SlideShare a Scribd company logo
1 of 6
Installing
Hardware
AJAY JASSI
Safety first


Firstly place an antistatic mat on a flat surface.



Place the computer carefully on the mat.



Put the antistatic wristband to your wrist and clip
the crocodile clip inside the tower on a metal part
to conduct the electricity.
Installing RAM

Firstly take the RAM out of the packaging.
Secondly allocate the RAM in the position.
Now apply a little pressure to get the RAM
placed into the slot.
Finally clip down the side clips to secure the
RAM and keep it in place.
Installing DVD drive

Firstly take out the DVD drive out of the
packaging.
Secondly put the bracket on the DVD drive
using the correct screws and screwdriver.
Now insert the IDE cable to the motherboard.
Finally place the DVD drive in position and
plug the IDE cable to it.
Installing HDD

Firstly take out the HDD from the packaging.
Then put the bracket on to the HDD using the
correct screws and screwdriver.
Now insert the ATA data cable to the
motherboard.
Position and place the HDD in place.
Finally plug the ATA data cable to the HDD.
Installing wireless NIC

Firstly take out the wireless NIC from the
packaging.
Secondly unclip the supporter lever for the
expansion slots.
Then allocate the wireless NIC and apply little
pressure to secure it in position.
Now push back down the supporter lever for
security.
Finally screw on the antenna to the wireless NIC
adapter.

More Related Content

Viewers also liked

P2- Technical Presentation- Tablets
P2- Technical Presentation- TabletsP2- Technical Presentation- Tablets
P2- Technical Presentation- TabletsAjay Jassi
 
Personalising Desktop
Personalising DesktopPersonalising Desktop
Personalising DesktopAjay Jassi
 
Embedded Devices
Embedded DevicesEmbedded Devices
Embedded DevicesAjay Jassi
 
Comparison between Windows 8 and Mavericks OS X
Comparison between Windows 8 and Mavericks OS XComparison between Windows 8 and Mavericks OS X
Comparison between Windows 8 and Mavericks OS XAjay Jassi
 
Reasons why Hardware is Installed and Potential Problems and the Precautions
Reasons why Hardware is Installed and Potential Problems and the PrecautionsReasons why Hardware is Installed and Potential Problems and the Precautions
Reasons why Hardware is Installed and Potential Problems and the PrecautionsAjay Jassi
 
Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices Ajay Jassi
 
Health and safety requirements for computer maintenance
Health and safety requirements for computer maintenanceHealth and safety requirements for computer maintenance
Health and safety requirements for computer maintenanceAjay Jassi
 
Potential problems that occur during hardware installation
Potential problems that occur during hardware installationPotential problems that occur during hardware installation
Potential problems that occur during hardware installationAjay Jassi
 

Viewers also liked (8)

P2- Technical Presentation- Tablets
P2- Technical Presentation- TabletsP2- Technical Presentation- Tablets
P2- Technical Presentation- Tablets
 
Personalising Desktop
Personalising DesktopPersonalising Desktop
Personalising Desktop
 
Embedded Devices
Embedded DevicesEmbedded Devices
Embedded Devices
 
Comparison between Windows 8 and Mavericks OS X
Comparison between Windows 8 and Mavericks OS XComparison between Windows 8 and Mavericks OS X
Comparison between Windows 8 and Mavericks OS X
 
Reasons why Hardware is Installed and Potential Problems and the Precautions
Reasons why Hardware is Installed and Potential Problems and the PrecautionsReasons why Hardware is Installed and Potential Problems and the Precautions
Reasons why Hardware is Installed and Potential Problems and the Precautions
 
Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices
 
Health and safety requirements for computer maintenance
Health and safety requirements for computer maintenanceHealth and safety requirements for computer maintenance
Health and safety requirements for computer maintenance
 
Potential problems that occur during hardware installation
Potential problems that occur during hardware installationPotential problems that occur during hardware installation
Potential problems that occur during hardware installation
 

Similar to Installing Computer Hardware Components Safely

How to install computer hardware 10 steps (with pictures)
How to install computer hardware  10 steps (with pictures)How to install computer hardware  10 steps (with pictures)
How to install computer hardware 10 steps (with pictures)Perla Pelicano Corpez
 
Computer Assembly and Disassembly (2nd Lesson part 2).ppt
Computer Assembly and Disassembly (2nd Lesson part 2).pptComputer Assembly and Disassembly (2nd Lesson part 2).ppt
Computer Assembly and Disassembly (2nd Lesson part 2).pptJonathanOcampo23
 
Build your own computer
Build your own computerBuild your own computer
Build your own computerMansoor Shar
 
SYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITY
SYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITYSYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITY
SYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITYGOKUL SREE
 
Css grade 11 week 4
Css grade 11 week 4Css grade 11 week 4
Css grade 11 week 4Danilo Anos
 
Computer hardware basic -shashank
Computer hardware basic  -shashankComputer hardware basic  -shashank
Computer hardware basic -shashanktechbed
 
Install computer system,devices and peripherals
Install computer system,devices and peripheralsInstall computer system,devices and peripherals
Install computer system,devices and peripheralsRaiza Janelle
 
Assembling a computer
Assembling a computerAssembling a computer
Assembling a computerNeeraj Dhiman
 
Installing hard drive and optical drive
Installing hard drive and optical driveInstalling hard drive and optical drive
Installing hard drive and optical drivekapitanbasa
 
Installing hard drive and optical drive
Installing hard drive and optical driveInstalling hard drive and optical drive
Installing hard drive and optical drivekapitanbasa
 

Similar to Installing Computer Hardware Components Safely (20)

Computer assembly
Computer assemblyComputer assembly
Computer assembly
 
How to install computer hardware 10 steps (with pictures)
How to install computer hardware  10 steps (with pictures)How to install computer hardware  10 steps (with pictures)
How to install computer hardware 10 steps (with pictures)
 
Caramerakitkomputer.ppt
Caramerakitkomputer.pptCaramerakitkomputer.ppt
Caramerakitkomputer.ppt
 
Caramerakitkomputer
CaramerakitkomputerCaramerakitkomputer
Caramerakitkomputer
 
Unit 111 D1
Unit 111 D1 Unit 111 D1
Unit 111 D1
 
2.3
2.32.3
2.3
 
Computer Assembly and Disassembly (2nd Lesson part 2).ppt
Computer Assembly and Disassembly (2nd Lesson part 2).pptComputer Assembly and Disassembly (2nd Lesson part 2).ppt
Computer Assembly and Disassembly (2nd Lesson part 2).ppt
 
Build your own computer
Build your own computerBuild your own computer
Build your own computer
 
Montandopc
MontandopcMontandopc
Montandopc
 
SYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITY
SYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITYSYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITY
SYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITY
 
Assemble your pc
Assemble your pcAssemble your pc
Assemble your pc
 
Css grade 11 week 4
Css grade 11 week 4Css grade 11 week 4
Css grade 11 week 4
 
Computer hardware basic -shashank
Computer hardware basic  -shashankComputer hardware basic  -shashank
Computer hardware basic -shashank
 
Dasar komputer chapter3
Dasar komputer chapter3Dasar komputer chapter3
Dasar komputer chapter3
 
BuildingAComputer
BuildingAComputerBuildingAComputer
BuildingAComputer
 
Install computer system,devices and peripherals
Install computer system,devices and peripheralsInstall computer system,devices and peripherals
Install computer system,devices and peripherals
 
ict 10 4 second q.pptx
ict 10 4 second q.pptxict 10 4 second q.pptx
ict 10 4 second q.pptx
 
Assembling a computer
Assembling a computerAssembling a computer
Assembling a computer
 
Installing hard drive and optical drive
Installing hard drive and optical driveInstalling hard drive and optical drive
Installing hard drive and optical drive
 
Installing hard drive and optical drive
Installing hard drive and optical driveInstalling hard drive and optical drive
Installing hard drive and optical drive
 

More from Ajay Jassi

Managing IT Security
Managing IT SecurityManaging IT Security
Managing IT SecurityAjay Jassi
 
Configuring personal desktop
Configuring personal desktopConfiguring personal desktop
Configuring personal desktopAjay Jassi
 
Preaparation for new software application
Preaparation for new software applicationPreaparation for new software application
Preaparation for new software applicationAjay Jassi
 
Hardware Documentation and Benefits of Hardware Provider
Hardware Documentation and Benefits of Hardware ProviderHardware Documentation and Benefits of Hardware Provider
Hardware Documentation and Benefits of Hardware ProviderAjay Jassi
 
IT job role description for Technical Support Engineer
IT job role description for Technical Support EngineerIT job role description for Technical Support Engineer
IT job role description for Technical Support EngineerAjay Jassi
 
Characteristics for IT Employee (P1)
Characteristics for IT Employee (P1)Characteristics for IT Employee (P1)
Characteristics for IT Employee (P1)Ajay Jassi
 
Preparation for Installing Hardware
Preparation for Installing HardwarePreparation for Installing Hardware
Preparation for Installing HardwareAjay Jassi
 
Installation and Testing of Hardware
Installation and Testing of HardwareInstallation and Testing of Hardware
Installation and Testing of HardwareAjay Jassi
 
Installation of Windows 7 using USB
Installation of Windows 7 using USBInstallation of Windows 7 using USB
Installation of Windows 7 using USBAjay Jassi
 
Installation and configuration of Wireless NIC
Installation and configuration of Wireless NICInstallation and configuration of Wireless NIC
Installation and configuration of Wireless NICAjay Jassi
 
Upgrade Invoice
Upgrade InvoiceUpgrade Invoice
Upgrade InvoiceAjay Jassi
 
Computer Invoice
Computer InvoiceComputer Invoice
Computer InvoiceAjay Jassi
 
Test Table for Wireless NIC
Test Table for Wireless NIC Test Table for Wireless NIC
Test Table for Wireless NIC Ajay Jassi
 
Removing Security Risks from PC
Removing Security Risks from PCRemoving Security Risks from PC
Removing Security Risks from PCAjay Jassi
 
Identifying Security Risks
Identifying Security RisksIdentifying Security Risks
Identifying Security RisksAjay Jassi
 
Earl's Ices Computer Configuration
Earl's Ices Computer Configuration Earl's Ices Computer Configuration
Earl's Ices Computer Configuration Ajay Jassi
 
P3 dataflow around pc
P3   dataflow around pcP3   dataflow around pc
P3 dataflow around pcAjay Jassi
 

More from Ajay Jassi (17)

Managing IT Security
Managing IT SecurityManaging IT Security
Managing IT Security
 
Configuring personal desktop
Configuring personal desktopConfiguring personal desktop
Configuring personal desktop
 
Preaparation for new software application
Preaparation for new software applicationPreaparation for new software application
Preaparation for new software application
 
Hardware Documentation and Benefits of Hardware Provider
Hardware Documentation and Benefits of Hardware ProviderHardware Documentation and Benefits of Hardware Provider
Hardware Documentation and Benefits of Hardware Provider
 
IT job role description for Technical Support Engineer
IT job role description for Technical Support EngineerIT job role description for Technical Support Engineer
IT job role description for Technical Support Engineer
 
Characteristics for IT Employee (P1)
Characteristics for IT Employee (P1)Characteristics for IT Employee (P1)
Characteristics for IT Employee (P1)
 
Preparation for Installing Hardware
Preparation for Installing HardwarePreparation for Installing Hardware
Preparation for Installing Hardware
 
Installation and Testing of Hardware
Installation and Testing of HardwareInstallation and Testing of Hardware
Installation and Testing of Hardware
 
Installation of Windows 7 using USB
Installation of Windows 7 using USBInstallation of Windows 7 using USB
Installation of Windows 7 using USB
 
Installation and configuration of Wireless NIC
Installation and configuration of Wireless NICInstallation and configuration of Wireless NIC
Installation and configuration of Wireless NIC
 
Upgrade Invoice
Upgrade InvoiceUpgrade Invoice
Upgrade Invoice
 
Computer Invoice
Computer InvoiceComputer Invoice
Computer Invoice
 
Test Table for Wireless NIC
Test Table for Wireless NIC Test Table for Wireless NIC
Test Table for Wireless NIC
 
Removing Security Risks from PC
Removing Security Risks from PCRemoving Security Risks from PC
Removing Security Risks from PC
 
Identifying Security Risks
Identifying Security RisksIdentifying Security Risks
Identifying Security Risks
 
Earl's Ices Computer Configuration
Earl's Ices Computer Configuration Earl's Ices Computer Configuration
Earl's Ices Computer Configuration
 
P3 dataflow around pc
P3   dataflow around pcP3   dataflow around pc
P3 dataflow around pc
 

Recently uploaded

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 

Recently uploaded (20)

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 

Installing Computer Hardware Components Safely

  • 2. Safety first  Firstly place an antistatic mat on a flat surface.  Place the computer carefully on the mat.  Put the antistatic wristband to your wrist and clip the crocodile clip inside the tower on a metal part to conduct the electricity.
  • 3. Installing RAM Firstly take the RAM out of the packaging. Secondly allocate the RAM in the position. Now apply a little pressure to get the RAM placed into the slot. Finally clip down the side clips to secure the RAM and keep it in place.
  • 4. Installing DVD drive Firstly take out the DVD drive out of the packaging. Secondly put the bracket on the DVD drive using the correct screws and screwdriver. Now insert the IDE cable to the motherboard. Finally place the DVD drive in position and plug the IDE cable to it.
  • 5. Installing HDD Firstly take out the HDD from the packaging. Then put the bracket on to the HDD using the correct screws and screwdriver. Now insert the ATA data cable to the motherboard. Position and place the HDD in place. Finally plug the ATA data cable to the HDD.
  • 6. Installing wireless NIC Firstly take out the wireless NIC from the packaging. Secondly unclip the supporter lever for the expansion slots. Then allocate the wireless NIC and apply little pressure to secure it in position. Now push back down the supporter lever for security. Finally screw on the antenna to the wireless NIC adapter.