Understanding Operational Procedures

Slides:



Advertisements
Similar presentations
Safety Promotion Basic Health Care; HCE100.
Advertisements

Safety Overview Take notes You will be tested
Occupational Health and Safety (OHS)
IT Essentials: PC Hardware and Software v4.0. Chapter 2 Objectives 2.1 Explain the purpose of safe working conditions and procedures 2.2 Identify tools.
Assembly / Disassembly / Reassembly Computers. Chapter Objectives After completing this chapter you will: Understand how static electricity can damage.
© 2013 The McGraw-Hill Companies, Inc. All rights reserved Mike Meyers’ CompTIA A+ ® Guide to 801: Managing and Troubleshooting PCs Fourth Edition (Exam.
Module 2 PC Technician. Safety Measures Personal safety is your top priority when working with computer components. Exercise great care when working with.
 Workshop induction. Hazards Magazine,
Installing Windows XP Professional Using Attended Installation Slide 1 of 38Session 3 Ver. 1.0 CompTIA A+ Certification: A Comprehensive Approach for all.
CIT In this chapter you will learn how to:  Care for the external parts of the computer  Describe methods for keeping the inside of the case problem-free.
Chapter 2 Safe Lab Procedures & Tool Use
Technician License Course Chapter 9 Lesson Module 20: Electrical Safety.
Technician License Course Chapter 9 Lesson Module 20: Electrical Safety.
1 Lesson 3 Computer Protection Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
MAKE SURE YOUR OWN ACTIONS REDUCE RISKS TO HEALTH AND SAFETY.
Unit 4, Lesson 9 Keeping You and Your Computer Safe AOIT Computer Systems Copyright © 2008–2013 National Academy Foundation. All rights reserved.
PC Maintenance: Preparing for A+ Certification Chapter 2: Safety and Preventive Maintenance.
PC Repair Fundamentals 1. Objectives Learn about tools you’ll need as a computer support technician Learn how to develop a preventive maintenance plan.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 IT Essentials PC Hardware and Software 4.1 Instructional Resource Chapter.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 2 1 Chapter 2: Safe Lab Procedures and Tool Use IT Essentials: PC Hardware.
© Cisco Systems, Inc. All rights reserved. Cisco Public ITE PC v4.1 Chapter 2 1 Chapter 2: Safe Lab Procedures and Tool Use IT Essentials:
1 Safety and Preventative Maintenance. 2 MB, One megabyte - MB or M-byte - represents about 1 million (10 6 ) bytes. Precisely, 1 MB = = 1 kB x 1 kB =
1 Lesson 3 Computer Protection Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
Copyright © 2008–2011 National Academy Foundation. All rights reserved. Unit 4, Lesson 9 Keeping You and Your Computer Safe AOIT Computer Systems.
Health and Safety Policy
© 2010 The McGraw-Hill Companies, Inc. All rights reserved Mike Meyers’ CompTIA A+ ® Guide to Managing and Troubleshooting PCs Third Edition Operational.
Safety 101 : The basics Computer Technician. Static Electricity Builds up through friction When it comes to computers, it can be very damaging Many computer.
Chapter 7 Safety. Introduction This chapter covers the following topics: Dangers of electricity Preventive measures Electrostatic discharge Safety practices.
Safety. Outcomes  Potential health hazards when working with computer equipment.  Precautions to take to prevent injuries.  Steps and techniques for.
Course ILT Safety Unit objectives Identify safety issues and hazards in the computer environment Identify ways to avoid injury and strain when working.
Computer Engineering Technology I – Pilot Objective Use appropriate safety procedures. Course Weight : 2%
Computer Safety Basics Microsoft Academy. Types of Hazards  Electric Shock  Sharp Edges  Muscle Strain  Dust.
OCCUPATIONAL HEALTH AND SAFETY STANDARDS
IT Essentials PC Hardware & Software v4.1 Chapter 2 – Tools & Safety Procedures Jeopardy Review v1 Darren Shaver Kubasaki High School Okinawa, Japan Chapter.
Copyright ExplorNet™ Operational Procedures Safety and Environmental Computer Engineering Level 1 Objective
Safe Lab Procedures and Tool Use
COMPUTER HARDWARE SERVICING
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 2: Safe Lab Procedures and Tool Use IT Essentials 5.0.
© Cisco Systems, Inc. All rights reserved. Cisco Public ITE PC v4.1 Chapter 2 1 Chapter 2: Safe Lab Procedures and Tool Use IT Essentials:
HOW NOT TO INCORRECTLY CARE FOR COMPUTER HARDWARE HANDLING AND STORAGE BY BLAINE AND ZACH.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 2: Introduction to Lab Procedures and Tool Use IT Essentials.
Your Classroom is Full of Hazards!...Let’s Fix It. Presented by James Hernandez
San Francisco Electricians. Why Do You Need to Call an Electrician? Most of us have studied that one subject about circuits, electricity, and electrons.
Operational Procedures
Automotive Engines Theory and Servicing
Chapter 2: Introduction to Lab Procedures and Tool Use
Handout 1: Health and safety at work
Chapter 13: The IT Professional
Instructor Materials Chapter 13: The IT Professional
Section 11.2 Safety on the Job
Mangan Inc. Hazard Communication 11/15/2012
Chapter 4: Overview of Preventive Maintenance
Health and Safety Policy
Chapter 13 The IT Professional
Safety in the Workplace
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 2: Safe Lab Procedures and Tool Use IT Essentials 5.0.
Understanding Operational Procedures
Apply your knowledge Module 2.
Reference: Diversified Health Occupations
Computer Repair & Maintenance
1 Safety in the Small Gas Engine Shop. 1 Safety in the Small Gas Engine Shop.
Health and Safety Induction
Follow safety rules so that YOU: Avoid getting HURT.
Unit 4: Infection Control and Safety Precautions
OBJECTIVES After studying Chapter 2, the reader should be able to:
IT Essentials PC Hardware and Software 4
Chapter 13: The IT Professional
College of Dental Medicine
Automotive Engines Theory and Servicing
IT Essentials PC Hardware and Software 4
Presentation transcript:

Understanding Operational Procedures Chapter Twenty-Three Understanding Operational Procedures

220-902 Objectives Covered Protection from airborne particles 5.1 Given a scenario, use appropriate safety procedures. Equipment grounding Proper component handling and storage Antistatic bags ESD straps ESD mats Self-grounding Toxic waste handling Batteries Toner CRT Personal safety Disconnect power before repairing PC. Remove jewelry. Lifting techniques Weight limitations Electrical fire safety Cable management Safety goggles Air filter mask Compliance with local government regulations 5.2 Given a scenario with potential environmental impacts, apply the appropriate controls. MSDS documentation for handling and disposal Temperature, humidity level awareness, and proper ventilation Power surges, brownouts, blackouts Battery backup Surge suppressor Protection from airborne particles Enclosures Air filters/Mask Dust and debris Compressed air Vacuums Compliance to local government regulations

220-902 Objectives Covered Incident response Licensing / DRM / EULA 5.4 Demonstrate proper communication techniques and professionalism. Use proper language – avoid jargon, acronyms, slang when applicable. Maintain a positive attitude / project confidence. Actively listen (taking notes) and avoid interrupting the customer. Be culturally sensitive. Use appropriate professional titles, when applicable. Be on time (if late, contact the customer). Avoid distractions. Personal calls Texting / Social media sites Talking to co-workers while interacting with customers Personal interruptions Dealing with difficult customer or situation Do not argue with customers and/or be defensive. Avoid minimizing customer’s problems. Avoid being judgmental. Clarify customer statements (ask open-ended questions to narrow the scope of the problem, restate the issue or question to verify understanding). Do not disclose experiences via social media outlets. Set and meet expectations/timeline and communicate status with the customer. Offer different repair/replacement options if applicable. Provide proper documentation on the services provided. Follow up with customer/user at a later date to verify satisfaction. Deal appropriately with customer’’s confidential materials. Located on a computer, desktop, printer, etc. 5.3 Summarize the process of addressing prohibited content/activity, and explain privacy, licensing, and policy concepts. Incident response First response Identify Report through proper channels Data/device preservation Use of documentation/documentation changes Chain of custody Tracking of evidence/ documenting process Licensing / DRM / EULA Open source vs. commercial license Personal license vs. enterprise licenses Personally Identifiable Information Follow corporate end-use policies and security best practices

PC Safety Issues Break them into 4 general areas: Computer components Electrostatic discharge Electromagnetic interference Natural elements

Components Power Supply Monitor Case Keyboard/Mouse Printer High Voltage Probe=> Power The two biggest dangers with power supplies are burning or electrocuting yourself – capacitors hold charge even when unplugged. Connect a resistor across the leads of the capacitor to discharge Monitor do not try to repair monitors A+ exam may test your knowledge of the safety practices to use if you ever you need to do so. If you have to open a monitor, you must first discharge the high-voltage charge on it by using a high-voltage probe. Do not use an ESD strap when discharging the monitor; doing so can lead to a fatal electric shock The Case be careful when handling them. You can, for example, cut yourself by jamming your fingers between the case and the frame when you try to force the case back on Keyboard/Mouse Keep liquids far Free the cords The Printer Do not turn Toner upside down Do not put any objects into the feeding system Do not look directly into the source of the laser do not try to blow in the ink cartridge to clear a clogged opening Laser printers use very high voltage power sources Don’t burn yourself on internal components

Electrostatic Discharge (ESD) Antistatic Wrist Straps Touch the chassis/Self grounding Anti-static bags for parts ESD Antistatic Mats Increase Humidity CPU chips and memory chips are particularly sensitive to ESD. Be extremely cautious when handling them Just by sitting in a chair, you can generate around 100 volts of static electricity This voltage can occur in any room with very low humidity—like a heated room in wintertime For an antistatic wrist strap to work properly, the computer must be plugged in but turned off. When the computer is plugged in, it is grounded through the power cord. When you attach yourself to it with the wrist strap, you are grounded through the power cord as well. If the computer is not plugged in, there is no ground and any excess electricity on you will just discharge into the case, which is not good. Dry air promotes static electricity This mat drains excess charge away from any item coming in contact with it (see Figure 23.2).

Electromagnetic Interference (EMI) also known as radio frequency interference (RFI): Network devices Magnets Cordless phones Microwave ovens EMI is an unwanted disturbance caused by electromagnetic radiation generated by another source. In other words, some of your electrical equipment may interfere with other equipment. Microwaves - The radiation they generate is typically in the 2.45GHz range

Natural Elements Avoid direct sunlight Avoid water sources Avoid Dirt and dust

Creating a Safe Workspace Moving computer equipment Using appropriate repair tools Creating a safe work environment Implementing safety policies and procedures

Moving Computer Equipment Unplug it! Tether power cords. Remove loose jewelry. Lift with legs. Do not twist. Keep objects close to your body. Push rather than pull.

Using the Right Repair Tools PC repair kit Screwdrivers Anti-static wrist straps Other useful tools Pliers Wire cutters Strippers Mirrors Flashlight Compressed air

PC Repair Kit

Creating a Safe Environment Avoid trip hazards. Floor cable guard Cable ties

Implement Safety Policies and Procedures Employer and employee have responsibilities. Create and train on safety plans. Define clear policies for incident management. The Occupational Safety and Health Act states that every working American has the right to a safe and healthy work environment. Occupational Safety and Health Administration (OSHA) was formed to enforce the act. OSHA covers all private-sector employees and post office workers. Public-sector employees are covered by state programs, and federal employees are covered under a presidential executive order. There are three overarching criteria to a safe work environment: ■■ The company and its employees have identified all significant hazards in the work setting. ■■ Preventive measures have been taken to address each significant hazard. ■■ The company and its employees understand how to respond to accidents or near-miss accidents if or when they occur.

Handling Accidents Environmental Accidents (POWER/WATER) Human Accidents (TRIP/SPILLS)

Maintaining Power

Natural Elements Sunlight Water Heat Dust and dirt Unreliable power sources

Using Safety Documentation OSHA (Occupational Safety and Health Administration) MSDS (Materia Safety Data Sheets) The United States Occupational Safety and Health Administration (OSHA) mandates MSDSs only for the following products: ■■ Products that meet OSHA’s definition of hazardous (it poses a physical or health hazard) ■■ Products that are “known to be present in the workplace in such a manner that employees may be exposed under normal conditions of use or in a foreseeable emergency” Besides your product manuals, another place to find safety information is in material safety data sheets (MSDSs). MSDSs include information such as physical product data (boiling point, melting point, flash point, and so forth), potential health risks, storage and disposal recommendations, and spill/leak procedures. MSDSs are typically associated with hazardous chemicals

Following Disposal Procedures Batteries Display devices Laser printer toner Chemical solvents and cans Some manufacturers will take back outdated equipment for parts Properly dispose of solvents or cleaners (as well as their containers) used with computers at a local hazardous waste disposal facility Check with the EPA or at www.msds.com to see if what you are disposing has a Material Safety Data Sheet (MSDS).

Software Licenses Freeware Open source Shareware Multiuser Single user Concurrent Corporate Freeware Freeware is software that is completely free Open Source Open-source software is freer than free: not only is the application free, but the source code (code used by programmers) is also shared to encourage others to contribute to the future development and improvement of the application Shareware Shareware is software that provides a free trial, with the expectation that you’ll pay for it if you like it and decide to keep it. Multiuser This is commercial software that you’re allowed to install on more than one computer. For example, some versions of Microsoft Office allow you to install the same copy on two or three PCs Single User This is commercial software for which the license restricts installation to a single PC. Concurrent This license allows the software to be installed on many PCs but used concurrently by a smaller number. For example, you may have 1,000 computers with the application installed, but only 100 users can use it simultaneously Corporate, Campus, or Site These are enterprise licenses, which permit an organization to install the application on an agreed-upon number of PCs. For example, a school may buy a site license of an antivirus program and allow all students to download and install it freely to ensure that the school’s network remains virus free. Microsoft calls this a volume license key.

Sensitive Information Personally identifiable information Prohibited content/activity Create a policy. Handle specific situations. Personally identifiable information (PII) is anything that can be used to identify an individual person on its own or in context with other information. This includes someone’s name, address, other contact information, the names of family members, and other details that people would consider private. computer you are fixing has content on it that is inappropriate or illegal, or you see someone on your network performing an action that is against policy or laws. How you respond in such a situation can have a significant bearing on your career, the other people involved, and, depending on the situation, the well-being of your company. The lynchpin to dealing with prohibited content or activity is to have a comprehensive policy in place that covers appropriate behavior

Demonstrating Communication Skills and Professionalism Communicating with customers Using appropriate behavior Punctuality Accountability Flexibility Confidentiality Respect Privacy