Irsandi Hasan
 

En vedette (9)

CCNA RS_NB - Chapter 10
CCNA RS_NB - Chapter 10CCNA RS_NB - Chapter 10
CCNA RS_NB - Chapter 10
 
CCNA Security - Chapter 9
CCNA Security - Chapter 9CCNA Security - Chapter 9
CCNA Security - Chapter 9
 
CCNA Security 06- AAA
CCNA Security 06- AAACCNA Security 06- AAA
CCNA Security 06- AAA
 
CCNA Security 03- network foundation protection
CCNA Security 03- network foundation protectionCCNA Security 03- network foundation protection
CCNA Security 03- network foundation protection
 
CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11
 
VMware vShield - Overview
VMware vShield - OverviewVMware vShield - Overview
VMware vShield - Overview
 
CCNA Security 02- fundamentals of network security
CCNA Security 02-  fundamentals of network securityCCNA Security 02-  fundamentals of network security
CCNA Security 02- fundamentals of network security
 
CCNA Security - Chapter 1
CCNA Security - Chapter 1CCNA Security - Chapter 1
CCNA Security - Chapter 1
 
Router commands
Router commandsRouter commands
Router commands
 

Similaire à Laptop Components & Configuration

2c esp8266 non-os_sdk_api_reference_en
2c esp8266 non-os_sdk_api_reference_en2c esp8266 non-os_sdk_api_reference_en
2c esp8266 non-os_sdk_api_reference_enle van hoa
 
Human Interaction Library
Human Interaction LibraryHuman Interaction Library
Human Interaction Librarygraphitech
 
05 optimization of cocos2d-x games on x86 architecture
05   optimization of cocos2d-x games on x86 architecture05   optimization of cocos2d-x games on x86 architecture
05 optimization of cocos2d-x games on x86 architecture乐费 胡
 
14157565 embedded-programming
14157565 embedded-programming14157565 embedded-programming
14157565 embedded-programmingPRADEEP
 
Cldc Hotspot Architecture
Cldc Hotspot ArchitectureCldc Hotspot Architecture
Cldc Hotspot Architecturezdmilan
 
Bharat gargi final project report
Bharat gargi final project reportBharat gargi final project report
Bharat gargi final project reportBharat Biyani
 
Ite pc v40_chapter6
Ite pc v40_chapter6Ite pc v40_chapter6
Ite pc v40_chapter6jaquelinn3
 
SIMPLIFIED SECURED WIRELESS RAILWAY / AIRWAY FOR RESERVATION
SIMPLIFIED SECURED WIRELESS RAILWAY / AIRWAY FOR RESERVATIONSIMPLIFIED SECURED WIRELESS RAILWAY / AIRWAY FOR RESERVATION
SIMPLIFIED SECURED WIRELESS RAILWAY / AIRWAY FOR RESERVATIONRicky Drk
 

Similaire à Laptop Components & Configuration (20)

Zigbee 802.15.4
Zigbee 802.15.4Zigbee 802.15.4
Zigbee 802.15.4
 
2c esp8266 non-os_sdk_api_reference_en
2c esp8266 non-os_sdk_api_reference_en2c esp8266 non-os_sdk_api_reference_en
2c esp8266 non-os_sdk_api_reference_en
 
ITE - Chapter 8
ITE - Chapter 8ITE - Chapter 8
ITE - Chapter 8
 
Human Interaction Library
Human Interaction LibraryHuman Interaction Library
Human Interaction Library
 
05 optimization of cocos2d-x games on x86 architecture
05   optimization of cocos2d-x games on x86 architecture05   optimization of cocos2d-x games on x86 architecture
05 optimization of cocos2d-x games on x86 architecture
 
14157565 embedded-programming
14157565 embedded-programming14157565 embedded-programming
14157565 embedded-programming
 
Cldc Hotspot Architecture
Cldc Hotspot ArchitectureCldc Hotspot Architecture
Cldc Hotspot Architecture
 
2.1 system concept
2.1 system concept2.1 system concept
2.1 system concept
 
ITE - Chapter 13
ITE - Chapter 13ITE - Chapter 13
ITE - Chapter 13
 
java-ring
 java-ring java-ring
java-ring
 
Bharat gargi final project report
Bharat gargi final project reportBharat gargi final project report
Bharat gargi final project report
 
Ite pc v40_chapter6
Ite pc v40_chapter6Ite pc v40_chapter6
Ite pc v40_chapter6
 
Ite pc v40_chapter6
Ite pc v40_chapter6Ite pc v40_chapter6
Ite pc v40_chapter6
 
ITE - Chapter 12
ITE - Chapter 12ITE - Chapter 12
ITE - Chapter 12
 
New Ring
New RingNew Ring
New Ring
 
SIMPLIFIED SECURED WIRELESS RAILWAY / AIRWAY FOR RESERVATION
SIMPLIFIED SECURED WIRELESS RAILWAY / AIRWAY FOR RESERVATIONSIMPLIFIED SECURED WIRELESS RAILWAY / AIRWAY FOR RESERVATION
SIMPLIFIED SECURED WIRELESS RAILWAY / AIRWAY FOR RESERVATION
 
Controlofmachines
Controlofmachines Controlofmachines
Controlofmachines
 
Control of machines
Control of machinesControl of machines
Control of machines
 
ITE - Chapter 7
ITE - Chapter 7ITE - Chapter 7
ITE - Chapter 7
 
ITE - Chapter 1
ITE - Chapter 1ITE - Chapter 1
ITE - Chapter 1
 

Plus de Irsandi Hasan

CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 08
CCNA v6.0 ITN - Chapter 08CCNA v6.0 ITN - Chapter 08
CCNA v6.0 ITN - Chapter 08Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 07CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 07Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 06
CCNA v6.0 ITN - Chapter 06CCNA v6.0 ITN - Chapter 06
CCNA v6.0 ITN - Chapter 06Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 04
CCNA v6.0 ITN - Chapter 04CCNA v6.0 ITN - Chapter 04
CCNA v6.0 ITN - Chapter 04Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01Irsandi Hasan
 
CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 9CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 9Irsandi Hasan
 
CCNA RS_NB - Chapter 8
CCNA RS_NB - Chapter 8CCNA RS_NB - Chapter 8
CCNA RS_NB - Chapter 8Irsandi Hasan
 
CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 7CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 7Irsandi Hasan
 
CCNA RS_NB - Chapter 6
CCNA RS_NB - Chapter 6CCNA RS_NB - Chapter 6
CCNA RS_NB - Chapter 6Irsandi Hasan
 
CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5Irsandi Hasan
 
CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4Irsandi Hasan
 
CCNA RS_NB - Chapter 3
CCNA RS_NB - Chapter 3CCNA RS_NB - Chapter 3
CCNA RS_NB - Chapter 3Irsandi Hasan
 
CCNA RS_NB - Chapter 2
CCNA RS_NB - Chapter 2CCNA RS_NB - Chapter 2
CCNA RS_NB - Chapter 2Irsandi Hasan
 
CCNA RS_NB - Chapter 1
CCNA RS_NB - Chapter 1CCNA RS_NB - Chapter 1
CCNA RS_NB - Chapter 1Irsandi Hasan
 

Plus de Irsandi Hasan (20)

CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11
 
CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10
 
CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09
 
CCNA v6.0 ITN - Chapter 08
CCNA v6.0 ITN - Chapter 08CCNA v6.0 ITN - Chapter 08
CCNA v6.0 ITN - Chapter 08
 
CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 07CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 07
 
CCNA v6.0 ITN - Chapter 06
CCNA v6.0 ITN - Chapter 06CCNA v6.0 ITN - Chapter 06
CCNA v6.0 ITN - Chapter 06
 
CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05
 
CCNA v6.0 ITN - Chapter 04
CCNA v6.0 ITN - Chapter 04CCNA v6.0 ITN - Chapter 04
CCNA v6.0 ITN - Chapter 04
 
CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03
 
CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02
 
CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01
 
CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 9CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 9
 
CCNA RS_NB - Chapter 8
CCNA RS_NB - Chapter 8CCNA RS_NB - Chapter 8
CCNA RS_NB - Chapter 8
 
CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 7CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 7
 
CCNA RS_NB - Chapter 6
CCNA RS_NB - Chapter 6CCNA RS_NB - Chapter 6
CCNA RS_NB - Chapter 6
 
CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5
 
CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4
 
CCNA RS_NB - Chapter 3
CCNA RS_NB - Chapter 3CCNA RS_NB - Chapter 3
CCNA RS_NB - Chapter 3
 
CCNA RS_NB - Chapter 2
CCNA RS_NB - Chapter 2CCNA RS_NB - Chapter 2
CCNA RS_NB - Chapter 2
 
CCNA RS_NB - Chapter 1
CCNA RS_NB - Chapter 1CCNA RS_NB - Chapter 1
CCNA RS_NB - Chapter 1
 

Dernier

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 

Dernier (20)

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 

Laptop Components & Configuration

  • 1. IT Essentials PC Hardware and Software 4.1 Instructional Resource Chapter 6: Fundamental Laptops and Portable Devices Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 1
  • 2. Chapter 6: Objectives  Describe laptops and other portable devices.  Identify and describe the components of a laptop.  Compare and contrast desktop and laptop components.  Explain how to configure laptops.  Compare the different mobile phone standards.  Identify common preventive maintenance techniques for laptops and portable devices.  Describe how to troubleshoot laptops and portable devices. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 2
  • 3. Chapter 6: Critical Concepts  What is this chapter about and why is it important?  This chapter describes laptops and other portable devices. Portable devices, such as smartphones and personal digital assistants, have very few parts that can be replaced. These devices usually require a technician with a brand-specific certification to repair them. In this chapter, the emphasis is on laptops, their components, and how to configure them. Laptop preventive maintenance and troubleshooting are also covered.  This chapter is important because more people are using laptops in addition to, or instead of, desktop computers. There are differences across makes and models of laptops, but certain technologies apply to all. Today’s IT technicians are likely to spend much of their time maintaining and troubleshooting laptops. For those students who do not have access to a physical laptop computer in the lab, Chapter 6 also provides a Virtual Laptop. The Virtual Laptop labs demonstrate laptop component installation and removal through animation and student interaction. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 3
  • 4. Chapter 6: Activities  What activities are associated with this chapter? 6.1.2 Worksheet: Research Laptops, Smartphones, and PDAs 6.2.1 Optional Activity: Virtual Laptop – Explore Laptop 6.2.2 Optional Activity: Virtual Laptop – Keyboard 6.2.3 Worksheet: Complete Docking Stations True or False Questions 6.2.3 Optional Activity: Virtual Laptop – Docking Station 6.3.4 Worksheet: Answer Laptop Expansion Questions 6.4.1 Worksheet: Match ACPI Standards 6.4.2 Optional Activity: Virtual Laptop – Components and Devices 6.7.2 Worksheet: Research Laptop Problems Chapter 6 Quiz Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 4
  • 5. Chapter 6: New Terms  What terms are introduced in this chapter? AC power connector 6.2.1 Advanced Configuration and Power Interface (ACPI) 6.3.3 Advanced Power Management (APM) 6.3.3 base station 6.2.3 battery 6.2.1 battery latch 6.2.1 battery status indicator LED 6.2.1 Bluetooth 6.1.2 Caps lock indicator LED 6.2.2 desktop computer 6.2.1 Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 5
  • 6. Chapter 6: New Terms (continued)  What terms are introduced in this chapter? docking connector 6.2.3 docking station 6.2 Ethernet 6.4.3 ExpressCard 6.3.4 fingerprint reader 6.2.2 function key (Fn key) 6.2.2 Global System for Mobile Communications (GSM) 6.5 Hibernate/Standby indicator LED 6.2.2 hot-swappable interface 6.4.2 laptop 6.1 Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 6
  • 7. Chapter 6: New Terms (continued)  What terms are introduced in this chapter? power on indicator LED 6.2.2 security keyhole 6.2.1 smartphones 6.1 Streaming Single-instruction-multi-data Extensions (SSE) 6.2.2 stylus 6.2.2 touchpad 6.2.2 ventilation 6.2.1 volume control 6.2.2 wireless indicator LED 6.2.2 power on indicator LED 6.2.2 Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 7
  • 8. Chapter 6: Changes  What has changed from the previous version (4.0) of ITEPC? Page 6.2.2 Describe the components found on the inside of the laptop • Input devices •Stylus or digitizer •Pointing devices •Function keys Page 6.2.3 Describe the components found on the laptop docking station • Install, configure, and optimize laptop components and features. •Docking station Page 6.3.3 Compare and contrast desktop and laptop power management • AC adapter Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 8
  • 9. Chapter 6: Changes (continued)  What has changed from the previous version (4.0) of ITEPC? Page 6.3.4 Compare and contrast desktop and laptop expansion capabilities • Install, configure, and optimize laptop components and features. •ExpressCard Page 6.4.1 Describe how to configure power settings •Wake on LAN •Suspend •Sleep timers Page 6.4.2 Describe the safe installation and removal of laptop components • Install, configure, and optimize laptop components and features. • Power and electrical input devices •Auto-switching •Fixed input power supplies Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 9
  • 10. Chapter 6: Changes (continued)  What has changed from the previous version (4.0) of ITEPC? Page 6.4.3 Laptop communication hardware installation and configuration • Communication connections •Ethernet •Bluetooth •Infrared •Cellular WAN Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 10
  • 11. Chapter 6: Changes (continued)  What has changed from the previous version (4.0) of ITEPC? Page 6.7.1 Review the troubleshooting process • Identify the Problem • Establish a Theory of Probable Causes • Determine an Exact Cause • Implement a Solution • Verify Solution and Full System Functionality • Document Findings Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 11
  • 12. Chapter 6: Changes (continued)  What has changed from the previous version (4.0) of ITEPC? Page 6.7.2 Identify common problems and solutions • Issues •Power condition •Video •Keyboard •Pointer •Stylus •Wireless card • Methods •Verify that the laptop has power. •Remove unneeded peripherals. •Plug in an external monitor. •Toggle the Fn keys or hardware switches. •Check the LCD cutoff switch. •Verify backlight functionality. •Check for a switch for built-in WiFi antennas. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 12
  • 13. Chapter 6: Classroom Management  Plan for a lot of interaction and discussion in this chapter because many schools may not have laptops to use in the classroom.  Use the virtual laptop labs if laptops are not available.  Disassemble a laptop in front of the class.  Provide a non-functioning laptop for students to practice assembling and to use for part identification. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 13
  • 14. Chapter 6: Teaching Analogies  A laptop is like a mini-bike, whereas a desktop computer is like a motorcycle. The laptop may have all the same components, but it is not as big. You could also use the same type of analogy with a mini-refrigerator. It serves the same purpose and is easier to move. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 14
  • 15. Chapter 6: Suggested Class Discussions  What do laptops and desktops have in common?  How do laptops and desktops differ?  What makes laptops more difficult for technicians to support?  How have cellular developments influenced the growth of laptop technologies? Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 15
  • 16. Chapter 6: Best Practices  Obtain old laptops from the school or through donation when possible. Obtain manuals for the laptops and disassemble one in front of the class. Use egg cartons or small plastic bags to organize the screws and pieces. Take notes the first time the laptop is disassembled, because laptops are more compact and each brand is unique with their re-assembly steps. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 16
  • 17. Chapter 6: Outside Reading Laptop Comparison Guides Laptop Manufacturer Websites Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 17
  • 18. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 18
  • 19. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 19