ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: When Was the Last Time You Cleaned Your PC?

b2ap3_thumbnail_clean_your_pc_400.jpgA clean computer is one that you can rely on. Like all other kinds of technology, a computer needs regular maintenance and cleanup sessions that preserve its working ability and prolong its life. Since January is Clean Up Your Computer Month, there’s no time like the present to ensure that your PC is squeaky clean. Here’s how you can give your computer and its components a comprehensive cleaning.

Before you start cleaning your PC, you should be sure to power the PC down and unplug it from the power supply. Doing so makes sure that you don’t accidentally damage both yourself or the PC while cleaning it.

The Monitor
Believe it or not, you might not immediately realize that your monitor is in need of some serious cleaning. Just take a good, hard look at it. Dirt, dust, fingerprints, and other grime can accumulate, giving your monitor a very nasty look. If your monitor is in especially gross condition, it might even be difficult to read what’s on the screen. Hopefully it never gets that way, but you should know that cleaning your monitor once in awhile can go great lengths toward enhancing your user experience.

The process is easy enough, as long as you keep one imperative rule in mind: Absolutely do not spray any liquids directly on the screen. Spraying something at the screen makes it much more difficult to control, which means that the chances of chemicals or water seeping into the monitor are greater. In most cases, your best bet is to use a damp cloth to wipe the monitor down. Water should work fine, but for LCD displays you’ll want to consider using rubbing alcohol. As always, take a minimal risk when cleaning the monitor, and you shouldn’t have any trouble. Once the screen is clean, all you have to do is vacuum away any remaining dust, and make sure that any monitor vents aren’t obstructed.

The Keyboard
As you might guess, the keyboard is the grimiest part of your PC setup. In fact, keyboards are known to hold more bacteria and germs than the average toilet seat. This is why it’s so important to clean your keyboard from time to time, if not regularly. Before starting, it’s important that your PC is powered down when you unplug the keyboard from the computer. If you’re using an older keyboard and you don’t power your PC down first, it could cause some severe problems, but it’s more likely that you’re using a USB-connected keyboard. Either way, make sure you shut down the PC, just to be safe.

First, you’ll want to make sure that you have a surface nearby that’s easy to wipe off. You’ll be turning your keyboard upside down and shaking it. Just take a moment to appreciate all of the nasty particles that accumulate underneath the keys. All of that is dust, food, and dead skin. Next, you should use a can of compressed air to dislodge some of the more stubborn particles. Depending on how nasty they are, you might have to remove keys to get the best clean. To safely remove a key, press down on the key directly beneath it, and insert a flat object (like a butter knife or a flat-head screwdriver) under the key. Apply the proper leverage and it should pop off easily enough. From there, it’s as simple as blowing compressed air and carefully wiping down surfaces that need it. As long as you haven’t spilled soda or coffee on your keyboard, this process should be good enough to achieve a decent level of cleanliness.

The PC Itself
Cleaning the rest of your PC is mostly a matter of looking at the fans on the computer casing. These fans are responsible for cooling the system, but when they start to collect dust, a PC might be at risk of overheating. An overheating PC can lead to serious long-term damage, like hardware failure or data loss. The best way to take the fight to this inevitable issue is to use a can of compressed air. Blow the dust away from the fan, not into the computer casing.

It’s a pretty good idea to give your PC a once-over with compressed air. Dust can accumulate on a piece of machinery that remains stationary for too long, and a computer is no exception. As mentioned before, steer clear of spraying any liquid anywhere inside or outside a computer, unless you know exactly what you’re doing. You don’t want to ruin any internal components of your PC while trying to clean it.

It’s a best practice to clean out your PC hardware every 6-to-12 months, but this can vary depending on how dusty your working area is. You’ll most likely be cleaning only the computer case fans, but it’s also a good idea to clean the inner mechanisms of your PC on occasion. Doing so can be dangerous without the oversight of a professional IT technician though, so proceed at your own risk. If you’re ever unsure of whether or not you’re handling your tech correctly, give ClearView IT a call. We’d be happy to advise you on PC cleaning best practices.

For more computer tips and tricks, be sure to subscribe to our blog.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, 06 May 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Network Security Privacy Data Cloud Business User Tips IT Support Internet Hardware Innovation Email Hosted Solutions Malware Efficiency Workplace Tips Computer Microsoft Google Collaboration Android Phishing Business Management Cybersecurity IT Services Backup Data Backup Ransomware Smartphone communications Small Business Upgrade Microsoft Office Smartphones Mobile Devices Network Communication Managed IT Services Data Recovery Quick Tips Productivity VoIP Users Social Media Mobile Device Tech Term Automation Facebook Windows 10 Business Continuity Disaster Recovery Covid-19 Passwords Holiday Managed Service Windows 10 Apps IT Support Browser Miscellaneous Cloud Computing Outsourced IT Managed Service Provider Data Management Internet of Things Remote Work Operating System Government Saving Money Gadgets Artificial Intelligence Managed IT services Workplace Strategy Networking Windows Mobile Device Management Server Spam Information Bandwidth Business Technology Encryption Remote Blockchain WiFi App Virtualization Two-factor Authentication Office 365 Apple Information Technology History Employee/Employer Relationship Gmail Budget Office Access Control Data Security BDR Cybercrime Health Analytics Wi-Fi Big Data Conferencing Voice over Internet Protocol Patch Management Cost Management Vendor Hacker Remote Monitoring Employer-Employee Relationship Document Management Compliance Save Money IT Management Remote Computing Training Help Desk Hacking Computing Vendor Management Hard Drive Mobile Office Applications Money Managed Services Search... Best Practice Project Management Customer Service Unified Threat Management Vulnerabilities Firewall Legal Retail Data storage Augmented Reality Alert Word Hiring/Firing IBM Outlook Website Password Data loss BYOD Update Laptop Remote Workers Mobile Computing Data Breach Windows 7 Marketing Paperless Office Free Resource Antivirus Running Cable Twitter Maintenance Law Enforcement Sports How To Social End of Support SaaS Storage DDoS Printer Monitoring Healthcare Websites iPhone Mobility Education Cortana Meetings Content Filtering User Travel Google Maps Virtual Reality Social Engineering Scam Router Cryptocurrency Black Market Cleaning Chrome VPN The Internet of Things Windows 11 Robot YouTube Managed IT Professional Services PowerPoint Digital Virtual Assistant Wireless Technology Solid State Drive Administration eWaste Presentation Taxes Specifications Drones IT Consultant Downtime Managed Services Provider Chromebook Processor Safety Virtual Private Network Automobile Customer Relationship Management Virtual Desktop Co-Managed IT Physical Security Experience How To Current Events Entertainment Microchip Flexibility Solutions Multi-factor Authentication Start Menu Integration Downloads Images 101 Computer Care Disaster Hack Display Identity Theft Vulnerability Saving Time Notifications Unified Communications Software as a Service Google Docs HIPAA Data Protection Computers Employees Bitcoin Lithium-ion battery Avoiding Downtime Bluetooth Telephone Distributed Denial of Service Office Tips Holidays Private Cloud Memory Processors Cooperation Excel Video Conferencing Politics Tech Terms Virtual Machines Computer Repair Machine Learning Settings Google Wallet Telephone System Regulations PCI DSS Public Speaking Licensing Banking Messenger Supply Chain Deep Learning Directions Streaming Media Backup and Disaster Recovery Gig Economy Web Server Humor Digital Payment Desktop Internet Service Provider Keyboard Azure SharePoint Content Business Communications Hosted Solution Electronic Payment Electronic Medical Records Worker Accountants Regulations Compliance Hard Drives Managed IT Service Business Metrics intranet Books Workplace Access Database Memes Wireless Public Cloud Net Neutrality Shortcut Language Society Time Management Human Resources Health IT Phone System Equifax Financial Data Heating/Cooling Environment Social Networking Reading Scams Monitors Audit Windows XP Visible Light Communication Spyware Tactics Risk Management Hard Drive Disposal IT File Sharing Windows 8 Username Google Apps Redundancy Startup Telework Freedom of Information Relocation Microsoft 365 Cables Displays Navigation Advertising Cache Addiction Smartwatch email scam Communitications Computer Accessories Workers Mobile Security Procurement Work/Life Balance Tech Support Unified Threat Management User Tip Legislation FinTech News IT Assessment Point of Sale Printing Evernote Network Management CES CCTV Staffing Supply Chain Management In Internet of Things Value Touchscreen Shortcuts Network Congestion Emergency Proxy Server Emails Organization IP Address Computer Malfunction Fake News Cyber security Hacks Smart Devices Reliable Computing Writing Vendor Mangement Service Level Agreement Computing Infrastructure Samsung Device security Remote Working Management Be Proactive Uninterrupted Power Supply Wireless Headphones AI Webcam Microsoft Excel Trend Micro Electronic Health Records Scalability Transportation Tech Troubleshooting Business Mangement Going Green Digital Security Cameras Business Cards Error Recovery Tablets Competition Administrator Wasting Time Text Messaging Proactive IT Bring Your Own Device Modem Workplace Strategies Bookmark eCommerce Supercomputer Piracy Surveillance Entrepreneur Google Calendar Term LiFi Download Videos Music Virus Documents HTML Application Managing Costs SSID Browsers Nanotechnology Motion Sickness Business Intelligence Software License Development Employer/Employee Relationships Comparison Google Play Business Owner Google Drive Upload Media Social Network Securty Botnet Virtual Machine Rental Service Smart Technology Micrsooft Knowledge Data Analysis Corporate Profile Screen Reader Reviews Domains Optimization Employer Employee Relationship Mobile Technology Teamwork Flash Television Security Cameras Telephony Trends 2FA Business Growth Customer Resource management Cabling Devices Data Storage Hypervisor Telephone Systems Medical IT Fileless Malware Tablet Shopping G Suite Tip of the week Tracking Company Culture SQL Server Mouse Inbound Marketing VoIP Gamification Paperless

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?