© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 2: Introduction to Lab Procedures and Tool Use IT Essentials.

Slides:



Advertisements
Similar presentations
IT Ess I v.4x Chapter 1 RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
Advertisements

Chapter 2: Safe Lab Procedures and Tool Use
A+ Certification Guide
IT Essentials: PC Hardware and Software v4.0. Chapter 2 Objectives 2.1 Explain the purpose of safe working conditions and procedures 2.2 Identify tools.
Assembly / Disassembly / Reassembly Computers. Chapter Objectives After completing this chapter you will: Understand how static electricity can damage.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco PublicNew CCNA Jianxin Tang IT 1 V4.0 Ch2. Safe Lab Procedures and Tool Use.
 Workshop induction. Hazards Magazine,
Chapter 2 Safe Lab Procedures & Tool Use
Chapter 24 Troubleshooting and Maintenance Fundamentals.
Maintaining and Troubleshooting Computer Systems Computer Technology.
1 Lesson 3 Computer Protection Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 2 1 Chapter 2: Safe Lab Procedures and Tool Use IT Essentials: PC Hardware.
IT Essentials: PC Hardware and Software v4.0.  List of chapter objectives  Overview of the chapter contents, including ◦ student worksheets ◦ student.
MAINTAINING AND TROUBLESHOOTING COMPUTER SYSTEMS UNIT 6.
Unit 4, Lesson 9 Keeping You and Your Computer Safe AOIT Computer Systems Copyright © 2008–2013 National Academy Foundation. All rights reserved.
PC Maintenance: Preparing for A+ Certification Chapter 2: Safety and Preventive Maintenance.
PC Repair Fundamentals 1. Objectives Learn about tools you’ll need as a computer support technician Learn how to develop a preventive maintenance plan.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 11 1 Chapter 11: Advanced Personal Computers IT Essentials: PC Hardware.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 IT Essentials PC Hardware and Software 4.1 Instructional Resource Chapter.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 2 1 Chapter 2: Safe Lab Procedures and Tool Use IT Essentials: PC Hardware.
IT Essentials: PC Hardware and Software 1 Chapter 10 Preventative Maintenance.
© Cisco Systems, Inc. All rights reserved. Cisco Public ITE PC v4.1 Chapter 2 1 Chapter 2: Safe Lab Procedures and Tool Use IT Essentials:
COMPUTER CARE & MAINTENANCE. Protecting Your Computer From Damage Like any kind of equipment, your computer requires care and maintenance to run smoothly.
1 Safety and Preventative Maintenance. 2 MB, One megabyte - MB or M-byte - represents about 1 million (10 6 ) bytes. Precisely, 1 MB = = 1 kB x 1 kB =
Chapter 13 Troubleshooting and Maintenance Fundamentals.
Tools.
1 Lesson 3 Computer Protection Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
Copyright © 2008–2011 National Academy Foundation. All rights reserved. Unit 4, Lesson 9 Keeping You and Your Computer Safe AOIT Computer Systems.
© 2010 The McGraw-Hill Companies, Inc. All rights reserved Mike Meyers’ CompTIA A+ ® Guide to Managing and Troubleshooting PCs Third Edition Operational.
Safety 101 : The basics Computer Technician. Static Electricity Builds up through friction When it comes to computers, it can be very damaging Many computer.
Computer Literacy BASICS
Safety. Outcomes  Potential health hazards when working with computer equipment.  Precautions to take to prevent injuries.  Steps and techniques for.
Computer Engineering Technology I – Pilot Objective Use appropriate safety procedures. Course Weight : 2%
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 3: Computer Assembly IT Essentials 5.0.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 2 1 Chapter 2: Safe Lab Procedures and Tool Use IT Essentials: PC Hardware.
Chapter 2: Safe Lab Procedures and Tool Use
IT Essentials PC Hardware & Software v4.1 Chapter 2 – Tools & Safety Procedures Jeopardy Review v1 Darren Shaver Kubasaki High School Okinawa, Japan Chapter.
POWER FLUCTUATIONS Computer Systems. Power Fluctuations Voltage is the force that moves electrons through a circuit Unsteady voltages are called power.
Lesson 10 System Maintenance Core Hardware Fundamentals.
Safe Lab Procedures and Tool Use
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapters 1-4: IT Essentials IT Essentials 5.0.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 4: Overview of Preventive Maintenance IT Essentials 5.0.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 2: Safe Lab Procedures and Tool Use IT Essentials 5.0.
© Cisco Systems, Inc. All rights reserved. Cisco Public ITE PC v4.1 Chapter 2 1 Chapter 2: Safe Lab Procedures and Tool Use IT Essentials:
A+ Computer Repair Lesson 9 Problems Causing Power Events.
HOW NOT TO INCORRECTLY CARE FOR COMPUTER HARDWARE HANDLING AND STORAGE BY BLAINE AND ZACH.
Ahmadu Bello Computer Repair Training Course 3: Assembling/Disassembling of a Desktop computer By Suprix Technology Nigeria (
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 2: Introduction to Lab Procedures and Tool Use IT Essentials.
CONDUCTING TEST ON THE INSTALLED COMPUTER SYSTEM
CompTIA Server+ Certification (Exam SK0-004)
Computer Literacy BASICS
Chapter 2: Introduction to Lab Procedures and Tool Use
Chapter 2: Safe Lab Procedures and Tool Use
Chapter 2: Safe Lab Procedures and Tool Use
IC3 GS3 Standard COMPUTING FUNDAMENTALS Module
Chapter Objectives In this chapter, you will learn:
Chapter 2: Safe Lab Procedures and Tool Use
Chapter 2 Lab Procedures & Tool Use
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 2: Safe Lab Procedures and Tool Use IT Essentials 5.0.
Chapter 2: Safe Lab Procedures and Tool Use
Understanding Operational Procedures
Chapter 2: Safe Lab Procedures and Tool Use
Chapter 6 Purchasing and Maintaining a Computer
Apply your knowledge Module 2.
Chapter 2: Safe Lab Procedures and Tool Use
Chapter 2: Safe Lab Procedures and Tool Use
Computer Literacy BASICS
IT Essentials PC Hardware and Software 4
Chapter 2: Safe Lab Procedures and Tool Use
IT Essentials PC Hardware and Software 4
Presentation transcript:

© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 2: Introduction to Lab Procedures and Tool Use IT Essentials v6.0

Presentation_ID 2 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Safe Lab Procedures Procedures to Protect People  General Safety Make sure a first-aid kit is available. Unsecured cables create tripping hazards. Food and drinks should not be in the workspace. Remove jewelry.  Electrical Safety Computer power supplies are dangerous when disassembled. Watch for printer areas that are hot or that use high voltage. Check the voltage output of AC adapters and chargers before connecting them to devices.

Presentation_ID 3 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Safe Lab Procedures Procedures to Protect People Fire Safety Turn off the power and unplug equipment before performing service. Different types of fires require different types of fire extinguishers; make sure to use to correct one. Be alert for odors emitting from computers and electronic devices. It is important to know how to use a fire extinguisher. Use the memory aid P-A-S-S to help you remember the basic rules of fire extinguisher operation: P - Pull the pin. A - Aim at the base of the fire, not at the flames. S -Squeeze the lever. S -Sweep the nozzle from side to side.

Presentation_ID 4 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Safe Lab Procedures Procedures to Protect Equipment and Data  ESD and EMI ESD can cause damage to computer equipment if not discharged properly. Wrist straps equalize the electrical charge between a person and the equipment. ESD can build up on you as you walk on a carpeted floor. EMI distorts the signals, degrading computer communication. EMI can be generated by large motors, power lines, electrical storms, or any other source of electromagnetic energy. Wireless networks are affected by RFI. RFI is caused by radio transmitters transmitting in the same frequency. EMI is recoverable, ESD is not. Do NOT wear a wrist strap when working on CRTs or power supplies.  Environmental temperature and humidity levels also affect computers.

Presentation_ID 5 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Safe Lab Procedures Procedures to Protect Equipment and Data (cont.)  Power Fluctuation Types Power fluctuations may impact the operation of computer components. Blackouts, brownouts, noise, spike and power surge are types of power fluctuations that can cause data loss or hardware failure.  Power Protection Devices Surge suppressors, UPSs, and SPSs are devices designed to protect computer systems from power fluctuations by providing a constant level of voltage.Surge suppressors UPSs helps protect against potential electrical power problems by supplying electrical power to a computer or other device for a length dependent upon the battery. SPSs helps protect against potential electrical power problems by providing a backup battery to supply power when the incoming voltage drops below the normal level. It does not provide constant power, like the UPS. An SPS is not as effective as a UPS because the SPS must detect a power-out condition first and then switch over to the battery to supply power to the computer. Laser printers should not be plugged to UPSs.

Presentation_ID 6 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Safe Lab Procedures Procedures to Protect the Environment  Safety Data Sheet Use an SDS to obtain information about a material, including procedures for proper disposal. The SDS contains information on the material’s composition, how it can affect personal health, fire hazards, and first-aid requirements. It also includes protective measures for the safe handling and storage of materials and spill, leak, and disposal procedures.  Equipment Disposal Computer equipment contains hazardous materials and should be properly disposed. Follow regulations to protect the environment and avoid fines. Batteries, monitors, toner kits, cartridges, developers, chemical solvents and aerosol cans are examples of equipment that must be properly disposed. Older CTRs often retain residual electricity due to capacitors inside.

Presentation_ID 7 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Proper Use of Tools Hardware Tools Hardware tools are grouped into:  ESD Tools antistatic wrist strap and antistatic mat  Hand Tools include screwdrivers, flashlights, pliers, magnifying glass  Cable Tools include wire cutters and strippers, crimpers and punch down tool, cable tester, tone probe  Cleaning Tools Include special cloths, isopropyl alcohol, canned air, and cable ties  Diagnostic Tools Include digital multimeters, power supply testers, WiFi analyzer, external HDD enclosuremultimeters

Presentation_ID 8 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Let’s see what you have learned... Q:Do not wear an ESD wrist strap when working on _____ or _____ _____. A:monitors, power supplies Q:Which is recoverable, ESD or EMI? A:EMI Q:What is a reduced voltage level of AC power that lasts for a period of time? A:brownout Q:Where would you find ways to effectively dispose of hazardous materials? A:on the MSDS effectively dispose of them

Presentation_ID 9 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Proper Use of Tools Software Tools  Like hardware tools, software tools are task- specific.  Programs are used to diagnose problems, maintain hardware, and protect the data stored on a computer. Check Now, System File Checker, Defrag, Disk Cleanup  Disk Management Tools used for disk management, formatting, error checking, drive optimization, disk cleanup and more  Protection Software Tools Malicious software can damage or compromise operating systems, applications, and data. Software protection tools include antivirus, antispyware, firewalls and update manager software.

Presentation_ID 10 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Proper Use of Tools Organizational Tools It is important that a technician document all services and repairs for future reference.  Personal Reference Tools include troubleshooting guides, manufacturer manuals, quick reference guides, and repair journals History of repairs and a notepad can be extremely useful as a technician performs troubleshooting and repairs. The Internet can be a great reference tool by providing access to specialized forums, search engines, manufacturer’s FAQs, and more.  Miscellaneous Tools Additional secondary items can be added to the toolkit. Electrical tape, a working computer and even pencil eraser can be very useful additions to a technician’s kit.

Presentation_ID 11 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Let’s see what you have learned... Q:What software utility is used to optimize space on a hard drive? A:defrag Q:What command-line utility scans the operating system critical files and replaces any files that are corrupted? A:system file checker Q:What system utility is used to manage hard drives and partitions? A:disk management Q:What system utility is used to clear space on a hard drive by searching for files that can be safely deleted? A:disk cleanup

Presentation_ID 12 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential  This chapter discussed safe lab procedures, correct tool usage, and the proper disposal of computer components and supplies.  Work in a safe manner to protect users and equipment.  Follow all safety guidelines to prevent injuries to yourself and others.  Know how to protect equipment from ESD damage.  Know about and be able to prevent power issues that can cause equipment damage or data loss.  Know which products and supplies require special disposal procedures.  Familiarize yourself with the SDS for safety issues and disposal restrictions to help protect the environment.  Be able to use the correct tools for the task.  Know how to clean components safely.  Use organizational tools during computer repairs. Chapter Summary Summary

Presentation_ID 13 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Assignments  Carefully read Chapter 2 completing any interactive activities included and watching any embedded videos.  Complete Lab Diagnostic Software  Complete Lab Using a Multimeter and a Power Supply Tester  Go to 801/motherboard-expansion-slots-and-bus-speeds/. Watch the video about motherboard expansion slots and bus speeds. Write up a summary that includes your name, the name of the video (“Motherboard Expansion Slots and Bus Speeds”), and a five- to six- sentence paragraph summarizing the video. Save as Professor Messer Video No /motherboard-expansion-slots-and-bus-speeds/

Presentation_ID 14 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential