15 Materials (Parts) Needed in Building A Computer
15 Materials (Parts) Needed in Building A Computer
Component Description
3. Memory (RAM) The system memory is often called RAM (for random
access memory). This is the primary memory, which
holds all the programs and data the processor is using
at a given time. Memory is covered in detail in Chapter
6, "Memory."
7. Hard drive The hard disk is the primary archival storage memory
for the system. Hard disk drives are also covered in
detail in Chapter 10, "Hard Disk Storage."
8. CD-ROM/DVD- CD-ROM (compact disc read-only) and DVD-ROM
ROM (digital versatile disc read-only) drives are relatively
high-capacity, removable media, optical drives. These
drives are covered in detail in Chapter 13, "Optical
Storage."
11. Video card The video card controls the information you see on the
monitor. Video cards are covered in detail in Chapter
15, "Video Hardware."
You should have, at a minimum, small- and medium-sized Phillips and flat screwdrivers
and a 1/4" nut driver. A precision screwdriver set should have all the screwdrivers you'll
need.
Very small needle-nosed pliers, forceps, or tweezers are very handy for removing and
inserting jumpers on motherboards and hard drives.
3. Cable Ties
Plastic cable ties are useful for neatly bundling wires and cables away from fans and
other components inside the computer.
4. Anti-Static Kit
An anti-static kit consists of a rubberized mat and a wrist strap that attaches to both the
mat and the computer or electronic device you're working on. This both protects the
equipment from static damage and protects your tabletop from scratches. Click here for
more information about anti-static precautions.
Heat sink compound improves the thermal efficiency of heat sinks and improves
cooling. It's sometimes included with processor fans or heat sinks, but may also be
purchased separately. It is applied neatly to the area where the processor contacts the
heat sink to improve cooling efficiency. (Some heat sinks have the compound "built-in"
behind a little peel-off label.) I like Arctic MX-4 or other silver-based thermal
compounds.
Canned air or a canless air duster air is used to blow dust out of the nooks and crannies
of your computer. Never blow into a computer with your lips to remove dust. Your breath
contains too much moisture (and maybe other things depending on what you ate for
dinner). Also, never use a household vacuum cleaner nozzle to clean inside a
computer. They generate way too much static.
You'll need a pill bottle or other small container to hold the various screws, jumpers, and
other small parts used to assemble and configure a homebuilt computer.
8. Light Source
PC cases are full of shadows, and screws love to roll into the darkest corners. A bright
desk lamp with a long, pose-able neck is handy, but nothing beats a cheap headlamp
for direct illumination. It may look silly, but a headlamp will always point in the right
direction, and it doesn’t require an extra hand to hold it. A flashlight will work in a pinch,
but it will also make multitasking much harder.
9. Pliers
Unfortunately, sometimes the heads of cheap screws get stripped. When this happens,
sometimes the only option is to use a pair of pliers (carefully). Needlenose pliers have a
wide variety of uses, and they often include a wire cutter, which can be used to snip the
excess off of cable ties.
Most CPU coolers come with a patch of thermal paste already applied (or a spare
packet), but there’s no guarantee that it’s high-quality or fresh. Swabbing-off the
provided thermal paste and applying a new layer ensures that the paste is soft and that
the correct amount is used. A small tube of thermal paste should go an extremely long
way for the casual builder, so there’s no need to buy more than one.
Be aware of the policies and rules regarding public computer usage at this site. They
are usually posted somewhere nearby, viewable on the desktop, or available at a Help
Desk. They should specify your access rights to the computer and what type of usage is
considered inappropriate.
Be careful using flash and other portable devices in public computers. Software exists
that can load data to and from drives automatically when they are plugged in, siphoning
your personal information. Drives containing personal or work data should especially not
be used.
This is the method employed by passersby watching what you are doing while using a
computer -- like typing in usernames and passwords. Always take a second to glance
around briefly before typing in any personal information. Notebook Privacy Filters are
another solution.
These are programs that record your key strokes, or everything you type into the
computer. They can very easily be loaded on public computers by other users and
checked at a later time, without the computer owner even knowing. For this reason the
use of credit card numbers or important login information should be avoided on public
computers.
Both before and after using a public computer, you should clean out the temporary
internet files, history, caches, cookies and recycling bin. It is also important to clean out
existing cookies before you start using the computer, so your computer usage is not
recorded.
Your personal software can be carried around and used from a portable drive, including
Internet browsers, instant messengers and word processing programs. This reduces the
amount of information stored on the computer, though it should still be cleaned.
PortableApps.com offers a wide variety of everyday software and it's free. But again be
mindful of tip #2. Apps are one thing; personal information quite another.
Others in the area may be watching your traffic to get usernames and passwords.
Banking and other sensitive web business should not be done until work or home
access is available.
Be respectful when using wireless hotspots since someone else is paying for your
usage. Do not download music or videos illegally or view inappropriate websites. This is
to avoid trouble and to ensure the owner of the hotspot won't be forced to shut it down.
Unattended laptops can disappear very quickly from airports, cafes or hotel rooms.
Always keep your laptop in a locked bag or drawer when possible. Cable locks, alarms
and ID tags are always a good idea. Newer technologies such as biometric IDs and
linking to your cell phone via Blue Tooth will lock out unknown users. If your laptop is
ever stolen, you may also get it back using Absolute Software's LoJack.