1 / 17

Chapter 2: Safe Lab Procedures and Tool Use

Chapter 2: Safe Lab Procedures and Tool Use. IT Essentials 5.0. Chapter 2 Objectives. 2.1 Explain the purpose of safe working conditions and safe lab procedures 2.2 Identify tools and software used with personal computer components and their purposes 2.2 Demonstrate proper tool use.

foster
Télécharger la présentation

Chapter 2: Safe Lab Procedures and Tool Use

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Chapter 2: Safe Lab Procedures and Tool Use IT Essentials 5.0

  2. Chapter 2 Objectives • 2.1 Explain the purpose of safe working conditions and safe lab procedures • 2.2 Identify tools and software used with personal computer components and their purposes • 2.2 Demonstrate proper tool use

  3. Safe Lab Procedures The workplace should have safety guidelines to: • Protect people from injury. • Protect equipment from damage. • Protect the environment from contamination.

  4. Characteristics of a Safe Workplace • Clean, organized, and properly lit workspace • Proper procedures for handling equipment • Proper disposal or recycling of components containing hazardous materials • Safety guidelines • Most companies require reporting any injuries, including description of safety procedures not followed. • Damage to equipment may result in claims for damages from the customer. • Types of safety guidelines: General, Electrical, Fire

  5. Types of Interference • Electrostatic Discharge (ESD) • Buildup of an electric charge resting on a surface • 30 volts of static electricity can damage a computer component. • Electromagnetic Interference (EMI) • Intrusion of outside electromagnetic signals in a transmission media, such as copper cabling • Sources can be: Man-made, natural events, climate or any source designed to generate electromagnetic energy.

  6. Types of Interference (cont) • Power Fluctuation • Voltage in a computer that is not accurate or steady • Blackouts, brownouts, noise, spikes, power surges • Power Protection Devices • Surge suppressor • Uninterruptible Power Supply (UPS) • Standby Power Supply (SPS)

  7. The following types of AC power fluctuations can cause data loss or hardware failure: • Blackout - Complete loss of AC power. A blown fuse, damaged transformer, or downed power line can cause a blackout. • Brownout - Reduced voltage level of AC power that lasts for a period of time.Brownouts occur when the power line voltage drops below 80 percent of the normal voltage level. Overloading electrical circuits can cause a brownout. • Noise - Interference from generators and lightning. Noise results in poor quality power, which can cause errors in a computer system.

  8. Spike- Sudden increase in voltage that lasts for a short period and exceeds 100 percent of the normal voltage on a line. Spikes can be caused by lightning strikes, but can also occur when the electrical system comes back on after a blackout. • Power surge - Dramatic increase in voltage above the normal flow of electrical current. A power surge lasts for a few nanoseconds, or one-billionth of a second.

  9. Procedures to Protect the Environment • Computers and peripherals contain materials that can be harmful to the environment. • Protect the environment by responsibly disposing and recycling: • Material Safety Data Sheet (MSDS): Fact sheet summarizing information about material identification, including hazardous ingredients that can affect personal health, fire hazards, and first aid requirements. • Proper Disposal: Comply with policies that specify the procedures for disposing different materials such as batteries, monitors and used printer kits.

  10. Specialized Tools Skilled use of tools and software makes the job less difficult and ensures that tasks are performed properly and safely. • Hardware Tools • ESD Tools • Hand Tools • Cleaning Tools • Diagnostic Tools

  11. Software Tools • Protection Software Tools • Windows 7 Security Center • Antivirus program • Antispyware program • Window 7 Firewall program • Organizational Tools • Notes • Journal • History of repairs • Internet Reference Disk Management Tools • FDISK • Format • Scandisk or CHKDSK • Defrag • Disk Cleanup • Disk Management • System File Checker (SFC)

  12. FDISK - Creates and deletes partitions on a hard drive. The FDISK tool is not available in Windows XP, Vista, or 7. It has been replaced with the Disk Management tool. • Disk Management - Initializes disks, creates partitions, and formats partitions. • Defrag - Optimizes space on a hard drive to allow faster access to programs and data. • Disk Cleanup - Clears space on a hard drive by searching for files that can be safely deleted. • Format- Prepares a hard drive to store information.

  13. System File Checker (SFC) - Scans the operating system critical files and replaces files that are corrupted. Use the Windows 7 boot disk for troubleshooting and repairing corrupted files. The Windows 7 boot disk repairs Windows system files, restores damaged or lost files, and reinstalls the operating system. Third-party software tools are also available to assist in troubleshooting problems.

  14. Proper Tool Use • Safety in the workplace is everyone's responsibility. • Before cleaning or repairing equipment, check to make sure that tools are in good condition. • Proper use of an antistatic wrist strap can prevent ESD damage to computer components. CAUTION: Never wear an antistatic wrist strap if you are repairing a monitor or CRT. • Proper use of an antistatic mat transfers static electricity away from equipment to a grounding point. • Proper use of hand tools. • Proper Use of Cleaning Materials. CAUTION: Before cleaning any device, turn it off and unplug the device from the power source.

  15. Chapter 2 Summary • Work in a safe manner to protect both users and equipment. • Follow all safety guidelines to prevent injuries to yourself and to others. • Know how to protect equipment from ESD damage. • Know about, and be able to prevent, power issues that can cause equipment damage or data loss.

  16. Chapter 2 Summary • Know which products and supplies require special disposal procedures. • Be familiar with MSDS sheets for both safety issues and disposal restrictions to help protect the environment. • Be able to use the correct tools for the task. • Know how to clean components safely. • Use organizational tools during computer repairs.

More Related