SlideShare a Scribd company logo
Installing
Hardware
AJAY JASSI
Safety first


Firstly place an antistatic mat on a flat surface.



Place the computer carefully on the mat.



Put the antistatic wristband to your wrist and clip
the crocodile clip inside the tower on a metal part
to conduct the electricity.
Installing RAM

Firstly take the RAM out of the packaging.
Secondly allocate the RAM in the position.
Now apply a little pressure to get the RAM
placed into the slot.
Finally clip down the side clips to secure the
RAM and keep it in place.
Installing DVD drive

Firstly take out the DVD drive out of the
packaging.
Secondly put the bracket on the DVD drive
using the correct screws and screwdriver.
Now insert the IDE cable to the motherboard.
Finally place the DVD drive in position and
plug the IDE cable to it.
Installing HDD

Firstly take out the HDD from the packaging.
Then put the bracket on to the HDD using the
correct screws and screwdriver.
Now insert the ATA data cable to the
motherboard.
Position and place the HDD in place.
Finally plug the ATA data cable to the HDD.
Installing wireless NIC

Firstly take out the wireless NIC from the
packaging.
Secondly unclip the supporter lever for the
expansion slots.
Then allocate the wireless NIC and apply little
pressure to secure it in position.
Now push back down the supporter lever for
security.
Finally screw on the antenna to the wireless NIC
adapter.

More Related Content

Viewers also liked

P2- Technical Presentation- Tablets
P2- Technical Presentation- TabletsP2- Technical Presentation- Tablets
P2- Technical Presentation- Tablets
Ajay Jassi
 
Personalising Desktop
Personalising DesktopPersonalising Desktop
Personalising Desktop
Ajay Jassi
 
Embedded Devices
Embedded DevicesEmbedded Devices
Embedded Devices
Ajay Jassi
 
Comparison between Windows 8 and Mavericks OS X
Comparison between Windows 8 and Mavericks OS XComparison between Windows 8 and Mavericks OS X
Comparison between Windows 8 and Mavericks OS X
Ajay Jassi
 
Reasons why Hardware is Installed and Potential Problems and the Precautions
Reasons why Hardware is Installed and Potential Problems and the PrecautionsReasons why Hardware is Installed and Potential Problems and the Precautions
Reasons why Hardware is Installed and Potential Problems and the Precautions
Ajay Jassi
 
Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices
Ajay Jassi
 
Health and safety requirements for computer maintenance
Health and safety requirements for computer maintenanceHealth and safety requirements for computer maintenance
Health and safety requirements for computer maintenance
Ajay Jassi
 
Potential problems that occur during hardware installation
Potential problems that occur during hardware installationPotential problems that occur during hardware installation
Potential problems that occur during hardware installation
Ajay Jassi
 

Viewers also liked (8)

P2- Technical Presentation- Tablets
P2- Technical Presentation- TabletsP2- Technical Presentation- Tablets
P2- Technical Presentation- Tablets
 
Personalising Desktop
Personalising DesktopPersonalising Desktop
Personalising Desktop
 
Embedded Devices
Embedded DevicesEmbedded Devices
Embedded Devices
 
Comparison between Windows 8 and Mavericks OS X
Comparison between Windows 8 and Mavericks OS XComparison between Windows 8 and Mavericks OS X
Comparison between Windows 8 and Mavericks OS X
 
Reasons why Hardware is Installed and Potential Problems and the Precautions
Reasons why Hardware is Installed and Potential Problems and the PrecautionsReasons why Hardware is Installed and Potential Problems and the Precautions
Reasons why Hardware is Installed and Potential Problems and the Precautions
 
Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices
 
Health and safety requirements for computer maintenance
Health and safety requirements for computer maintenanceHealth and safety requirements for computer maintenance
Health and safety requirements for computer maintenance
 
Potential problems that occur during hardware installation
Potential problems that occur during hardware installationPotential problems that occur during hardware installation
Potential problems that occur during hardware installation
 

Similar to Installing Hardware

Computer assembly
Computer assemblyComputer assembly
Computer assembly
MLG College of Learning, Inc
 
How to install computer hardware 10 steps (with pictures)
How to install computer hardware  10 steps (with pictures)How to install computer hardware  10 steps (with pictures)
How to install computer hardware 10 steps (with pictures)
Perla Pelicano Corpez
 
Caramerakitkomputer
CaramerakitkomputerCaramerakitkomputer
Caramerakitkomputer
adityawicaksono95
 
Caramerakitkomputer.ppt
Caramerakitkomputer.pptCaramerakitkomputer.ppt
Caramerakitkomputer.ppt
adityawicaksono95
 
2.3
2.32.3
Computer Assembly and Disassembly (2nd Lesson part 2).ppt
Computer Assembly and Disassembly (2nd Lesson part 2).pptComputer Assembly and Disassembly (2nd Lesson part 2).ppt
Computer Assembly and Disassembly (2nd Lesson part 2).ppt
JonathanOcampo23
 
Build your own computer
Build your own computerBuild your own computer
Build your own computer
Mansoor Shar
 
Montandopc
MontandopcMontandopc
Montandopc
Irene Valera
 
SYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITY
SYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITYSYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITY
SYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITY
GOKUL SREE
 
Assemble your pc
Assemble your pcAssemble your pc
Assemble your pc
Tapan Khilar
 
Css grade 11 week 4
Css grade 11 week 4Css grade 11 week 4
Css grade 11 week 4
Danilo Anos
 
Computer hardware basic -shashank
Computer hardware basic  -shashankComputer hardware basic  -shashank
Computer hardware basic -shashank
techbed
 
Install computer system,devices and peripherals
Install computer system,devices and peripheralsInstall computer system,devices and peripherals
Install computer system,devices and peripherals
Raiza Janelle
 
ict 10 4 second q.pptx
ict 10 4 second q.pptxict 10 4 second q.pptx
ict 10 4 second q.pptx
TerrenceRamirez1
 
Assembling a computer
Assembling a computerAssembling a computer
Assembling a computerNeeraj Dhiman
 
Installing hard drive and optical drive
Installing hard drive and optical driveInstalling hard drive and optical drive
Installing hard drive and optical drivekapitanbasa
 
Installing hard drive and optical drive
Installing hard drive and optical driveInstalling hard drive and optical drive
Installing hard drive and optical drivekapitanbasa
 

Similar to Installing Hardware (20)

Computer assembly
Computer assemblyComputer assembly
Computer assembly
 
How to install computer hardware 10 steps (with pictures)
How to install computer hardware  10 steps (with pictures)How to install computer hardware  10 steps (with pictures)
How to install computer hardware 10 steps (with pictures)
 
Caramerakitkomputer
CaramerakitkomputerCaramerakitkomputer
Caramerakitkomputer
 
Caramerakitkomputer.ppt
Caramerakitkomputer.pptCaramerakitkomputer.ppt
Caramerakitkomputer.ppt
 
Unit 111 D1
Unit 111 D1 Unit 111 D1
Unit 111 D1
 
2.3
2.32.3
2.3
 
Computer Assembly and Disassembly (2nd Lesson part 2).ppt
Computer Assembly and Disassembly (2nd Lesson part 2).pptComputer Assembly and Disassembly (2nd Lesson part 2).ppt
Computer Assembly and Disassembly (2nd Lesson part 2).ppt
 
Build your own computer
Build your own computerBuild your own computer
Build your own computer
 
Montandopc
MontandopcMontandopc
Montandopc
 
SYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITY
SYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITYSYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITY
SYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITY
 
Assemble your pc
Assemble your pcAssemble your pc
Assemble your pc
 
Css grade 11 week 4
Css grade 11 week 4Css grade 11 week 4
Css grade 11 week 4
 
Computer hardware basic -shashank
Computer hardware basic  -shashankComputer hardware basic  -shashank
Computer hardware basic -shashank
 
Dasar komputer chapter3
Dasar komputer chapter3Dasar komputer chapter3
Dasar komputer chapter3
 
BuildingAComputer
BuildingAComputerBuildingAComputer
BuildingAComputer
 
Install computer system,devices and peripherals
Install computer system,devices and peripheralsInstall computer system,devices and peripherals
Install computer system,devices and peripherals
 
ict 10 4 second q.pptx
ict 10 4 second q.pptxict 10 4 second q.pptx
ict 10 4 second q.pptx
 
Assembling a computer
Assembling a computerAssembling a computer
Assembling a computer
 
Installing hard drive and optical drive
Installing hard drive and optical driveInstalling hard drive and optical drive
Installing hard drive and optical drive
 
Installing hard drive and optical drive
Installing hard drive and optical driveInstalling hard drive and optical drive
Installing hard drive and optical drive
 

More from Ajay Jassi

Managing IT Security
Managing IT SecurityManaging IT Security
Managing IT Security
Ajay Jassi
 
Configuring personal desktop
Configuring personal desktopConfiguring personal desktop
Configuring personal desktop
Ajay Jassi
 
Preaparation for new software application
Preaparation for new software applicationPreaparation for new software application
Preaparation for new software application
Ajay Jassi
 
Hardware Documentation and Benefits of Hardware Provider
Hardware Documentation and Benefits of Hardware ProviderHardware Documentation and Benefits of Hardware Provider
Hardware Documentation and Benefits of Hardware Provider
Ajay Jassi
 
IT job role description for Technical Support Engineer
IT job role description for Technical Support EngineerIT job role description for Technical Support Engineer
IT job role description for Technical Support Engineer
Ajay Jassi
 
Characteristics for IT Employee (P1)
Characteristics for IT Employee (P1)Characteristics for IT Employee (P1)
Characteristics for IT Employee (P1)
Ajay Jassi
 
Preparation for Installing Hardware
Preparation for Installing HardwarePreparation for Installing Hardware
Preparation for Installing Hardware
Ajay Jassi
 
Installation and Testing of Hardware
Installation and Testing of HardwareInstallation and Testing of Hardware
Installation and Testing of Hardware
Ajay Jassi
 
Installation of Windows 7 using USB
Installation of Windows 7 using USBInstallation of Windows 7 using USB
Installation of Windows 7 using USB
Ajay Jassi
 
Installation and configuration of Wireless NIC
Installation and configuration of Wireless NICInstallation and configuration of Wireless NIC
Installation and configuration of Wireless NIC
Ajay Jassi
 
Upgrade Invoice
Upgrade InvoiceUpgrade Invoice
Upgrade Invoice
Ajay Jassi
 
Computer Invoice
Computer InvoiceComputer Invoice
Computer Invoice
Ajay Jassi
 
Test Table for Wireless NIC
Test Table for Wireless NIC Test Table for Wireless NIC
Test Table for Wireless NIC
Ajay Jassi
 
Removing Security Risks from PC
Removing Security Risks from PCRemoving Security Risks from PC
Removing Security Risks from PC
Ajay Jassi
 
Identifying Security Risks
Identifying Security RisksIdentifying Security Risks
Identifying Security Risks
Ajay Jassi
 
Earl's Ices Computer Configuration
Earl's Ices Computer Configuration Earl's Ices Computer Configuration
Earl's Ices Computer Configuration
Ajay Jassi
 
P3 dataflow around pc
P3   dataflow around pcP3   dataflow around pc
P3 dataflow around pc
Ajay Jassi
 

More from Ajay Jassi (17)

Managing IT Security
Managing IT SecurityManaging IT Security
Managing IT Security
 
Configuring personal desktop
Configuring personal desktopConfiguring personal desktop
Configuring personal desktop
 
Preaparation for new software application
Preaparation for new software applicationPreaparation for new software application
Preaparation for new software application
 
Hardware Documentation and Benefits of Hardware Provider
Hardware Documentation and Benefits of Hardware ProviderHardware Documentation and Benefits of Hardware Provider
Hardware Documentation and Benefits of Hardware Provider
 
IT job role description for Technical Support Engineer
IT job role description for Technical Support EngineerIT job role description for Technical Support Engineer
IT job role description for Technical Support Engineer
 
Characteristics for IT Employee (P1)
Characteristics for IT Employee (P1)Characteristics for IT Employee (P1)
Characteristics for IT Employee (P1)
 
Preparation for Installing Hardware
Preparation for Installing HardwarePreparation for Installing Hardware
Preparation for Installing Hardware
 
Installation and Testing of Hardware
Installation and Testing of HardwareInstallation and Testing of Hardware
Installation and Testing of Hardware
 
Installation of Windows 7 using USB
Installation of Windows 7 using USBInstallation of Windows 7 using USB
Installation of Windows 7 using USB
 
Installation and configuration of Wireless NIC
Installation and configuration of Wireless NICInstallation and configuration of Wireless NIC
Installation and configuration of Wireless NIC
 
Upgrade Invoice
Upgrade InvoiceUpgrade Invoice
Upgrade Invoice
 
Computer Invoice
Computer InvoiceComputer Invoice
Computer Invoice
 
Test Table for Wireless NIC
Test Table for Wireless NIC Test Table for Wireless NIC
Test Table for Wireless NIC
 
Removing Security Risks from PC
Removing Security Risks from PCRemoving Security Risks from PC
Removing Security Risks from PC
 
Identifying Security Risks
Identifying Security RisksIdentifying Security Risks
Identifying Security Risks
 
Earl's Ices Computer Configuration
Earl's Ices Computer Configuration Earl's Ices Computer Configuration
Earl's Ices Computer Configuration
 
P3 dataflow around pc
P3   dataflow around pcP3   dataflow around pc
P3 dataflow around pc
 

Recently uploaded

GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 

Recently uploaded (20)

GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 

Installing Hardware

  • 2. Safety first  Firstly place an antistatic mat on a flat surface.  Place the computer carefully on the mat.  Put the antistatic wristband to your wrist and clip the crocodile clip inside the tower on a metal part to conduct the electricity.
  • 3. Installing RAM Firstly take the RAM out of the packaging. Secondly allocate the RAM in the position. Now apply a little pressure to get the RAM placed into the slot. Finally clip down the side clips to secure the RAM and keep it in place.
  • 4. Installing DVD drive Firstly take out the DVD drive out of the packaging. Secondly put the bracket on the DVD drive using the correct screws and screwdriver. Now insert the IDE cable to the motherboard. Finally place the DVD drive in position and plug the IDE cable to it.
  • 5. Installing HDD Firstly take out the HDD from the packaging. Then put the bracket on to the HDD using the correct screws and screwdriver. Now insert the ATA data cable to the motherboard. Position and place the HDD in place. Finally plug the ATA data cable to the HDD.
  • 6. Installing wireless NIC Firstly take out the wireless NIC from the packaging. Secondly unclip the supporter lever for the expansion slots. Then allocate the wireless NIC and apply little pressure to secure it in position. Now push back down the supporter lever for security. Finally screw on the antenna to the wireless NIC adapter.