SlideShare a Scribd company logo
Potential problems
that occur during
hardware
installation
AJAY JASSI
Potential problems



Before dealing with a computer system in the
workshop, training must be done for installing, disposing
and dealing with computer components safely.



It’s important for an technician to understand and
know the risks that can occur, so it can be prevented
and dealt with.



There are many problems that could happen when
installing hardware. This can be caused by a small
accident.



In this presentation I will be explaining some of the
general errors and how this can be prevented and
resolved.
Electrostatic charge



This is the electricity between the technician and the
computer component.



The electricity in the circuit on the components are
harmless to users/technicians, but they are very
sensitive and could be damaged.



This can cause damage to the component when they
build up static electricity which is released on the
technician and becomes discharged.



To prevent all this from happening, a antistatic
wristband must be worn, which is attached to a metal
part inside the tower and an antistatic mat should be
used, which is placed underneath the computer.
Component damage



When handling with any component and computer,
they is as chance that it may get damaged, as
there is many ways.



The common ways a component can get
damaged is by dropping the component, turning
screws too much ruining the treads, bending a pin
or socket, and by loosening a cable in a plug.



All this is generally done when rushed or a lack of
concentration.



To prevent this it is important to use tools and
equipment correctly, to be careful, concentrate all
times and to take time when handling.
Data



Before starting, it is important to backup all data from
the computer, as anything could happen.



The two main risk that may occur is data corruption
and data loss.



Data corruption is when data is damaged by errors. This
means the data is still recognised by the system but
cannot be viewed or usable. The cause of this may be
from not copying the file completely or correctly.



Data loss happens when the HDD is damaged or
formatted. If data is lost, it cannot be retrieved without
a backup. This can be a disaster to any organisation as
they wouldn’t have nay records or proof.

More Related Content

What's hot

Css Major computer systems and networks
Css Major computer systems and networksCss Major computer systems and networks
Css Major computer systems and networks
Rhenan Belisario
 
Lo1.3 diagnosing computer systems
Lo1.3 diagnosing computer systemsLo1.3 diagnosing computer systems
Lo1.3 diagnosing computer systems
Frya Lora
 
Maintaining computer and network system
Maintaining computer and network systemMaintaining computer and network system
Maintaining computer and network system
MLG College of Learning, Inc
 
Computer Systems Servicing COC1-COC2
Computer Systems Servicing COC1-COC2Computer Systems Servicing COC1-COC2
Computer Systems Servicing COC1-COC2
melody77776
 
Install computer system,devices and peripherals
Install computer system,devices and peripheralsInstall computer system,devices and peripherals
Install computer system,devices and peripherals
Raiza Janelle
 
Computer hardware servicing practice occupational health and safety procedure
Computer hardware servicing   practice occupational health and safety procedure Computer hardware servicing   practice occupational health and safety procedure
Computer hardware servicing practice occupational health and safety procedure
Grayzon Gonzales, LPT
 
CSS L12 STRUCTURE OF COMPUTER NETWORK
CSS L12 STRUCTURE OF COMPUTER NETWORKCSS L12 STRUCTURE OF COMPUTER NETWORK
CSS L12 STRUCTURE OF COMPUTER NETWORK
Marvin Bronoso
 
CSS L07 - Preparing the Installer
CSS L07 - Preparing the InstallerCSS L07 - Preparing the Installer
CSS L07 - Preparing the Installer
Marvin Bronoso
 
How to install computer hardware 10 steps (with pictures)
How to install computer hardware  10 steps (with pictures)How to install computer hardware  10 steps (with pictures)
How to install computer hardware 10 steps (with pictures)
Perla Pelicano Corpez
 
Disassembling a PC
Disassembling a PCDisassembling a PC
Disassembling a PC
University of Dhaka
 
Basic computer maintenance
Basic computer maintenanceBasic computer maintenance
Basic computer maintenance
geepatty
 
Power supply
Power supplyPower supply
Power supply
Mansoor Shar
 
Css q3 week2
Css q3 week2Css q3 week2
Css q3 week2
Brian Magan
 
LAN CABLING
LAN CABLING LAN CABLING
LAN CABLING
Rachelle Bibat
 
Final Demo Semi Detailed Lesson Plan in TLE 2 (LAN Cabling)
Final Demo Semi Detailed Lesson Plan in TLE 2 (LAN Cabling)Final Demo Semi Detailed Lesson Plan in TLE 2 (LAN Cabling)
Final Demo Semi Detailed Lesson Plan in TLE 2 (LAN Cabling)
Manila Central University
 
Tools and Equipment used in CSS NCII
Tools and Equipment used in CSS NCIITools and Equipment used in CSS NCII
Tools and Equipment used in CSS NCII
DepEd-Bataan
 
Chs nc2 reviewer - with oral questioning
Chs nc2 reviewer - with oral questioningChs nc2 reviewer - with oral questioning
Chs nc2 reviewer - with oral questioning
Adolfo Nasol
 
Computer systems servicing cbc
Computer systems servicing cbcComputer systems servicing cbc
Computer systems servicing cbc
Hanzel Metrio
 
Straight&Cross-over cable connection
Straight&Cross-over cable connectionStraight&Cross-over cable connection
Straight&Cross-over cable connection
Horacio Aceveda
 
Pc maintenance
Pc maintenancePc maintenance
Pc maintenance
FitaAyalew
 

What's hot (20)

Css Major computer systems and networks
Css Major computer systems and networksCss Major computer systems and networks
Css Major computer systems and networks
 
Lo1.3 diagnosing computer systems
Lo1.3 diagnosing computer systemsLo1.3 diagnosing computer systems
Lo1.3 diagnosing computer systems
 
Maintaining computer and network system
Maintaining computer and network systemMaintaining computer and network system
Maintaining computer and network system
 
Computer Systems Servicing COC1-COC2
Computer Systems Servicing COC1-COC2Computer Systems Servicing COC1-COC2
Computer Systems Servicing COC1-COC2
 
Install computer system,devices and peripherals
Install computer system,devices and peripheralsInstall computer system,devices and peripherals
Install computer system,devices and peripherals
 
Computer hardware servicing practice occupational health and safety procedure
Computer hardware servicing   practice occupational health and safety procedure Computer hardware servicing   practice occupational health and safety procedure
Computer hardware servicing practice occupational health and safety procedure
 
CSS L12 STRUCTURE OF COMPUTER NETWORK
CSS L12 STRUCTURE OF COMPUTER NETWORKCSS L12 STRUCTURE OF COMPUTER NETWORK
CSS L12 STRUCTURE OF COMPUTER NETWORK
 
CSS L07 - Preparing the Installer
CSS L07 - Preparing the InstallerCSS L07 - Preparing the Installer
CSS L07 - Preparing the Installer
 
How to install computer hardware 10 steps (with pictures)
How to install computer hardware  10 steps (with pictures)How to install computer hardware  10 steps (with pictures)
How to install computer hardware 10 steps (with pictures)
 
Disassembling a PC
Disassembling a PCDisassembling a PC
Disassembling a PC
 
Basic computer maintenance
Basic computer maintenanceBasic computer maintenance
Basic computer maintenance
 
Power supply
Power supplyPower supply
Power supply
 
Css q3 week2
Css q3 week2Css q3 week2
Css q3 week2
 
LAN CABLING
LAN CABLING LAN CABLING
LAN CABLING
 
Final Demo Semi Detailed Lesson Plan in TLE 2 (LAN Cabling)
Final Demo Semi Detailed Lesson Plan in TLE 2 (LAN Cabling)Final Demo Semi Detailed Lesson Plan in TLE 2 (LAN Cabling)
Final Demo Semi Detailed Lesson Plan in TLE 2 (LAN Cabling)
 
Tools and Equipment used in CSS NCII
Tools and Equipment used in CSS NCIITools and Equipment used in CSS NCII
Tools and Equipment used in CSS NCII
 
Chs nc2 reviewer - with oral questioning
Chs nc2 reviewer - with oral questioningChs nc2 reviewer - with oral questioning
Chs nc2 reviewer - with oral questioning
 
Computer systems servicing cbc
Computer systems servicing cbcComputer systems servicing cbc
Computer systems servicing cbc
 
Straight&Cross-over cable connection
Straight&Cross-over cable connectionStraight&Cross-over cable connection
Straight&Cross-over cable connection
 
Pc maintenance
Pc maintenancePc maintenance
Pc maintenance
 

Viewers also liked

Installing hardware components
Installing hardware componentsInstalling hardware components
Installing hardware componentsliameast96
 
Conducting test on the installed computer system
Conducting test on the installed computer systemConducting test on the installed computer system
Conducting test on the installed computer system
Rachel Espino
 
Basic computer configuration setup
Basic computer configuration setupBasic computer configuration setup
Basic computer configuration setup
Rachel Espino
 
17. Computer System Configuration And Methods
17. Computer System   Configuration And Methods17. Computer System   Configuration And Methods
17. Computer System Configuration And MethodsNew Era University
 
ITFT_Peripheral devices
ITFT_Peripheral devices ITFT_Peripheral devices
ITFT_Peripheral devices
Swati Aggarwal
 
IT103Microsoft Windows XP/OS Chap04
IT103Microsoft Windows XP/OS Chap04IT103Microsoft Windows XP/OS Chap04
IT103Microsoft Windows XP/OS Chap04blusmurfydot1
 
Chapter 03
Chapter 03Chapter 03
Chapter 03
cois201.ut
 
All about motherboard .shamie
All about motherboard .shamieAll about motherboard .shamie
Installing and uninstalling computer software
Installing and uninstalling computer softwareInstalling and uninstalling computer software
Installing and uninstalling computer software
Vidya Kalaivani Rajkumar
 
Selecting and Installing Operating System
Selecting and Installing Operating SystemSelecting and Installing Operating System
Selecting and Installing Operating System
Amir Villas
 
Computer Literacy Lesson 7
Computer Literacy Lesson 7Computer Literacy Lesson 7
Computer Literacy Lesson 7
cpashke
 
Computer dis assembly HP PRO 6300
Computer dis assembly HP PRO 6300Computer dis assembly HP PRO 6300
Computer dis assembly HP PRO 6300
Ullees Selim
 
Installing Operating System
Installing Operating System Installing Operating System
Installing Operating System
Perla Pelicano Corpez
 
Introduction, Installation Operating System and Application
Introduction, Installation Operating System and ApplicationIntroduction, Installation Operating System and Application
Introduction, Installation Operating System and Application
Vichhaiy Serey
 
Application software
Application softwareApplication software
Application softwareshalivale
 
GCSE Geography: How And Why To Use Spearman’s Rank
GCSE Geography: How And Why To Use Spearman’s RankGCSE Geography: How And Why To Use Spearman’s Rank
GCSE Geography: How And Why To Use Spearman’s Rank
Mark Cowan
 
Computer Hardware Servicing Learner's Material Grade 10
Computer Hardware Servicing Learner's Material Grade 10Computer Hardware Servicing Learner's Material Grade 10
Computer Hardware Servicing Learner's Material Grade 10
Bogs De Castro
 
04 software system and application software
04 software   system and application software04 software   system and application software
04 software system and application softwareSowmini Gowda
 
Functions Of Operating System
Functions Of Operating SystemFunctions Of Operating System
Functions Of Operating System
Dr.Suresh Isave
 
Types of computer system error
Types of computer system errorTypes of computer system error
Types of computer system error
Rachel Espino
 

Viewers also liked (20)

Installing hardware components
Installing hardware componentsInstalling hardware components
Installing hardware components
 
Conducting test on the installed computer system
Conducting test on the installed computer systemConducting test on the installed computer system
Conducting test on the installed computer system
 
Basic computer configuration setup
Basic computer configuration setupBasic computer configuration setup
Basic computer configuration setup
 
17. Computer System Configuration And Methods
17. Computer System   Configuration And Methods17. Computer System   Configuration And Methods
17. Computer System Configuration And Methods
 
ITFT_Peripheral devices
ITFT_Peripheral devices ITFT_Peripheral devices
ITFT_Peripheral devices
 
IT103Microsoft Windows XP/OS Chap04
IT103Microsoft Windows XP/OS Chap04IT103Microsoft Windows XP/OS Chap04
IT103Microsoft Windows XP/OS Chap04
 
Chapter 03
Chapter 03Chapter 03
Chapter 03
 
All about motherboard .shamie
All about motherboard .shamieAll about motherboard .shamie
All about motherboard .shamie
 
Installing and uninstalling computer software
Installing and uninstalling computer softwareInstalling and uninstalling computer software
Installing and uninstalling computer software
 
Selecting and Installing Operating System
Selecting and Installing Operating SystemSelecting and Installing Operating System
Selecting and Installing Operating System
 
Computer Literacy Lesson 7
Computer Literacy Lesson 7Computer Literacy Lesson 7
Computer Literacy Lesson 7
 
Computer dis assembly HP PRO 6300
Computer dis assembly HP PRO 6300Computer dis assembly HP PRO 6300
Computer dis assembly HP PRO 6300
 
Installing Operating System
Installing Operating System Installing Operating System
Installing Operating System
 
Introduction, Installation Operating System and Application
Introduction, Installation Operating System and ApplicationIntroduction, Installation Operating System and Application
Introduction, Installation Operating System and Application
 
Application software
Application softwareApplication software
Application software
 
GCSE Geography: How And Why To Use Spearman’s Rank
GCSE Geography: How And Why To Use Spearman’s RankGCSE Geography: How And Why To Use Spearman’s Rank
GCSE Geography: How And Why To Use Spearman’s Rank
 
Computer Hardware Servicing Learner's Material Grade 10
Computer Hardware Servicing Learner's Material Grade 10Computer Hardware Servicing Learner's Material Grade 10
Computer Hardware Servicing Learner's Material Grade 10
 
04 software system and application software
04 software   system and application software04 software   system and application software
04 software system and application software
 
Functions Of Operating System
Functions Of Operating SystemFunctions Of Operating System
Functions Of Operating System
 
Types of computer system error
Types of computer system errorTypes of computer system error
Types of computer system error
 

Similar to Potential problems that occur during hardware installation

precision-15-7530-laptop_setup-guide2_en-us.pdf
precision-15-7530-laptop_setup-guide2_en-us.pdfprecision-15-7530-laptop_setup-guide2_en-us.pdf
precision-15-7530-laptop_setup-guide2_en-us.pdf
ssuserad36061
 
Reasons why Hardware is Installed and Potential Problems and the Precautions
Reasons why Hardware is Installed and Potential Problems and the PrecautionsReasons why Hardware is Installed and Potential Problems and the Precautions
Reasons why Hardware is Installed and Potential Problems and the Precautions
Ajay Jassi
 
Occupational-Health-And-Safety.pptx
Occupational-Health-And-Safety.pptxOccupational-Health-And-Safety.pptx
Occupational-Health-And-Safety.pptx
YoruFaller
 
vostro-3888-desktop_owners-manual5_en-us.pdf
vostro-3888-desktop_owners-manual5_en-us.pdfvostro-3888-desktop_owners-manual5_en-us.pdf
vostro-3888-desktop_owners-manual5_en-us.pdf
MohamedAAmin2
 
lesson 3; inspect and test the configured cs and network handouts
lesson 3; inspect and test the configured cs and network handoutslesson 3; inspect and test the configured cs and network handouts
lesson 3; inspect and test the configured cs and network handouts
lorbz
 
Health and safety requirements for computer maintenance
Health and safety requirements for computer maintenanceHealth and safety requirements for computer maintenance
Health and safety requirements for computer maintenance
Ajay Jassi
 
The Samsung Series 7 15.6" Notebook (NP700Z5C-S02UB) manual / User Guide
 The Samsung Series 7 15.6" Notebook (NP700Z5C-S02UB) manual / User Guide The Samsung Series 7 15.6" Notebook (NP700Z5C-S02UB) manual / User Guide
The Samsung Series 7 15.6" Notebook (NP700Z5C-S02UB) manual / User Guide
manualsheet
 
Health and safety in the workplace.
Health and safety in the workplace.Health and safety in the workplace.
Health and safety in the workplace.
OriginalGSM
 
Computer Hardware & Software Lab Manual 1
Computer Hardware & Software Lab Manual 1Computer Hardware & Software Lab Manual 1
Computer Hardware & Software Lab Manual 1
senayteklay
 
Managing IT Security
Managing IT SecurityManaging IT Security
Managing IT Security
Ajay Jassi
 
MAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS 12.pptx
MAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS 12.pptxMAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS 12.pptx
MAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS 12.pptx
RichardSugbo
 
Basic computer and RAM troubleshooting
Basic computer and RAM troubleshootingBasic computer and RAM troubleshooting
Basic computer and RAM troubleshooting
Leah Gonzales
 
ITE_50_Chapter2.ppt
ITE_50_Chapter2.pptITE_50_Chapter2.ppt
ITE_50_Chapter2.ppt
Rossy719186
 
Pace IT - Troubleshooting Laptops
Pace IT - Troubleshooting LaptopsPace IT - Troubleshooting Laptops
Pace IT - Troubleshooting Laptops
Pace IT at Edmonds Community College
 
PRESENTATTION.pptx
PRESENTATTION.pptxPRESENTATTION.pptx
PRESENTATTION.pptx
EmmanuelAleng
 
Computer Assembly and Disassembly Procedures_student.pptx
Computer Assembly and Disassembly Procedures_student.pptxComputer Assembly and Disassembly Procedures_student.pptx
Computer Assembly and Disassembly Procedures_student.pptx
ssusercb53d4
 
Fb1200 instruction manual
Fb1200   instruction manualFb1200   instruction manual
Fb1200 instruction manual
GUSTAVO HERNANDEZ
 
Error,Failure and Risk
Error,Failure and RiskError,Failure and Risk
Error,Failure and Risk
Nazrul Islam
 
Hardware installation- Dheelan RS
Hardware installation- Dheelan RSHardware installation- Dheelan RS
Hardware installation- Dheelan RSdheelan2995
 

Similar to Potential problems that occur during hardware installation (20)

precision-15-7530-laptop_setup-guide2_en-us.pdf
precision-15-7530-laptop_setup-guide2_en-us.pdfprecision-15-7530-laptop_setup-guide2_en-us.pdf
precision-15-7530-laptop_setup-guide2_en-us.pdf
 
Reasons why Hardware is Installed and Potential Problems and the Precautions
Reasons why Hardware is Installed and Potential Problems and the PrecautionsReasons why Hardware is Installed and Potential Problems and the Precautions
Reasons why Hardware is Installed and Potential Problems and the Precautions
 
Occupational-Health-And-Safety.pptx
Occupational-Health-And-Safety.pptxOccupational-Health-And-Safety.pptx
Occupational-Health-And-Safety.pptx
 
vostro-3888-desktop_owners-manual5_en-us.pdf
vostro-3888-desktop_owners-manual5_en-us.pdfvostro-3888-desktop_owners-manual5_en-us.pdf
vostro-3888-desktop_owners-manual5_en-us.pdf
 
lesson 3; inspect and test the configured cs and network handouts
lesson 3; inspect and test the configured cs and network handoutslesson 3; inspect and test the configured cs and network handouts
lesson 3; inspect and test the configured cs and network handouts
 
Health and safety requirements for computer maintenance
Health and safety requirements for computer maintenanceHealth and safety requirements for computer maintenance
Health and safety requirements for computer maintenance
 
The Samsung Series 7 15.6" Notebook (NP700Z5C-S02UB) manual / User Guide
 The Samsung Series 7 15.6" Notebook (NP700Z5C-S02UB) manual / User Guide The Samsung Series 7 15.6" Notebook (NP700Z5C-S02UB) manual / User Guide
The Samsung Series 7 15.6" Notebook (NP700Z5C-S02UB) manual / User Guide
 
Health and safety in the workplace.
Health and safety in the workplace.Health and safety in the workplace.
Health and safety in the workplace.
 
Computer Hardware & Software Lab Manual 1
Computer Hardware & Software Lab Manual 1Computer Hardware & Software Lab Manual 1
Computer Hardware & Software Lab Manual 1
 
Managing IT Security
Managing IT SecurityManaging IT Security
Managing IT Security
 
MAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS 12.pptx
MAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS 12.pptxMAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS 12.pptx
MAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS 12.pptx
 
It280-Final Project
It280-Final ProjectIt280-Final Project
It280-Final Project
 
Basic computer and RAM troubleshooting
Basic computer and RAM troubleshootingBasic computer and RAM troubleshooting
Basic computer and RAM troubleshooting
 
ITE_50_Chapter2.ppt
ITE_50_Chapter2.pptITE_50_Chapter2.ppt
ITE_50_Chapter2.ppt
 
Pace IT - Troubleshooting Laptops
Pace IT - Troubleshooting LaptopsPace IT - Troubleshooting Laptops
Pace IT - Troubleshooting Laptops
 
PRESENTATTION.pptx
PRESENTATTION.pptxPRESENTATTION.pptx
PRESENTATTION.pptx
 
Computer Assembly and Disassembly Procedures_student.pptx
Computer Assembly and Disassembly Procedures_student.pptxComputer Assembly and Disassembly Procedures_student.pptx
Computer Assembly and Disassembly Procedures_student.pptx
 
Fb1200 instruction manual
Fb1200   instruction manualFb1200   instruction manual
Fb1200 instruction manual
 
Error,Failure and Risk
Error,Failure and RiskError,Failure and Risk
Error,Failure and Risk
 
Hardware installation- Dheelan RS
Hardware installation- Dheelan RSHardware installation- Dheelan RS
Hardware installation- Dheelan RS
 

More from Ajay Jassi

Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices
Ajay Jassi
 
Impact on IT system breaches
Impact on IT system breachesImpact on IT system breaches
Impact on IT system breaches
Ajay Jassi
 
Testing software
Testing softwareTesting software
Testing software
Ajay Jassi
 
Configuring personal desktop
Configuring personal desktopConfiguring personal desktop
Configuring personal desktop
Ajay Jassi
 
Preaparation for new software application
Preaparation for new software applicationPreaparation for new software application
Preaparation for new software application
Ajay Jassi
 
Software Licences
Software LicencesSoftware Licences
Software Licences
Ajay Jassi
 
Hardware Documentation and Benefits of Hardware Provider
Hardware Documentation and Benefits of Hardware ProviderHardware Documentation and Benefits of Hardware Provider
Hardware Documentation and Benefits of Hardware Provider
Ajay Jassi
 
IT job role description for Technical Support Engineer
IT job role description for Technical Support EngineerIT job role description for Technical Support Engineer
IT job role description for Technical Support Engineer
Ajay Jassi
 
Characteristics for IT Employee (P1)
Characteristics for IT Employee (P1)Characteristics for IT Employee (P1)
Characteristics for IT Employee (P1)
Ajay Jassi
 
Preparation for Installing Hardware
Preparation for Installing HardwarePreparation for Installing Hardware
Preparation for Installing Hardware
Ajay Jassi
 
Installation and Testing of Hardware
Installation and Testing of HardwareInstallation and Testing of Hardware
Installation and Testing of Hardware
Ajay Jassi
 
Installation of Windows 7 using USB
Installation of Windows 7 using USBInstallation of Windows 7 using USB
Installation of Windows 7 using USB
Ajay Jassi
 
Building Computer System
Building Computer SystemBuilding Computer System
Building Computer System
Ajay Jassi
 
Installation and configuration of Wireless NIC
Installation and configuration of Wireless NICInstallation and configuration of Wireless NIC
Installation and configuration of Wireless NIC
Ajay Jassi
 
Comparison between Windows 8 and Mavericks OS X
Comparison between Windows 8 and Mavericks OS XComparison between Windows 8 and Mavericks OS X
Comparison between Windows 8 and Mavericks OS X
Ajay Jassi
 
Upgrade Invoice
Upgrade InvoiceUpgrade Invoice
Upgrade Invoice
Ajay Jassi
 
Personalising Desktop
Personalising DesktopPersonalising Desktop
Personalising Desktop
Ajay Jassi
 
Computer Invoice
Computer InvoiceComputer Invoice
Computer Invoice
Ajay Jassi
 
Test Table for Wireless NIC
Test Table for Wireless NIC Test Table for Wireless NIC
Test Table for Wireless NIC
Ajay Jassi
 
Removing Security Risks from PC
Removing Security Risks from PCRemoving Security Risks from PC
Removing Security Risks from PC
Ajay Jassi
 

More from Ajay Jassi (20)

Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices
 
Impact on IT system breaches
Impact on IT system breachesImpact on IT system breaches
Impact on IT system breaches
 
Testing software
Testing softwareTesting software
Testing software
 
Configuring personal desktop
Configuring personal desktopConfiguring personal desktop
Configuring personal desktop
 
Preaparation for new software application
Preaparation for new software applicationPreaparation for new software application
Preaparation for new software application
 
Software Licences
Software LicencesSoftware Licences
Software Licences
 
Hardware Documentation and Benefits of Hardware Provider
Hardware Documentation and Benefits of Hardware ProviderHardware Documentation and Benefits of Hardware Provider
Hardware Documentation and Benefits of Hardware Provider
 
IT job role description for Technical Support Engineer
IT job role description for Technical Support EngineerIT job role description for Technical Support Engineer
IT job role description for Technical Support Engineer
 
Characteristics for IT Employee (P1)
Characteristics for IT Employee (P1)Characteristics for IT Employee (P1)
Characteristics for IT Employee (P1)
 
Preparation for Installing Hardware
Preparation for Installing HardwarePreparation for Installing Hardware
Preparation for Installing Hardware
 
Installation and Testing of Hardware
Installation and Testing of HardwareInstallation and Testing of Hardware
Installation and Testing of Hardware
 
Installation of Windows 7 using USB
Installation of Windows 7 using USBInstallation of Windows 7 using USB
Installation of Windows 7 using USB
 
Building Computer System
Building Computer SystemBuilding Computer System
Building Computer System
 
Installation and configuration of Wireless NIC
Installation and configuration of Wireless NICInstallation and configuration of Wireless NIC
Installation and configuration of Wireless NIC
 
Comparison between Windows 8 and Mavericks OS X
Comparison between Windows 8 and Mavericks OS XComparison between Windows 8 and Mavericks OS X
Comparison between Windows 8 and Mavericks OS X
 
Upgrade Invoice
Upgrade InvoiceUpgrade Invoice
Upgrade Invoice
 
Personalising Desktop
Personalising DesktopPersonalising Desktop
Personalising Desktop
 
Computer Invoice
Computer InvoiceComputer Invoice
Computer Invoice
 
Test Table for Wireless NIC
Test Table for Wireless NIC Test Table for Wireless NIC
Test Table for Wireless NIC
 
Removing Security Risks from PC
Removing Security Risks from PCRemoving Security Risks from PC
Removing Security Risks from PC
 

Recently uploaded

Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 

Recently uploaded (20)

Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 

Potential problems that occur during hardware installation

  • 1. Potential problems that occur during hardware installation AJAY JASSI
  • 2. Potential problems  Before dealing with a computer system in the workshop, training must be done for installing, disposing and dealing with computer components safely.  It’s important for an technician to understand and know the risks that can occur, so it can be prevented and dealt with.  There are many problems that could happen when installing hardware. This can be caused by a small accident.  In this presentation I will be explaining some of the general errors and how this can be prevented and resolved.
  • 3. Electrostatic charge  This is the electricity between the technician and the computer component.  The electricity in the circuit on the components are harmless to users/technicians, but they are very sensitive and could be damaged.  This can cause damage to the component when they build up static electricity which is released on the technician and becomes discharged.  To prevent all this from happening, a antistatic wristband must be worn, which is attached to a metal part inside the tower and an antistatic mat should be used, which is placed underneath the computer.
  • 4. Component damage  When handling with any component and computer, they is as chance that it may get damaged, as there is many ways.  The common ways a component can get damaged is by dropping the component, turning screws too much ruining the treads, bending a pin or socket, and by loosening a cable in a plug.  All this is generally done when rushed or a lack of concentration.  To prevent this it is important to use tools and equipment correctly, to be careful, concentrate all times and to take time when handling.
  • 5. Data  Before starting, it is important to backup all data from the computer, as anything could happen.  The two main risk that may occur is data corruption and data loss.  Data corruption is when data is damaged by errors. This means the data is still recognised by the system but cannot be viewed or usable. The cause of this may be from not copying the file completely or correctly.  Data loss happens when the HDD is damaged or formatted. If data is lost, it cannot be retrieved without a backup. This can be a disaster to any organisation as they wouldn’t have nay records or proof.