SlideShare a Scribd company logo
Care of Netbook
                     Student Device
                   Safety and Care Guidelines



JTHS 1:1 Initiative 2012-13
Basic Laptop Care
Do not leave your laptop in a car for
extended periods of time:
• Leaving the laptop in a car can expose
   it to temperature stresses and to theft.
• Intense heat can warp the case or ruin
   internal components
Basic Laptop Care
Operate at room temperature:
• Laptops will form condensation when changing
  temperature, which can damage it if it is turned
  on.
• Your laptop is also sensitive to extreme heat or
  cold.
• Hot or cold weather can warp the case, ruin
  components and damage batteries.
Basic Laptop Care
    Keep your laptop out of areas where it may
    get wet.
    Place power cables where they can’t be
    stepped on or tripped over.
  • Avoid areas with a lot of dust or smoke: Both
    dust and smoke can damage the laptop
Basic Laptop Care
          Carry the laptop in the carrying case
         when transporting and be sure to zip
         up your bag.
          A large number of laptops are damaged
         by falling out of bags.
          Handle the laptop with both hands.
          Don’t place the laptop where it may
         fall.
Basic Laptop Care
 Don’t force a cord or card in or out of
your laptop.
 Don’t leave your laptop unattended:
Theft rate for laptops is extremely high.   Never handle
 Make sure the laptop is in hibernate          a laptop
mode or shut down before putting it in      by the screen.
a carrying case, as it will overheat.
 Refrain from eating or drinking near
your laptop.
Basic Laptop Care
Clean your laptop:
• Use only a soft, lint free cloth and if necessary, lightly
  moisten only with water.
• Cleaners can damage the screen and other finishes.
• There are specific cleaners for laptop screens. These
  are ok to use also.
• Remember to spray onto the cloth and not onto the
  screen.
Basic Laptop Care
     Don’t place heavy objects on top of or
    squeeze the laptop into a tight bag.
     Make sure all items are off of the keyboard
    before closing the lid.
     Use canned air to blow dust and dirt out of
    keyboards.
     Use alcohol on a cotton swab to clean keys.
This Stuff is Important!

Are you paying attention?!?!?
Basic Laptop Care
Using the Power Cord           Plug into a surge protector
Plug the AC adapter into the   Power surges and spikes in
wall first and then plug the   power and modem lines are
other end into your laptop.    a high cause of damage to
This prevents damage to the    computers.
power circuitry.
Basic Laptop Care
Lock, log off, or shutdown
computers when unattended.
Basic Laptop Care
  Place laptop on a flat hard surface:
  • Laptops can overheat when air can not
    circulate properly. Setting your laptop on
    carpet, bedding, couches, etc. can cause it to
    overheat.
  • Never allow magnets to be on or near
    computers or computer accessories: It can
    be instant death for computers/accessories.
To Ensure availability of the internet for
instruction
• During instructional time:
  - Do not stream background music.
  - Do not use games unless associated with curriculum.
  - Do not use non-instructional web based applications as a
  reward.
  - Refrain from downloading/uploading excessive amounts of
  files or applications.
Security
You have your new laptop ready for action.
Whether typing up your reports, or surfing the web for research, all your
information to pass your classes is on your computer.
Security
What would you do if it suddenly
disappeared?
Security
The monetary value is only half of a theft,
trying to recreate all that information is the
hardest part.
Security
COMMON SENSE
• Security is NOT purely a technological issue.
• The most important part of information security is
  to minimize human error.
• The laptop user can help by simply following a few
  common sense solutions, such as the ones listed in
  the next slide.
Security
Keep the Laptop Out of Sight
• Do not leave your laptop unattended for any reason. Not even for
  "just for a minute."
• Do not leave your laptop in a car even if the car is locked.
• Do not let a friend borrow your laptop.
• Do not share hall lockers with anyone.
• The same tips apply for your power cord and other laptop
  accessories.
• Always be aware of who is seeing your screen.

More Related Content

Viewers also liked

MEDIA OPERATIONS DOCTRINE
MEDIA OPERATIONS DOCTRINEMEDIA OPERATIONS DOCTRINE
MEDIA OPERATIONS DOCTRINE
SartoL
 
Sistema de informacion alexis rivera
Sistema de informacion alexis riveraSistema de informacion alexis rivera
Sistema de informacion alexis riverallavi28
 
Heritage
HeritageHeritage
Heritage
hoatranthanh
 
O que aconteceu a cuba
O que aconteceu a cubaO que aconteceu a cuba
O que aconteceu a cuba
Daniel Kialka
 
Cyber citizenship
Cyber citizenshipCyber citizenship
Cyber citizenshipkaeschliman
 
กรรมฐาน (สื่อการสอน ๒) สัปดาห์ที่ ๓ กสิณ ๑๐
กรรมฐาน (สื่อการสอน ๒) สัปดาห์ที่ ๓    กสิณ ๑๐กรรมฐาน (สื่อการสอน ๒) สัปดาห์ที่ ๓    กสิณ ๑๐
กรรมฐาน (สื่อการสอน ๒) สัปดาห์ที่ ๓ กสิณ ๑๐
วัดดอนทอง กาฬสินธุ์
 
Care of Laptops 2002
Care of Laptops 2002Care of Laptops 2002
Care of Laptops 2002
Donald E. Hester
 
Sita lab russia
Sita lab russiaSita lab russia
Sita lab russia
mparth
 
Hannah's Windows 7 installation
Hannah's Windows 7 installationHannah's Windows 7 installation
Hannah's Windows 7 installation
hanninggwapa
 
Jc's window 7 installation
Jc's window 7 installationJc's window 7 installation
Jc's window 7 installation
corilla14
 

Viewers also liked (16)

MEDIA OPERATIONS DOCTRINE
MEDIA OPERATIONS DOCTRINEMEDIA OPERATIONS DOCTRINE
MEDIA OPERATIONS DOCTRINE
 
Sistema de informacion alexis rivera
Sistema de informacion alexis riveraSistema de informacion alexis rivera
Sistema de informacion alexis rivera
 
Heritage
HeritageHeritage
Heritage
 
Moelos de comercio
Moelos de comercioMoelos de comercio
Moelos de comercio
 
Secure valuepresentation
Secure valuepresentationSecure valuepresentation
Secure valuepresentation
 
O que aconteceu a cuba
O que aconteceu a cubaO que aconteceu a cuba
O que aconteceu a cuba
 
Cyber citizenship
Cyber citizenshipCyber citizenship
Cyber citizenship
 
Anuncio en paginas gratuitas
Anuncio en paginas gratuitasAnuncio en paginas gratuitas
Anuncio en paginas gratuitas
 
Baogia kenh14
Baogia kenh14Baogia kenh14
Baogia kenh14
 
กถาวัตถุ
กถาวัตถุกถาวัตถุ
กถาวัตถุ
 
กรรมฐาน (สื่อการสอน ๒) สัปดาห์ที่ ๓ กสิณ ๑๐
กรรมฐาน (สื่อการสอน ๒) สัปดาห์ที่ ๓    กสิณ ๑๐กรรมฐาน (สื่อการสอน ๒) สัปดาห์ที่ ๓    กสิณ ๑๐
กรรมฐาน (สื่อการสอน ๒) สัปดาห์ที่ ๓ กสิณ ๑๐
 
ธรรมภาคปฏิบัติ ๓ Ppt
ธรรมภาคปฏิบัติ ๓ Pptธรรมภาคปฏิบัติ ๓ Ppt
ธรรมภาคปฏิบัติ ๓ Ppt
 
Care of Laptops 2002
Care of Laptops 2002Care of Laptops 2002
Care of Laptops 2002
 
Sita lab russia
Sita lab russiaSita lab russia
Sita lab russia
 
Hannah's Windows 7 installation
Hannah's Windows 7 installationHannah's Windows 7 installation
Hannah's Windows 7 installation
 
Jc's window 7 installation
Jc's window 7 installationJc's window 7 installation
Jc's window 7 installation
 

Similar to Care of netbook

Laptop maintenance
Laptop maintenanceLaptop maintenance
Laptop maintenance
Manu Melwin Joy
 
ICT Laptop and Desktop Policy Final
ICT  Laptop and Desktop Policy FinalICT  Laptop and Desktop Policy Final
ICT Laptop and Desktop Policy Final
Kel' Laquian
 
DPI Parent Meeting
DPI Parent MeetingDPI Parent Meeting
DPI Parent Meeting
Nikki Robertson
 
Elkmont DPI Parent Meeting
Elkmont DPI Parent MeetingElkmont DPI Parent Meeting
Elkmont DPI Parent Meeting
Nikki Robertson
 
Elkmont DPI Parent Meeting
Elkmont DPI Parent MeetingElkmont DPI Parent Meeting
Elkmont DPI Parent Meeting
Nikki Robertson
 
Computer Laboratoy Guidelines 1.1.4
Computer Laboratoy Guidelines 1.1.4Computer Laboratoy Guidelines 1.1.4
Computer Laboratoy Guidelines 1.1.4Keshuv
 
Taking care of your computers
Taking care of your computersTaking care of your computers
Taking care of your computersJean Ulpindo
 
Laptop tips and tricks
Laptop tips and tricksLaptop tips and tricks
Laptop tips and tricks
Abie Anarna
 
Safety use of electronic devices
Safety use of electronic devicesSafety use of electronic devices
Safety use of electronic devices
Abdulla Al Hosani
 
Lecture 2: Operational Procedures
Lecture 2: Operational ProceduresLecture 2: Operational Procedures
Lecture 2: Operational Procedures
S. M. Ali Murtazawi
 
Narrated Laptop Program Policy Highlights
Narrated Laptop Program Policy HighlightsNarrated Laptop Program Policy Highlights
Narrated Laptop Program Policy HighlightsJim Homan
 
Presentation__Computer_Maintenance_Basics.pptx
Presentation__Computer_Maintenance_Basics.pptxPresentation__Computer_Maintenance_Basics.pptx
Presentation__Computer_Maintenance_Basics.pptx
MJARProgrammer
 
Samsung Galaxy J2 Prime Manual / User Guide
Samsung Galaxy J2 Prime Manual / User GuideSamsung Galaxy J2 Prime Manual / User Guide
Samsung Galaxy J2 Prime Manual / User Guide
manualsheet
 
Samsung Galaxy C5 Manual / User Guide
Samsung Galaxy C5 Manual / User GuideSamsung Galaxy C5 Manual / User Guide
Samsung Galaxy C5 Manual / User Guide
manualsheet
 
Basic computer maintenance
Basic computer maintenanceBasic computer maintenance
Basic computer maintenance
geepatty
 
axioo-pjm-m1110-pico-m1110.pdf
axioo-pjm-m1110-pico-m1110.pdfaxioo-pjm-m1110-pico-m1110.pdf
axioo-pjm-m1110-pico-m1110.pdf
suprilanshari1
 
Maintaining equipment and consumables ppt.pptx
Maintaining equipment and consumables  ppt.pptxMaintaining equipment and consumables  ppt.pptx
Maintaining equipment and consumables ppt.pptx
Abebe Tora
 
Narrated laptop program_policy_highlights
Narrated laptop program_policy_highlightsNarrated laptop program_policy_highlights
Narrated laptop program_policy_highlightsJim Homan
 
Sm j701 m-um_ltn_nougat_eng_rev.1.0_170623
Sm j701 m-um_ltn_nougat_eng_rev.1.0_170623Sm j701 m-um_ltn_nougat_eng_rev.1.0_170623
Sm j701 m-um_ltn_nougat_eng_rev.1.0_170623
Patricia Diaz
 

Similar to Care of netbook (20)

Laptop maintenance
Laptop maintenanceLaptop maintenance
Laptop maintenance
 
ICT Laptop and Desktop Policy Final
ICT  Laptop and Desktop Policy FinalICT  Laptop and Desktop Policy Final
ICT Laptop and Desktop Policy Final
 
DPI Parent Meeting
DPI Parent MeetingDPI Parent Meeting
DPI Parent Meeting
 
Elkmont DPI Parent Meeting
Elkmont DPI Parent MeetingElkmont DPI Parent Meeting
Elkmont DPI Parent Meeting
 
Elkmont DPI Parent Meeting
Elkmont DPI Parent MeetingElkmont DPI Parent Meeting
Elkmont DPI Parent Meeting
 
Computer Laboratoy Guidelines 1.1.4
Computer Laboratoy Guidelines 1.1.4Computer Laboratoy Guidelines 1.1.4
Computer Laboratoy Guidelines 1.1.4
 
Taking care of your computers
Taking care of your computersTaking care of your computers
Taking care of your computers
 
Laptop tips and tricks
Laptop tips and tricksLaptop tips and tricks
Laptop tips and tricks
 
Safety use of electronic devices
Safety use of electronic devicesSafety use of electronic devices
Safety use of electronic devices
 
Lecture 2: Operational Procedures
Lecture 2: Operational ProceduresLecture 2: Operational Procedures
Lecture 2: Operational Procedures
 
Narrated Laptop Program Policy Highlights
Narrated Laptop Program Policy HighlightsNarrated Laptop Program Policy Highlights
Narrated Laptop Program Policy Highlights
 
Presentation__Computer_Maintenance_Basics.pptx
Presentation__Computer_Maintenance_Basics.pptxPresentation__Computer_Maintenance_Basics.pptx
Presentation__Computer_Maintenance_Basics.pptx
 
Samsung Galaxy J2 Prime Manual / User Guide
Samsung Galaxy J2 Prime Manual / User GuideSamsung Galaxy J2 Prime Manual / User Guide
Samsung Galaxy J2 Prime Manual / User Guide
 
Samsung Galaxy C5 Manual / User Guide
Samsung Galaxy C5 Manual / User GuideSamsung Galaxy C5 Manual / User Guide
Samsung Galaxy C5 Manual / User Guide
 
Basic computer maintenance
Basic computer maintenanceBasic computer maintenance
Basic computer maintenance
 
axioo-pjm-m1110-pico-m1110.pdf
axioo-pjm-m1110-pico-m1110.pdfaxioo-pjm-m1110-pico-m1110.pdf
axioo-pjm-m1110-pico-m1110.pdf
 
Maintaining equipment and consumables ppt.pptx
Maintaining equipment and consumables  ppt.pptxMaintaining equipment and consumables  ppt.pptx
Maintaining equipment and consumables ppt.pptx
 
Narrated laptop program_policy_highlights
Narrated laptop program_policy_highlightsNarrated laptop program_policy_highlights
Narrated laptop program_policy_highlights
 
Sm j701 m-um_ltn_nougat_eng_rev.1.0_170623
Sm j701 m-um_ltn_nougat_eng_rev.1.0_170623Sm j701 m-um_ltn_nougat_eng_rev.1.0_170623
Sm j701 m-um_ltn_nougat_eng_rev.1.0_170623
 
C100 zone1 en
C100 zone1 enC100 zone1 en
C100 zone1 en
 

Recently uploaded

FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
Vlad Stirbu
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
UiPathCommunity
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
Jen Stirrup
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 

Care of netbook

  • 1. Care of Netbook Student Device Safety and Care Guidelines JTHS 1:1 Initiative 2012-13
  • 2. Basic Laptop Care Do not leave your laptop in a car for extended periods of time: • Leaving the laptop in a car can expose it to temperature stresses and to theft. • Intense heat can warp the case or ruin internal components
  • 3. Basic Laptop Care Operate at room temperature: • Laptops will form condensation when changing temperature, which can damage it if it is turned on. • Your laptop is also sensitive to extreme heat or cold. • Hot or cold weather can warp the case, ruin components and damage batteries.
  • 4. Basic Laptop Care Keep your laptop out of areas where it may get wet. Place power cables where they can’t be stepped on or tripped over. • Avoid areas with a lot of dust or smoke: Both dust and smoke can damage the laptop
  • 5. Basic Laptop Care Carry the laptop in the carrying case when transporting and be sure to zip up your bag. A large number of laptops are damaged by falling out of bags. Handle the laptop with both hands. Don’t place the laptop where it may fall.
  • 6. Basic Laptop Care Don’t force a cord or card in or out of your laptop. Don’t leave your laptop unattended: Theft rate for laptops is extremely high. Never handle Make sure the laptop is in hibernate a laptop mode or shut down before putting it in by the screen. a carrying case, as it will overheat. Refrain from eating or drinking near your laptop.
  • 7. Basic Laptop Care Clean your laptop: • Use only a soft, lint free cloth and if necessary, lightly moisten only with water. • Cleaners can damage the screen and other finishes. • There are specific cleaners for laptop screens. These are ok to use also. • Remember to spray onto the cloth and not onto the screen.
  • 8. Basic Laptop Care Don’t place heavy objects on top of or squeeze the laptop into a tight bag. Make sure all items are off of the keyboard before closing the lid. Use canned air to blow dust and dirt out of keyboards. Use alcohol on a cotton swab to clean keys.
  • 9. This Stuff is Important! Are you paying attention?!?!?
  • 10. Basic Laptop Care Using the Power Cord Plug into a surge protector Plug the AC adapter into the Power surges and spikes in wall first and then plug the power and modem lines are other end into your laptop. a high cause of damage to This prevents damage to the computers. power circuitry.
  • 11. Basic Laptop Care Lock, log off, or shutdown computers when unattended.
  • 12. Basic Laptop Care Place laptop on a flat hard surface: • Laptops can overheat when air can not circulate properly. Setting your laptop on carpet, bedding, couches, etc. can cause it to overheat. • Never allow magnets to be on or near computers or computer accessories: It can be instant death for computers/accessories.
  • 13. To Ensure availability of the internet for instruction • During instructional time: - Do not stream background music. - Do not use games unless associated with curriculum. - Do not use non-instructional web based applications as a reward. - Refrain from downloading/uploading excessive amounts of files or applications.
  • 14. Security You have your new laptop ready for action. Whether typing up your reports, or surfing the web for research, all your information to pass your classes is on your computer.
  • 15. Security What would you do if it suddenly disappeared?
  • 16. Security The monetary value is only half of a theft, trying to recreate all that information is the hardest part.
  • 17. Security COMMON SENSE • Security is NOT purely a technological issue. • The most important part of information security is to minimize human error. • The laptop user can help by simply following a few common sense solutions, such as the ones listed in the next slide.
  • 18. Security Keep the Laptop Out of Sight • Do not leave your laptop unattended for any reason. Not even for "just for a minute." • Do not leave your laptop in a car even if the car is locked. • Do not let a friend borrow your laptop. • Do not share hall lockers with anyone. • The same tips apply for your power cord and other laptop accessories. • Always be aware of who is seeing your screen.