SlideShare a Scribd company logo
To complete hardware repairs, it is important to have a toolkit that should
contain all of the necessary tools. As you gain experience, you will learn which
tools to have available for different types of jobs.
Electro-Static Discharge (ESD) tools
Hand tools
Cleaning tools
Diagnostic tools
Static electricity is easily generated by friction on
carpets, tile flooring, clothing, hair, fabric, and etc.
The friction of moving air alone will charge suspended
particles and cause the buildup of static electrical
charges on people and objects in the environment.
Grounded antistatic work mats used with antistatic
wrist straps provide the most basic means for the
controlled discharge of electrostatic electricity.
A hand tool is a device for performing work on a material or a
physical system using only hands. The hand tools can be
manually used employing force, or electrically powered,
using electrical current.
Having the appropriate cleaning tools is essential
when maintaining or repairing computers. Using
these tools ensures that computer components are
not damaged during cleaning.
Computers are easier to use and more dependable
with each new generation of hardware and operating
system update, but that doesn't mean they're
problem-free. Here's the most popular tools for
diagnosing your computer problems:
HARDWARE TOOLS.pptx

More Related Content

Similar to HARDWARE TOOLS.pptx

2.-USE-OF-HAND-TOOLS.pptx
2.-USE-OF-HAND-TOOLS.pptx2.-USE-OF-HAND-TOOLS.pptx
2.-USE-OF-HAND-TOOLS.pptx
DanLexterLaulita
 
TLE LESSON 1 Computer Servicing Tools.pptx
TLE LESSON 1 Computer Servicing Tools.pptxTLE LESSON 1 Computer Servicing Tools.pptx
TLE LESSON 1 Computer Servicing Tools.pptx
GabrielleEllis4
 
ESD TOOLS.pptx
ESD TOOLS.pptxESD TOOLS.pptx
ESD TOOLS.pptx
JedrickCaraig1
 
Proper tools selection
Proper tools selectionProper tools selection
Proper tools selection
Princes Diane Carbonell-Jasareno
 
LO1 ICT USE OF HAND TOOLS.pptx
LO1 ICT USE OF HAND TOOLS.pptxLO1 ICT USE OF HAND TOOLS.pptx
LO1 ICT USE OF HAND TOOLS.pptx
ClarinaBergante
 
CREATIVE TECHNOLOGY 7 QI-L3
CREATIVE TECHNOLOGY 7 QI-L3CREATIVE TECHNOLOGY 7 QI-L3
CREATIVE TECHNOLOGY 7 QI-L3
FLORENCE FERNNADEZ
 
Grade8_Q1-4_W1_HandTools.pdf
Grade8_Q1-4_W1_HandTools.pdfGrade8_Q1-4_W1_HandTools.pdf
Grade8_Q1-4_W1_HandTools.pdf
Ronilo Yap
 
COMPUTER HARDWARE TOOLS IN CHS AND CSS
COMPUTER HARDWARE TOOLS IN CHS AND CSSCOMPUTER HARDWARE TOOLS IN CHS AND CSS
COMPUTER HARDWARE TOOLS IN CHS AND CSS
BelindaLapidCamullo
 
Introduction safety
Introduction safetyIntroduction safety
Introduction safety
Syahrizat Azizan
 
Presentation1
Presentation1Presentation1
Presentation1
Mohamed Mahmoud
 
Handtools
HandtoolsHandtools
Handtools
Emelinda Alejo
 
Lesson 1 Tools and Equipment in CSS.pptx
Lesson 1 Tools and Equipment in CSS.pptxLesson 1 Tools and Equipment in CSS.pptx
Lesson 1 Tools and Equipment in CSS.pptx
JojamesGaddi1
 
TLE 10 week 2 - Use of Hand Tools and Equipment in Computer.pptx
TLE 10 week 2 - Use of Hand Tools and Equipment in Computer.pptxTLE 10 week 2 - Use of Hand Tools and Equipment in Computer.pptx
TLE 10 week 2 - Use of Hand Tools and Equipment in Computer.pptx
JohnKingjohnkingmond
 
Equipment in CSS Computer HARDWARE Servicing.pptx
Equipment in CSS Computer HARDWARE Servicing.pptxEquipment in CSS Computer HARDWARE Servicing.pptx
Equipment in CSS Computer HARDWARE Servicing.pptx
MagdaLo1
 
System_Servicing_(NCII)_Tools_and_Equipment_in_CSS.pptx
System_Servicing_(NCII)_Tools_and_Equipment_in_CSS.pptxSystem_Servicing_(NCII)_Tools_and_Equipment_in_CSS.pptx
System_Servicing_(NCII)_Tools_and_Equipment_in_CSS.pptx
EdmarkDaveBolo1
 
Handtools
HandtoolsHandtools
Handtools
Frya Lora
 
Computer hazard
Computer hazardComputer hazard
Computer-hardware-tools PPT.pptx
Computer-hardware-tools PPT.pptxComputer-hardware-tools PPT.pptx
Computer-hardware-tools PPT.pptx
marilyn361593
 
CSS L02 - Tool and Equipment in CSS
CSS L02 - Tool and Equipment in CSSCSS L02 - Tool and Equipment in CSS
CSS L02 - Tool and Equipment in CSS
Marvin Bronoso
 
Occupational-Health-And-Safety.pptx
Occupational-Health-And-Safety.pptxOccupational-Health-And-Safety.pptx
Occupational-Health-And-Safety.pptx
YoruFaller
 

Similar to HARDWARE TOOLS.pptx (20)

2.-USE-OF-HAND-TOOLS.pptx
2.-USE-OF-HAND-TOOLS.pptx2.-USE-OF-HAND-TOOLS.pptx
2.-USE-OF-HAND-TOOLS.pptx
 
TLE LESSON 1 Computer Servicing Tools.pptx
TLE LESSON 1 Computer Servicing Tools.pptxTLE LESSON 1 Computer Servicing Tools.pptx
TLE LESSON 1 Computer Servicing Tools.pptx
 
ESD TOOLS.pptx
ESD TOOLS.pptxESD TOOLS.pptx
ESD TOOLS.pptx
 
Proper tools selection
Proper tools selectionProper tools selection
Proper tools selection
 
LO1 ICT USE OF HAND TOOLS.pptx
LO1 ICT USE OF HAND TOOLS.pptxLO1 ICT USE OF HAND TOOLS.pptx
LO1 ICT USE OF HAND TOOLS.pptx
 
CREATIVE TECHNOLOGY 7 QI-L3
CREATIVE TECHNOLOGY 7 QI-L3CREATIVE TECHNOLOGY 7 QI-L3
CREATIVE TECHNOLOGY 7 QI-L3
 
Grade8_Q1-4_W1_HandTools.pdf
Grade8_Q1-4_W1_HandTools.pdfGrade8_Q1-4_W1_HandTools.pdf
Grade8_Q1-4_W1_HandTools.pdf
 
COMPUTER HARDWARE TOOLS IN CHS AND CSS
COMPUTER HARDWARE TOOLS IN CHS AND CSSCOMPUTER HARDWARE TOOLS IN CHS AND CSS
COMPUTER HARDWARE TOOLS IN CHS AND CSS
 
Introduction safety
Introduction safetyIntroduction safety
Introduction safety
 
Presentation1
Presentation1Presentation1
Presentation1
 
Handtools
HandtoolsHandtools
Handtools
 
Lesson 1 Tools and Equipment in CSS.pptx
Lesson 1 Tools and Equipment in CSS.pptxLesson 1 Tools and Equipment in CSS.pptx
Lesson 1 Tools and Equipment in CSS.pptx
 
TLE 10 week 2 - Use of Hand Tools and Equipment in Computer.pptx
TLE 10 week 2 - Use of Hand Tools and Equipment in Computer.pptxTLE 10 week 2 - Use of Hand Tools and Equipment in Computer.pptx
TLE 10 week 2 - Use of Hand Tools and Equipment in Computer.pptx
 
Equipment in CSS Computer HARDWARE Servicing.pptx
Equipment in CSS Computer HARDWARE Servicing.pptxEquipment in CSS Computer HARDWARE Servicing.pptx
Equipment in CSS Computer HARDWARE Servicing.pptx
 
System_Servicing_(NCII)_Tools_and_Equipment_in_CSS.pptx
System_Servicing_(NCII)_Tools_and_Equipment_in_CSS.pptxSystem_Servicing_(NCII)_Tools_and_Equipment_in_CSS.pptx
System_Servicing_(NCII)_Tools_and_Equipment_in_CSS.pptx
 
Handtools
HandtoolsHandtools
Handtools
 
Computer hazard
Computer hazardComputer hazard
Computer hazard
 
Computer-hardware-tools PPT.pptx
Computer-hardware-tools PPT.pptxComputer-hardware-tools PPT.pptx
Computer-hardware-tools PPT.pptx
 
CSS L02 - Tool and Equipment in CSS
CSS L02 - Tool and Equipment in CSSCSS L02 - Tool and Equipment in CSS
CSS L02 - Tool and Equipment in CSS
 
Occupational-Health-And-Safety.pptx
Occupational-Health-And-Safety.pptxOccupational-Health-And-Safety.pptx
Occupational-Health-And-Safety.pptx
 

Recently uploaded

Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Zilliz
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 

Recently uploaded (20)

Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 

HARDWARE TOOLS.pptx

  • 1. To complete hardware repairs, it is important to have a toolkit that should contain all of the necessary tools. As you gain experience, you will learn which tools to have available for different types of jobs.
  • 2. Electro-Static Discharge (ESD) tools Hand tools Cleaning tools Diagnostic tools
  • 3. Static electricity is easily generated by friction on carpets, tile flooring, clothing, hair, fabric, and etc. The friction of moving air alone will charge suspended particles and cause the buildup of static electrical charges on people and objects in the environment. Grounded antistatic work mats used with antistatic wrist straps provide the most basic means for the controlled discharge of electrostatic electricity.
  • 4.
  • 5. A hand tool is a device for performing work on a material or a physical system using only hands. The hand tools can be manually used employing force, or electrically powered, using electrical current.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10. Having the appropriate cleaning tools is essential when maintaining or repairing computers. Using these tools ensures that computer components are not damaged during cleaning.
  • 11.
  • 12.
  • 13. Computers are easier to use and more dependable with each new generation of hardware and operating system update, but that doesn't mean they're problem-free. Here's the most popular tools for diagnosing your computer problems: