Solved

Tear down guide

Posted on 2011-02-12
7
353 Views
Last Modified: 2013-12-27
Hi all

I need a tear down guide for a packard bell esaynote 3245
0
Comment
Question by:davy999
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 3
7 Comments
 
LVL 92

Accepted Solution

by:
nobus earned 500 total points
ID: 34877775
0
 
LVL 6

Author Comment

by:davy999
ID: 34877944
Hi Nobus

Ive have this link but its for a easynote s and it does'nt look the same as the 3245
0
 
LVL 92

Expert Comment

by:nobus
ID: 34878484
did you try it?
any how the procedure is nearly always identical :
look for screws on the bottom side (note where they come from)
then pry open the part between keyboard and hinges
that 's how it starts
0
Migrating Your Company's PCs

To keep pace with competitors, businesses must keep employees productive, and that means providing them with the latest technology. This document provides the tips and tricks you need to help you migrate an outdated PC fleet to new desktops, laptops, and tablets.

 
LVL 9

Expert Comment

by:sah18
ID: 34878546
Is that the entire model number?  When searching, I'm finding numbers with a letter just before them, such as:  C3245 and E3245.  Just wanted to make sure that was the precise entire number.
0
 
LVL 6

Author Comment

by:davy999
ID: 34878608
Sorry i can see there is an E Before 3245

Nobus iam down to removing the motherboard but there a screw i cant get at
thats why i need the exact teardown.
0
 
LVL 92

Expert Comment

by:nobus
ID: 34879060
can you post a couple of pics?  maybe i can help then
0
 
LVL 6

Author Comment

by:davy999
ID: 34879251
I will do that but it wont be for a couple of days, ian on holiday
0

Featured Post

Simplifying Server Workload Migrations

This use case outlines the migration challenges that organizations face and how the Acronis AnyData Engine supports physical-to-physical (P2P), physical-to-virtual (P2V), virtual to physical (V2P), and cross-virtual (V2V) migration scenarios to address these challenges.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Moving your enterprise fax infrastructure from in-house fax machines and servers to the cloud makes sense — from both an efficiency and productivity standpoint. But does migrating to a cloud fax solution mean you will no longer be able to send or re…
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
In this video we outline the Physical Segments view of NetCrunch network monitor. By following this brief how-to video, you will be able to learn how NetCrunch visualizes your network, how granular is the information collected, as well as where to f…
NetCrunch network monitor is a highly extensive platform for network monitoring and alert generation. In this video you'll see a live demo of NetCrunch with most notable features explained in a walk-through manner. You'll also get to know the philos…

734 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question