SlideShare a Scribd company logo
1 of 18
Care of Netbook
                     Student Device
                   Safety and Care Guidelines



JTHS 1:1 Initiative 2012-13
Basic Laptop Care
Do not leave your laptop in a car for
extended periods of time:
• Leaving the laptop in a car can expose
   it to temperature stresses and to theft.
• Intense heat can warp the case or ruin
   internal components
Basic Laptop Care
Operate at room temperature:
• Laptops will form condensation when changing
  temperature, which can damage it if it is turned
  on.
• Your laptop is also sensitive to extreme heat or
  cold.
• Hot or cold weather can warp the case, ruin
  components and damage batteries.
Basic Laptop Care
    Keep your laptop out of areas where it may
    get wet.
    Place power cables where they can’t be
    stepped on or tripped over.
  • Avoid areas with a lot of dust or smoke: Both
    dust and smoke can damage the laptop
Basic Laptop Care
          Carry the laptop in the carrying case
         when transporting and be sure to zip
         up your bag.
          A large number of laptops are damaged
         by falling out of bags.
          Handle the laptop with both hands.
          Don’t place the laptop where it may
         fall.
Basic Laptop Care
 Don’t force a cord or card in or out of
your laptop.
 Don’t leave your laptop unattended:
Theft rate for laptops is extremely high.   Never handle
 Make sure the laptop is in hibernate          a laptop
mode or shut down before putting it in      by the screen.
a carrying case, as it will overheat.
 Refrain from eating or drinking near
your laptop.
Basic Laptop Care
Clean your laptop:
• Use only a soft, lint free cloth and if necessary, lightly
  moisten only with water.
• Cleaners can damage the screen and other finishes.
• There are specific cleaners for laptop screens. These
  are ok to use also.
• Remember to spray onto the cloth and not onto the
  screen.
Basic Laptop Care
     Don’t place heavy objects on top of or
    squeeze the laptop into a tight bag.
     Make sure all items are off of the keyboard
    before closing the lid.
     Use canned air to blow dust and dirt out of
    keyboards.
     Use alcohol on a cotton swab to clean keys.
This Stuff is Important!

Are you paying attention?!?!?
Basic Laptop Care
Using the Power Cord           Plug into a surge protector
Plug the AC adapter into the   Power surges and spikes in
wall first and then plug the   power and modem lines are
other end into your laptop.    a high cause of damage to
This prevents damage to the    computers.
power circuitry.
Basic Laptop Care
Lock, log off, or shutdown
computers when unattended.
Basic Laptop Care
  Place laptop on a flat hard surface:
  • Laptops can overheat when air can not
    circulate properly. Setting your laptop on
    carpet, bedding, couches, etc. can cause it to
    overheat.
  • Never allow magnets to be on or near
    computers or computer accessories: It can
    be instant death for computers/accessories.
To Ensure availability of the internet for
instruction
• During instructional time:
  - Do not stream background music.
  - Do not use games unless associated with curriculum.
  - Do not use non-instructional web based applications as a
  reward.
  - Refrain from downloading/uploading excessive amounts of
  files or applications.
Security
You have your new laptop ready for action.
Whether typing up your reports, or surfing the web for research, all your
information to pass your classes is on your computer.
Security
What would you do if it suddenly
disappeared?
Security
The monetary value is only half of a theft,
trying to recreate all that information is the
hardest part.
Security
COMMON SENSE
• Security is NOT purely a technological issue.
• The most important part of information security is
  to minimize human error.
• The laptop user can help by simply following a few
  common sense solutions, such as the ones listed in
  the next slide.
Security
Keep the Laptop Out of Sight
• Do not leave your laptop unattended for any reason. Not even for
  "just for a minute."
• Do not leave your laptop in a car even if the car is locked.
• Do not let a friend borrow your laptop.
• Do not share hall lockers with anyone.
• The same tips apply for your power cord and other laptop
  accessories.
• Always be aware of who is seeing your screen.

More Related Content

Viewers also liked (16)

MEDIA OPERATIONS DOCTRINE
MEDIA OPERATIONS DOCTRINEMEDIA OPERATIONS DOCTRINE
MEDIA OPERATIONS DOCTRINE
 
Sistema de informacion alexis rivera
Sistema de informacion alexis riveraSistema de informacion alexis rivera
Sistema de informacion alexis rivera
 
Heritage
HeritageHeritage
Heritage
 
Moelos de comercio
Moelos de comercioMoelos de comercio
Moelos de comercio
 
Secure valuepresentation
Secure valuepresentationSecure valuepresentation
Secure valuepresentation
 
O que aconteceu a cuba
O que aconteceu a cubaO que aconteceu a cuba
O que aconteceu a cuba
 
Cyber citizenship
Cyber citizenshipCyber citizenship
Cyber citizenship
 
Anuncio en paginas gratuitas
Anuncio en paginas gratuitasAnuncio en paginas gratuitas
Anuncio en paginas gratuitas
 
Baogia kenh14
Baogia kenh14Baogia kenh14
Baogia kenh14
 
กถาวัตถุ
กถาวัตถุกถาวัตถุ
กถาวัตถุ
 
กรรมฐาน (สื่อการสอน ๒) สัปดาห์ที่ ๓ กสิณ ๑๐
กรรมฐาน (สื่อการสอน ๒) สัปดาห์ที่ ๓    กสิณ ๑๐กรรมฐาน (สื่อการสอน ๒) สัปดาห์ที่ ๓    กสิณ ๑๐
กรรมฐาน (สื่อการสอน ๒) สัปดาห์ที่ ๓ กสิณ ๑๐
 
ธรรมภาคปฏิบัติ ๓ Ppt
ธรรมภาคปฏิบัติ ๓ Pptธรรมภาคปฏิบัติ ๓ Ppt
ธรรมภาคปฏิบัติ ๓ Ppt
 
Care of Laptops 2002
Care of Laptops 2002Care of Laptops 2002
Care of Laptops 2002
 
Sita lab russia
Sita lab russiaSita lab russia
Sita lab russia
 
Hannah's Windows 7 installation
Hannah's Windows 7 installationHannah's Windows 7 installation
Hannah's Windows 7 installation
 
Jc's window 7 installation
Jc's window 7 installationJc's window 7 installation
Jc's window 7 installation
 

Similar to Care of netbook

ICT Laptop and Desktop Policy Final
ICT  Laptop and Desktop Policy FinalICT  Laptop and Desktop Policy Final
ICT Laptop and Desktop Policy FinalKel' Laquian
 
Elkmont DPI Parent Meeting
Elkmont DPI Parent MeetingElkmont DPI Parent Meeting
Elkmont DPI Parent MeetingNikki Robertson
 
Elkmont DPI Parent Meeting
Elkmont DPI Parent MeetingElkmont DPI Parent Meeting
Elkmont DPI Parent MeetingNikki Robertson
 
Computer Laboratoy Guidelines 1.1.4
Computer Laboratoy Guidelines 1.1.4Computer Laboratoy Guidelines 1.1.4
Computer Laboratoy Guidelines 1.1.4Keshuv
 
Taking care of your computers
Taking care of your computersTaking care of your computers
Taking care of your computersJean Ulpindo
 
Laptop tips and tricks
Laptop tips and tricksLaptop tips and tricks
Laptop tips and tricksAbie Anarna
 
Safety use of electronic devices
Safety use of electronic devicesSafety use of electronic devices
Safety use of electronic devicesAbdulla Al Hosani
 
Lecture 2: Operational Procedures
Lecture 2: Operational ProceduresLecture 2: Operational Procedures
Lecture 2: Operational ProceduresS. M. Ali Murtazawi
 
Narrated Laptop Program Policy Highlights
Narrated Laptop Program Policy HighlightsNarrated Laptop Program Policy Highlights
Narrated Laptop Program Policy HighlightsJim Homan
 
Presentation__Computer_Maintenance_Basics.pptx
Presentation__Computer_Maintenance_Basics.pptxPresentation__Computer_Maintenance_Basics.pptx
Presentation__Computer_Maintenance_Basics.pptxMJARProgrammer
 
Samsung Galaxy J2 Prime Manual / User Guide
Samsung Galaxy J2 Prime Manual / User GuideSamsung Galaxy J2 Prime Manual / User Guide
Samsung Galaxy J2 Prime Manual / User Guidemanualsheet
 
Samsung Galaxy C5 Manual / User Guide
Samsung Galaxy C5 Manual / User GuideSamsung Galaxy C5 Manual / User Guide
Samsung Galaxy C5 Manual / User Guidemanualsheet
 
Basic computer maintenance
Basic computer maintenanceBasic computer maintenance
Basic computer maintenancegeepatty
 
axioo-pjm-m1110-pico-m1110.pdf
axioo-pjm-m1110-pico-m1110.pdfaxioo-pjm-m1110-pico-m1110.pdf
axioo-pjm-m1110-pico-m1110.pdfsuprilanshari1
 
Maintaining equipment and consumables ppt.pptx
Maintaining equipment and consumables  ppt.pptxMaintaining equipment and consumables  ppt.pptx
Maintaining equipment and consumables ppt.pptxAbebe Tora
 
Narrated laptop program_policy_highlights
Narrated laptop program_policy_highlightsNarrated laptop program_policy_highlights
Narrated laptop program_policy_highlightsJim Homan
 
Sm j701 m-um_ltn_nougat_eng_rev.1.0_170623
Sm j701 m-um_ltn_nougat_eng_rev.1.0_170623Sm j701 m-um_ltn_nougat_eng_rev.1.0_170623
Sm j701 m-um_ltn_nougat_eng_rev.1.0_170623Patricia Diaz
 

Similar to Care of netbook (20)

Laptop maintenance
Laptop maintenanceLaptop maintenance
Laptop maintenance
 
ICT Laptop and Desktop Policy Final
ICT  Laptop and Desktop Policy FinalICT  Laptop and Desktop Policy Final
ICT Laptop and Desktop Policy Final
 
DPI Parent Meeting
DPI Parent MeetingDPI Parent Meeting
DPI Parent Meeting
 
Elkmont DPI Parent Meeting
Elkmont DPI Parent MeetingElkmont DPI Parent Meeting
Elkmont DPI Parent Meeting
 
Elkmont DPI Parent Meeting
Elkmont DPI Parent MeetingElkmont DPI Parent Meeting
Elkmont DPI Parent Meeting
 
Computer Laboratoy Guidelines 1.1.4
Computer Laboratoy Guidelines 1.1.4Computer Laboratoy Guidelines 1.1.4
Computer Laboratoy Guidelines 1.1.4
 
Taking care of your computers
Taking care of your computersTaking care of your computers
Taking care of your computers
 
Laptop tips and tricks
Laptop tips and tricksLaptop tips and tricks
Laptop tips and tricks
 
Safety use of electronic devices
Safety use of electronic devicesSafety use of electronic devices
Safety use of electronic devices
 
Lecture 2: Operational Procedures
Lecture 2: Operational ProceduresLecture 2: Operational Procedures
Lecture 2: Operational Procedures
 
Narrated Laptop Program Policy Highlights
Narrated Laptop Program Policy HighlightsNarrated Laptop Program Policy Highlights
Narrated Laptop Program Policy Highlights
 
Presentation__Computer_Maintenance_Basics.pptx
Presentation__Computer_Maintenance_Basics.pptxPresentation__Computer_Maintenance_Basics.pptx
Presentation__Computer_Maintenance_Basics.pptx
 
Samsung Galaxy J2 Prime Manual / User Guide
Samsung Galaxy J2 Prime Manual / User GuideSamsung Galaxy J2 Prime Manual / User Guide
Samsung Galaxy J2 Prime Manual / User Guide
 
Samsung Galaxy C5 Manual / User Guide
Samsung Galaxy C5 Manual / User GuideSamsung Galaxy C5 Manual / User Guide
Samsung Galaxy C5 Manual / User Guide
 
Basic computer maintenance
Basic computer maintenanceBasic computer maintenance
Basic computer maintenance
 
axioo-pjm-m1110-pico-m1110.pdf
axioo-pjm-m1110-pico-m1110.pdfaxioo-pjm-m1110-pico-m1110.pdf
axioo-pjm-m1110-pico-m1110.pdf
 
Maintaining equipment and consumables ppt.pptx
Maintaining equipment and consumables  ppt.pptxMaintaining equipment and consumables  ppt.pptx
Maintaining equipment and consumables ppt.pptx
 
Narrated laptop program_policy_highlights
Narrated laptop program_policy_highlightsNarrated laptop program_policy_highlights
Narrated laptop program_policy_highlights
 
Sm j701 m-um_ltn_nougat_eng_rev.1.0_170623
Sm j701 m-um_ltn_nougat_eng_rev.1.0_170623Sm j701 m-um_ltn_nougat_eng_rev.1.0_170623
Sm j701 m-um_ltn_nougat_eng_rev.1.0_170623
 
C100 zone1 en
C100 zone1 enC100 zone1 en
C100 zone1 en
 

Recently uploaded

Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 

Care of netbook

  • 1. Care of Netbook Student Device Safety and Care Guidelines JTHS 1:1 Initiative 2012-13
  • 2. Basic Laptop Care Do not leave your laptop in a car for extended periods of time: • Leaving the laptop in a car can expose it to temperature stresses and to theft. • Intense heat can warp the case or ruin internal components
  • 3. Basic Laptop Care Operate at room temperature: • Laptops will form condensation when changing temperature, which can damage it if it is turned on. • Your laptop is also sensitive to extreme heat or cold. • Hot or cold weather can warp the case, ruin components and damage batteries.
  • 4. Basic Laptop Care Keep your laptop out of areas where it may get wet. Place power cables where they can’t be stepped on or tripped over. • Avoid areas with a lot of dust or smoke: Both dust and smoke can damage the laptop
  • 5. Basic Laptop Care Carry the laptop in the carrying case when transporting and be sure to zip up your bag. A large number of laptops are damaged by falling out of bags. Handle the laptop with both hands. Don’t place the laptop where it may fall.
  • 6. Basic Laptop Care Don’t force a cord or card in or out of your laptop. Don’t leave your laptop unattended: Theft rate for laptops is extremely high. Never handle Make sure the laptop is in hibernate a laptop mode or shut down before putting it in by the screen. a carrying case, as it will overheat. Refrain from eating or drinking near your laptop.
  • 7. Basic Laptop Care Clean your laptop: • Use only a soft, lint free cloth and if necessary, lightly moisten only with water. • Cleaners can damage the screen and other finishes. • There are specific cleaners for laptop screens. These are ok to use also. • Remember to spray onto the cloth and not onto the screen.
  • 8. Basic Laptop Care Don’t place heavy objects on top of or squeeze the laptop into a tight bag. Make sure all items are off of the keyboard before closing the lid. Use canned air to blow dust and dirt out of keyboards. Use alcohol on a cotton swab to clean keys.
  • 9. This Stuff is Important! Are you paying attention?!?!?
  • 10. Basic Laptop Care Using the Power Cord Plug into a surge protector Plug the AC adapter into the Power surges and spikes in wall first and then plug the power and modem lines are other end into your laptop. a high cause of damage to This prevents damage to the computers. power circuitry.
  • 11. Basic Laptop Care Lock, log off, or shutdown computers when unattended.
  • 12. Basic Laptop Care Place laptop on a flat hard surface: • Laptops can overheat when air can not circulate properly. Setting your laptop on carpet, bedding, couches, etc. can cause it to overheat. • Never allow magnets to be on or near computers or computer accessories: It can be instant death for computers/accessories.
  • 13. To Ensure availability of the internet for instruction • During instructional time: - Do not stream background music. - Do not use games unless associated with curriculum. - Do not use non-instructional web based applications as a reward. - Refrain from downloading/uploading excessive amounts of files or applications.
  • 14. Security You have your new laptop ready for action. Whether typing up your reports, or surfing the web for research, all your information to pass your classes is on your computer.
  • 15. Security What would you do if it suddenly disappeared?
  • 16. Security The monetary value is only half of a theft, trying to recreate all that information is the hardest part.
  • 17. Security COMMON SENSE • Security is NOT purely a technological issue. • The most important part of information security is to minimize human error. • The laptop user can help by simply following a few common sense solutions, such as the ones listed in the next slide.
  • 18. Security Keep the Laptop Out of Sight • Do not leave your laptop unattended for any reason. Not even for "just for a minute." • Do not leave your laptop in a car even if the car is locked. • Do not let a friend borrow your laptop. • Do not share hall lockers with anyone. • The same tips apply for your power cord and other laptop accessories. • Always be aware of who is seeing your screen.