Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people, just like you, are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
Solved

NUKED EQUIPMENT!

Posted on 2006-11-14
3
319 Views
Last Modified: 2013-11-09
Is it possible for Electronic equipment more specific Wireless network cards to be damaged by Airport XRAY scanners? THe stuff was working fine before it took a ride in the cargo plane.
0
Comment
Question by:MSAIT
3 Comments
 
LVL 9

Accepted Solution

by:
JamesTX10 earned 60 total points
ID: 17938178
Hi MSAIT,
Not that I have ever heard of. It has a better chance of not working from being dropped or banged around while in transit.

JamesTX10
0
 
LVL 69

Assisted Solution

by:Callandor
Callandor earned 20 total points
ID: 17938207
The x-ray machines can fog film, but they are not so powerful that they will damage electronic equipment.  Otherwise, they would be a health risk to anyone nearby and would destroy every electronic device near them, including themselves.  It is more likely that electrostatic discharge, condensation, or mechanical vibration damaged your equipment.
0
 
LVL 13

Assisted Solution

by:wlennon
wlennon earned 20 total points
ID: 17938327
I have flown approximately 1.5 million miles and have had my laptop(s) w/PCMCIA cards through belt X-Rays and in the Cargo Hold and have never experienced any problems.

My newsest laptop has built in Wi-Fi and no problems there either.
0

Featured Post

Enterprise Mobility and BYOD For Dummies

Like “For Dummies” books, you can read this in whatever order you choose and learn about mobility and BYOD; and how to put a competitive mobile infrastructure in place. Developed for SMBs and large enterprises alike, you will find helpful use cases, planning, and implementation.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In this article you will get to know about pros and cons of storage drives HDD, SSD and SSHD.
What do we know about Legacy Video Conferencing? - Full IT support needed! - Complicated systems at outrageous prices! - Intense training required! Highfive believes we need to embrace a new alternative.
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
Although Jacob Bernoulli (1654-1705) has been credited as the creator of "Binomial Distribution Table", Gottfried Leibniz (1646-1716) did his dissertation on the subject in 1666; Leibniz you may recall is the co-inventor of "Calculus" and beat Isaac…

809 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question