Direct Technology Group Blog

Direct Technology Group provides professional IT Support and Network Services for Businesses around South Florida. Computer Services, Tech Support, IT Solutions and more!

Tip of the Week: How to Save Your Keyboard After Spilling Your Drink On It

b2ap3_thumbnail_keyboard_cleaning_400.jpgYou know that you shouldn’t keep a beverage near your computer, but how good are you at actually abiding by this best practice? Due to the busyness of our modern lives, it’s likely that most office workers eat more meals at their computer than away from it. Inevitably, this will lead to a drink spilt on your keyboard, which can put you in a rather sticky situation.

When your keyboard takes an unintended plunge, what can you do about it?

First off, don’t just sit there with your keyboard sopping wet and try typing into Google, “How to clean Mountain Dew off my keyboard.” The liquid will only seep further into your keyboard, making it extremely difficult to type. Actually, a sugary substance like Mountain Dew will cause your keys to stick, which means that your Google Search query would actually look something like this:

not good ib1

Don’t lollygag when faced with a liquid-on-your-keyboard crisis or you’ll just make the problem worse. Instead, take immediate action by following these five steps:

Power Off Your Computer and Disconnect the Keyboard
By far, your computer is way more important than your keyboard (and quite possibly your outfit that also took a Mountain Dew bath). Therefore, as soon as you can, be sure to either disconnect your keyboard. Most modern keyboards are USB, so they can be unplugged with the computer on, but other keyboards use round connectors. Unplugging the round connectors while the PC is on could cause damage, so if you aren’t sure just shut the PC down before disconnecting the keyboard. Act quickly, the liquid may seep into the keyboard’s circuits and cause some problems (and not the good kind like we saw from Coca-cola’s spilt-soda-on-computer scenario).

Flip the Keyboard Upside Down and Give it a Good Shaking
When you encounter a spill, your first instinct is to get up and grab a towel. Before you do that, flip your keyboard over and shake it. Basically, when dealing with a spill, you’ve got precious little time to locate a towel while the ill-fated beverage seeps deeper and deeper into your circuits.

Wipe Down Your Keyboard
After gravity has done its job and drained as much liquid as possible, now is the time to use a dry cloth to wipe down your mess. Do what you can to get in between the keys, but don’t do anything drastic like apply too much force or pop off the keys, yet. For now, the goal is clean up, not detailing.

Let it Dry Overnight
Next, find a dry place to let your keyboard sit upside down overnight. When you come back to it the next day, look for any additional moisture that may be left and give it a wiping.

Check for Stickiness
Before plugging in your now-dry keyboard, press on every key to check for stickiness. This will most likely be the case if you split a sugary substance, like Mountain Dew. To clean out the stickiness, you’ll have to remove the keys to really clean underneath. Computer Hope offers some solid advice on how to do this:

Removing a standard keyboard key is simple. Start by pressing down on the key in front of the key you want to remove and insert a flat object such as a car key... or a small flathead screwdriver below the key. Once below the key twist it or push down until the key pops off. If you want to remove more than one key, repeat this process until all keys are removed.

Once you’ve got your keys removed, using a tool like a Q-tip will really help with those small and hard-to-reach places, with both your keyboard and your ear canal.

Lastly, with your keyboard fully cleaned and dry, plug it in and give it a spin. If you were fast-acting enough to catch the mess, then you might have been able to save it. Although, if the spill was too great, then your keyboard might be toast and you’ll have to replace it. You’ll know for sure when you sit down with your cleaned keyboard and try it out.

We hope that you’ve found this week’s tip helpful. For more great technology tips, subscribe to Direct Technology Group’s blog and check back every week.

Think Strategically When Upgrading Your Workstatio...
4 Scenarios to Consider On Disaster Preparedness D...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, 21 January 2020

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Business Computing Cloud Google Hackers Microsoft Efficiency Malware Network Security Data Innovation Productivity Software User Tips Miscellaneous Email Business Smartphones Backup Mobile Devices Internet Hardware communications Hosted Solutions Workplace Tips Computer Productivity Android Smartphone Communication VoIP Business Management Ransomware Windows 10 Cybersecurity Outsourced IT Windows Upgrade Browser Managed IT Services Small Business Social Media Network Tech Term IT Support Mobile Device Employer-Employee Relationship Passwords IT Services Bandwidth Microsoft Office Save Money Business Continuity Holiday Windows 10 Collaboration Apps Facebook Users Managed IT Services Office Chrome Automation Cloud Computing Internet of Things Data Backup IT Support Marketing Gadgets Gmail Quick Tips Data Recovery Password Wi-Fi Mobile Device Management Disaster Recovery Wireless Networking Apple Server Router Alert Applications Retail Managed Service Provider Information Computers Business Intelligence App Hacking Virtualization Office Tips VPN Managed Service Health Mobility Remote Computing Settings Blockchain Patch Management Office 365 Analytics BYOD Laptop Physical Security Application Saving Money Remote Monitoring Excel Cybercrime Government Phishing Website Law Enforcement Operating System Access Control iPhone Data Management Spam Telephone Systems Bring Your Own Device Biometrics Value Entertainment Going Green History Twitter WiFi Mouse BDR Word Big Data Google Drive Workers Safety Recovery Virus VoIP Paperless Office Social Engineering Environment Politics Managed IT Service Maintenance Compliance Data Breach Lithium-ion battery Humor Artificial Intelligence Mobile Computing Battery End of Support Connectivity Voice over Internet Protocol Mobile Office Current Events Search Batteries Social Network Human Resources Telephone System Cleaning Hosted Solution Dark Web DDoS Robot Wireless Charging Hard Drives Tech Support IT solutions Tip of the week Payment Cards Customer Relationship Management Risk Management Customer Service Virtual Assistant Data Protection Internet Exlporer Windows 7 HIPAA How To Streaming Media Hybrid Cloud Fax Server The Internet of Things Tech Terms Remote Monitoring and Management RAM Cost Management Two-factor Authentication Sports PowerPoint Net Neutrality Information Technology Employee-Employer Relationship Business Technology Vulnerability eWaste Processor Company Culture Scam Healthcare Cortana Smart Technology User Error Printer Telephony G Suite Best Practice Data Security Files Printer Server Tablet Shortcut Data storage Managing Stress Medical IT Running Cable Recycling Profitability Vendor eCommerce Digital News Uninterrupted Power Supply Chromecast Payment Monitor Hard Disk Drive Entrepreneur Staff GDPR Access Comparison disposal Copy Internet exploMicrosoft Social Networking Eliminating Downtime Online Shopping Downloads Tablets Edge Antivirus Techology instant Messaging Meetings Reputation Video Phone System Websites Storage Printers Specifications Paste Google Maps Advertising Bitcoin User Wireless Internet Distribution Trends Amazon Education HaaS Vulnerabilities Customer OneNote Dongle Error Conferencing Spotify Distributed Denial of Service Private Cloud Help Desk Fleet Management Lead Generation A.I. Memory IT budget Plug-In Personal Information Remote Support Shadow IT Flexibility Hiring/Firing Budget Cryptocurrency Windows Server 2008 R2 Touchscreen Content Filtering Database Cabling Remote Control Botnet Public Cloud Threats Bluetooth Certification Multi-Factor Authentication Movies IT Management Proactive IT SaaS Legal Staffing Touchpad Taskbar Programming Technology Tips Microsoft Office 365 User Tip Tactics Spam Blocking Managed IT Scams USB Training Holidays WannaCry Unified Communications Time Management File Sharing SharePoint Relocation National Security Backup and Disaster Recovery Authentication Telecommuting Internet Explorer Windows XP Email Management Hard Drive Encryption PDF Project Management Security Cameras Virtual Private Network Chrome OS Analyitcs Network Attached Storage Analysis User Security Video Games Updates Consultant SSD Authorization Computer Accessories Millennials Threat Processors Microsoft Teams Licensing Notifications Insurance Wearables Co-Managed IT Hacker Server Management Gadget Black Market Webcam Best Available Inventory Troubleshooting Cameras Printing Spyware Travel YouTube Memes Science Electronic Health Records Machine Learning Worker Alerts Display Mobile Security Update File Management Paper Windows 8 HP Live Streaming NarrowBand IT Downtime Employees WIndows 7 Virtual Reality Telecommute Reporting Unified Threat Management Sales Work/Life Balance Avoiding Downtime Multi-Factor Security Wearable Technology Benchmarks Social e-waste Outlook Managed Services Provider Voice over IP Ink Document Management Cables Windows Media Player Automobile WhatsApp Wireless Technology E-Commerce Hosted Desktop People Solid State Drive Bloatware Data loss Knowledge