SlideShare a Scribd company logo
1 of 17
Laptops
Ajay Jassi
Purpose of a laptop
• There are many reasons why laptops are used. The main
purpose of a laptop is that it’s portable and can be carried
around.
• It’s used for businesses, education, entertainment and general
internet browsing.
• For employees and students it is very useful as they can finish
any incomplete work at home.
Laptop features
• Battery
• AC power source/input
• Integrated display screen in lid
• Integrated keyboard
• Integrated track pad
• Integrated speakers
• Hot-swappable drives and peripherals
• Bluetooth
• Standby mode
• Built-in webcam
Features
• Laptops nowadays have these common features: Wi-Fi,
Bluetooth, Fire wire, USB, Ethernet which allows a wide range
of connectivity.
USB and Fire Wire
• These components allow the use of hot swappable devices,
such as external HDD’s or USB sticks, this also expands to
external mouse.
How usb and firewire works
• The two different connections allow a wired interface, this
improves security and the reliability of the data transfer.
• USB allows the use of a wireless USB dongle, this allows you to
use a wireless mouse or keyboard.
• Both connections allow connection to peripherals.
Power
• The laptop has a battery in which it stores power.
• To conserve power you can turn the brightness down and to
use power saving mode which most laptops have.
• Processors have been made specifically for laptops to prevent
overheating and power loss.
How power works
• The Battery in a laptop allows the laptop to be versatile and
not always connected to a power source.
• The power connects to an AC power supply to charge. And
could hold on average around 5 hours of general usage.
Wi-Fi
• Wi-Fi stands for wireless area local network.
• Wi-Fi is used every day by millions of people, it allows you to
connect to the internet without the hassle of wires. It is built
in to most laptops.
• With some older laptops, a wireless nic is required to do this.
Bluetooth
• Bluetooth is built into new laptops, whereas in older laptops a
dongle will be needed. Bluetooth is used to transfer and
receive files without any cables. This works by special radio
frequencies that transmit from one device to another.
Built-in webcam
• In all laptops and netbooks these days, webcams are built-in
which allows video calls, photos and movies to be made.
Integrated track pad
• With laptops and netbooks, a mice isn’t required to use the
cursor as there is a integrated track pad which allows the
same job to be done.
Integrated speakers
• With laptops no additional speakers are required as there is
built in speakers in the laptop, which produces enough sound.
But however if more sound wants to be produced there are
speakers which are specialist for laptops.

More Related Content

What's hot

Softimize - Connecting Devices to Gateways
Softimize - Connecting Devices to GatewaysSoftimize - Connecting Devices to Gateways
Softimize - Connecting Devices to GatewaysYael Malki
 
STANLEY healthcare IOT
STANLEY healthcare IOTSTANLEY healthcare IOT
STANLEY healthcare IOTYael Malki
 
Pavel stessin - building and selecting hardware for connected devices
Pavel stessin - building and selecting hardware for connected devicesPavel stessin - building and selecting hardware for connected devices
Pavel stessin - building and selecting hardware for connected devicesYael Malki
 
Networks la ns and design
Networks la ns and designNetworks la ns and design
Networks la ns and designsbmiller87
 
Portable Wifi Solution for Event Sites
Portable Wifi Solution for Event SitesPortable Wifi Solution for Event Sites
Portable Wifi Solution for Event Sitesetetuan
 
Analog vs Digital vs VoIP: Choosing the Right Phone System for You
Analog vs Digital vs VoIP: Choosing the Right Phone System for YouAnalog vs Digital vs VoIP: Choosing the Right Phone System for You
Analog vs Digital vs VoIP: Choosing the Right Phone System for YouNTEK Systems Inc.
 
The Hardware to Web Commerce Revolution
The Hardware to Web Commerce RevolutionThe Hardware to Web Commerce Revolution
The Hardware to Web Commerce RevolutionJonathan LeBlanc
 
2600hz Virtualization Expert Q and A
2600hz Virtualization Expert Q and A2600hz Virtualization Expert Q and A
2600hz Virtualization Expert Q and AJoshua Goldbard
 
VoIP Phone Rollouts: Smoothing the Transition & Avoiding Key Pitfalls
VoIP Phone Rollouts: Smoothing the Transition & Avoiding Key PitfallsVoIP Phone Rollouts: Smoothing the Transition & Avoiding Key Pitfalls
VoIP Phone Rollouts: Smoothing the Transition & Avoiding Key PitfallsSpiceworks
 
WILLIS ERIC PREZZY RESUME IT
WILLIS ERIC PREZZY RESUME ITWILLIS ERIC PREZZY RESUME IT
WILLIS ERIC PREZZY RESUME ITWillis Prezzy
 
Voip over eoip
Voip over eoipVoip over eoip
Voip over eoipteja reddy
 

What's hot (19)

Softimize - Connecting Devices to Gateways
Softimize - Connecting Devices to GatewaysSoftimize - Connecting Devices to Gateways
Softimize - Connecting Devices to Gateways
 
STANLEY healthcare IOT
STANLEY healthcare IOTSTANLEY healthcare IOT
STANLEY healthcare IOT
 
Cvnp projects
Cvnp projectsCvnp projects
Cvnp projects
 
Pavel stessin - building and selecting hardware for connected devices
Pavel stessin - building and selecting hardware for connected devicesPavel stessin - building and selecting hardware for connected devices
Pavel stessin - building and selecting hardware for connected devices
 
Networks la ns and design
Networks la ns and designNetworks la ns and design
Networks la ns and design
 
Portable Wifi Solution for Event Sites
Portable Wifi Solution for Event SitesPortable Wifi Solution for Event Sites
Portable Wifi Solution for Event Sites
 
Analog vs Digital vs VoIP: Choosing the Right Phone System for You
Analog vs Digital vs VoIP: Choosing the Right Phone System for YouAnalog vs Digital vs VoIP: Choosing the Right Phone System for You
Analog vs Digital vs VoIP: Choosing the Right Phone System for You
 
Networking
NetworkingNetworking
Networking
 
The Hardware to Web Commerce Revolution
The Hardware to Web Commerce RevolutionThe Hardware to Web Commerce Revolution
The Hardware to Web Commerce Revolution
 
Home Tech
Home TechHome Tech
Home Tech
 
5 Pen PC Technology
5 Pen PC Technology5 Pen PC Technology
5 Pen PC Technology
 
2600hz Virtualization Expert Q and A
2600hz Virtualization Expert Q and A2600hz Virtualization Expert Q and A
2600hz Virtualization Expert Q and A
 
Working From Home
Working From HomeWorking From Home
Working From Home
 
VoIP Phone Rollouts: Smoothing the Transition & Avoiding Key Pitfalls
VoIP Phone Rollouts: Smoothing the Transition & Avoiding Key PitfallsVoIP Phone Rollouts: Smoothing the Transition & Avoiding Key Pitfalls
VoIP Phone Rollouts: Smoothing the Transition & Avoiding Key Pitfalls
 
Voip
VoipVoip
Voip
 
13CH it 1
13CH it 113CH it 1
13CH it 1
 
WILLIS ERIC PREZZY RESUME IT
WILLIS ERIC PREZZY RESUME ITWILLIS ERIC PREZZY RESUME IT
WILLIS ERIC PREZZY RESUME IT
 
Voip over eoip
Voip over eoipVoip over eoip
Voip over eoip
 
Apps on Silicon
Apps on SiliconApps on Silicon
Apps on Silicon
 

Viewers also liked

LegalShield Presentation
LegalShield PresentationLegalShield Presentation
LegalShield PresentationSamuel Ellis
 
Preparation for Installing Hardware
Preparation for Installing HardwarePreparation for Installing Hardware
Preparation for Installing HardwareAjay Jassi
 
PROYECTO DISTRICONEJO BARBOSA
PROYECTO DISTRICONEJO BARBOSAPROYECTO DISTRICONEJO BARBOSA
PROYECTO DISTRICONEJO BARBOSAivanleongomez1
 
PROYECTO DISTRICONEJO BARBOSA
PROYECTO DISTRICONEJO BARBOSAPROYECTO DISTRICONEJO BARBOSA
PROYECTO DISTRICONEJO BARBOSAivanleongomez1
 
50d6aff619ad1 aplikasi fuzzy_logic_pada_vacuum_cleaner
50d6aff619ad1 aplikasi fuzzy_logic_pada_vacuum_cleaner50d6aff619ad1 aplikasi fuzzy_logic_pada_vacuum_cleaner
50d6aff619ad1 aplikasi fuzzy_logic_pada_vacuum_cleanerIpanSaputra
 
Installation and configuration of Wireless NIC
Installation and configuration of Wireless NICInstallation and configuration of Wireless NIC
Installation and configuration of Wireless NICAjay Jassi
 
презентация без названия (2)
презентация без названия (2)презентация без названия (2)
презентация без названия (2)Arina Hrapko
 
Installation and Testing of Hardware
Installation and Testing of HardwareInstallation and Testing of Hardware
Installation and Testing of HardwareAjay Jassi
 
Susunan panitia khataman kitab ihya final
Susunan panitia khataman kitab ihya finalSusunan panitia khataman kitab ihya final
Susunan panitia khataman kitab ihya finalAbah Trifaza
 
Configuring personal desktop
Configuring personal desktopConfiguring personal desktop
Configuring personal desktopAjay Jassi
 
Installation of Windows 7 using USB
Installation of Windows 7 using USBInstallation of Windows 7 using USB
Installation of Windows 7 using USBAjay Jassi
 

Viewers also liked (14)

LegalShield Presentation
LegalShield PresentationLegalShield Presentation
LegalShield Presentation
 
Kata
KataKata
Kata
 
Preparation for Installing Hardware
Preparation for Installing HardwarePreparation for Installing Hardware
Preparation for Installing Hardware
 
PROYECTO DISTRICONEJO BARBOSA
PROYECTO DISTRICONEJO BARBOSAPROYECTO DISTRICONEJO BARBOSA
PROYECTO DISTRICONEJO BARBOSA
 
PROYECTO DISTRICONEJO BARBOSA
PROYECTO DISTRICONEJO BARBOSAPROYECTO DISTRICONEJO BARBOSA
PROYECTO DISTRICONEJO BARBOSA
 
50d6aff619ad1 aplikasi fuzzy_logic_pada_vacuum_cleaner
50d6aff619ad1 aplikasi fuzzy_logic_pada_vacuum_cleaner50d6aff619ad1 aplikasi fuzzy_logic_pada_vacuum_cleaner
50d6aff619ad1 aplikasi fuzzy_logic_pada_vacuum_cleaner
 
Installation and configuration of Wireless NIC
Installation and configuration of Wireless NICInstallation and configuration of Wireless NIC
Installation and configuration of Wireless NIC
 
презентация без названия (2)
презентация без названия (2)презентация без названия (2)
презентация без названия (2)
 
Port
PortPort
Port
 
Installation and Testing of Hardware
Installation and Testing of HardwareInstallation and Testing of Hardware
Installation and Testing of Hardware
 
Susunan panitia khataman kitab ihya final
Susunan panitia khataman kitab ihya finalSusunan panitia khataman kitab ihya final
Susunan panitia khataman kitab ihya final
 
Configuring personal desktop
Configuring personal desktopConfiguring personal desktop
Configuring personal desktop
 
Pdf
PdfPdf
Pdf
 
Installation of Windows 7 using USB
Installation of Windows 7 using USBInstallation of Windows 7 using USB
Installation of Windows 7 using USB
 

Similar to Unit 3 - Laptops (P2)

Features of a laptop
Features of a laptopFeatures of a laptop
Features of a laptopOriginalGSM
 
5 pen pc technology
5 pen pc technology5 pen pc technology
5 pen pc technologyabshidore
 
Computer Devices - What Are they?
Computer Devices - What Are they?Computer Devices - What Are they?
Computer Devices - What Are they?Andrew Willetts
 
Unit 3 - Computer Components (P1)
Unit 3 - Computer Components (P1)Unit 3 - Computer Components (P1)
Unit 3 - Computer Components (P1)Ajay Jassi
 
George lee non technical
George lee non technicalGeorge lee non technical
George lee non technicalgeorgelee96
 
Non technical presentation
Non technical presentationNon technical presentation
Non technical presentationconnorhowe131
 
Pick your connectivity solution [web2day 2015]
Pick your connectivity solution [web2day 2015]Pick your connectivity solution [web2day 2015]
Pick your connectivity solution [web2day 2015]Nicolas Lesconnec
 
Chapter 1 one html
Chapter 1 one htmlChapter 1 one html
Chapter 1 one htmlnobel mujuji
 
Computer Systems
Computer Systems Computer Systems
Computer Systems jack_dyball
 
Grade 10 Term 3 Week 1 Lesson 1 - Copy.pptx
Grade 10 Term 3 Week 1 Lesson 1 - Copy.pptxGrade 10 Term 3 Week 1 Lesson 1 - Copy.pptx
Grade 10 Term 3 Week 1 Lesson 1 - Copy.pptxNtandoThwala
 

Similar to Unit 3 - Laptops (P2) (20)

FLAT(WIRELESS USB)1 (1).pptx
FLAT(WIRELESS USB)1 (1).pptxFLAT(WIRELESS USB)1 (1).pptx
FLAT(WIRELESS USB)1 (1).pptx
 
Non technical
Non technicalNon technical
Non technical
 
Features of a laptop
Features of a laptopFeatures of a laptop
Features of a laptop
 
5 pen pc technology
5 pen pc technology5 pen pc technology
5 pen pc technology
 
Computer Devices - What Are they?
Computer Devices - What Are they?Computer Devices - What Are they?
Computer Devices - What Are they?
 
P2 Computer Systems
P2 Computer SystemsP2 Computer Systems
P2 Computer Systems
 
FLAT(WIRELESS USB).pptx
FLAT(WIRELESS USB).pptxFLAT(WIRELESS USB).pptx
FLAT(WIRELESS USB).pptx
 
Unit 3 - Computer Components (P1)
Unit 3 - Computer Components (P1)Unit 3 - Computer Components (P1)
Unit 3 - Computer Components (P1)
 
George lee non technical
George lee non technicalGeorge lee non technical
George lee non technical
 
5 pen pc
5 pen pc 5 pen pc
5 pen pc
 
Non technical presentation
Non technical presentationNon technical presentation
Non technical presentation
 
Portable PC final
Portable PC finalPortable PC final
Portable PC final
 
Pick your connectivity solution [web2day 2015]
Pick your connectivity solution [web2day 2015]Pick your connectivity solution [web2day 2015]
Pick your connectivity solution [web2day 2015]
 
InTEK
InTEKInTEK
InTEK
 
Chapter 1 html
Chapter 1 htmlChapter 1 html
Chapter 1 html
 
Chapter 1 one html
Chapter 1 one htmlChapter 1 one html
Chapter 1 one html
 
Computer Systems
Computer Systems Computer Systems
Computer Systems
 
Wireless USB
Wireless USBWireless USB
Wireless USB
 
Grade 10 Term 3 Week 1 Lesson 1 - Copy.pptx
Grade 10 Term 3 Week 1 Lesson 1 - Copy.pptxGrade 10 Term 3 Week 1 Lesson 1 - Copy.pptx
Grade 10 Term 3 Week 1 Lesson 1 - Copy.pptx
 
wireless usb.pptx
wireless usb.pptxwireless usb.pptx
wireless usb.pptx
 

More from Ajay Jassi

Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices Ajay Jassi
 
Managing IT Security
Managing IT SecurityManaging IT Security
Managing IT SecurityAjay Jassi
 
Impact on IT system breaches
Impact on IT system breachesImpact on IT system breaches
Impact on IT system breachesAjay Jassi
 
Testing software
Testing softwareTesting software
Testing softwareAjay Jassi
 
Preaparation for new software application
Preaparation for new software applicationPreaparation for new software application
Preaparation for new software applicationAjay Jassi
 
Software Licences
Software LicencesSoftware Licences
Software LicencesAjay Jassi
 
Hardware Documentation and Benefits of Hardware Provider
Hardware Documentation and Benefits of Hardware ProviderHardware Documentation and Benefits of Hardware Provider
Hardware Documentation and Benefits of Hardware ProviderAjay Jassi
 
IT job role description for Technical Support Engineer
IT job role description for Technical Support EngineerIT job role description for Technical Support Engineer
IT job role description for Technical Support EngineerAjay Jassi
 
Characteristics for IT Employee (P1)
Characteristics for IT Employee (P1)Characteristics for IT Employee (P1)
Characteristics for IT Employee (P1)Ajay Jassi
 
Reasons why Hardware is Installed and Potential Problems and the Precautions
Reasons why Hardware is Installed and Potential Problems and the PrecautionsReasons why Hardware is Installed and Potential Problems and the Precautions
Reasons why Hardware is Installed and Potential Problems and the PrecautionsAjay Jassi
 
Potential problems that occur during hardware installation
Potential problems that occur during hardware installationPotential problems that occur during hardware installation
Potential problems that occur during hardware installationAjay Jassi
 
Building Computer System
Building Computer SystemBuilding Computer System
Building Computer SystemAjay Jassi
 
Comparison between Windows 8 and Mavericks OS X
Comparison between Windows 8 and Mavericks OS XComparison between Windows 8 and Mavericks OS X
Comparison between Windows 8 and Mavericks OS XAjay Jassi
 
Upgrade Invoice
Upgrade InvoiceUpgrade Invoice
Upgrade InvoiceAjay Jassi
 
Personalising Desktop
Personalising DesktopPersonalising Desktop
Personalising DesktopAjay Jassi
 
Health and safety requirements for computer maintenance
Health and safety requirements for computer maintenanceHealth and safety requirements for computer maintenance
Health and safety requirements for computer maintenanceAjay Jassi
 
Computer Invoice
Computer InvoiceComputer Invoice
Computer InvoiceAjay Jassi
 
Test Table for Wireless NIC
Test Table for Wireless NIC Test Table for Wireless NIC
Test Table for Wireless NIC Ajay Jassi
 
Removing Security Risks from PC
Removing Security Risks from PCRemoving Security Risks from PC
Removing Security Risks from PCAjay Jassi
 
Identifying Security Risks
Identifying Security RisksIdentifying Security Risks
Identifying Security RisksAjay Jassi
 

More from Ajay Jassi (20)

Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices
 
Managing IT Security
Managing IT SecurityManaging IT Security
Managing IT Security
 
Impact on IT system breaches
Impact on IT system breachesImpact on IT system breaches
Impact on IT system breaches
 
Testing software
Testing softwareTesting software
Testing software
 
Preaparation for new software application
Preaparation for new software applicationPreaparation for new software application
Preaparation for new software application
 
Software Licences
Software LicencesSoftware Licences
Software Licences
 
Hardware Documentation and Benefits of Hardware Provider
Hardware Documentation and Benefits of Hardware ProviderHardware Documentation and Benefits of Hardware Provider
Hardware Documentation and Benefits of Hardware Provider
 
IT job role description for Technical Support Engineer
IT job role description for Technical Support EngineerIT job role description for Technical Support Engineer
IT job role description for Technical Support Engineer
 
Characteristics for IT Employee (P1)
Characteristics for IT Employee (P1)Characteristics for IT Employee (P1)
Characteristics for IT Employee (P1)
 
Reasons why Hardware is Installed and Potential Problems and the Precautions
Reasons why Hardware is Installed and Potential Problems and the PrecautionsReasons why Hardware is Installed and Potential Problems and the Precautions
Reasons why Hardware is Installed and Potential Problems and the Precautions
 
Potential problems that occur during hardware installation
Potential problems that occur during hardware installationPotential problems that occur during hardware installation
Potential problems that occur during hardware installation
 
Building Computer System
Building Computer SystemBuilding Computer System
Building Computer System
 
Comparison between Windows 8 and Mavericks OS X
Comparison between Windows 8 and Mavericks OS XComparison between Windows 8 and Mavericks OS X
Comparison between Windows 8 and Mavericks OS X
 
Upgrade Invoice
Upgrade InvoiceUpgrade Invoice
Upgrade Invoice
 
Personalising Desktop
Personalising DesktopPersonalising Desktop
Personalising Desktop
 
Health and safety requirements for computer maintenance
Health and safety requirements for computer maintenanceHealth and safety requirements for computer maintenance
Health and safety requirements for computer maintenance
 
Computer Invoice
Computer InvoiceComputer Invoice
Computer Invoice
 
Test Table for Wireless NIC
Test Table for Wireless NIC Test Table for Wireless NIC
Test Table for Wireless NIC
 
Removing Security Risks from PC
Removing Security Risks from PCRemoving Security Risks from PC
Removing Security Risks from PC
 
Identifying Security Risks
Identifying Security RisksIdentifying Security Risks
Identifying Security Risks
 

Recently uploaded

AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 

Unit 3 - Laptops (P2)

  • 2. Purpose of a laptop • There are many reasons why laptops are used. The main purpose of a laptop is that it’s portable and can be carried around. • It’s used for businesses, education, entertainment and general internet browsing. • For employees and students it is very useful as they can finish any incomplete work at home.
  • 3. Laptop features • Battery • AC power source/input • Integrated display screen in lid • Integrated keyboard • Integrated track pad • Integrated speakers • Hot-swappable drives and peripherals • Bluetooth • Standby mode • Built-in webcam
  • 4.
  • 5.
  • 6.
  • 7.
  • 8. Features • Laptops nowadays have these common features: Wi-Fi, Bluetooth, Fire wire, USB, Ethernet which allows a wide range of connectivity.
  • 9. USB and Fire Wire • These components allow the use of hot swappable devices, such as external HDD’s or USB sticks, this also expands to external mouse.
  • 10. How usb and firewire works • The two different connections allow a wired interface, this improves security and the reliability of the data transfer. • USB allows the use of a wireless USB dongle, this allows you to use a wireless mouse or keyboard. • Both connections allow connection to peripherals.
  • 11. Power • The laptop has a battery in which it stores power. • To conserve power you can turn the brightness down and to use power saving mode which most laptops have. • Processors have been made specifically for laptops to prevent overheating and power loss.
  • 12. How power works • The Battery in a laptop allows the laptop to be versatile and not always connected to a power source. • The power connects to an AC power supply to charge. And could hold on average around 5 hours of general usage.
  • 13. Wi-Fi • Wi-Fi stands for wireless area local network. • Wi-Fi is used every day by millions of people, it allows you to connect to the internet without the hassle of wires. It is built in to most laptops. • With some older laptops, a wireless nic is required to do this.
  • 14. Bluetooth • Bluetooth is built into new laptops, whereas in older laptops a dongle will be needed. Bluetooth is used to transfer and receive files without any cables. This works by special radio frequencies that transmit from one device to another.
  • 15. Built-in webcam • In all laptops and netbooks these days, webcams are built-in which allows video calls, photos and movies to be made.
  • 16. Integrated track pad • With laptops and netbooks, a mice isn’t required to use the cursor as there is a integrated track pad which allows the same job to be done.
  • 17. Integrated speakers • With laptops no additional speakers are required as there is built in speakers in the laptop, which produces enough sound. But however if more sound wants to be produced there are speakers which are specialist for laptops.