SlideShare a Scribd company logo
1 of 12
Laptop
construction and
deconstruction.
Page 2
Instructor, PACE-IT Program – Edmonds Community College
Areas of Expertise Industry Certification
 PC Hardware
 Network Administration
 IT Project Management
 Network Design
 User Training
 IT Troubleshooting
Qualifications Summary
Education
 M.B.A., IT Management, Western Governor’s University
 B.S., IT Security, Western Governor’s University
Entrepreneur, executive leader, and proven manger
with 10+ years of experience turning complex issues
into efficient and effective solutions.
Strengths include developing and mentoring diverse
workforces, improving processes, analyzing
business needs and creating the solutions
required— with a focus on technology.
Page 3
– Common laptop construction.
– Laptop field repair.
PACE-IT.
Page 4
Laptop construction and deconstruction.
Page 5
– Common laptop materials.
» Plastic is used extensively in the construction of laptops.
• Inexpensive.
• Lightweight.
• Easy to work with.
• Durable (to a point).
» Aluminum is used in higher end construction of laptops.
• More expensive.
• Lightweight.
• Durable and rugged.
» Other metal alloys (e.g., magnesium) are used in high
end construction of laptops.
• Most expensive.
• Very lightweight.
• Tend to not be as durable as aluminum, but are more
durable than plastic.
Laptop construction and deconstruction.
Page 6
Laptops tend to have fewer
components that are easily
replaceable in the field.
For those components that can be easily replaced in
the field, manufacturers commonly place access to
them on the bottom side of the laptop. It is not
uncommon to find access doors for RAM, batteries,
and optical drives on the underside of laptops.
Laptop construction and deconstruction.
Page 7
Laptop construction and deconstruction.
Page 8
There is no standard method
of breaking a laptop down
to its individual components.
Researching the manufacturers’ documentation and
other sources is the key to successfully breaking
down and reassembling a laptop. The Internet will
be a vital resource when having to dismantle a
laptop to perform any type of field repair.
Laptop construction and deconstruction.
Page 9
– General tips for disassembly.
» Research the manufacturer’s documentation on the
process.
• Research other sources (the Internet).
» Develop a step-by-step plan.
» Unplug the power cord and turn the system off.
» Document all screw and cable locations (take pictures).
• Systematically organize parts.
» Use the appropriate tools.
• Use plastic wedges when there is a need to pry open
something—with plastic there is less danger of marring
surfaces.
» When reassembling, reverse the order.
Laptop construction and deconstruction.
Page 10
Laptop construction and deconstruction.
Plastic is used extensively in the construction of laptops because it is
inexpensive, easy to form, and fairly durable. Other materials may be used
as well. For those items that are easily field replaceable, it is common for
there to be access covers on the bottom of the unit.
Topic
Common laptop construction.
Summary
There is no standard established for the disassembly of a laptop in order for
field repair to take place. General steps include: researching the
manufacturers’ documentation and other sources, unplugging the power
cord, turning the system off, documenting screw and cable locations, and
organizing parts in a systematic way—all while using the appropriate tools
for the job. When reassembling, reverse the order.
Laptop field repair.
Page 11
THANK YOU!
This workforce solution was 100 percent funded by a $3 million grant awarded by the
U.S. Department of Labor's Employment and Training Administration. The solution was
created by the grantee and does not necessarily reflect the official position of the U.S.
Department of Labor. The Department of Labor makes no guarantees, warranties, or
assurances of any kind, express or implied, with respect to such information, including
any information on linked sites and including, but not limited to, accuracy of the
information or its completeness, timeliness, usefulness, adequacy, continued availability
or ownership. Funded by the Department of Labor, Employment and Training
Administration, Grant #TC-23745-12-60-A-53.
PACE-IT is an equal opportunity employer/program and auxiliary aids and services are
available upon request to individuals with disabilities. For those that are hearing
impaired, a video phone is available at the Services for Students with Disabilities (SSD)
office in Mountlake Terrace Hall 159. Check www.edcc.edu/ssd for office hours. Call
425.354.3113 on a video phone for more information about the PACE-IT program. For
any additional special accommodations needed, call the SSD office at 425.640.1814.
Edmonds Community College does not discriminate on the basis of race; color; religion;
national origin; sex; disability; sexual orientation; age; citizenship, marital, or veteran
status; or genetic information in its programs and activities.

More Related Content

Viewers also liked

Evolution of computer
Evolution of computerEvolution of computer
Evolution of computer
Ankit Yadav
 
Evolution Of The Computers
Evolution Of The ComputersEvolution Of The Computers
Evolution Of The Computers
panitiaict
 

Viewers also liked (13)

Literary Theory & Criticism pt 3: Post-Structuralism & Deconstruction
Literary Theory & Criticism pt 3: Post-Structuralism & DeconstructionLiterary Theory & Criticism pt 3: Post-Structuralism & Deconstruction
Literary Theory & Criticism pt 3: Post-Structuralism & Deconstruction
 
Deconstruction: a reaction to rational Modernism - Thesis
Deconstruction: a reaction to rational Modernism - ThesisDeconstruction: a reaction to rational Modernism - Thesis
Deconstruction: a reaction to rational Modernism - Thesis
 
CONSTRUCTIVISM
CONSTRUCTIVISMCONSTRUCTIVISM
CONSTRUCTIVISM
 
evolution of computers
 evolution of computers evolution of computers
evolution of computers
 
Deconstruction
DeconstructionDeconstruction
Deconstruction
 
[Facilitating Learning] Constructivism: Knowledge Construction/Concept Learning
[Facilitating Learning] Constructivism: Knowledge Construction/Concept Learning[Facilitating Learning] Constructivism: Knowledge Construction/Concept Learning
[Facilitating Learning] Constructivism: Knowledge Construction/Concept Learning
 
I poststructuralism deconstruction
I poststructuralism deconstructionI poststructuralism deconstruction
I poststructuralism deconstruction
 
Deconstruction: Literary Criticism
Deconstruction: Literary CriticismDeconstruction: Literary Criticism
Deconstruction: Literary Criticism
 
Evolution of computer
Evolution of computerEvolution of computer
Evolution of computer
 
EVOLUTION OF COMPUTER
EVOLUTION OF COMPUTEREVOLUTION OF COMPUTER
EVOLUTION OF COMPUTER
 
Deconstruction
DeconstructionDeconstruction
Deconstruction
 
Online shopping ppt by rohit jain
Online shopping ppt by rohit jainOnline shopping ppt by rohit jain
Online shopping ppt by rohit jain
 
Evolution Of The Computers
Evolution Of The ComputersEvolution Of The Computers
Evolution Of The Computers
 

Similar to Pace IT - Laptop Construction and Deconstruction

Pace it data-disposal_and_destruction_methods_bf_sw
Pace it data-disposal_and_destruction_methods_bf_swPace it data-disposal_and_destruction_methods_bf_sw
Pace it data-disposal_and_destruction_methods_bf_sw
Edward Sargent
 
Pace it common-laptop_components_sw_nm
Pace it common-laptop_components_sw_nmPace it common-laptop_components_sw_nm
Pace it common-laptop_components_sw_nm
Edward Sargent
 
Pace it environmental-impact_and_control_sw_nm
Pace it environmental-impact_and_control_sw_nmPace it environmental-impact_and_control_sw_nm
Pace it environmental-impact_and_control_sw_nm
Edward Sargent
 

Similar to Pace IT - Laptop Construction and Deconstruction (20)

Pace it data-disposal_and_destruction_methods_bf_sw
Pace it data-disposal_and_destruction_methods_bf_swPace it data-disposal_and_destruction_methods_bf_sw
Pace it data-disposal_and_destruction_methods_bf_sw
 
Pace IT - Thermal and Impact Printers
Pace IT - Thermal and Impact PrintersPace IT - Thermal and Impact Printers
Pace IT - Thermal and Impact Printers
 
Pace IT - Troubleshooting Laptops
Pace IT - Troubleshooting LaptopsPace IT - Troubleshooting Laptops
Pace IT - Troubleshooting Laptops
 
PACE-IT: Supporting Configuration Management (part 2)
PACE-IT: Supporting Configuration Management (part 2)PACE-IT: Supporting Configuration Management (part 2)
PACE-IT: Supporting Configuration Management (part 2)
 
Pace IT - Control Panel (Part 3)
Pace IT - Control Panel (Part 3)Pace IT - Control Panel (Part 3)
Pace IT - Control Panel (Part 3)
 
Pace it common-laptop_components_sw_nm
Pace it common-laptop_components_sw_nmPace it common-laptop_components_sw_nm
Pace it common-laptop_components_sw_nm
 
PACE-IT: Risk and Security Related Concepts
PACE-IT: Risk and Security Related ConceptsPACE-IT: Risk and Security Related Concepts
PACE-IT: Risk and Security Related Concepts
 
Pace IT - Introduction to_the_Motherboard
Pace IT - Introduction to_the_MotherboardPace IT - Introduction to_the_Motherboard
Pace IT - Introduction to_the_Motherboard
 
Pace IT - Network Cable Connectors
Pace IT - Network Cable ConnectorsPace IT - Network Cable Connectors
Pace IT - Network Cable Connectors
 
Pace IT - Basic Mobile Device
Pace IT - Basic Mobile DevicePace IT - Basic Mobile Device
Pace IT - Basic Mobile Device
 
Pace IT - Tools for Working on Networks
Pace IT - Tools for Working on NetworksPace IT - Tools for Working on Networks
Pace IT - Tools for Working on Networks
 
Pace IT - Expansion Cards
Pace IT - Expansion CardsPace IT - Expansion Cards
Pace IT - Expansion Cards
 
PACE-IT, Security+2.8: Disaster Recovery Concepts
PACE-IT, Security+2.8: Disaster Recovery ConceptsPACE-IT, Security+2.8: Disaster Recovery Concepts
PACE-IT, Security+2.8: Disaster Recovery Concepts
 
Pace it environmental-impact_and_control_sw_nm
Pace it environmental-impact_and_control_sw_nmPace it environmental-impact_and_control_sw_nm
Pace it environmental-impact_and_control_sw_nm
 
Pace IT - Environmental Impact and Control
Pace IT - Environmental Impact and ControlPace IT - Environmental Impact and Control
Pace IT - Environmental Impact and Control
 
PACE-IT: Network Cabling (part 3) - N10 006
PACE-IT: Network Cabling (part 3) - N10 006 PACE-IT: Network Cabling (part 3) - N10 006
PACE-IT: Network Cabling (part 3) - N10 006
 
PACE-IT: Troubleshooting Hard Drives and Raid
PACE-IT: Troubleshooting Hard Drives and RaidPACE-IT: Troubleshooting Hard Drives and Raid
PACE-IT: Troubleshooting Hard Drives and Raid
 
PACE-IT: Securing the Workstation
PACE-IT: Securing the WorkstationPACE-IT: Securing the Workstation
PACE-IT: Securing the Workstation
 
Pace IT - Troubleshooting Printers
Pace IT - Troubleshooting PrintersPace IT - Troubleshooting Printers
Pace IT - Troubleshooting Printers
 
Pace IT - Network Devices (part 2)
Pace IT - Network Devices (part 2)Pace IT - Network Devices (part 2)
Pace IT - Network Devices (part 2)
 

More from Pace IT at Edmonds Community College

More from Pace IT at Edmonds Community College (20)

PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
 
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
 
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
 
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
 
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
 
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
 
PACE-IT, Security + 5.3: Security Controls for Account Management
PACE-IT, Security + 5.3: Security Controls for Account ManagementPACE-IT, Security + 5.3: Security Controls for Account Management
PACE-IT, Security + 5.3: Security Controls for Account Management
 
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
 
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
 
PACE-IT, Security + 5.1: Summary of Authentication Services
PACE-IT, Security + 5.1: Summary of Authentication ServicesPACE-IT, Security + 5.1: Summary of Authentication Services
PACE-IT, Security + 5.1: Summary of Authentication Services
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
 
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and TechniquesPACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
 
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative EnvironmentsPACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
 
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
PACE-IT, Security+ 4.4: Controls to Ensure Data SecurityPACE-IT, Security+ 4.4: Controls to Ensure Data Security
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
 
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
PACE-IT, Security+ 4.3: Solutions to Establish Host SecurityPACE-IT, Security+ 4.3: Solutions to Establish Host Security
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
 
PACE-IT, Security+3.7: Overview of Security Assessment Tools
PACE-IT, Security+3.7: Overview of Security Assessment ToolsPACE-IT, Security+3.7: Overview of Security Assessment Tools
PACE-IT, Security+3.7: Overview of Security Assessment Tools
 
PACE-IT, Security+3.6: Security Enhancement Techniques
PACE-IT, Security+3.6: Security Enhancement TechniquesPACE-IT, Security+3.6: Security Enhancement Techniques
PACE-IT, Security+3.6: Security Enhancement Techniques
 
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PACE-IT, Security+3.5: Types of Application Attacks (part 2)PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
 
PACE-IT, Security+3.5: Types of Application Attacks (part 1)
PACE-IT, Security+3.5: Types of Application Attacks (part 1)PACE-IT, Security+3.5: Types of Application Attacks (part 1)
PACE-IT, Security+3.5: Types of Application Attacks (part 1)
 

Recently uploaded

Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 

Recently uploaded (20)

Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 

Pace IT - Laptop Construction and Deconstruction

  • 2. Page 2 Instructor, PACE-IT Program – Edmonds Community College Areas of Expertise Industry Certification  PC Hardware  Network Administration  IT Project Management  Network Design  User Training  IT Troubleshooting Qualifications Summary Education  M.B.A., IT Management, Western Governor’s University  B.S., IT Security, Western Governor’s University Entrepreneur, executive leader, and proven manger with 10+ years of experience turning complex issues into efficient and effective solutions. Strengths include developing and mentoring diverse workforces, improving processes, analyzing business needs and creating the solutions required— with a focus on technology.
  • 3. Page 3 – Common laptop construction. – Laptop field repair. PACE-IT.
  • 4. Page 4 Laptop construction and deconstruction.
  • 5. Page 5 – Common laptop materials. » Plastic is used extensively in the construction of laptops. • Inexpensive. • Lightweight. • Easy to work with. • Durable (to a point). » Aluminum is used in higher end construction of laptops. • More expensive. • Lightweight. • Durable and rugged. » Other metal alloys (e.g., magnesium) are used in high end construction of laptops. • Most expensive. • Very lightweight. • Tend to not be as durable as aluminum, but are more durable than plastic. Laptop construction and deconstruction.
  • 6. Page 6 Laptops tend to have fewer components that are easily replaceable in the field. For those components that can be easily replaced in the field, manufacturers commonly place access to them on the bottom side of the laptop. It is not uncommon to find access doors for RAM, batteries, and optical drives on the underside of laptops. Laptop construction and deconstruction.
  • 7. Page 7 Laptop construction and deconstruction.
  • 8. Page 8 There is no standard method of breaking a laptop down to its individual components. Researching the manufacturers’ documentation and other sources is the key to successfully breaking down and reassembling a laptop. The Internet will be a vital resource when having to dismantle a laptop to perform any type of field repair. Laptop construction and deconstruction.
  • 9. Page 9 – General tips for disassembly. » Research the manufacturer’s documentation on the process. • Research other sources (the Internet). » Develop a step-by-step plan. » Unplug the power cord and turn the system off. » Document all screw and cable locations (take pictures). • Systematically organize parts. » Use the appropriate tools. • Use plastic wedges when there is a need to pry open something—with plastic there is less danger of marring surfaces. » When reassembling, reverse the order. Laptop construction and deconstruction.
  • 10. Page 10 Laptop construction and deconstruction. Plastic is used extensively in the construction of laptops because it is inexpensive, easy to form, and fairly durable. Other materials may be used as well. For those items that are easily field replaceable, it is common for there to be access covers on the bottom of the unit. Topic Common laptop construction. Summary There is no standard established for the disassembly of a laptop in order for field repair to take place. General steps include: researching the manufacturers’ documentation and other sources, unplugging the power cord, turning the system off, documenting screw and cable locations, and organizing parts in a systematic way—all while using the appropriate tools for the job. When reassembling, reverse the order. Laptop field repair.
  • 12. This workforce solution was 100 percent funded by a $3 million grant awarded by the U.S. Department of Labor's Employment and Training Administration. The solution was created by the grantee and does not necessarily reflect the official position of the U.S. Department of Labor. The Department of Labor makes no guarantees, warranties, or assurances of any kind, express or implied, with respect to such information, including any information on linked sites and including, but not limited to, accuracy of the information or its completeness, timeliness, usefulness, adequacy, continued availability or ownership. Funded by the Department of Labor, Employment and Training Administration, Grant #TC-23745-12-60-A-53. PACE-IT is an equal opportunity employer/program and auxiliary aids and services are available upon request to individuals with disabilities. For those that are hearing impaired, a video phone is available at the Services for Students with Disabilities (SSD) office in Mountlake Terrace Hall 159. Check www.edcc.edu/ssd for office hours. Call 425.354.3113 on a video phone for more information about the PACE-IT program. For any additional special accommodations needed, call the SSD office at 425.640.1814. Edmonds Community College does not discriminate on the basis of race; color; religion; national origin; sex; disability; sexual orientation; age; citizenship, marital, or veteran status; or genetic information in its programs and activities.