Solved

How do I remove a wireless card on a toshiba tecra M!

Posted on 2009-04-03
1
589 Views
Last Modified: 2013-11-09
Hello,

I am having issues that point to a defective wireless adapter. I want to remove the existing adapter to see it and get the part number so that I can look for a spare part to replace it.
I am familiar with the removal of the keyboard to get to the place where you can add memory, etc. But the wireless adapter appears to be in an area that does not seem as easy to get to, so I am looking for instructions for the removal of the wireless card.
Does anyone have a link with the instructions for this task?

Thank you.
0
Comment
Question by:Aguillon1949
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 7

Accepted Solution

by:
tplaya07 earned 500 total points
ID: 24064117
0

Featured Post

Secure Your Active Directory - April 20, 2017

Active Directory plays a critical role in your company’s IT infrastructure and keeping it secure in today’s hacker-infested world is a must.
Microsoft published 300+ pages of guidance, but who has the time, money, and resources to implement? Register now to find an easier way.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Internet speed from ISP 173 mbps WiFi only 30 mbps 8 191
wifi turns off automatically in window 10 40 246
Wireless connection 6 57
Booster, Repeater, or Wireless Access Point 9 59
Last Mile Wireless The term last mile wireless is a bit deceptive as it can be much more than a mile. It is also called WiMax and 802.16. It generally refers to relatively short distance point-to-point / point-to-multipoint secure wireless connecti…
In the modern office, employees tend to move around the workplace a lot more freely. Conferences, collaborative groups, flexible seating and working from home require a new level of mobility. Technology has not only changed the behavior and the expe…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
I've attached the XLSM Excel spreadsheet I used in the video and also text files containing the macros used below. https://filedb.experts-exchange.com/incoming/2017/03_w12/1151775/Permutations.txt https://filedb.experts-exchange.com/incoming/201…

756 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question