SlideShare a Scribd company logo
Laptop
construction and
deconstruction.
Page 2
Instructor, PACE-IT Program – Edmonds Community College
Areas of Expertise Industry Certification
 PC Hardware
 Network Administration
 IT Project Management
 Network Design
 User Training
 IT Troubleshooting
Qualifications Summary
Education
 M.B.A., IT Management, Western Governor’s University
 B.S., IT Security, Western Governor’s University
Entrepreneur, executive leader, and proven manger
with 10+ years of experience turning complex issues
into efficient and effective solutions.
Strengths include developing and mentoring diverse
workforces, improving processes, analyzing
business needs and creating the solutions
required— with a focus on technology.
Page 3
– Common laptop construction.
– Laptop field repair.
PACE-IT.
Page 4
Laptop construction and deconstruction.
Page 5
– Common laptop materials.
» Plastic is used extensively in the construction of laptops.
• Inexpensive.
• Lightweight.
• Easy to work with.
• Durable (to a point).
» Aluminum is used in higher end construction of laptops.
• More expensive.
• Lightweight.
• Durable and rugged.
» Other metal alloys (e.g., magnesium) are used in high
end construction of laptops.
• Most expensive.
• Very lightweight.
• Tend to not be as durable as aluminum, but are more
durable than plastic.
Laptop construction and deconstruction.
Page 6
Laptops tend to have fewer
components that are easily
replaceable in the field.
For those components that can be easily replaced in
the field, manufacturers commonly place access to
them on the bottom side of the laptop. It is not
uncommon to find access doors for RAM, batteries,
and optical drives on the underside of laptops.
Laptop construction and deconstruction.
Page 7
Laptop construction and deconstruction.
Page 8
There is no standard method
of breaking a laptop down
to its individual components.
Researching the manufacturers’ documentation and
other sources is the key to successfully breaking
down and reassembling a laptop. The Internet will
be a vital resource when having to dismantle a
laptop to perform any type of field repair.
Laptop construction and deconstruction.
Page 9
– General tips for disassembly.
» Research the manufacturer’s documentation on the
process.
• Research other sources (the Internet).
» Develop a step-by-step plan.
» Unplug the power cord and turn the system off.
» Document all screw and cable locations (take pictures).
• Systematically organize parts.
» Use the appropriate tools.
• Use plastic wedges when there is a need to pry open
something—with plastic there is less danger of marring
surfaces.
» When reassembling, reverse the order.
Laptop construction and deconstruction.
Page 10
Laptop construction and deconstruction.
Plastic is used extensively in the construction of laptops because it is
inexpensive, easy to form, and fairly durable. Other materials may be used
as well. For those items that are easily field replaceable, it is common for
there to be access covers on the bottom of the unit.
Topic
Common laptop construction.
Summary
There is no standard established for the disassembly of a laptop in order for
field repair to take place. General steps include: researching the
manufacturers’ documentation and other sources, unplugging the power
cord, turning the system off, documenting screw and cable locations, and
organizing parts in a systematic way—all while using the appropriate tools
for the job. When reassembling, reverse the order.
Laptop field repair.
Page 11
THANK YOU!
This workforce solution was 100 percent funded by a $3 million grant awarded by the
U.S. Department of Labor's Employment and Training Administration. The solution was
created by the grantee and does not necessarily reflect the official position of the U.S.
Department of Labor. The Department of Labor makes no guarantees, warranties, or
assurances of any kind, express or implied, with respect to such information, including
any information on linked sites and including, but not limited to, accuracy of the
information or its completeness, timeliness, usefulness, adequacy, continued availability
or ownership. Funded by the Department of Labor, Employment and Training
Administration, Grant #TC-23745-12-60-A-53.
PACE-IT is an equal opportunity employer/program and auxiliary aids and services are
available upon request to individuals with disabilities. For those that are hearing
impaired, a video phone is available at the Services for Students with Disabilities (SSD)
office in Mountlake Terrace Hall 159. Check www.edcc.edu/ssd for office hours. Call
425.354.3113 on a video phone for more information about the PACE-IT program. For
any additional special accommodations needed, call the SSD office at 425.640.1814.
Edmonds Community College does not discriminate on the basis of race; color; religion;
national origin; sex; disability; sexual orientation; age; citizenship, marital, or veteran
status; or genetic information in its programs and activities.

More Related Content

Viewers also liked

Literary Theory & Criticism pt 3: Post-Structuralism & Deconstruction
Literary Theory & Criticism pt 3: Post-Structuralism & DeconstructionLiterary Theory & Criticism pt 3: Post-Structuralism & Deconstruction
Literary Theory & Criticism pt 3: Post-Structuralism & Deconstruction
Mansa Daby
 
Deconstruction: a reaction to rational Modernism - Thesis
Deconstruction: a reaction to rational Modernism - ThesisDeconstruction: a reaction to rational Modernism - Thesis
Deconstruction: a reaction to rational Modernism - Thesis
fsteverlynck
 
CONSTRUCTIVISM
CONSTRUCTIVISMCONSTRUCTIVISM
CONSTRUCTIVISM
Sruzan Lolla
 
evolution of computers
 evolution of computers evolution of computers
evolution of computers
Bhavya Chawla
 
Deconstruction
DeconstructionDeconstruction
Deconstruction
Vann Jagdon
 
[Facilitating Learning] Constructivism: Knowledge Construction/Concept Learning
[Facilitating Learning] Constructivism: Knowledge Construction/Concept Learning[Facilitating Learning] Constructivism: Knowledge Construction/Concept Learning
[Facilitating Learning] Constructivism: Knowledge Construction/Concept Learning
Jhoanna Lyn
 
I poststructuralism deconstruction
I poststructuralism deconstructionI poststructuralism deconstruction
I poststructuralism deconstruction
pvillacanas
 
Deconstruction: Literary Criticism
Deconstruction: Literary CriticismDeconstruction: Literary Criticism
Deconstruction: Literary Criticism
Aulia Hakim
 
Evolution of computer
Evolution of computerEvolution of computer
Evolution of computerAnkit Yadav
 
EVOLUTION OF COMPUTER
EVOLUTION OF COMPUTEREVOLUTION OF COMPUTER
EVOLUTION OF COMPUTER
fhemrosacia
 
Online shopping ppt by rohit jain
Online shopping ppt by rohit jainOnline shopping ppt by rohit jain
Online shopping ppt by rohit jain
Rohit Jain
 
Evolution Of The Computers
Evolution Of The ComputersEvolution Of The Computers
Evolution Of The Computerspanitiaict
 

Viewers also liked (13)

Literary Theory & Criticism pt 3: Post-Structuralism & Deconstruction
Literary Theory & Criticism pt 3: Post-Structuralism & DeconstructionLiterary Theory & Criticism pt 3: Post-Structuralism & Deconstruction
Literary Theory & Criticism pt 3: Post-Structuralism & Deconstruction
 
Deconstruction: a reaction to rational Modernism - Thesis
Deconstruction: a reaction to rational Modernism - ThesisDeconstruction: a reaction to rational Modernism - Thesis
Deconstruction: a reaction to rational Modernism - Thesis
 
CONSTRUCTIVISM
CONSTRUCTIVISMCONSTRUCTIVISM
CONSTRUCTIVISM
 
evolution of computers
 evolution of computers evolution of computers
evolution of computers
 
Deconstruction
DeconstructionDeconstruction
Deconstruction
 
[Facilitating Learning] Constructivism: Knowledge Construction/Concept Learning
[Facilitating Learning] Constructivism: Knowledge Construction/Concept Learning[Facilitating Learning] Constructivism: Knowledge Construction/Concept Learning
[Facilitating Learning] Constructivism: Knowledge Construction/Concept Learning
 
I poststructuralism deconstruction
I poststructuralism deconstructionI poststructuralism deconstruction
I poststructuralism deconstruction
 
Deconstruction: Literary Criticism
Deconstruction: Literary CriticismDeconstruction: Literary Criticism
Deconstruction: Literary Criticism
 
Evolution of computer
Evolution of computerEvolution of computer
Evolution of computer
 
EVOLUTION OF COMPUTER
EVOLUTION OF COMPUTEREVOLUTION OF COMPUTER
EVOLUTION OF COMPUTER
 
Deconstruction
DeconstructionDeconstruction
Deconstruction
 
Online shopping ppt by rohit jain
Online shopping ppt by rohit jainOnline shopping ppt by rohit jain
Online shopping ppt by rohit jain
 
Evolution Of The Computers
Evolution Of The ComputersEvolution Of The Computers
Evolution Of The Computers
 

Similar to Pace IT - Laptop Construction and Deconstruction

Pace it data-disposal_and_destruction_methods_bf_sw
Pace it data-disposal_and_destruction_methods_bf_swPace it data-disposal_and_destruction_methods_bf_sw
Pace it data-disposal_and_destruction_methods_bf_swEdward Sargent
 
Pace IT - Thermal and Impact Printers
Pace IT - Thermal and Impact PrintersPace IT - Thermal and Impact Printers
Pace IT - Thermal and Impact Printers
Pace IT at Edmonds Community College
 
Pace IT - Troubleshooting Laptops
Pace IT - Troubleshooting LaptopsPace IT - Troubleshooting Laptops
Pace IT - Troubleshooting Laptops
Pace IT at Edmonds Community College
 
PACE-IT: Supporting Configuration Management (part 2)
PACE-IT: Supporting Configuration Management (part 2)PACE-IT: Supporting Configuration Management (part 2)
PACE-IT: Supporting Configuration Management (part 2)
Pace IT at Edmonds Community College
 
Pace IT - Control Panel (Part 3)
Pace IT - Control Panel (Part 3)Pace IT - Control Panel (Part 3)
Pace IT - Control Panel (Part 3)
Pace IT at Edmonds Community College
 
Pace it common-laptop_components_sw_nm
Pace it common-laptop_components_sw_nmPace it common-laptop_components_sw_nm
Pace it common-laptop_components_sw_nmEdward Sargent
 
PACE-IT: Risk and Security Related Concepts
PACE-IT: Risk and Security Related ConceptsPACE-IT: Risk and Security Related Concepts
PACE-IT: Risk and Security Related Concepts
Pace IT at Edmonds Community College
 
Pace IT - Introduction to_the_Motherboard
Pace IT - Introduction to_the_MotherboardPace IT - Introduction to_the_Motherboard
Pace IT - Introduction to_the_Motherboard
Pace IT at Edmonds Community College
 
Pace IT - Network Cable Connectors
Pace IT - Network Cable ConnectorsPace IT - Network Cable Connectors
Pace IT - Network Cable Connectors
Pace IT at Edmonds Community College
 
Pace IT - Basic Mobile Device
Pace IT - Basic Mobile DevicePace IT - Basic Mobile Device
Pace IT - Basic Mobile Device
Pace IT at Edmonds Community College
 
Pace IT - Tools for Working on Networks
Pace IT - Tools for Working on NetworksPace IT - Tools for Working on Networks
Pace IT - Tools for Working on Networks
Pace IT at Edmonds Community College
 
Pace IT - Expansion Cards
Pace IT - Expansion CardsPace IT - Expansion Cards
Pace IT - Expansion Cards
Pace IT at Edmonds Community College
 
PACE-IT, Security+2.8: Disaster Recovery Concepts
PACE-IT, Security+2.8: Disaster Recovery ConceptsPACE-IT, Security+2.8: Disaster Recovery Concepts
PACE-IT, Security+2.8: Disaster Recovery Concepts
Pace IT at Edmonds Community College
 
Pace it environmental-impact_and_control_sw_nm
Pace it environmental-impact_and_control_sw_nmPace it environmental-impact_and_control_sw_nm
Pace it environmental-impact_and_control_sw_nmEdward Sargent
 
Pace IT - Environmental Impact and Control
Pace IT - Environmental Impact and ControlPace IT - Environmental Impact and Control
Pace IT - Environmental Impact and Control
Pace IT at Edmonds Community College
 
PACE-IT: Network Cabling (part 3) - N10 006
PACE-IT: Network Cabling (part 3) - N10 006 PACE-IT: Network Cabling (part 3) - N10 006
PACE-IT: Network Cabling (part 3) - N10 006
Pace IT at Edmonds Community College
 
PACE-IT: Troubleshooting Hard Drives and Raid
PACE-IT: Troubleshooting Hard Drives and RaidPACE-IT: Troubleshooting Hard Drives and Raid
PACE-IT: Troubleshooting Hard Drives and Raid
Pace IT at Edmonds Community College
 
PACE-IT: Securing the Workstation
PACE-IT: Securing the WorkstationPACE-IT: Securing the Workstation
PACE-IT: Securing the Workstation
Pace IT at Edmonds Community College
 
Pace IT - Troubleshooting Printers
Pace IT - Troubleshooting PrintersPace IT - Troubleshooting Printers
Pace IT - Troubleshooting Printers
Pace IT at Edmonds Community College
 
Pace IT - Network Devices (part 2)
Pace IT - Network Devices (part 2)Pace IT - Network Devices (part 2)
Pace IT - Network Devices (part 2)
Pace IT at Edmonds Community College
 

Similar to Pace IT - Laptop Construction and Deconstruction (20)

Pace it data-disposal_and_destruction_methods_bf_sw
Pace it data-disposal_and_destruction_methods_bf_swPace it data-disposal_and_destruction_methods_bf_sw
Pace it data-disposal_and_destruction_methods_bf_sw
 
Pace IT - Thermal and Impact Printers
Pace IT - Thermal and Impact PrintersPace IT - Thermal and Impact Printers
Pace IT - Thermal and Impact Printers
 
Pace IT - Troubleshooting Laptops
Pace IT - Troubleshooting LaptopsPace IT - Troubleshooting Laptops
Pace IT - Troubleshooting Laptops
 
PACE-IT: Supporting Configuration Management (part 2)
PACE-IT: Supporting Configuration Management (part 2)PACE-IT: Supporting Configuration Management (part 2)
PACE-IT: Supporting Configuration Management (part 2)
 
Pace IT - Control Panel (Part 3)
Pace IT - Control Panel (Part 3)Pace IT - Control Panel (Part 3)
Pace IT - Control Panel (Part 3)
 
Pace it common-laptop_components_sw_nm
Pace it common-laptop_components_sw_nmPace it common-laptop_components_sw_nm
Pace it common-laptop_components_sw_nm
 
PACE-IT: Risk and Security Related Concepts
PACE-IT: Risk and Security Related ConceptsPACE-IT: Risk and Security Related Concepts
PACE-IT: Risk and Security Related Concepts
 
Pace IT - Introduction to_the_Motherboard
Pace IT - Introduction to_the_MotherboardPace IT - Introduction to_the_Motherboard
Pace IT - Introduction to_the_Motherboard
 
Pace IT - Network Cable Connectors
Pace IT - Network Cable ConnectorsPace IT - Network Cable Connectors
Pace IT - Network Cable Connectors
 
Pace IT - Basic Mobile Device
Pace IT - Basic Mobile DevicePace IT - Basic Mobile Device
Pace IT - Basic Mobile Device
 
Pace IT - Tools for Working on Networks
Pace IT - Tools for Working on NetworksPace IT - Tools for Working on Networks
Pace IT - Tools for Working on Networks
 
Pace IT - Expansion Cards
Pace IT - Expansion CardsPace IT - Expansion Cards
Pace IT - Expansion Cards
 
PACE-IT, Security+2.8: Disaster Recovery Concepts
PACE-IT, Security+2.8: Disaster Recovery ConceptsPACE-IT, Security+2.8: Disaster Recovery Concepts
PACE-IT, Security+2.8: Disaster Recovery Concepts
 
Pace it environmental-impact_and_control_sw_nm
Pace it environmental-impact_and_control_sw_nmPace it environmental-impact_and_control_sw_nm
Pace it environmental-impact_and_control_sw_nm
 
Pace IT - Environmental Impact and Control
Pace IT - Environmental Impact and ControlPace IT - Environmental Impact and Control
Pace IT - Environmental Impact and Control
 
PACE-IT: Network Cabling (part 3) - N10 006
PACE-IT: Network Cabling (part 3) - N10 006 PACE-IT: Network Cabling (part 3) - N10 006
PACE-IT: Network Cabling (part 3) - N10 006
 
PACE-IT: Troubleshooting Hard Drives and Raid
PACE-IT: Troubleshooting Hard Drives and RaidPACE-IT: Troubleshooting Hard Drives and Raid
PACE-IT: Troubleshooting Hard Drives and Raid
 
PACE-IT: Securing the Workstation
PACE-IT: Securing the WorkstationPACE-IT: Securing the Workstation
PACE-IT: Securing the Workstation
 
Pace IT - Troubleshooting Printers
Pace IT - Troubleshooting PrintersPace IT - Troubleshooting Printers
Pace IT - Troubleshooting Printers
 
Pace IT - Network Devices (part 2)
Pace IT - Network Devices (part 2)Pace IT - Network Devices (part 2)
Pace IT - Network Devices (part 2)
 

More from Pace IT at Edmonds Community College

PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
Pace IT at Edmonds Community College
 
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
Pace IT at Edmonds Community College
 
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
Pace IT at Edmonds Community College
 
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
Pace IT at Edmonds Community College
 
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
Pace IT at Edmonds Community College
 
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
Pace IT at Edmonds Community College
 
PACE-IT, Security + 5.3: Security Controls for Account Management
PACE-IT, Security + 5.3: Security Controls for Account ManagementPACE-IT, Security + 5.3: Security Controls for Account Management
PACE-IT, Security + 5.3: Security Controls for Account Management
Pace IT at Edmonds Community College
 
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
Pace IT at Edmonds Community College
 
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
Pace IT at Edmonds Community College
 
PACE-IT, Security + 5.1: Summary of Authentication Services
PACE-IT, Security + 5.1: Summary of Authentication ServicesPACE-IT, Security + 5.1: Summary of Authentication Services
PACE-IT, Security + 5.1: Summary of Authentication Services
Pace IT at Edmonds Community College
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
Pace IT at Edmonds Community College
 
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and TechniquesPACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
Pace IT at Edmonds Community College
 
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative EnvironmentsPACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
Pace IT at Edmonds Community College
 
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
PACE-IT, Security+ 4.4: Controls to Ensure Data SecurityPACE-IT, Security+ 4.4: Controls to Ensure Data Security
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
Pace IT at Edmonds Community College
 
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
PACE-IT, Security+ 4.3: Solutions to Establish Host SecurityPACE-IT, Security+ 4.3: Solutions to Establish Host Security
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
Pace IT at Edmonds Community College
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
Pace IT at Edmonds Community College
 
PACE-IT, Security+3.7: Overview of Security Assessment Tools
PACE-IT, Security+3.7: Overview of Security Assessment ToolsPACE-IT, Security+3.7: Overview of Security Assessment Tools
PACE-IT, Security+3.7: Overview of Security Assessment Tools
Pace IT at Edmonds Community College
 
PACE-IT, Security+3.6: Security Enhancement Techniques
PACE-IT, Security+3.6: Security Enhancement TechniquesPACE-IT, Security+3.6: Security Enhancement Techniques
PACE-IT, Security+3.6: Security Enhancement Techniques
Pace IT at Edmonds Community College
 
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PACE-IT, Security+3.5: Types of Application Attacks (part 2)PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
Pace IT at Edmonds Community College
 
PACE-IT, Security+3.5: Types of Application Attacks (part 1)
PACE-IT, Security+3.5: Types of Application Attacks (part 1)PACE-IT, Security+3.5: Types of Application Attacks (part 1)
PACE-IT, Security+3.5: Types of Application Attacks (part 1)
Pace IT at Edmonds Community College
 

More from Pace IT at Edmonds Community College (20)

PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
 
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
 
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
 
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
 
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
 
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
 
PACE-IT, Security + 5.3: Security Controls for Account Management
PACE-IT, Security + 5.3: Security Controls for Account ManagementPACE-IT, Security + 5.3: Security Controls for Account Management
PACE-IT, Security + 5.3: Security Controls for Account Management
 
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
 
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
 
PACE-IT, Security + 5.1: Summary of Authentication Services
PACE-IT, Security + 5.1: Summary of Authentication ServicesPACE-IT, Security + 5.1: Summary of Authentication Services
PACE-IT, Security + 5.1: Summary of Authentication Services
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
 
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and TechniquesPACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
 
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative EnvironmentsPACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
 
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
PACE-IT, Security+ 4.4: Controls to Ensure Data SecurityPACE-IT, Security+ 4.4: Controls to Ensure Data Security
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
 
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
PACE-IT, Security+ 4.3: Solutions to Establish Host SecurityPACE-IT, Security+ 4.3: Solutions to Establish Host Security
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
 
PACE-IT, Security+3.7: Overview of Security Assessment Tools
PACE-IT, Security+3.7: Overview of Security Assessment ToolsPACE-IT, Security+3.7: Overview of Security Assessment Tools
PACE-IT, Security+3.7: Overview of Security Assessment Tools
 
PACE-IT, Security+3.6: Security Enhancement Techniques
PACE-IT, Security+3.6: Security Enhancement TechniquesPACE-IT, Security+3.6: Security Enhancement Techniques
PACE-IT, Security+3.6: Security Enhancement Techniques
 
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PACE-IT, Security+3.5: Types of Application Attacks (part 2)PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
 
PACE-IT, Security+3.5: Types of Application Attacks (part 1)
PACE-IT, Security+3.5: Types of Application Attacks (part 1)PACE-IT, Security+3.5: Types of Application Attacks (part 1)
PACE-IT, Security+3.5: Types of Application Attacks (part 1)
 

Recently uploaded

Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 

Recently uploaded (20)

Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 

Pace IT - Laptop Construction and Deconstruction

  • 2. Page 2 Instructor, PACE-IT Program – Edmonds Community College Areas of Expertise Industry Certification  PC Hardware  Network Administration  IT Project Management  Network Design  User Training  IT Troubleshooting Qualifications Summary Education  M.B.A., IT Management, Western Governor’s University  B.S., IT Security, Western Governor’s University Entrepreneur, executive leader, and proven manger with 10+ years of experience turning complex issues into efficient and effective solutions. Strengths include developing and mentoring diverse workforces, improving processes, analyzing business needs and creating the solutions required— with a focus on technology.
  • 3. Page 3 – Common laptop construction. – Laptop field repair. PACE-IT.
  • 4. Page 4 Laptop construction and deconstruction.
  • 5. Page 5 – Common laptop materials. » Plastic is used extensively in the construction of laptops. • Inexpensive. • Lightweight. • Easy to work with. • Durable (to a point). » Aluminum is used in higher end construction of laptops. • More expensive. • Lightweight. • Durable and rugged. » Other metal alloys (e.g., magnesium) are used in high end construction of laptops. • Most expensive. • Very lightweight. • Tend to not be as durable as aluminum, but are more durable than plastic. Laptop construction and deconstruction.
  • 6. Page 6 Laptops tend to have fewer components that are easily replaceable in the field. For those components that can be easily replaced in the field, manufacturers commonly place access to them on the bottom side of the laptop. It is not uncommon to find access doors for RAM, batteries, and optical drives on the underside of laptops. Laptop construction and deconstruction.
  • 7. Page 7 Laptop construction and deconstruction.
  • 8. Page 8 There is no standard method of breaking a laptop down to its individual components. Researching the manufacturers’ documentation and other sources is the key to successfully breaking down and reassembling a laptop. The Internet will be a vital resource when having to dismantle a laptop to perform any type of field repair. Laptop construction and deconstruction.
  • 9. Page 9 – General tips for disassembly. » Research the manufacturer’s documentation on the process. • Research other sources (the Internet). » Develop a step-by-step plan. » Unplug the power cord and turn the system off. » Document all screw and cable locations (take pictures). • Systematically organize parts. » Use the appropriate tools. • Use plastic wedges when there is a need to pry open something—with plastic there is less danger of marring surfaces. » When reassembling, reverse the order. Laptop construction and deconstruction.
  • 10. Page 10 Laptop construction and deconstruction. Plastic is used extensively in the construction of laptops because it is inexpensive, easy to form, and fairly durable. Other materials may be used as well. For those items that are easily field replaceable, it is common for there to be access covers on the bottom of the unit. Topic Common laptop construction. Summary There is no standard established for the disassembly of a laptop in order for field repair to take place. General steps include: researching the manufacturers’ documentation and other sources, unplugging the power cord, turning the system off, documenting screw and cable locations, and organizing parts in a systematic way—all while using the appropriate tools for the job. When reassembling, reverse the order. Laptop field repair.
  • 12. This workforce solution was 100 percent funded by a $3 million grant awarded by the U.S. Department of Labor's Employment and Training Administration. The solution was created by the grantee and does not necessarily reflect the official position of the U.S. Department of Labor. The Department of Labor makes no guarantees, warranties, or assurances of any kind, express or implied, with respect to such information, including any information on linked sites and including, but not limited to, accuracy of the information or its completeness, timeliness, usefulness, adequacy, continued availability or ownership. Funded by the Department of Labor, Employment and Training Administration, Grant #TC-23745-12-60-A-53. PACE-IT is an equal opportunity employer/program and auxiliary aids and services are available upon request to individuals with disabilities. For those that are hearing impaired, a video phone is available at the Services for Students with Disabilities (SSD) office in Mountlake Terrace Hall 159. Check www.edcc.edu/ssd for office hours. Call 425.354.3113 on a video phone for more information about the PACE-IT program. For any additional special accommodations needed, call the SSD office at 425.640.1814. Edmonds Community College does not discriminate on the basis of race; color; religion; national origin; sex; disability; sexual orientation; age; citizenship, marital, or veteran status; or genetic information in its programs and activities.