Download presentation
Presentation is loading. Please wait.
Published byGilbert Wright Modified over 9 years ago
1
by Nick Paige
2
Identify problems that can occur if hardware is not properly maintained Identify routine maintenance that can be performed by users. Identify routine maintenance that should be performed by experienced
3
Consider the following: to properly maintain a car and have it run smoothly you change the oil and filter, check the tire pressure, and complete other required regular maintenenance.
4
KEY BOARD & MOUSE You should check and clean the key board periodically. PRINTERS After so much usage deposits of day ink accumulate on print head the printer.
5
After so much usage, small deposits of dry ink accumulate on the print head of the printer.
6
At some point hardware components may be damaged and need to be changed or out put and production needs to be increased.
7
All computers slow down as you add and delete files install and uninstall software and perform normal activities.
8
an electronic memory device; "a memory and the CPU form the central part of a computer to which peripherals are attached" computer storage, memory board, store, memory, storagecomputer storagememory boardstorememory storage
9
To reorganize the way information is stored on a computer disk so that all of the information belonging to a file is stored in a single, contiguous area the disk
10
A holding area for files and folders before their final deletion from a storage device
11
Clean Temp Files & Junks from PC. Keep Your PC Clean, Fast & Healthy!PC
12
a message, or segment of data, containing information about a user, sent by a Web server to a browser and sent back to the server each time the browser requests a Web page.
13
Replacing the power supply or opening the power supply case Replacing other electrical components Replacing processor Replacing or adding a hard disk Replacing or adding additional ram
14
The security of a computer network is challenged every day by equipment malfunctions, system failures, computer hackers, and virus attacks.
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.