SlideShare a Scribd company logo
Ajay Jassi
Benefits of Installing expansion
• Expansion

on a computer system are the graphics card, PCI
cards, Wi-Fi card, video cards and sound cards.

• These can

be installed as an upgrade to make the computer
system faster and updated.

• Nowadays these

are mostly inputted and already installed onto
the motherboard. An example that is commonly upgraded is the
graphics card.

• Another

reasons it might be installed is too replace faults in the
computer system and repair the machine.
Potential problems
• Before

dealing with a computer system in the workshop, training
must be done for installing, disposing and dealing with computer
components safely.

• It’s

important for an technician to understand and know the risks
that can occur, so it can be prevented and dealt with.

• There are

many problems that could happen when installing
hardware. This can be caused by a small accident.
Effects
• This

can effect data, damage to computer components and
electrostatic charge.

• Electrostatic

charge: This is the electricity between the technician
and the computer component.

• Damage to

damaged.

• Data:

computer components: This is when the component is

information that is stored onto the computer. (HDD)
Electrostatic charge
• The electricity

in the circuit on the components are harmless to
users/technicians, but they are very sensitive and could be
damaged.

• This can

cause damage to the component when they build up
static electricity which is released on the technician and becomes
discharged.
Component damage
• When

handling with any component and computer, they is as
chance that it may get damaged, as there is many ways.

• The

common ways a component can get damaged is by dropping
the component, turning screws too much ruining the
treads, bending a pin or socket, and by loosening a cable in a plug.
Data
• The two

main risk that may occur is data corruption and data loss.

• Data

corruption is when data is damaged by errors. This means the
data is still recognised by the system but cannot be viewed or
usable. The cause of this may be from not copying the file
completely or correctly.

• Data

loss happens when the HDD is damaged or formatted. If
data is lost, it cannot be retrieved without a backup.
Precautions to avoid problems
• Electrostatic charge: A

antistatic wristband must be worn, which is
attached to a metal part inside the tower and an antistatic mat
should be used, which is placed underneath the computer.

• Damage to

computer components: Use tools and equipment
correctly, to be careful, concentrate all times and to take time
when handling.

• Data:

It is important to backup all data from the computer, as
anything could happen.

More Related Content

Viewers also liked

Health & Safety 12.11
Health & Safety 12.11Health & Safety 12.11
Health & Safety 12.11Meg Thompson
 
Safety in the home
Safety in the homeSafety in the home
Safety in the homeBeth Rogers
 
Home Safety Presentation_September 22, 2016
Home Safety Presentation_September 22, 2016Home Safety Presentation_September 22, 2016
Home Safety Presentation_September 22, 2016Bethany Anderson, MPH
 
palomabarrientos8aepe2015@gmail.com
palomabarrientos8aepe2015@gmail.compalomabarrientos8aepe2015@gmail.com
palomabarrientos8aepe2015@gmail.com
Paloma8a
 
Esd control-in-electronic-assembly
Esd control-in-electronic-assemblyEsd control-in-electronic-assembly
Esd control-in-electronic-assemblyTransformingTech
 
Pagbasa
PagbasaPagbasa
Isang Pagsusuri sa Akdang Canal dela Reina sa Pananaw Realismo
Isang Pagsusuri sa Akdang Canal dela Reina sa Pananaw RealismoIsang Pagsusuri sa Akdang Canal dela Reina sa Pananaw Realismo
Isang Pagsusuri sa Akdang Canal dela Reina sa Pananaw RealismoIris Joy Yabyabin
 
ESD Basics By Transforming Technologies
ESD Basics By Transforming TechnologiesESD Basics By Transforming Technologies
ESD Basics By Transforming TechnologiesEric Puszczewicz
 
Home safety awareness
Home safety awarenessHome safety awareness
Home safety awareness
Proactive Safety Services, LLC
 
Control de Electrostatica en la Industria Electronica Alumnas del 5 AMRH
Control de Electrostatica en la Industria Electronica Alumnas del 5 AMRH Control de Electrostatica en la Industria Electronica Alumnas del 5 AMRH
Control de Electrostatica en la Industria Electronica Alumnas del 5 AMRH
Nallely Almazan
 
Safety in the home
Safety in the homeSafety in the home
Safety in the home
siobhanpdst
 
Electro Static Discharge Basics
Electro Static Discharge BasicsElectro Static Discharge Basics
Electro Static Discharge Basics
TransformingTech
 
ELECTROSTATICA
ELECTROSTATICAELECTROSTATICA
ELECTROSTATICA
saulino27
 
Programa de Control de ESD
Programa de Control de ESDPrograma de Control de ESD
Programa de Control de ESD
Mario Jose
 

Viewers also liked (17)

Health & Safety 12.11
Health & Safety 12.11Health & Safety 12.11
Health & Safety 12.11
 
Safety in the home
Safety in the homeSafety in the home
Safety in the home
 
Home Safety Presentation_September 22, 2016
Home Safety Presentation_September 22, 2016Home Safety Presentation_September 22, 2016
Home Safety Presentation_September 22, 2016
 
palomabarrientos8aepe2015@gmail.com
palomabarrientos8aepe2015@gmail.compalomabarrientos8aepe2015@gmail.com
palomabarrientos8aepe2015@gmail.com
 
Esd control-in-electronic-assembly
Esd control-in-electronic-assemblyEsd control-in-electronic-assembly
Esd control-in-electronic-assembly
 
Pagbasa
PagbasaPagbasa
Pagbasa
 
Isang Pagsusuri sa Akdang Canal dela Reina sa Pananaw Realismo
Isang Pagsusuri sa Akdang Canal dela Reina sa Pananaw RealismoIsang Pagsusuri sa Akdang Canal dela Reina sa Pananaw Realismo
Isang Pagsusuri sa Akdang Canal dela Reina sa Pananaw Realismo
 
ESD Basics By Transforming Technologies
ESD Basics By Transforming TechnologiesESD Basics By Transforming Technologies
ESD Basics By Transforming Technologies
 
Presentation1
Presentation1Presentation1
Presentation1
 
Home safety awareness
Home safety awarenessHome safety awareness
Home safety awareness
 
ESD PRESENTATION
ESD PRESENTATIONESD PRESENTATION
ESD PRESENTATION
 
Control de Electrostatica en la Industria Electronica Alumnas del 5 AMRH
Control de Electrostatica en la Industria Electronica Alumnas del 5 AMRH Control de Electrostatica en la Industria Electronica Alumnas del 5 AMRH
Control de Electrostatica en la Industria Electronica Alumnas del 5 AMRH
 
Safety in the home
Safety in the homeSafety in the home
Safety in the home
 
Hazard
HazardHazard
Hazard
 
Electro Static Discharge Basics
Electro Static Discharge BasicsElectro Static Discharge Basics
Electro Static Discharge Basics
 
ELECTROSTATICA
ELECTROSTATICAELECTROSTATICA
ELECTROSTATICA
 
Programa de Control de ESD
Programa de Control de ESDPrograma de Control de ESD
Programa de Control de ESD
 

Similar to Reasons why Hardware is Installed and Potential Problems and the Precautions

Ch 2 maintenance and safety
Ch 2 maintenance and safetyCh 2 maintenance and safety
Ch 2 maintenance and safetymekashaw tizazu
 
lesson 3; inspect and test the configured cs and network handouts
lesson 3; inspect and test the configured cs and network handoutslesson 3; inspect and test the configured cs and network handouts
lesson 3; inspect and test the configured cs and network handouts
lorbz
 
Computer basic
Computer basicComputer basic
Computer basic
Renée Howard-Johnson
 
Assembling.pptx
Assembling.pptxAssembling.pptx
Assembling.pptx
GauravSharmaIAHAP
 
ComputerAssembly
ComputerAssemblyComputerAssembly
ComputerAssemblyjay decelo
 
Installation and Testing of Hardware
Installation and Testing of HardwareInstallation and Testing of Hardware
Installation and Testing of Hardware
Ajay Jassi
 
GENERAL H and S plus tools Pre-Practical ITE6_Instructor_Materials_Chapter2.pptx
GENERAL H and S plus tools Pre-Practical ITE6_Instructor_Materials_Chapter2.pptxGENERAL H and S plus tools Pre-Practical ITE6_Instructor_Materials_Chapter2.pptx
GENERAL H and S plus tools Pre-Practical ITE6_Instructor_Materials_Chapter2.pptx
Amanda Weaver
 
Hardware Book BTI.pdf
Hardware Book BTI.pdfHardware Book BTI.pdf
Hardware Book BTI.pdf
Mohamoud Saed Mohamed
 
Computer Assembly
Computer AssemblyComputer Assembly
Computer Assembly
Michael Corcino
 
Why Install Hardware?
Why Install Hardware?Why Install Hardware?
Why Install Hardware?
trisson255
 
Assembling
AssemblingAssembling
Assembling
Magline Pereira
 
precision-15-7530-laptop_setup-guide2_en-us.pdf
precision-15-7530-laptop_setup-guide2_en-us.pdfprecision-15-7530-laptop_setup-guide2_en-us.pdf
precision-15-7530-laptop_setup-guide2_en-us.pdf
ssuserad36061
 
Css grade 11 week 3
Css grade 11 week 3Css grade 11 week 3
Css grade 11 week 3
Danilo Anos
 
Fixsmith pc repair fundamentals
Fixsmith pc repair fundamentalsFixsmith pc repair fundamentals
Fixsmith pc repair fundamentals
FixSmith
 
It technician
It technicianIt technician
It technicianEdz Gapuz
 
vostro-3888-desktop_owners-manual5_en-us.pdf
vostro-3888-desktop_owners-manual5_en-us.pdfvostro-3888-desktop_owners-manual5_en-us.pdf
vostro-3888-desktop_owners-manual5_en-us.pdf
MohamedAAmin2
 
1. advantages and applications of embedded system
1. advantages and applications of embedded system1. advantages and applications of embedded system
1. advantages and applications of embedded system
Vikas Dongre
 
Hardware Lecture_PPT_WK01_Computer_Parts_Tools.pptx
Hardware Lecture_PPT_WK01_Computer_Parts_Tools.pptxHardware Lecture_PPT_WK01_Computer_Parts_Tools.pptx
Hardware Lecture_PPT_WK01_Computer_Parts_Tools.pptx
clement swarnappa
 

Similar to Reasons why Hardware is Installed and Potential Problems and the Precautions (20)

Ch 2 maintenance and safety
Ch 2 maintenance and safetyCh 2 maintenance and safety
Ch 2 maintenance and safety
 
lesson 3; inspect and test the configured cs and network handouts
lesson 3; inspect and test the configured cs and network handoutslesson 3; inspect and test the configured cs and network handouts
lesson 3; inspect and test the configured cs and network handouts
 
Ch02
Ch02Ch02
Ch02
 
Computer basic
Computer basicComputer basic
Computer basic
 
Assembling.pptx
Assembling.pptxAssembling.pptx
Assembling.pptx
 
ComputerAssembly
ComputerAssemblyComputerAssembly
ComputerAssembly
 
Installation and Testing of Hardware
Installation and Testing of HardwareInstallation and Testing of Hardware
Installation and Testing of Hardware
 
GENERAL H and S plus tools Pre-Practical ITE6_Instructor_Materials_Chapter2.pptx
GENERAL H and S plus tools Pre-Practical ITE6_Instructor_Materials_Chapter2.pptxGENERAL H and S plus tools Pre-Practical ITE6_Instructor_Materials_Chapter2.pptx
GENERAL H and S plus tools Pre-Practical ITE6_Instructor_Materials_Chapter2.pptx
 
Hardware Book BTI.pdf
Hardware Book BTI.pdfHardware Book BTI.pdf
Hardware Book BTI.pdf
 
Computer Assembly
Computer AssemblyComputer Assembly
Computer Assembly
 
Why Install Hardware?
Why Install Hardware?Why Install Hardware?
Why Install Hardware?
 
Assembling
AssemblingAssembling
Assembling
 
precision-15-7530-laptop_setup-guide2_en-us.pdf
precision-15-7530-laptop_setup-guide2_en-us.pdfprecision-15-7530-laptop_setup-guide2_en-us.pdf
precision-15-7530-laptop_setup-guide2_en-us.pdf
 
Css grade 11 week 3
Css grade 11 week 3Css grade 11 week 3
Css grade 11 week 3
 
Fixsmith pc repair fundamentals
Fixsmith pc repair fundamentalsFixsmith pc repair fundamentals
Fixsmith pc repair fundamentals
 
It technician
It technicianIt technician
It technician
 
vostro-3888-desktop_owners-manual5_en-us.pdf
vostro-3888-desktop_owners-manual5_en-us.pdfvostro-3888-desktop_owners-manual5_en-us.pdf
vostro-3888-desktop_owners-manual5_en-us.pdf
 
1. advantages and applications of embedded system
1. advantages and applications of embedded system1. advantages and applications of embedded system
1. advantages and applications of embedded system
 
Module 4 unit 1
Module 4  unit 1Module 4  unit 1
Module 4 unit 1
 
Hardware Lecture_PPT_WK01_Computer_Parts_Tools.pptx
Hardware Lecture_PPT_WK01_Computer_Parts_Tools.pptxHardware Lecture_PPT_WK01_Computer_Parts_Tools.pptx
Hardware Lecture_PPT_WK01_Computer_Parts_Tools.pptx
 

More from Ajay Jassi

Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices
Ajay Jassi
 
Managing IT Security
Managing IT SecurityManaging IT Security
Managing IT Security
Ajay Jassi
 
Impact on IT system breaches
Impact on IT system breachesImpact on IT system breaches
Impact on IT system breaches
Ajay Jassi
 
Testing software
Testing softwareTesting software
Testing software
Ajay Jassi
 
Configuring personal desktop
Configuring personal desktopConfiguring personal desktop
Configuring personal desktop
Ajay Jassi
 
Preaparation for new software application
Preaparation for new software applicationPreaparation for new software application
Preaparation for new software application
Ajay Jassi
 
Software Licences
Software LicencesSoftware Licences
Software Licences
Ajay Jassi
 
Hardware Documentation and Benefits of Hardware Provider
Hardware Documentation and Benefits of Hardware ProviderHardware Documentation and Benefits of Hardware Provider
Hardware Documentation and Benefits of Hardware Provider
Ajay Jassi
 
IT job role description for Technical Support Engineer
IT job role description for Technical Support EngineerIT job role description for Technical Support Engineer
IT job role description for Technical Support Engineer
Ajay Jassi
 
Characteristics for IT Employee (P1)
Characteristics for IT Employee (P1)Characteristics for IT Employee (P1)
Characteristics for IT Employee (P1)
Ajay Jassi
 
Preparation for Installing Hardware
Preparation for Installing HardwarePreparation for Installing Hardware
Preparation for Installing Hardware
Ajay Jassi
 
Installation of Windows 7 using USB
Installation of Windows 7 using USBInstallation of Windows 7 using USB
Installation of Windows 7 using USB
Ajay Jassi
 
Building Computer System
Building Computer SystemBuilding Computer System
Building Computer System
Ajay Jassi
 
Installation and configuration of Wireless NIC
Installation and configuration of Wireless NICInstallation and configuration of Wireless NIC
Installation and configuration of Wireless NIC
Ajay Jassi
 
Comparison between Windows 8 and Mavericks OS X
Comparison between Windows 8 and Mavericks OS XComparison between Windows 8 and Mavericks OS X
Comparison between Windows 8 and Mavericks OS X
Ajay Jassi
 
Upgrade Invoice
Upgrade InvoiceUpgrade Invoice
Upgrade Invoice
Ajay Jassi
 
Personalising Desktop
Personalising DesktopPersonalising Desktop
Personalising Desktop
Ajay Jassi
 
Health and safety requirements for computer maintenance
Health and safety requirements for computer maintenanceHealth and safety requirements for computer maintenance
Health and safety requirements for computer maintenance
Ajay Jassi
 
Computer Invoice
Computer InvoiceComputer Invoice
Computer Invoice
Ajay Jassi
 
Test Table for Wireless NIC
Test Table for Wireless NIC Test Table for Wireless NIC
Test Table for Wireless NIC
Ajay Jassi
 

More from Ajay Jassi (20)

Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices
 
Managing IT Security
Managing IT SecurityManaging IT Security
Managing IT Security
 
Impact on IT system breaches
Impact on IT system breachesImpact on IT system breaches
Impact on IT system breaches
 
Testing software
Testing softwareTesting software
Testing software
 
Configuring personal desktop
Configuring personal desktopConfiguring personal desktop
Configuring personal desktop
 
Preaparation for new software application
Preaparation for new software applicationPreaparation for new software application
Preaparation for new software application
 
Software Licences
Software LicencesSoftware Licences
Software Licences
 
Hardware Documentation and Benefits of Hardware Provider
Hardware Documentation and Benefits of Hardware ProviderHardware Documentation and Benefits of Hardware Provider
Hardware Documentation and Benefits of Hardware Provider
 
IT job role description for Technical Support Engineer
IT job role description for Technical Support EngineerIT job role description for Technical Support Engineer
IT job role description for Technical Support Engineer
 
Characteristics for IT Employee (P1)
Characteristics for IT Employee (P1)Characteristics for IT Employee (P1)
Characteristics for IT Employee (P1)
 
Preparation for Installing Hardware
Preparation for Installing HardwarePreparation for Installing Hardware
Preparation for Installing Hardware
 
Installation of Windows 7 using USB
Installation of Windows 7 using USBInstallation of Windows 7 using USB
Installation of Windows 7 using USB
 
Building Computer System
Building Computer SystemBuilding Computer System
Building Computer System
 
Installation and configuration of Wireless NIC
Installation and configuration of Wireless NICInstallation and configuration of Wireless NIC
Installation and configuration of Wireless NIC
 
Comparison between Windows 8 and Mavericks OS X
Comparison between Windows 8 and Mavericks OS XComparison between Windows 8 and Mavericks OS X
Comparison between Windows 8 and Mavericks OS X
 
Upgrade Invoice
Upgrade InvoiceUpgrade Invoice
Upgrade Invoice
 
Personalising Desktop
Personalising DesktopPersonalising Desktop
Personalising Desktop
 
Health and safety requirements for computer maintenance
Health and safety requirements for computer maintenanceHealth and safety requirements for computer maintenance
Health and safety requirements for computer maintenance
 
Computer Invoice
Computer InvoiceComputer Invoice
Computer Invoice
 
Test Table for Wireless NIC
Test Table for Wireless NIC Test Table for Wireless NIC
Test Table for Wireless NIC
 

Recently uploaded

Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 

Recently uploaded (20)

Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 

Reasons why Hardware is Installed and Potential Problems and the Precautions

  • 2. Benefits of Installing expansion • Expansion on a computer system are the graphics card, PCI cards, Wi-Fi card, video cards and sound cards. • These can be installed as an upgrade to make the computer system faster and updated. • Nowadays these are mostly inputted and already installed onto the motherboard. An example that is commonly upgraded is the graphics card. • Another reasons it might be installed is too replace faults in the computer system and repair the machine.
  • 3. Potential problems • Before dealing with a computer system in the workshop, training must be done for installing, disposing and dealing with computer components safely. • It’s important for an technician to understand and know the risks that can occur, so it can be prevented and dealt with. • There are many problems that could happen when installing hardware. This can be caused by a small accident.
  • 4. Effects • This can effect data, damage to computer components and electrostatic charge. • Electrostatic charge: This is the electricity between the technician and the computer component. • Damage to damaged. • Data: computer components: This is when the component is information that is stored onto the computer. (HDD)
  • 5. Electrostatic charge • The electricity in the circuit on the components are harmless to users/technicians, but they are very sensitive and could be damaged. • This can cause damage to the component when they build up static electricity which is released on the technician and becomes discharged.
  • 6. Component damage • When handling with any component and computer, they is as chance that it may get damaged, as there is many ways. • The common ways a component can get damaged is by dropping the component, turning screws too much ruining the treads, bending a pin or socket, and by loosening a cable in a plug.
  • 7. Data • The two main risk that may occur is data corruption and data loss. • Data corruption is when data is damaged by errors. This means the data is still recognised by the system but cannot be viewed or usable. The cause of this may be from not copying the file completely or correctly. • Data loss happens when the HDD is damaged or formatted. If data is lost, it cannot be retrieved without a backup.
  • 8. Precautions to avoid problems • Electrostatic charge: A antistatic wristband must be worn, which is attached to a metal part inside the tower and an antistatic mat should be used, which is placed underneath the computer. • Damage to computer components: Use tools and equipment correctly, to be careful, concentrate all times and to take time when handling. • Data: It is important to backup all data from the computer, as anything could happen.