SlideShare ist ein Scribd-Unternehmen logo
1 von 19
IT Essentials PC Hardware
  and Software 4.1

  Instructional Resource
  Chapter 6: Fundamental
  Laptops and Portable
  Devices




Presentation_ID               © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   1
Chapter 6: Objectives
            Describe laptops and other portable devices.
            Identify and describe the components of a laptop.
            Compare and contrast desktop and laptop components.
            Explain how to configure laptops.
            Compare the different mobile phone standards.
            Identify common preventive maintenance techniques for laptops and portable
             devices.
            Describe how to troubleshoot laptops and portable devices.




Presentation_ID                                      © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   2
Chapter 6: Critical Concepts
            What is this chapter about and why is it important?
            This chapter describes laptops and other portable devices. Portable devices, such
             as smartphones and personal digital assistants, have very few parts that can be
             replaced. These devices usually require a technician with a brand-specific
             certification to repair them. In this chapter, the emphasis is on laptops, their
             components, and how to configure them. Laptop preventive maintenance and
             troubleshooting are also covered.
            This chapter is important because more people are using laptops in addition to, or
             instead of, desktop computers. There are differences across makes and models of
             laptops, but certain technologies apply to all. Today’s IT technicians are likely to
             spend much of their time maintaining and troubleshooting laptops. For those
             students who do not have access to a physical laptop computer in the lab, Chapter 6
             also provides a Virtual Laptop. The Virtual Laptop labs demonstrate laptop
             component installation and removal through animation and student interaction.




Presentation_ID                                      © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   3
Chapter 6: Activities
            What activities are associated with this chapter?
                  6.1.2 Worksheet: Research Laptops, Smartphones, and PDAs
                  6.2.1 Optional Activity: Virtual Laptop – Explore Laptop
                  6.2.2 Optional Activity: Virtual Laptop – Keyboard
                  6.2.3 Worksheet: Complete Docking Stations True or False Questions
                  6.2.3 Optional Activity: Virtual Laptop – Docking Station
                  6.3.4 Worksheet: Answer Laptop Expansion Questions
                  6.4.1 Worksheet: Match ACPI Standards
                  6.4.2 Optional Activity: Virtual Laptop – Components and Devices
                  6.7.2 Worksheet: Research Laptop Problems
                  Chapter 6 Quiz




Presentation_ID                                         © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   4
Chapter 6: New Terms
            What terms are introduced in this chapter?


                  AC power connector                                                                     6.2.1

                  Advanced Configuration and Power Interface (ACPI)                                      6.3.3

                  Advanced Power Management (APM)                                                        6.3.3

                  base station                                                                           6.2.3

                  battery                                                                                6.2.1

                  battery latch                                                                          6.2.1

                  battery status indicator LED                                                           6.2.1

                  Bluetooth                                                                              6.1.2

                  Caps lock indicator LED                                                                6.2.2

                  desktop computer                                                                       6.2.1




Presentation_ID                                                       © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   5
Chapter 6: New Terms (continued)
            What terms are introduced in this chapter?


                  docking connector                                                                  6.2.3

                  docking station                                                                    6.2

                  Ethernet                                                                           6.4.3

                  ExpressCard                                                                        6.3.4

                  fingerprint reader                                                                 6.2.2

                  function key (Fn key)                                                              6.2.2

                  Global System for Mobile Communications (GSM)                                      6.5

                  Hibernate/Standby indicator LED                                                    6.2.2

                  hot-swappable interface                                                            6.4.2

                  laptop                                                                             6.1




Presentation_ID                                                   © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   6
Chapter 6: New Terms (continued)
            What terms are introduced in this chapter?


                  power on indicator LED                                                                        6.2.2

                  security keyhole                                                                              6.2.1

                  smartphones                                                                                   6.1

                  Streaming Single-instruction-multi-data Extensions (SSE)                                      6.2.2

                  stylus                                                                                        6.2.2

                  touchpad                                                                                      6.2.2

                  ventilation                                                                                   6.2.1

                  volume control                                                                                6.2.2

                  wireless indicator LED                                                                        6.2.2

                  power on indicator LED                                                                        6.2.2




Presentation_ID                                                              © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   7
Chapter 6: Changes
            What has changed from the previous version (4.0) of ITEPC?
                  Page 6.2.2 Describe the components found on the inside of the laptop
                  • Input devices
                      •Stylus or digitizer
                      •Pointing devices
                      •Function keys


                  Page 6.2.3 Describe the components found on the laptop docking station
                  • Install, configure, and optimize laptop components and features.
                      •Docking station


                  Page 6.3.3 Compare and contrast desktop and laptop power management
                  • AC adapter




Presentation_ID                                       © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   8
Chapter 6: Changes (continued)
            What has changed from the previous version (4.0) of ITEPC?
              Page 6.3.4 Compare and contrast desktop and laptop expansion capabilities
              • Install, configure, and optimize laptop components and features.
                    •ExpressCard

                  Page 6.4.1 Describe how to configure power settings
                      •Wake on LAN
                      •Suspend
                      •Sleep timers

                  Page 6.4.2 Describe the safe installation and removal of laptop components
                  • Install, configure, and optimize laptop components and features.
                  • Power and electrical input devices
                        •Auto-switching
                        •Fixed input power supplies



Presentation_ID                                       © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   9
Chapter 6: Changes (continued)
            What has changed from the previous version (4.0) of ITEPC?
                  Page 6.4.3 Laptop communication hardware installation and configuration
                  • Communication connections
                      •Ethernet
                      •Bluetooth
                      •Infrared
                      •Cellular WAN




Presentation_ID                                       © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   10
Chapter 6: Changes (continued)
            What has changed from the previous version (4.0) of ITEPC?
                  Page 6.7.1 Review the troubleshooting process
                  • Identify the Problem
                  • Establish a Theory of Probable Causes
                  • Determine an Exact Cause
                  • Implement a Solution
                  • Verify Solution and Full System Functionality
                  • Document Findings




Presentation_ID                                         © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   11
Chapter 6: Changes (continued)
            What has changed from the previous version (4.0) of ITEPC?
              Page 6.7.2 Identify common problems and solutions
              • Issues
                    •Power condition
                    •Video
                    •Keyboard
                    •Pointer
                    •Stylus
                    •Wireless card
              • Methods
                    •Verify that the laptop has power.
                    •Remove unneeded peripherals.
                    •Plug in an external monitor.
                    •Toggle the Fn keys or hardware switches.
                    •Check the LCD cutoff switch.
                    •Verify backlight functionality.
                    •Check for a switch for built-in WiFi antennas.
Presentation_ID                                    © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   12
Chapter 6: Classroom Management
                   Plan for a lot of interaction and discussion in this chapter because many
                    schools may not have laptops to use in the classroom.
                   Use the virtual laptop labs if laptops are not available.
                   Disassemble a laptop in front of the class.
                   Provide a non-functioning laptop for students to practice assembling and to use
                    for part identification.




Presentation_ID                                          © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   13
Chapter 6: Teaching Analogies
            A laptop is like a mini-bike, whereas a desktop computer is like a motorcycle. The
             laptop may have all the same components, but it is not as big. You could also use
             the same type of analogy with a mini-refrigerator. It serves the same purpose and
             is easier to move.




Presentation_ID                                      © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   14
Chapter 6: Suggested Class Discussions
                 What do laptops and desktops have in common?
                 How do laptops and desktops differ?
                 What makes laptops more difficult for technicians to support?
                 How have cellular developments influenced the growth of laptop
                  technologies?




Presentation_ID                                     © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   15
Chapter 6: Best Practices
                 Obtain old laptops from the school or through donation when possible. Obtain
                  manuals for the laptops and disassemble one in front of the class. Use egg
                  cartons or small plastic bags to organize the screws and pieces. Take notes the
                  first time the laptop is disassembled, because laptops are more compact and each
                  brand is unique with their re-assembly steps.




Presentation_ID                                        © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   16
Chapter 6: Outside Reading
           Laptop Comparison Guides


           Laptop Manufacturer Websites




Presentation_ID                           © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   17
Presentation_ID   © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   18
Presentation_ID   © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   19

Weitere ähnliche Inhalte

Andere mochten auch

CCNA RS_NB - Chapter 10
CCNA RS_NB - Chapter 10CCNA RS_NB - Chapter 10
CCNA RS_NB - Chapter 10Irsandi Hasan
 
CCNA Security - Chapter 9
CCNA Security - Chapter 9CCNA Security - Chapter 9
CCNA Security - Chapter 9Irsandi Hasan
 
CCNA Security 06- AAA
CCNA Security 06- AAACCNA Security 06- AAA
CCNA Security 06- AAAAhmed Habib
 
CCNA Security 03- network foundation protection
CCNA Security 03- network foundation protectionCCNA Security 03- network foundation protection
CCNA Security 03- network foundation protectionAhmed Habib
 
CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11Irsandi Hasan
 
VMware vShield - Overview
VMware vShield - OverviewVMware vShield - Overview
VMware vShield - OverviewIrsandi Hasan
 
CCNA Security 02- fundamentals of network security
CCNA Security 02-  fundamentals of network securityCCNA Security 02-  fundamentals of network security
CCNA Security 02- fundamentals of network securityAhmed Habib
 
CCNA Security - Chapter 1
CCNA Security - Chapter 1CCNA Security - Chapter 1
CCNA Security - Chapter 1Irsandi Hasan
 

Andere mochten auch (9)

CCNA RS_NB - Chapter 10
CCNA RS_NB - Chapter 10CCNA RS_NB - Chapter 10
CCNA RS_NB - Chapter 10
 
CCNA Security - Chapter 9
CCNA Security - Chapter 9CCNA Security - Chapter 9
CCNA Security - Chapter 9
 
CCNA Security 06- AAA
CCNA Security 06- AAACCNA Security 06- AAA
CCNA Security 06- AAA
 
CCNA Security 03- network foundation protection
CCNA Security 03- network foundation protectionCCNA Security 03- network foundation protection
CCNA Security 03- network foundation protection
 
CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11
 
VMware vShield - Overview
VMware vShield - OverviewVMware vShield - Overview
VMware vShield - Overview
 
CCNA Security 02- fundamentals of network security
CCNA Security 02-  fundamentals of network securityCCNA Security 02-  fundamentals of network security
CCNA Security 02- fundamentals of network security
 
CCNA Security - Chapter 1
CCNA Security - Chapter 1CCNA Security - Chapter 1
CCNA Security - Chapter 1
 
Router commands
Router commandsRouter commands
Router commands
 

Ähnlich wie Laptop Components & Configuration

2c esp8266 non-os_sdk_api_reference_en
2c esp8266 non-os_sdk_api_reference_en2c esp8266 non-os_sdk_api_reference_en
2c esp8266 non-os_sdk_api_reference_enle van hoa
 
Human Interaction Library
Human Interaction LibraryHuman Interaction Library
Human Interaction Librarygraphitech
 
05 optimization of cocos2d-x games on x86 architecture
05   optimization of cocos2d-x games on x86 architecture05   optimization of cocos2d-x games on x86 architecture
05 optimization of cocos2d-x games on x86 architecture乐费 胡
 
14157565 embedded-programming
14157565 embedded-programming14157565 embedded-programming
14157565 embedded-programmingPRADEEP
 
Cldc Hotspot Architecture
Cldc Hotspot ArchitectureCldc Hotspot Architecture
Cldc Hotspot Architecturezdmilan
 
Bharat gargi final project report
Bharat gargi final project reportBharat gargi final project report
Bharat gargi final project reportBharat Biyani
 
Ite pc v40_chapter6
Ite pc v40_chapter6Ite pc v40_chapter6
Ite pc v40_chapter6jaquelinn3
 
SIMPLIFIED SECURED WIRELESS RAILWAY / AIRWAY FOR RESERVATION
SIMPLIFIED SECURED WIRELESS RAILWAY / AIRWAY FOR RESERVATIONSIMPLIFIED SECURED WIRELESS RAILWAY / AIRWAY FOR RESERVATION
SIMPLIFIED SECURED WIRELESS RAILWAY / AIRWAY FOR RESERVATIONRicky Drk
 

Ähnlich wie Laptop Components & Configuration (20)

Zigbee 802.15.4
Zigbee 802.15.4Zigbee 802.15.4
Zigbee 802.15.4
 
2c esp8266 non-os_sdk_api_reference_en
2c esp8266 non-os_sdk_api_reference_en2c esp8266 non-os_sdk_api_reference_en
2c esp8266 non-os_sdk_api_reference_en
 
ITE - Chapter 8
ITE - Chapter 8ITE - Chapter 8
ITE - Chapter 8
 
Human Interaction Library
Human Interaction LibraryHuman Interaction Library
Human Interaction Library
 
05 optimization of cocos2d-x games on x86 architecture
05   optimization of cocos2d-x games on x86 architecture05   optimization of cocos2d-x games on x86 architecture
05 optimization of cocos2d-x games on x86 architecture
 
14157565 embedded-programming
14157565 embedded-programming14157565 embedded-programming
14157565 embedded-programming
 
Cldc Hotspot Architecture
Cldc Hotspot ArchitectureCldc Hotspot Architecture
Cldc Hotspot Architecture
 
2.1 system concept
2.1 system concept2.1 system concept
2.1 system concept
 
ITE - Chapter 13
ITE - Chapter 13ITE - Chapter 13
ITE - Chapter 13
 
java-ring
 java-ring java-ring
java-ring
 
Bharat gargi final project report
Bharat gargi final project reportBharat gargi final project report
Bharat gargi final project report
 
Ite pc v40_chapter6
Ite pc v40_chapter6Ite pc v40_chapter6
Ite pc v40_chapter6
 
Ite pc v40_chapter6
Ite pc v40_chapter6Ite pc v40_chapter6
Ite pc v40_chapter6
 
ITE - Chapter 12
ITE - Chapter 12ITE - Chapter 12
ITE - Chapter 12
 
New Ring
New RingNew Ring
New Ring
 
SIMPLIFIED SECURED WIRELESS RAILWAY / AIRWAY FOR RESERVATION
SIMPLIFIED SECURED WIRELESS RAILWAY / AIRWAY FOR RESERVATIONSIMPLIFIED SECURED WIRELESS RAILWAY / AIRWAY FOR RESERVATION
SIMPLIFIED SECURED WIRELESS RAILWAY / AIRWAY FOR RESERVATION
 
Controlofmachines
Controlofmachines Controlofmachines
Controlofmachines
 
Control of machines
Control of machinesControl of machines
Control of machines
 
ITE - Chapter 7
ITE - Chapter 7ITE - Chapter 7
ITE - Chapter 7
 
ITE - Chapter 1
ITE - Chapter 1ITE - Chapter 1
ITE - Chapter 1
 

Mehr von Irsandi Hasan

CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 08
CCNA v6.0 ITN - Chapter 08CCNA v6.0 ITN - Chapter 08
CCNA v6.0 ITN - Chapter 08Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 07CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 07Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 06
CCNA v6.0 ITN - Chapter 06CCNA v6.0 ITN - Chapter 06
CCNA v6.0 ITN - Chapter 06Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 04
CCNA v6.0 ITN - Chapter 04CCNA v6.0 ITN - Chapter 04
CCNA v6.0 ITN - Chapter 04Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01Irsandi Hasan
 
CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 9CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 9Irsandi Hasan
 
CCNA RS_NB - Chapter 8
CCNA RS_NB - Chapter 8CCNA RS_NB - Chapter 8
CCNA RS_NB - Chapter 8Irsandi Hasan
 
CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 7CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 7Irsandi Hasan
 
CCNA RS_NB - Chapter 6
CCNA RS_NB - Chapter 6CCNA RS_NB - Chapter 6
CCNA RS_NB - Chapter 6Irsandi Hasan
 
CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5Irsandi Hasan
 
CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4Irsandi Hasan
 
CCNA RS_NB - Chapter 3
CCNA RS_NB - Chapter 3CCNA RS_NB - Chapter 3
CCNA RS_NB - Chapter 3Irsandi Hasan
 
CCNA RS_NB - Chapter 2
CCNA RS_NB - Chapter 2CCNA RS_NB - Chapter 2
CCNA RS_NB - Chapter 2Irsandi Hasan
 
CCNA RS_NB - Chapter 1
CCNA RS_NB - Chapter 1CCNA RS_NB - Chapter 1
CCNA RS_NB - Chapter 1Irsandi Hasan
 

Mehr von Irsandi Hasan (20)

CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11
 
CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10
 
CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09
 
CCNA v6.0 ITN - Chapter 08
CCNA v6.0 ITN - Chapter 08CCNA v6.0 ITN - Chapter 08
CCNA v6.0 ITN - Chapter 08
 
CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 07CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 07
 
CCNA v6.0 ITN - Chapter 06
CCNA v6.0 ITN - Chapter 06CCNA v6.0 ITN - Chapter 06
CCNA v6.0 ITN - Chapter 06
 
CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05
 
CCNA v6.0 ITN - Chapter 04
CCNA v6.0 ITN - Chapter 04CCNA v6.0 ITN - Chapter 04
CCNA v6.0 ITN - Chapter 04
 
CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03
 
CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02
 
CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01
 
CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 9CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 9
 
CCNA RS_NB - Chapter 8
CCNA RS_NB - Chapter 8CCNA RS_NB - Chapter 8
CCNA RS_NB - Chapter 8
 
CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 7CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 7
 
CCNA RS_NB - Chapter 6
CCNA RS_NB - Chapter 6CCNA RS_NB - Chapter 6
CCNA RS_NB - Chapter 6
 
CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5
 
CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4
 
CCNA RS_NB - Chapter 3
CCNA RS_NB - Chapter 3CCNA RS_NB - Chapter 3
CCNA RS_NB - Chapter 3
 
CCNA RS_NB - Chapter 2
CCNA RS_NB - Chapter 2CCNA RS_NB - Chapter 2
CCNA RS_NB - Chapter 2
 
CCNA RS_NB - Chapter 1
CCNA RS_NB - Chapter 1CCNA RS_NB - Chapter 1
CCNA RS_NB - Chapter 1
 

Kürzlich hochgeladen

Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 

Kürzlich hochgeladen (20)

Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 

Laptop Components & Configuration

  • 1. IT Essentials PC Hardware and Software 4.1 Instructional Resource Chapter 6: Fundamental Laptops and Portable Devices Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 1
  • 2. Chapter 6: Objectives  Describe laptops and other portable devices.  Identify and describe the components of a laptop.  Compare and contrast desktop and laptop components.  Explain how to configure laptops.  Compare the different mobile phone standards.  Identify common preventive maintenance techniques for laptops and portable devices.  Describe how to troubleshoot laptops and portable devices. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 2
  • 3. Chapter 6: Critical Concepts  What is this chapter about and why is it important?  This chapter describes laptops and other portable devices. Portable devices, such as smartphones and personal digital assistants, have very few parts that can be replaced. These devices usually require a technician with a brand-specific certification to repair them. In this chapter, the emphasis is on laptops, their components, and how to configure them. Laptop preventive maintenance and troubleshooting are also covered.  This chapter is important because more people are using laptops in addition to, or instead of, desktop computers. There are differences across makes and models of laptops, but certain technologies apply to all. Today’s IT technicians are likely to spend much of their time maintaining and troubleshooting laptops. For those students who do not have access to a physical laptop computer in the lab, Chapter 6 also provides a Virtual Laptop. The Virtual Laptop labs demonstrate laptop component installation and removal through animation and student interaction. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 3
  • 4. Chapter 6: Activities  What activities are associated with this chapter? 6.1.2 Worksheet: Research Laptops, Smartphones, and PDAs 6.2.1 Optional Activity: Virtual Laptop – Explore Laptop 6.2.2 Optional Activity: Virtual Laptop – Keyboard 6.2.3 Worksheet: Complete Docking Stations True or False Questions 6.2.3 Optional Activity: Virtual Laptop – Docking Station 6.3.4 Worksheet: Answer Laptop Expansion Questions 6.4.1 Worksheet: Match ACPI Standards 6.4.2 Optional Activity: Virtual Laptop – Components and Devices 6.7.2 Worksheet: Research Laptop Problems Chapter 6 Quiz Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 4
  • 5. Chapter 6: New Terms  What terms are introduced in this chapter? AC power connector 6.2.1 Advanced Configuration and Power Interface (ACPI) 6.3.3 Advanced Power Management (APM) 6.3.3 base station 6.2.3 battery 6.2.1 battery latch 6.2.1 battery status indicator LED 6.2.1 Bluetooth 6.1.2 Caps lock indicator LED 6.2.2 desktop computer 6.2.1 Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 5
  • 6. Chapter 6: New Terms (continued)  What terms are introduced in this chapter? docking connector 6.2.3 docking station 6.2 Ethernet 6.4.3 ExpressCard 6.3.4 fingerprint reader 6.2.2 function key (Fn key) 6.2.2 Global System for Mobile Communications (GSM) 6.5 Hibernate/Standby indicator LED 6.2.2 hot-swappable interface 6.4.2 laptop 6.1 Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 6
  • 7. Chapter 6: New Terms (continued)  What terms are introduced in this chapter? power on indicator LED 6.2.2 security keyhole 6.2.1 smartphones 6.1 Streaming Single-instruction-multi-data Extensions (SSE) 6.2.2 stylus 6.2.2 touchpad 6.2.2 ventilation 6.2.1 volume control 6.2.2 wireless indicator LED 6.2.2 power on indicator LED 6.2.2 Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 7
  • 8. Chapter 6: Changes  What has changed from the previous version (4.0) of ITEPC? Page 6.2.2 Describe the components found on the inside of the laptop • Input devices •Stylus or digitizer •Pointing devices •Function keys Page 6.2.3 Describe the components found on the laptop docking station • Install, configure, and optimize laptop components and features. •Docking station Page 6.3.3 Compare and contrast desktop and laptop power management • AC adapter Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 8
  • 9. Chapter 6: Changes (continued)  What has changed from the previous version (4.0) of ITEPC? Page 6.3.4 Compare and contrast desktop and laptop expansion capabilities • Install, configure, and optimize laptop components and features. •ExpressCard Page 6.4.1 Describe how to configure power settings •Wake on LAN •Suspend •Sleep timers Page 6.4.2 Describe the safe installation and removal of laptop components • Install, configure, and optimize laptop components and features. • Power and electrical input devices •Auto-switching •Fixed input power supplies Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 9
  • 10. Chapter 6: Changes (continued)  What has changed from the previous version (4.0) of ITEPC? Page 6.4.3 Laptop communication hardware installation and configuration • Communication connections •Ethernet •Bluetooth •Infrared •Cellular WAN Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 10
  • 11. Chapter 6: Changes (continued)  What has changed from the previous version (4.0) of ITEPC? Page 6.7.1 Review the troubleshooting process • Identify the Problem • Establish a Theory of Probable Causes • Determine an Exact Cause • Implement a Solution • Verify Solution and Full System Functionality • Document Findings Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 11
  • 12. Chapter 6: Changes (continued)  What has changed from the previous version (4.0) of ITEPC? Page 6.7.2 Identify common problems and solutions • Issues •Power condition •Video •Keyboard •Pointer •Stylus •Wireless card • Methods •Verify that the laptop has power. •Remove unneeded peripherals. •Plug in an external monitor. •Toggle the Fn keys or hardware switches. •Check the LCD cutoff switch. •Verify backlight functionality. •Check for a switch for built-in WiFi antennas. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 12
  • 13. Chapter 6: Classroom Management  Plan for a lot of interaction and discussion in this chapter because many schools may not have laptops to use in the classroom.  Use the virtual laptop labs if laptops are not available.  Disassemble a laptop in front of the class.  Provide a non-functioning laptop for students to practice assembling and to use for part identification. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 13
  • 14. Chapter 6: Teaching Analogies  A laptop is like a mini-bike, whereas a desktop computer is like a motorcycle. The laptop may have all the same components, but it is not as big. You could also use the same type of analogy with a mini-refrigerator. It serves the same purpose and is easier to move. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 14
  • 15. Chapter 6: Suggested Class Discussions  What do laptops and desktops have in common?  How do laptops and desktops differ?  What makes laptops more difficult for technicians to support?  How have cellular developments influenced the growth of laptop technologies? Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 15
  • 16. Chapter 6: Best Practices  Obtain old laptops from the school or through donation when possible. Obtain manuals for the laptops and disassemble one in front of the class. Use egg cartons or small plastic bags to organize the screws and pieces. Take notes the first time the laptop is disassembled, because laptops are more compact and each brand is unique with their re-assembly steps. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 16
  • 17. Chapter 6: Outside Reading Laptop Comparison Guides Laptop Manufacturer Websites Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 17
  • 18. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 18
  • 19. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 19