© 2007 Cisco Systems, Inc. All rights reserved.Cisco PublicNew CCNA 307 1 Jianxin Tang IT 1 V4.0 Ch2. Safe Lab Procedures and Tool Use.

Slides:



Advertisements
Similar presentations
IT Ess I v.4x Chapter 1 RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
Advertisements

Fragmentation is the degree to which pieces that make up files are spread across the hard disk.
Chapter 2: Safe Lab Procedures and Tool Use
IT Essentials I v. 3.1 Module 12 Preventive Maintenance and Upgrading
IT Essentials: PC Hardware and Software v4.0. Chapter 2 Objectives 2.1 Explain the purpose of safe working conditions and procedures 2.2 Identify tools.
Assembly / Disassembly / Reassembly Computers. Chapter Objectives After completing this chapter you will: Understand how static electricity can damage.
 Workshop induction. Hazards Magazine,
CIT In this chapter you will learn how to:  Care for the external parts of the computer  Describe methods for keeping the inside of the case problem-free.
Chapter 2 Safe Lab Procedures & Tool Use
Explanations Of Software Utilities By Tim Wong.
1 Lesson 3 Computer Protection Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
Chapter 8Basic Computer Maintenance  8.1Preventive Maintenance 8.1Preventive Maintenance 8.1Preventive Maintenance  8.2Monitoring System Performance.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 2 1 Chapter 2: Safe Lab Procedures and Tool Use IT Essentials: PC Hardware.
Computing Fundamentals Module Lesson 3 — Maintaining and Protecting Hardware Computer Literacy BASICS.
Name –Tushar Md. Jubaer Hossen ID Sec-B3.
IT Essentials: PC Hardware and Software v4.0.  List of chapter objectives  Overview of the chapter contents, including ◦ student worksheets ◦ student.
Unit 4, Lesson 9 Keeping You and Your Computer Safe AOIT Computer Systems Copyright © 2008–2013 National Academy Foundation. All rights reserved.
PC Maintenance: Preparing for A+ Certification Chapter 2: Safety and Preventive Maintenance.
PC Repair Fundamentals 1. Objectives Learn about tools you’ll need as a computer support technician Learn how to develop a preventive maintenance plan.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 IT Essentials PC Hardware and Software 4.1 Instructional Resource Chapter.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 2 1 Chapter 2: Safe Lab Procedures and Tool Use IT Essentials: PC Hardware.
IT Essentials: PC Hardware and Software 1 Chapter 10 Preventative Maintenance.
© Cisco Systems, Inc. All rights reserved. Cisco Public ITE PC v4.1 Chapter 2 1 Chapter 2: Safe Lab Procedures and Tool Use IT Essentials:
COMPUTER CARE & MAINTENANCE. Protecting Your Computer From Damage Like any kind of equipment, your computer requires care and maintenance to run smoothly.
1 Safety and Preventative Maintenance. 2 MB, One megabyte - MB or M-byte - represents about 1 million (10 6 ) bytes. Precisely, 1 MB = = 1 kB x 1 kB =
Chapter 13 Troubleshooting and Maintenance Fundamentals.
1 Lesson 3 Computer Protection Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
Chapter 4: Overview of Preventive Maintenance
Copyright © 2008–2011 National Academy Foundation. All rights reserved. Unit 4, Lesson 9 Keeping You and Your Computer Safe AOIT Computer Systems.
Advanced CIS NAME: ___________________. OBJECTIVE: Maintaining, Managing, and Troubleshooting Systems Maintenance includes following established procedures.
© CCI Learning Solutions Inc. 1 Lesson 5: Basic Troubleshooting Techniques Computer performance Care of the computer Working with hardware Basic maintenance.
Safety 101 : The basics Computer Technician. Static Electricity Builds up through friction When it comes to computers, it can be very damaging Many computer.
Computer Literacy BASICS
Objectives: Identify problems that can occur if hardware is not properly maintained Identify routine maintenance that should be performed by users Identify.
LESSON 4 COMPUTER MAINTENANCE BY: Morgan Bradley.
Safety. Outcomes  Potential health hazards when working with computer equipment.  Precautions to take to prevent injuries.  Steps and techniques for.
Course ILT Safety Unit objectives Identify safety issues and hazards in the computer environment Identify ways to avoid injury and strain when working.
Computer Engineering Technology I – Pilot Objective Use appropriate safety procedures. Course Weight : 2%
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 2 1 Chapter 2: Safe Lab Procedures and Tool Use IT Essentials: PC Hardware.
PREVENTIVE COMPUTER MAINTENANCE. Preventive Maintenance regular and systematic inspection, cleaning, and replacement of worn parts, materials, and systems.
Chapter 6 Protecting Your Files. Protecting Your Files FAQs: – What should I know about losing data? – How can I protect my files from viruses? – How.
Chapter 2: Safe Lab Procedures and Tool Use
IT Essentials PC Hardware & Software v4.1 Chapter 2 – Tools & Safety Procedures Jeopardy Review v1 Darren Shaver Kubasaki High School Okinawa, Japan Chapter.
POWER FLUCTUATIONS Computer Systems. Power Fluctuations Voltage is the force that moves electrons through a circuit Unsteady voltages are called power.
Risk and Precautions needed when installing hardware - P2
Safe Lab Procedures and Tool Use
Copyright© 2005 Avaya Inc. All rights reserved Avaya UPS Training powerware.com/avaya.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 4: Overview of Preventive Maintenance IT Essentials 5.0.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 2: Safe Lab Procedures and Tool Use IT Essentials 5.0.
Ahmadu Bello Computer Repair Training Course 1: Introduction To Computer And Computer Engineering By Suprix Technology Nigeria (
© Cisco Systems, Inc. All rights reserved. Cisco Public ITE PC v4.1 Chapter 2 1 Chapter 2: Safe Lab Procedures and Tool Use IT Essentials:
A+ Computer Repair Lesson 9 Problems Causing Power Events.
UNIT 14: INSTALLING & MAINTAINING COMPUTER HARDWARE.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 2: Introduction to Lab Procedures and Tool Use IT Essentials.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 2: Introduction to Lab Procedures and Tool Use IT Essentials.
CONDUCTING TEST ON THE INSTALLED COMPUTER SYSTEM
Chapter 2: Introduction to Lab Procedures and Tool Use
Chapter 2: Safe Lab Procedures and Tool Use
Chapter 2: Safe Lab Procedures and Tool Use
IC3 GS3 Standard COMPUTING FUNDAMENTALS Module
Chapter 2: Safe Lab Procedures and Tool Use
Chapter 2 Lab Procedures & Tool Use
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 2: Safe Lab Procedures and Tool Use IT Essentials 5.0.
Chapter 2: Safe Lab Procedures and Tool Use
Chapter 2: Safe Lab Procedures and Tool Use
Chapter 2: Safe Lab Procedures and Tool Use
Chapter 2: Safe Lab Procedures and Tool Use
IT Essentials PC Hardware and Software 4
Chapter 2: Safe Lab Procedures and Tool Use
IT Essentials PC Hardware and Software 4
Presentation transcript:

© 2007 Cisco Systems, Inc. All rights reserved.Cisco PublicNew CCNA Jianxin Tang IT 1 V4.0 Ch2. Safe Lab Procedures and Tool Use

© 2007 Cisco Systems, Inc. All rights reserved.Cisco PublicNew CCNA Explain the purpose of safe working conditions and procedures  Identify safety procedures and potential hazards for users and technicians.  Identify safety procedures to protect equipment from damage and data from loss.  Identify safety procedures to protect the environment from contamination.

© 2007 Cisco Systems, Inc. All rights reserved.Cisco PublicNew CCNA Identify safety procedures and potential hazards for users and technicians Four classifications for fire extinguishers:  Class A – Paper, wood, plastics, cardboard  Class B – Gasoline, kerosene, organic solvents  Class C – Electrical equipment  Class D – Combustible metals

© 2007 Cisco Systems, Inc. All rights reserved.Cisco PublicNew CCNA 307 4

© 2007 Cisco Systems, Inc. All rights reserved.Cisco PublicNew CCNA Identify safety procedures to protect equipment from damage and data from loss  ESD: At least 3,000 volts of static electricity must build up before a person can feel ESD If the discharge causes pain or makes a noise, the charge was probably above 10,000 volts 30 volts of static electricity can damage a computer component

© 2007 Cisco Systems, Inc. All rights reserved.Cisco PublicNew CCNA 307 6

© 2007 Cisco Systems, Inc. All rights reserved.Cisco PublicNew CCNA ESD Protection Recommendations  Keep all components in antistatic bags until you are ready to install them.  Use grounded mats on workbenches.  Use grounded floor mats in work areas.  Use antistatic wrist straps when working on computers.

© 2007 Cisco Systems, Inc. All rights reserved.Cisco PublicNew CCNA Power Fluctuation Types  Blackout – complete loss of AC power. A blown fuse, damaged transformer, or downed power line can cause a blackout.  Brownout – reduced voltage level of AC power that lasts for a period of time. Brownouts occur when the power line voltage drops below 80% of the normal voltage level. Overloading electrical circuits can cause a brownout.  Noise – interference from generators and lightning. Noise results in unclean power, which can cause errors in a computer system.  Spike – sudden increase in voltage that lasts for a very short period and exceeds 100% of the normal voltage on a line. Spikes can be caused by lightning strikes, but can also occur when the electrical system comes back on after a blackout.  Power surge – dramatic increase in voltage above the normal flow of electrical current. A power surge lasts for a few nanoseconds, or one-billionth of a second.

© 2007 Cisco Systems, Inc. All rights reserved.Cisco PublicNew CCNA Power Protection Devices  Surge Suppressor – helps protect against damage from surges and spikes. A surge suppressor diverts extra electrical voltage on the line to the ground.  Uninterruptible Power Supply (UPS) :The UPS is able to supply a consistent quality of power when brownouts and blackouts occur.  Standby Power Supply (SPS) – helps protect against potential electrical power problems by providing a backup battery to supply power when the incoming voltage drops below the normal level.

© 2007 Cisco Systems, Inc. All rights reserved.Cisco PublicNew CCNA Identify safety procedures to protect the environment from contamination  Material Safety and Data Sheet The name of the material The physical properties of the material Any hazardous ingredients contained in the material Reactivity data, such as fire and explosion data Procedures for spills or leaks Special precautions Health hazards Special protection requirements

© 2007 Cisco Systems, Inc. All rights reserved.Cisco PublicNew CCNA Proper Disposal of Batteries  Batteries often contain rare earth metals that can be harmful to the environment. Batteries from portable computer systems may contain lead, cadmium, lithium, alkaline manganese, and mercury. These metals do not decay and will remain in the environment for many years. Mercury is commonly used in the manufacturing of batteries and is extremely toxic and harmful to humans.  Recycling batteries should be a standard practice for a technician.

© 2007 Cisco Systems, Inc. All rights reserved.Cisco PublicNew CCNA Proper Disposal of Monitors or CRTs  Handle monitors and CRTs with care. Extremely high voltage can be stored in monitors and CRTs, even after being disconnected from a power source. CRTs contain glass, metal, plastics, lead, barium, and rare earth metals. According to the U.S. Environmental Protection Agency (EPA), CRTs may contain approximately 4 lbs (1.8 kg) of lead. Monitors must be disposed of in compliance with environmental regulations.

© 2007 Cisco Systems, Inc. All rights reserved.Cisco PublicNew CCNA Proper Disposal of Toner Kits and Cartridges  Used printer toner kits and printer cartridges must be disposed of properly or recycled. Some toner cartridge suppliers and manufacturers will take empty cartridges for refilling. There are also companies that specialize in refilling empty cartridges. Kits to refill inkjet printer cartridges are available but are not recommended, because the ink may leak into the printer, causing irreversible damage.

© 2007 Cisco Systems, Inc. All rights reserved.Cisco PublicNew CCNA Identify tools and software used with personal computer components and their purposes  Identify hardware tools and their purpose.  Identify software tools and their purpose.  Identify organizational tools and their purpose

© 2007 Cisco Systems, Inc. All rights reserved.Cisco PublicNew CCNA Identify hardware tools and their purpose  ESD tools  Hand tools  Cleaning tools  Diagnostic tools

© 2007 Cisco Systems, Inc. All rights reserved.Cisco PublicNew CCNA ESD Tools

© 2007 Cisco Systems, Inc. All rights reserved.Cisco PublicNew CCNA Hand Tools  Most tools used in the computer assembly process are small hand tools. They are available individually or as part of a computer repair toolkit. Toolkits range widely in size, quality, and price.

© 2007 Cisco Systems, Inc. All rights reserved.Cisco PublicNew CCNA Cleaning Tools  Having the appropriate cleaning tools is essential when maintaining or repairing computers. Using these tools ensures that computer components are not damaged during cleaning.

© 2007 Cisco Systems, Inc. All rights reserved.Cisco PublicNew CCNA Diagnostic Tools

© 2007 Cisco Systems, Inc. All rights reserved.Cisco PublicNew CCNA Identify software tools and their purpose  Fdisk or Disk Management – used to create and delete partitions on a hard drive  Format – used to prepare a hard drive to store information  Scandisk or Chkdsk – used to check the integrity of files and folders on a hard drive by scanning the disk surface for physical errors  Defrag – used to optimize space on a hard drive to allow faster access to programs and data  Disk Cleanup – used to clear space on a hard drive by searching for files that can be safely deleted  Disk Management – a system utility used to manage hard drives and partitions, which peforms tasks such as initializing disks, creating partitions, and formatting partitions  System File Checker (SFC) – a command-line utility that scans the operating system critical files and replaces any files that are corrupted

© 2007 Cisco Systems, Inc. All rights reserved.Cisco PublicNew CCNA Protection Software Tools  Windows XP Security Center – allows you to check the status of essential security settings on the computer. The Security Center continuously checks to make sure that the software firewall and antivirus programs are running. It also ensures that automatic updates are set to download and install automatically.  Antivirus Program – protects a computer against virus attacks.  Spyware Remover – protects against software that sends information about web surfing habits to an attacker. Spyware can be installed without the knowledge or consent of the user.  Firewall – a program that runs continuously to protect against unauthorized communications to and from your computer.

© 2007 Cisco Systems, Inc. All rights reserved.Cisco PublicNew CCNA Identify organizational tools and their purpose  Notes – Make notes as you go through the investigation and repair process. Refer to these notes to avoid repeating previous steps and to determine what steps to take next.  Journal – Document the upgrades and repairs that you perform. The documentation should include descriptions of the problem, possible solutions that have been tried in order to correct the problem, and the steps taken to repair the problem. Be sure to note any configuration changes made to the equipment and any replacement parts used in the repair. Your journal, along with your notes, can be valuable when you encounter similar situations in the future.  History of repairs – Make a detailed list of problems and repairs, including the date, replacement parts, and customer information. The history allows a technician to determine what work has been performed on a computer in the past.

© 2007 Cisco Systems, Inc. All rights reserved.Cisco PublicNew CCNA Internet Reference Tools  Internet search engines  News groups  Manufacturer FAQs  Online computer manuals  Online forums and chat  Technical websites

© 2007 Cisco Systems, Inc. All rights reserved.Cisco PublicNew CCNA Implement proper tool use  Demonstrate proper use of an antistatic wrist strap.  Demonstrate proper use of an antistatic mat.  Demonstrate proper use of various hand tools.  Demonstrate proper use of cleaning materials.

© 2007 Cisco Systems, Inc. All rights reserved.Cisco PublicNew CCNA Demonstrate proper use of an antistatic wrist strap  Wrap the strap around your wrist and secure it using the snap or Velcro. The metal on the back of the wrist strap must remain in contact with the skin at all times.  Snap the connector on the end of the wire to the wrist strap and connect the other end either to the equipment or to the same grounding point that the antistatic mat is connected to. The metal skeleton of the case is a good place to connect the wire. When connecting the wire to equipment you are working on, choose an unpainted metal surface. A painted surface does not conduct the electricity as well as unpainted metal.

© 2007 Cisco Systems, Inc. All rights reserved.Cisco PublicNew CCNA Demonstrate proper use of an antistatic mat  Lay the mat on the workspace next to or under the computer case.  Clip the mat to the case to provide a grounded surface on which you can place parts as you remove them from the system.

© 2007 Cisco Systems, Inc. All rights reserved.Cisco PublicNew CCNA Demonstrate proper use of cleaning materials