SlideShare a Scribd company logo
1
Lesson 4
Computer Maintenance
Computer Literacy
BASICS: A
Comprehensive Guide
to IC3, 4th Edition
Morrison / Wells
Lesson
4
Morrison / Wells CLB: A Comp Guide to IC3 4E
2
2
2
Objectives
 Identify maintenance issues.
 Maintain hardware.
 Upgrade and replace hardware components.
 Perform preventive maintenance.
 Request specialized maintenance.
Lesson
4
Morrison / Wells CLB: A Comp Guide to IC3 4E
3
3
3
Vocabulary
 cable management
 cookie
 corona wires
 defragmentation
 ergonomic keyboard
 fragmentation
 maintenance
 Recycle Bin
 sector
 seek time
 touchpad
 wireless keyboard
Lesson
4
Morrison / Wells CLB: A Comp Guide to IC3 4E
Identifying Maintenance Issues
 A computer requires
regular
maintenance.
 Managing computer
cables is an
overlooked problem
when maintaining a
computer system.
4
4
4
Lesson
4
Morrison / Wells CLB: A Comp Guide to IC3 4E
Maintaining Hardware
 Keyboard and
Mouse:
 Use a can of
compressed air to
remove the dust
from the keyboard.
5
5
5
Lesson
4
Morrison / Wells CLB: A Comp Guide to IC3 4E
Maintaining Hardware (continued)
 Inkjet Printers:
 Small deposits of
dry ink accumulate
on the print head of
an inkjet printer.
 You can use special
supplies to clean an
inkjet printer.
6
6
6
Lesson
4
Morrison / Wells CLB: A Comp Guide to IC3 4E
7
7
7
Maintaining Hardware (continued)
 Laser Printers:
– Use a printer brush or a good paint brush and a
lint-free cloth to clean inside the toner opening.
– Remove paper fragments.
– Use a clean cloth to wipe up any spilled toner and
dust.
– Clean the rollers, but don’t touch the transfer
(sponge) roller.
– Replace the toner cartridge
Lesson
4
Morrison / Wells CLB: A Comp Guide to IC3 4E
Upgrading and Replacing
Hardware Components
 Computer Memory:
 RAM is made up of
small memory chips
that form a memory
module, installed in
the RAM slots on the
motherboard of your
computer.
8
8
8
Lesson
4
Morrison / Wells CLB: A Comp Guide to IC3 4E
9
9
9
Upgrading and Replacing Hardware
Components (continued)
 Keyboards:
 Ergonomic keyboards allow for a more
natural positioning of your arms and hands.
 A wireless keyboard reduces the clutter of
unsightly wires and other cable problems and
improves mobility.
Lesson
4
Morrison / Wells CLB: A Comp Guide to IC3 4E
Upgrading and Replacing Hardware
Components (continued)
 Mouse:
 You can replace a
mouse without
replacing any other
computer hardware.
 A touchpad is a
pointing device you
can use instead of a
mouse.
10
10
10
Lesson
4
Morrison / Wells CLB: A Comp Guide to IC3 4E
Performing Preventive
Maintenance
 Disk
Defragmentation:
 Disk fragmentation
occurs when data is
broken up into many
pieces that are not
stored close
together.
11
11
11
Lesson
4
Morrison / Wells CLB: A Comp Guide to IC3 4E
Performing Preventive
Maintenance (continued)
 Recycle Bin:
 The Windows
Recycle Bin is a
holding area for files
and folders before
their final deletion
from a storage
device.
12
12
12
Lesson
4
Morrison / Wells CLB: A Comp Guide to IC3 4E
13
13
13
Performing Preventive Maintenance
(continued)
 Temporary Files:
 Temporary files normally exist only during
the current session of the program.
 Cookies:
 A cookie is a small text file that a Web site
uses to identify a specific computer.
Lesson
4
Morrison / Wells CLB: A Comp Guide to IC3 4E
14
14
14
Requesting Specialized
Maintenance
 Generally should be performed by a
computer professional:
– Replacing the power supply or opening the power
supply case
– Replacing other electrical components
– Replacing the processor
– Replacing or adding a hard disk
– Replacing or adding additional RAM
Lesson
4
Morrison / Wells CLB: A Comp Guide to IC3 4E
15
15
Summary
In this lesson, you learned:
 A computer requires maintenance on a regular
schedule to prevent problems such as the degrading
of hard disk performance and monitor trouble.
 Damaged and poorly maintained cables can prevent
peripheral devices from communicating with the
computer. Unorganized and unprotected cables can
also create safety hazards. Cable management
should therefore be part of a regular computer
maintenance routine.
15
Lesson
4
Morrison / Wells CLB: A Comp Guide to IC3 4E
16
16
Summary (continued)
 To maintain the computer keyboard, use a
can of compressed air to remove the dust
from the keyboard every six months.
 Clean a mechanical mouse by removing its
cover, removing debris from the roller and
the ball, and then reassembling the mouse.
16
Lesson
4
Morrison / Wells CLB: A Comp Guide to IC3 4E
17
17
Summary (continued)
 Printer maintenance helps to prevent common
printing problems. Many inkjet printers have a self-
cleaning mode. If yours does not, use an inkjet
cleaning cartridge to flush dirt and debris out of
clogged printer nozzles. Clean a laser printer when
you change the toner cartridge.
 Adding computer memory (RAM) often provides the
best value for increasing overall system
performance.
17
Lesson
4
Morrison / Wells CLB: A Comp Guide to IC3 4E
18
18
Summary (continued)
 All computers slow down as you work with them. To
improve or maintain computer efficiency, periodically use
Windows tools to defragment hard drives, empty the
Recycle Bin, delete temporary files, and remove cookies.
 Some maintenance procedures are not suitable for the
average computer user and should be performed by a
computer professional, such as replacing the power
supply or opening the power supply case, replacing other
electrical components, including the processor and RAM,
and adding an internal hard disk.
18

More Related Content

Similar to Coding, Information Theory (and Advanced Modulation

Computer Literacy Lesson 1: Computer and Operating Systems
Computer Literacy Lesson 1: Computer and Operating SystemsComputer Literacy Lesson 1: Computer and Operating Systems
Computer Literacy Lesson 1: Computer and Operating Systems
cpashke
 
Computer Literacy Lesson 5
Computer Literacy Lesson 5Computer Literacy Lesson 5
Computer Literacy Lesson 5
cpashke
 
Lesson 02
Lesson 02Lesson 02
Lesson 02
Tracie King
 
Computer Literacy Lesson 6
Computer Literacy Lesson 6Computer Literacy Lesson 6
Computer Literacy Lesson 6
cpashke
 
Bce notes unit 1 be 205
Bce notes unit 1 be 205Bce notes unit 1 be 205
Bce notes unit 1 be 205
NANDINI SHARMA
 
Computer Literacy Lesson 4
Computer Literacy Lesson 4Computer Literacy Lesson 4
Computer Literacy Lesson 4
cpashke
 
Chapter 4 - Processor Fundamentals.pdf
Chapter 4 - Processor Fundamentals.pdfChapter 4 - Processor Fundamentals.pdf
Chapter 4 - Processor Fundamentals.pdf
MerbertJeruela1
 
Lec45chap4f04
Lec45chap4f04Lec45chap4f04
Lec45chap4f04
screaminc
 
Lesson 10
Lesson 10Lesson 10
Lesson 10
Tracie King
 
Basic of COMPUTER SCIENCE Presented by Shubham Shewale.pdf
Basic of COMPUTER SCIENCE Presented by Shubham Shewale.pdfBasic of COMPUTER SCIENCE Presented by Shubham Shewale.pdf
Basic of COMPUTER SCIENCE Presented by Shubham Shewale.pdf
SSSMultiServices
 
Lesson 08
Lesson 08Lesson 08
Lesson 08
Tracie King
 
Computer Literacy Lesson 9
Computer Literacy Lesson 9Computer Literacy Lesson 9
Computer Literacy Lesson 9
cpashke
 
136wt3852600-4711661000382986.pptx
136wt3852600-4711661000382986.pptx136wt3852600-4711661000382986.pptx
136wt3852600-4711661000382986.pptx
wendifrawtadesse1
 
COMPLETE COMPUTER STUDIES NOTES.doc
COMPLETE COMPUTER STUDIES NOTES.docCOMPLETE COMPUTER STUDIES NOTES.doc
COMPLETE COMPUTER STUDIES NOTES.doc
zacheuskiprono
 
Computer Organization and BASIC Programming
Computer Organization and BASIC     Programming     Computer Organization and BASIC     Programming
Computer Organization and BASIC Programming
MuhammadAhmad844
 
Computer
ComputerComputer
Computer
Devesh Saini
 
Lesson two ppt
Lesson two   pptLesson two   ppt
Lesson two ppt
cpashke
 
Lecturer1 introduction to computer architecture (ca)
Lecturer1   introduction to computer architecture (ca)Lecturer1   introduction to computer architecture (ca)
Lecturer1 introduction to computer architecture (ca)
ADEOLA ADISA
 
Fundamental concept of computer By Er. Sohan Grover
Fundamental concept of computer By Er. Sohan GroverFundamental concept of computer By Er. Sohan Grover
Fundamental concept of computer By Er. Sohan Grover
Sohan Grover
 
lesson 3; inspect and test the configured cs and network handouts
lesson 3; inspect and test the configured cs and network handoutslesson 3; inspect and test the configured cs and network handouts
lesson 3; inspect and test the configured cs and network handouts
lorbz
 

Similar to Coding, Information Theory (and Advanced Modulation (20)

Computer Literacy Lesson 1: Computer and Operating Systems
Computer Literacy Lesson 1: Computer and Operating SystemsComputer Literacy Lesson 1: Computer and Operating Systems
Computer Literacy Lesson 1: Computer and Operating Systems
 
Computer Literacy Lesson 5
Computer Literacy Lesson 5Computer Literacy Lesson 5
Computer Literacy Lesson 5
 
Lesson 02
Lesson 02Lesson 02
Lesson 02
 
Computer Literacy Lesson 6
Computer Literacy Lesson 6Computer Literacy Lesson 6
Computer Literacy Lesson 6
 
Bce notes unit 1 be 205
Bce notes unit 1 be 205Bce notes unit 1 be 205
Bce notes unit 1 be 205
 
Computer Literacy Lesson 4
Computer Literacy Lesson 4Computer Literacy Lesson 4
Computer Literacy Lesson 4
 
Chapter 4 - Processor Fundamentals.pdf
Chapter 4 - Processor Fundamentals.pdfChapter 4 - Processor Fundamentals.pdf
Chapter 4 - Processor Fundamentals.pdf
 
Lec45chap4f04
Lec45chap4f04Lec45chap4f04
Lec45chap4f04
 
Lesson 10
Lesson 10Lesson 10
Lesson 10
 
Basic of COMPUTER SCIENCE Presented by Shubham Shewale.pdf
Basic of COMPUTER SCIENCE Presented by Shubham Shewale.pdfBasic of COMPUTER SCIENCE Presented by Shubham Shewale.pdf
Basic of COMPUTER SCIENCE Presented by Shubham Shewale.pdf
 
Lesson 08
Lesson 08Lesson 08
Lesson 08
 
Computer Literacy Lesson 9
Computer Literacy Lesson 9Computer Literacy Lesson 9
Computer Literacy Lesson 9
 
136wt3852600-4711661000382986.pptx
136wt3852600-4711661000382986.pptx136wt3852600-4711661000382986.pptx
136wt3852600-4711661000382986.pptx
 
COMPLETE COMPUTER STUDIES NOTES.doc
COMPLETE COMPUTER STUDIES NOTES.docCOMPLETE COMPUTER STUDIES NOTES.doc
COMPLETE COMPUTER STUDIES NOTES.doc
 
Computer Organization and BASIC Programming
Computer Organization and BASIC     Programming     Computer Organization and BASIC     Programming
Computer Organization and BASIC Programming
 
Computer
ComputerComputer
Computer
 
Lesson two ppt
Lesson two   pptLesson two   ppt
Lesson two ppt
 
Lecturer1 introduction to computer architecture (ca)
Lecturer1   introduction to computer architecture (ca)Lecturer1   introduction to computer architecture (ca)
Lecturer1 introduction to computer architecture (ca)
 
Fundamental concept of computer By Er. Sohan Grover
Fundamental concept of computer By Er. Sohan GroverFundamental concept of computer By Er. Sohan Grover
Fundamental concept of computer By Er. Sohan Grover
 
lesson 3; inspect and test the configured cs and network handouts
lesson 3; inspect and test the configured cs and network handoutslesson 3; inspect and test the configured cs and network handouts
lesson 3; inspect and test the configured cs and network handouts
 

More from jeronimored

Computer Networks 7.Physical LayerComputer Networks 7.Physical Layer
Computer Networks 7.Physical LayerComputer Networks 7.Physical LayerComputer Networks 7.Physical LayerComputer Networks 7.Physical Layer
Computer Networks 7.Physical LayerComputer Networks 7.Physical Layer
jeronimored
 
Android – Open source mobile OS developed ny the Open Handset Alliance led by...
Android – Open source mobile OS developed ny the Open Handset Alliance led by...Android – Open source mobile OS developed ny the Open Handset Alliance led by...
Android – Open source mobile OS developed ny the Open Handset Alliance led by...
jeronimored
 
Intel microprocessor history lec12_x86arch.ppt
Intel microprocessor history lec12_x86arch.pptIntel microprocessor history lec12_x86arch.ppt
Intel microprocessor history lec12_x86arch.ppt
jeronimored
 
Intro Ch 01BA business alliance consisting of 47 companies to develop open st...
Intro Ch 01BA business alliance consisting of 47 companies to develop open st...Intro Ch 01BA business alliance consisting of 47 companies to develop open st...
Intro Ch 01BA business alliance consisting of 47 companies to develop open st...
jeronimored
 
preKnowledge-InternetNetworking Android's mobile operating system is based on...
preKnowledge-InternetNetworking Android's mobile operating system is based on...preKnowledge-InternetNetworking Android's mobile operating system is based on...
preKnowledge-InternetNetworking Android's mobile operating system is based on...
jeronimored
 
TelecommunicationsThe Internet Basic Telecom Model
TelecommunicationsThe Internet Basic Telecom ModelTelecommunicationsThe Internet Basic Telecom Model
TelecommunicationsThe Internet Basic Telecom Model
jeronimored
 
Functional Areas of Network Management Configuration Management
Functional Areas of Network Management Configuration ManagementFunctional Areas of Network Management Configuration Management
Functional Areas of Network Management Configuration Management
jeronimored
 
8085microprocessorarchitectureppt-121013115356-phpapp02_2.ppt
8085microprocessorarchitectureppt-121013115356-phpapp02_2.ppt8085microprocessorarchitectureppt-121013115356-phpapp02_2.ppt
8085microprocessorarchitectureppt-121013115356-phpapp02_2.ppt
jeronimored
 
A microprocessor is the main component of a microcomputer system and is also ...
A microprocessor is the main component of a microcomputer system and is also ...A microprocessor is the main component of a microcomputer system and is also ...
A microprocessor is the main component of a microcomputer system and is also ...
jeronimored
 
Erroneous co-routines can block system Formal interfaces slow down system
Erroneous co-routines can block system Formal  interfaces slow down systemErroneous co-routines can block system Formal  interfaces slow down system
Erroneous co-routines can block system Formal interfaces slow down system
jeronimored
 
Welcome to Introduction to Algorithms, Spring 2004
Welcome to Introduction to Algorithms, Spring 2004Welcome to Introduction to Algorithms, Spring 2004
Welcome to Introduction to Algorithms, Spring 2004
jeronimored
 
Resource Management in (Embedded) Real-Time Systems
Resource Management in (Embedded) Real-Time SystemsResource Management in (Embedded) Real-Time Systems
Resource Management in (Embedded) Real-Time Systems
jeronimored
 
Management Tools Desirable features Management Architectures Simple Network ...
Management Tools  Desirable features Management Architectures Simple Network ...Management Tools  Desirable features Management Architectures Simple Network ...
Management Tools Desirable features Management Architectures Simple Network ...
jeronimored
 
MICMicrowave Tubes – klystron, reflex klystron, magnetron and TWT.
MICMicrowave Tubes – klystron, reflex klystron, magnetron and TWT.MICMicrowave Tubes – klystron, reflex klystron, magnetron and TWT.
MICMicrowave Tubes – klystron, reflex klystron, magnetron and TWT.
jeronimored
 
Network Management Network Management Model
Network Management Network Management ModelNetwork Management Network Management Model
Network Management Network Management Model
jeronimored
 
Saumya Debray The University of Arizona Tucson
Saumya Debray The University of Arizona TucsonSaumya Debray The University of Arizona Tucson
Saumya Debray The University of Arizona Tucson
jeronimored
 
An operating system (OS) provides a virtual execution environment on top of h...
An operating system (OS) provides a virtual execution environment on top of h...An operating system (OS) provides a virtual execution environment on top of h...
An operating system (OS) provides a virtual execution environment on top of h...
jeronimored
 
application Fundamentals Android Introduction
application Fundamentals  Android Introductionapplication Fundamentals  Android Introduction
application Fundamentals Android Introduction
jeronimored
 
linux-lecture1.ppt
linux-lecture1.pptlinux-lecture1.ppt
linux-lecture1.ppt
jeronimored
 
5 - System Administration.ppt
5 - System Administration.ppt5 - System Administration.ppt
5 - System Administration.ppt
jeronimored
 

More from jeronimored (20)

Computer Networks 7.Physical LayerComputer Networks 7.Physical Layer
Computer Networks 7.Physical LayerComputer Networks 7.Physical LayerComputer Networks 7.Physical LayerComputer Networks 7.Physical Layer
Computer Networks 7.Physical LayerComputer Networks 7.Physical Layer
 
Android – Open source mobile OS developed ny the Open Handset Alliance led by...
Android – Open source mobile OS developed ny the Open Handset Alliance led by...Android – Open source mobile OS developed ny the Open Handset Alliance led by...
Android – Open source mobile OS developed ny the Open Handset Alliance led by...
 
Intel microprocessor history lec12_x86arch.ppt
Intel microprocessor history lec12_x86arch.pptIntel microprocessor history lec12_x86arch.ppt
Intel microprocessor history lec12_x86arch.ppt
 
Intro Ch 01BA business alliance consisting of 47 companies to develop open st...
Intro Ch 01BA business alliance consisting of 47 companies to develop open st...Intro Ch 01BA business alliance consisting of 47 companies to develop open st...
Intro Ch 01BA business alliance consisting of 47 companies to develop open st...
 
preKnowledge-InternetNetworking Android's mobile operating system is based on...
preKnowledge-InternetNetworking Android's mobile operating system is based on...preKnowledge-InternetNetworking Android's mobile operating system is based on...
preKnowledge-InternetNetworking Android's mobile operating system is based on...
 
TelecommunicationsThe Internet Basic Telecom Model
TelecommunicationsThe Internet Basic Telecom ModelTelecommunicationsThe Internet Basic Telecom Model
TelecommunicationsThe Internet Basic Telecom Model
 
Functional Areas of Network Management Configuration Management
Functional Areas of Network Management Configuration ManagementFunctional Areas of Network Management Configuration Management
Functional Areas of Network Management Configuration Management
 
8085microprocessorarchitectureppt-121013115356-phpapp02_2.ppt
8085microprocessorarchitectureppt-121013115356-phpapp02_2.ppt8085microprocessorarchitectureppt-121013115356-phpapp02_2.ppt
8085microprocessorarchitectureppt-121013115356-phpapp02_2.ppt
 
A microprocessor is the main component of a microcomputer system and is also ...
A microprocessor is the main component of a microcomputer system and is also ...A microprocessor is the main component of a microcomputer system and is also ...
A microprocessor is the main component of a microcomputer system and is also ...
 
Erroneous co-routines can block system Formal interfaces slow down system
Erroneous co-routines can block system Formal  interfaces slow down systemErroneous co-routines can block system Formal  interfaces slow down system
Erroneous co-routines can block system Formal interfaces slow down system
 
Welcome to Introduction to Algorithms, Spring 2004
Welcome to Introduction to Algorithms, Spring 2004Welcome to Introduction to Algorithms, Spring 2004
Welcome to Introduction to Algorithms, Spring 2004
 
Resource Management in (Embedded) Real-Time Systems
Resource Management in (Embedded) Real-Time SystemsResource Management in (Embedded) Real-Time Systems
Resource Management in (Embedded) Real-Time Systems
 
Management Tools Desirable features Management Architectures Simple Network ...
Management Tools  Desirable features Management Architectures Simple Network ...Management Tools  Desirable features Management Architectures Simple Network ...
Management Tools Desirable features Management Architectures Simple Network ...
 
MICMicrowave Tubes – klystron, reflex klystron, magnetron and TWT.
MICMicrowave Tubes – klystron, reflex klystron, magnetron and TWT.MICMicrowave Tubes – klystron, reflex klystron, magnetron and TWT.
MICMicrowave Tubes – klystron, reflex klystron, magnetron and TWT.
 
Network Management Network Management Model
Network Management Network Management ModelNetwork Management Network Management Model
Network Management Network Management Model
 
Saumya Debray The University of Arizona Tucson
Saumya Debray The University of Arizona TucsonSaumya Debray The University of Arizona Tucson
Saumya Debray The University of Arizona Tucson
 
An operating system (OS) provides a virtual execution environment on top of h...
An operating system (OS) provides a virtual execution environment on top of h...An operating system (OS) provides a virtual execution environment on top of h...
An operating system (OS) provides a virtual execution environment on top of h...
 
application Fundamentals Android Introduction
application Fundamentals  Android Introductionapplication Fundamentals  Android Introduction
application Fundamentals Android Introduction
 
linux-lecture1.ppt
linux-lecture1.pptlinux-lecture1.ppt
linux-lecture1.ppt
 
5 - System Administration.ppt
5 - System Administration.ppt5 - System Administration.ppt
5 - System Administration.ppt
 

Recently uploaded

DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
gestioneergodomus
 
Question paper of renewable energy sources
Question paper of renewable energy sourcesQuestion paper of renewable energy sources
Question paper of renewable energy sources
mahammadsalmanmech
 
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
JamalHussainArman
 
New techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdfNew techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdf
wisnuprabawa3
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
VICTOR MAESTRE RAMIREZ
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
camseq
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
Madan Karki
 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
nooriasukmaningtyas
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
MDSABBIROJJAMANPAYEL
 
Heat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation pptHeat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation ppt
mamunhossenbd75
 
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
ihlasbinance2003
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
IJECEIAES
 
bank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdfbank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdf
Divyam548318
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
IJECEIAES
 
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
University of Maribor
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Christina Lin
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
NidhalKahouli2
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
gerogepatton
 
Exception Handling notes in java exception
Exception Handling notes in java exceptionException Handling notes in java exception
Exception Handling notes in java exception
Ratnakar Mikkili
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 

Recently uploaded (20)

DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
 
Question paper of renewable energy sources
Question paper of renewable energy sourcesQuestion paper of renewable energy sources
Question paper of renewable energy sources
 
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
 
New techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdfNew techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdf
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
 
Heat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation pptHeat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation ppt
 
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
 
bank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdfbank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdf
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
 
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
 
Exception Handling notes in java exception
Exception Handling notes in java exceptionException Handling notes in java exception
Exception Handling notes in java exception
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 

Coding, Information Theory (and Advanced Modulation

  • 1. 1 Lesson 4 Computer Maintenance Computer Literacy BASICS: A Comprehensive Guide to IC3, 4th Edition Morrison / Wells
  • 2. Lesson 4 Morrison / Wells CLB: A Comp Guide to IC3 4E 2 2 2 Objectives  Identify maintenance issues.  Maintain hardware.  Upgrade and replace hardware components.  Perform preventive maintenance.  Request specialized maintenance.
  • 3. Lesson 4 Morrison / Wells CLB: A Comp Guide to IC3 4E 3 3 3 Vocabulary  cable management  cookie  corona wires  defragmentation  ergonomic keyboard  fragmentation  maintenance  Recycle Bin  sector  seek time  touchpad  wireless keyboard
  • 4. Lesson 4 Morrison / Wells CLB: A Comp Guide to IC3 4E Identifying Maintenance Issues  A computer requires regular maintenance.  Managing computer cables is an overlooked problem when maintaining a computer system. 4 4 4
  • 5. Lesson 4 Morrison / Wells CLB: A Comp Guide to IC3 4E Maintaining Hardware  Keyboard and Mouse:  Use a can of compressed air to remove the dust from the keyboard. 5 5 5
  • 6. Lesson 4 Morrison / Wells CLB: A Comp Guide to IC3 4E Maintaining Hardware (continued)  Inkjet Printers:  Small deposits of dry ink accumulate on the print head of an inkjet printer.  You can use special supplies to clean an inkjet printer. 6 6 6
  • 7. Lesson 4 Morrison / Wells CLB: A Comp Guide to IC3 4E 7 7 7 Maintaining Hardware (continued)  Laser Printers: – Use a printer brush or a good paint brush and a lint-free cloth to clean inside the toner opening. – Remove paper fragments. – Use a clean cloth to wipe up any spilled toner and dust. – Clean the rollers, but don’t touch the transfer (sponge) roller. – Replace the toner cartridge
  • 8. Lesson 4 Morrison / Wells CLB: A Comp Guide to IC3 4E Upgrading and Replacing Hardware Components  Computer Memory:  RAM is made up of small memory chips that form a memory module, installed in the RAM slots on the motherboard of your computer. 8 8 8
  • 9. Lesson 4 Morrison / Wells CLB: A Comp Guide to IC3 4E 9 9 9 Upgrading and Replacing Hardware Components (continued)  Keyboards:  Ergonomic keyboards allow for a more natural positioning of your arms and hands.  A wireless keyboard reduces the clutter of unsightly wires and other cable problems and improves mobility.
  • 10. Lesson 4 Morrison / Wells CLB: A Comp Guide to IC3 4E Upgrading and Replacing Hardware Components (continued)  Mouse:  You can replace a mouse without replacing any other computer hardware.  A touchpad is a pointing device you can use instead of a mouse. 10 10 10
  • 11. Lesson 4 Morrison / Wells CLB: A Comp Guide to IC3 4E Performing Preventive Maintenance  Disk Defragmentation:  Disk fragmentation occurs when data is broken up into many pieces that are not stored close together. 11 11 11
  • 12. Lesson 4 Morrison / Wells CLB: A Comp Guide to IC3 4E Performing Preventive Maintenance (continued)  Recycle Bin:  The Windows Recycle Bin is a holding area for files and folders before their final deletion from a storage device. 12 12 12
  • 13. Lesson 4 Morrison / Wells CLB: A Comp Guide to IC3 4E 13 13 13 Performing Preventive Maintenance (continued)  Temporary Files:  Temporary files normally exist only during the current session of the program.  Cookies:  A cookie is a small text file that a Web site uses to identify a specific computer.
  • 14. Lesson 4 Morrison / Wells CLB: A Comp Guide to IC3 4E 14 14 14 Requesting Specialized Maintenance  Generally should be performed by a computer professional: – Replacing the power supply or opening the power supply case – Replacing other electrical components – Replacing the processor – Replacing or adding a hard disk – Replacing or adding additional RAM
  • 15. Lesson 4 Morrison / Wells CLB: A Comp Guide to IC3 4E 15 15 Summary In this lesson, you learned:  A computer requires maintenance on a regular schedule to prevent problems such as the degrading of hard disk performance and monitor trouble.  Damaged and poorly maintained cables can prevent peripheral devices from communicating with the computer. Unorganized and unprotected cables can also create safety hazards. Cable management should therefore be part of a regular computer maintenance routine. 15
  • 16. Lesson 4 Morrison / Wells CLB: A Comp Guide to IC3 4E 16 16 Summary (continued)  To maintain the computer keyboard, use a can of compressed air to remove the dust from the keyboard every six months.  Clean a mechanical mouse by removing its cover, removing debris from the roller and the ball, and then reassembling the mouse. 16
  • 17. Lesson 4 Morrison / Wells CLB: A Comp Guide to IC3 4E 17 17 Summary (continued)  Printer maintenance helps to prevent common printing problems. Many inkjet printers have a self- cleaning mode. If yours does not, use an inkjet cleaning cartridge to flush dirt and debris out of clogged printer nozzles. Clean a laser printer when you change the toner cartridge.  Adding computer memory (RAM) often provides the best value for increasing overall system performance. 17
  • 18. Lesson 4 Morrison / Wells CLB: A Comp Guide to IC3 4E 18 18 Summary (continued)  All computers slow down as you work with them. To improve or maintain computer efficiency, periodically use Windows tools to defragment hard drives, empty the Recycle Bin, delete temporary files, and remove cookies.  Some maintenance procedures are not suitable for the average computer user and should be performed by a computer professional, such as replacing the power supply or opening the power supply case, replacing other electrical components, including the processor and RAM, and adding an internal hard disk. 18