Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
100% found this document useful (1 vote)
2K views

Module 1 Computer Assembly and Disassembly

The document discusses safety procedures for disassembling and reassembling computer components as part of an incident response course. It emphasizes that computers contain electrical components that can destroy evidence or injure personnel if not handled properly. When assembling a computer, the document advises to let common sense guide the process of plugging components like the monitor, printer, and speakers into the appropriate ports of the central processing unit. It also notes that before removing any components, one should document details like the device model number, a brief definition, and whether it is an input, output, or internal component.

Uploaded by

R. Borres
Copyright
© © All Rights Reserved
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
2K views

Module 1 Computer Assembly and Disassembly

The document discusses safety procedures for disassembling and reassembling computer components as part of an incident response course. It emphasizes that computers contain electrical components that can destroy evidence or injure personnel if not handled properly. When assembling a computer, the document advises to let common sense guide the process of plugging components like the monitor, printer, and speakers into the appropriate ports of the central processing unit. It also notes that before removing any components, one should document details like the device model number, a brief definition, and whether it is an input, output, or internal component.

Uploaded by

R. Borres
Copyright
© © All Rights Reserved
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 28

COMPUTER CRIME INVESTIGATOR’S COURSE

Anti-Transnational Crime Division


Computer Crime Section - CIDG

Computer Assembly and Disassembly


INTRODUCTION
The computer is an extremely versatile tool that can assist us in both our
personal and professional lives in a countless number of ways.
Its extreme adaptability is, in part, due to the nature of its construction. Over many
years, computer electronics industries have strived to agree on certain 'standards',
enabling them to develop a wide range of devices and applications that are 'PC
compatible' - that is, that can be fitted / connected / installed to a PC with the
minimum of effort.

SAFETY
During the Incident Response course, you will be performing several
practical exercises involving the disassembly and reassembly of computer
components. Therefore, it is imperative that you follow the safety procedures
presented here. You will be given a wrist grounding strap and electrostatic mat to
use in the classroom.
Computers contain electrical components that if mishandled may destroy the
evidence or injure personnel who do not take proper safety precautions.
Although collection of the computer and components is vital, it does not supersede
the safety of the responding personnel.
COMPUTER CRIME INVESTIGATOR’S COURSE
Anti-Transnational Crime Division
Computer Crime Section - CIDG

Computer Assembly
When assembling a computer, it is wise to let common sense be
your guide. Everything that the computer uses gets plugged into the back of
the Central Processing Unit (CPU). The different plug in sockets is called
ports.
The monitor, printer, speakers, etc., have two cords. They attach to
the central processing unit and a power source. The ends of the cords are
male or female and in the case of computers, opposites attract. Male plugs
into female. A way to tell what gets plugged in where is by the shape of the
plug.
The phone cord will not fit into the printer port, nor will the printer
fit into the port where the monitor is plugged into. A good guideline to follow
when plugging in your computer is “if it don’t fit, don’t force it.” In new
computers, the ports have a icon of the item to be plugged into the
appropriate slot and color coordination.
COMPUTER CRIME INVESTIGATOR’S COURSE
Anti-Transnational Crime Division
Computer Crime Section - CIDG

Documentation

Before removing components, documents.

the device model number (if available)


a brief definition of the device
identify the devices as Input, Output, or Both
identify the devices as Internal or External Component

Computer Components
If you remove the case
from a console, you will
see the major
components of the
computer.
COMPUTER CRIME INVESTIGATOR’S COURSE
Anti-Transnational Crime Division
Computer Crime Section - CIDG

A computer system has a standard set of


components that can be divided into four categories
.
1. Main system components
2. Input components
3. Output components
4. Data storage and retrieval components
 ACTUAL
COMPUTER CRIME INVESTIGATOR’S COURSE
Anti-Transnational Crime Division
Computer Crime Section - CIDG

You might also like