Computer Repairs and Troubleshooting

Computer Hardware Repairs

This involves physical components of the computer.

Replacing Components:

  • Hard Drives: Involves removing the old drive, installing a new one, and possibly transferring data.
  • Memory (RAM): Upgrading or replacing faulty RAM sticks to improve performance or resolve issues.
  • Power Supplies: Swapping out a failing power supply unit (PSU) with a new one, ensuring compatibility with other components.
  • Motherboards, CPUs, and More: In more advanced cases, involves replacing or upgrading the motherboard, CPU, graphics cards, and other integral components.

    Apple’s Face ID is a secure and convenient facial recognition feature that utilizes a TrueDepth camera system for fast, reliable and secure access. 

    Apple made a big change in November 2017 when it released the iPhone X: It ditched Touch ID fingerprint security for a new face-based biometric sign-on tool called Face ID. The fingerprint scanner on most post-iPhone X Apple products is gone, and in its place is a new camera array capable of capturing a face map that is, according to Apple, 20 times less likely to be hacked than a Touch ID fingerprint.

    Face ID could bring us into a whole new age of biometric technology, but it isn’t without its critics. Fans of Touch ID and privacy advocates have been critical of Face ID, but like it or not, it’s now part of Apple’s ecosystem.

    Unlocking your phone with a fingerprint is nearly a thing of the past. The modern smartphone user, provided they have the latest Apple products, unlocks their device with a glance.

    How does Face ID work?

    Face ID maps faces in a similar way to how Touch ID maps fingerprints: It doesn’t store an image, but instead makes a map of the face using data points. When those data points match up with a face, it triggers an unlock.

    Apple maps faces with its front-facing camera array called the TrueDepth camera system. In addition to an improved camera, the TrueDepth system uses a dot map projected onto the face that is captured using infrared light.

    Once captured using light, the dot map is sent to the Secure Enclave on the device’s chip, where it is checked against existing records, just like a fingerprint. Face ID can also be used for other things that Touch ID used to do, like paying with Apple Pay or verifying your identity with apps.

    Apple Face ID Benefits

    The primary benefit of Face ID is that it provides fast and secure biometric authentication for device access. Unlike password or pin authentication, you do not need to enter or remember codes.

    And unlike Touch ID, you do not need to place a finger on a specific area on your device. Instead, a simple swipe up as you hold your device in a standard position so the front-facing camera has a view of your face is all that is needed to authenticate and provide access (Figure A).

    Figure A

    Apple mobile device display with the Swipe up to unlock prompt on highlight.
    Once active, Face ID works when you swipe up on a locked Apple mobile device.

    Apple Face ID Drawbacks

    For most people, there are few to no drawbacks to the use of Apple Face ID:

    • People who seek maximum security might prefer to enter a long password comprised of a string of random letters, numbers and characters.
    • People who object to facial scans and have fewer security concerns might prefer to enter a PIN code.
    • People with low or no vision might prefer to authenticate with a PIN, a password or Touch ID.

    However, most people will find that Face ID delivers reliable authentication quickly.

    Those concerned about law enforcement using Face ID to gain access to a secured device don’t need to worry either: A U.S. judge ruled in January 2019 that forcing users to unlock devices using biometric security methods like Face ID violates both the Fourth and Fifth Amendments to the U.S. constitution.

    Which devices support Face ID?

    While Apple has included Face ID on every iPhone — except iPhone SE — in recent years, on tablets the feature remains available only on iPad Pro devices as of 2023. Recent generations of iPad, iPad Air and iPad mini, for example, all feature Touch ID rather than Face ID.

    SEE: Here’s everything you need to know about iPhone 15.

    These devices have specific technology — TrueDepth cameras — that are required for Face ID to function, so don’t expect older Apple devices to get Face ID support in the future.

    How to set up and use Apple Face ID

    Setting up Face ID is similar to setting up Touch ID: The phone will show a picture of your face, tell you to move it in a circle, so it can capture multiple angles, and will tell you when it has enough data (Figure B). Unlocking a device or purchasing something with Face ID is as simple as looking at the device. It will automatically scan your face and unlock or complete the purchase.

    Figure B

    Series of images on how to configure Face ID options.
    Select Settings | Face ID & Passcode, then follow Apple’s instructions and configure Face ID options as desired.

    If you have multiple looks — for example, you wear your hair significantly different for work, remove facial piercings, have distinctive glasses or wear heavy makeup — that could affect your ability to use Face ID, but you can set up alternate appearances in the Settings app.

    With Settings open, tap Face ID & Passcode, then tap Set Up Alternate Appearance. You’ll have to repeat the setup steps from before, and you’ll be all set — just like adding an additional fingerprint with Touch ID.

    How to set up Apple Face ID to work with a mask

    You may even configure Apple Face ID devices to work when you are wearing a facemask of the type commonly used to minimize COVID-19 transmission risks (Figure C). There are two methods of unlocking a mobile Face ID-equipped device when wearing a mask.

    Figure C

    Series of screenshots on how to configure Face ID to work with a mask.
    You may not only add an alternative appearance with Face ID, but also configure it to work with a mask.

    The first method involves using an Apple Watch. Beginning with iOS update 14.5, you can unlock an iPhone using an Apple Watch. First, you must install the iPhone update, and then you must update your Apple Watch using watchOS update 7.4 or later. Next, you must enable Apple Watch to unlock your iPhone by following these steps:

    1. Open Settings on the iPhone.
    2. Select Face ID & Passcode.
    3. Enter your passcode.
    4. Enable the iPhone unlock radio button.
    5. Confirm by pressing Turn On.

    Once those steps are complete, while wearing your Apple Watch, swipe up on the iPhone’s screen as normal. As long as a portion of your face is visible, the iPhone should unlock.

    The Apple Watch method can sometimes prove a little wonky, though. But in March 2022, Apple released iOS 15.4, which enables Face ID to work on iPhone 12 and later models when you’re wearing a mask. The process essentially consists of installing the update, then going to Settings, selecting Face ID & Passcode, enabling the Face ID With A Mask option and following the configuration steps.

    How secure is Apple’s Face ID?

    Although there are reports users have unlocked their iPhone using Face ID with their eyes closed — including when an iPhone’s Face ID and Passcode menu option Require Attention for Face ID option is disabled — Apple states “Face ID requires that the TrueDepth camera sees your face or your eyes.”

    Face ID often works with one eye open, such as in bright sunlight when you might squint. But Apple purposefully took steps designing Face ID to ensure an iPhone or iPad cannot be unlocked using your face unless your intention is specifically to unlock the device. This is why Face ID recognizes whether your eyes are open and you are directing your attention to the iPhone or iPad. Those requirements help prevent someone from unlocking your Face ID-equipped mobile device by holding the device in front of your face while you sleep.

    Apple’s Face ID also cannot be unlocked using a photo or printed picture. According to Apple, “Face ID matches against depth information, which isn’t found in print or 2D digital photographs. It’s designed to protect against spoofing by masks or other techniques through the use of sophisticated anti-spoofing neural networks.”

    Should you use Apple’s Face ID on business devices?

    Face ID is safe to use on Apple mobile devices you use for work, as it helps reduce the potential that a device might be accessed by anyone other than the authorized user or owner. Face ID generally works quickly and accurately to identify the user and allow access.

    Compared to alternative methods of device authentication, Face ID requires little effort on the part of most people. Since Face ID is not available yet for macOS laptop or desktop devices, you’ll need to take other steps to secure those systems.


    The Internet has proved revolutionary for local merchants. Businesses of all sizes have benefited from the proliferation of e-commerce platforms since they have given them access to consumers all over the world. Equalizing access to marketing opportunities is another key contribution of social media, which has made it feasible for even the smallest enterprises to compete with those with much greater resources.

    In addition, the proliferation of smartphones and other mobile devices has made it simpler than ever for entrepreneurs to maintain contact with their clients and staff, run day-to-day operations, and have access to vital information and insights while on the road. Small firms have benefited greatly from the enhanced efficiency and responsiveness made possible by today’s ubiquitous internet.

    Effective Resources for Growing Your Small Business

    Numerous software programs and other tools have been developed over the past two decades to aid small businesses in streamlining their processes, cutting costs, and increasing productivity. Among the most revolutionary tools are:

    In the Cloud:

    The need for small businesses to invest in expensive on-premise hardware and software installations has been greatly reduced by cloud-based services such as Google Workspace, Microsoft Office 365, and Dropbox.

    Information Technology for Relationship Marketing:

    Customer relationship management (CRM) tools like Salesforce, HubSpot, and Zoho have changed the game for small businesses by automating marketing and sales operations, recording customer interactions, and giving actionable data to fuel expansion.

    Shopify, WooCommerce, and BigCommerce are three examples of popular e-commerce platforms that make it simple for even the smallest businesses to launch and operate their own online stores, equipping them with all they need to offer their customers a pleasant online buying experience.

    Software for project management: programs like Trello, Asana, and Basecamp have improved the efficiency and effectiveness of processes and communication between employees at firms of all sizes.

    Google Analytics, Tableau, and Looker are just a few of the analytics and data visualization tools that have helped small businesses harness the value of data and use it to their advantage.

    Using Technology to Improve Tomorrow:

    Small firms that are willing to adapt to the ever-accelerating speed of technological change by investing in the appropriate tools and tactics will be in a strong position to succeed. Small businesses can compete with larger rivals and pave the path for a brighter and more successful future by embracing technology to streamline operations, engage customers, and make data-driven choices.

    By: Richard A. Ovalle Jr

    “Digital Shield: Top 5 Proven Strategies to Safeguard Your Computer from Viruses, Spyware, and Malware”

    Install and Update Antivirus Software: A robust antivirus software is the first defence against viruses, spyware, and malware. Install a reputable antivirus program and set it to update automatically. Regular updates are essential because new threats emerge daily, and your antivirus software must be up-to-date to identify and eliminate the latest risks.

    Use a Firewall: A firewall is a security measure that monitors incoming and outgoing network traffic, acting as a barrier between your computer and the internet. It helps prevent unauthorized access to your system by blocking malicious software and hackers. Ensure your operating system’s built-in firewall is enabled, or install a reliable third-party firewall for added protection.

    Be Cautious with Email Attachments and Links: One common way malware spreads through seemingly harmless email attachments and links. Always be cautious when opening email attachments, even if they appear from a trusted source. Avoid clicking on suspicious or unsolicited links, and never provide personal information through email. Instead, delete the email or contact the sender to verify its authenticity when in doubt.

    Keep Your Operating System and Software Updated: Malware often exploits vulnerabilities in outdated software to infiltrate your computer. Regularly updating your operating system and other software is essential in protecting your computer. Turn on automatic updates for your operating system and frequently used applications to ensure you receive the latest security patches and bug fixes.

    Practice Safe Browsing Habits: Your online behaviour can significantly impact your computer’s security. Avoid visiting suspicious websites, downloading files from unknown sources, or clicking pop-up ads. Use strong and unique passwords for all your online accounts, and consider using a password manager to help you manage them securely. Enable two-factor authentication (2FA) whenever possible for added security.