SlideShare a Scribd company logo
1 of 17
IT Essentials PC Hardware
  and Software 4.1

  Instructional Resource
  Chapter 2: Safe Lab
  Procedures and Tool Use




Presentation_ID               © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   1
Chapter 2: Objectives
            Explain the purpose of safe working conditions and procedures.
            Identify tools and software used with personal computer components and their
             purposes.
            Implement proper tool use.




Presentation_ID                                     © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   2
Chapter 2: Critical Concepts
            What is this chapter about and why is it important?
            This chapter discusses safe lab procedures, tool use for computer maintenance, and
             proper disposal of hazardous materials. It provides an overview of safe working
             conditions in the lab and in other environments. Basic electrical, fire, and chemical
             safety guidelines are covered, as well as other potential workplace hazards. Much of
             the chapter is devoted to identification and proper usage of hand tools and software
             tools. It also discusses the importance of organization of tools, and cleaning
             procedures for all computer components.
            IT technicians have cut, burned, and even electrocuted themselves while working on
             computers. IT technicians have short-circuited working components, thus rendering
             the components unusable. This chapter is important because it explains the good
             work habits that all technicians must develop in order to avoid injury to themselves
             or others, and to avoid damaging or destroying equipment, or losing data.




Presentation_ID                                      © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   3
Chapter 2: Activities
            What activities are associated with this chapter
                  2.2.2: Worksheet: Diagnostic Software
                  2.3.4: Lab: Computer Disassembly
                  Chapter 2 Quiz




Presentation_ID                                       © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   4
Chapter 2: New Terms
            What terms are introduced in this chapter?

                  antistatic mat                                                       2.2.1

                  antistatic wrist strap                                               2.2.1

                  anti-virus application                                               2.2.2

                  blackout                                                             2.1.2

                  brownout                                                             2.1.2

                  cable tie                                                            2.2.1

                  CHKDSK                                                               2.2.2

                  compressed air                                                       2.2.1

                  conduit                                                              2.1.1

                  defrag                                                               2.2.2




Presentation_ID                                     © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   5
Chapter 2: New Terms
            What terms are introduced in this chapter?

                  digital multimeter                                                      2.2.1

                  disk cleanup                                                            2.2.2

                  disk management                                                         2.2.2

                  Electromagnetic Interference (EMI)                                      2.1.2

                  Electrostatic Discharge (ESD)                                           2.1.2

                  FDISK                                                                   2.2.2

                  flat-head screwdriver                                                   2.2.1

                  format                                                                  2.2.2

                  hex driver                                                              2.2.1

                  loopback plug                                                           2.2.1




Presentation_ID                                        © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   6
Chapter 2: New Terms
            What terms are introduced in this chapter?

                  Material Safety and Data Sheet (MSDS)                                      2.1.3

                  needle-nose pliers                                                         2.2.1

                  disk cleanup                                                               2.2.2

                  noise                                                                      2.1.2

                  Phillips-head screwdriver                                                  2.2.1

                  Radio Frequency Interference (RFI)                                         2.1.2

                  SCANDISK                                                                   2.2.2

                  spike                                                                      2.1.2

                  spyware                                                                    2.2.2

                  Standby Power Supply (SPS)                                                 2.1.2




Presentation_ID                                           © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   7
Chapter 2: New Terms
            What terms are introduced in this chapter?

                  surge                                                                2.1.2

                  surge suppressor                                                     2.1.2

                  torx screwdriver                                                     2.2.1

                  tweezers                                                             2.2.1

                  wire cutters                                                         2.2.1




Presentation_ID                                     © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   8
Chapter 2: Changes
            What has changed from the previous version (4.0) of ITEPC?
                  Page 2.1.1 Identify safety procedures and potential hazards for users and
                   technicians
                       •Electrical safety
                       •Cable management
                       •Avoiding trip hazards


                  Page 2.1.2 Identify safety procedures to protect equipment from damage and
                   data from loss
                       •EMI
                       •Network interference
                       •Magnets
                       •RFI
                       •Cordless phone interference
                       •Microwaves

Presentation_ID                                        © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   9
Chapter 2: Classroom Management
                   The instructor should ensure this chapter becomes as hand-on as possible.
                   Have different tools available. Hold up each tool and ask students what they
                    think a technician might use the tool for.
                   If enough tools are available, divide students into teams and have them
                    document the purpose of each tool in computer support. Have a computer
                    available so they can look inside to see the possibilities. Have two groups
                    share results with one another.
                   If Internet access is available, have students select suitable power protection for
                    the computers in the classroom based on different scenarios. If Internet access
                    is not available, have various vendors’ technical power protection documents
                    and have the students choose from them.
                   Keep the power and safety discussions relevant. Explain a section and then
                    have the students apply the information. An example might be to present
                    examples of relevant local or world weather events and the effects the
                    conditions might have on power and safety.
                   Have the students research the city or state rules for CRT disposal. Have them
                    brainstorm alternatives to disposal. If this is not feasible, bring the rules into
                    class as a handout.




Presentation_ID                                          © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   10
Chapter 2: Classroom Management
           (continued)
                   Download, print out, or have available MSDS data. Search the Internet with the
                    following key terms: laser printer msds.
                   Have the students determine the best place to keep MSDS information sheets
                    in the school, who might need this information, and how to get this information
                    to those who might need it.
                   Disassemble a computer in teams.
                   Have students rotate with each step so everyone gets hands-on time.
                   Lead the students through the disassembly process. For example, the first step
                    in the lab is to turn off the computer and disconnect power. It is very important
                    for the students to verify that the computer works BEFORE disassembly. Then,
                    have all the students power down and remove the power cord. No team can
                    progress until all power cords have been removed. Then, move on to step 2. In
                    this manner, the teacher can address issues or reinforce the lecture, and
                    everyone is on the same step and concept.




Presentation_ID                                         © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   11
Chapter 2: Teaching Analogies
            How often do you disassemble your car? When learning about cars, an automobile
             technician disassembles a car in sections to learn about how each particular
             section works. A student can learn about computer components by disassembling
             a computer in the same way.
            How important is doing a tune-up to a car? How important is it to have your teeth
             cleaned? Preventive maintenance is important to a computer in the same way.




Presentation_ID                                     © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   12
Chapter 2: Suggested Class Discussions
                     Safety – Laser printers possess high voltage and can burn the technician,
                      and CRTs possess high voltage and can shock the technician.
                     ESD – An electrostatic discharge can damage a computer.
                     Tools – Discuss the proper tool usage, storage, what to take on a service call,
                      and what to have in the car.
                     Software tools – Ensure you have software tools appropriate for the operating
                      system.
                     Preventive maintenance – This extends the life of the computer. Ensure
                      appropriate cleaning supplies are used.
                     Organization – Ensure computer components are organized and easy to find
                      when reassembling the computer. Emphasize the importance of taking notes
                      and being organized during disassembly.
                     Question for the class – Have you ever taken something apart and when you
                      tried to put it back together, things didn’t go as planned? Explain what
                      happened. What do you wish you had done differently?
                     Internet Search – Have students conduct an Internet search on laser printer
                      safety and disposal procedures. Discuss how students would apply this
                      knowledge in the workplace.


Presentation_ID                                         © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   13
Chapter 2: Best Practices
                     Diagram and document the computer disassembly process.
                      • Some students take photos with their phones to help reassemble the
                          computer. Encouraging the use of technology will engage the students.
                      • A good teaching practice is to have each student document the computer
                          disassembly.
                     Organize parts during the computer disassembly process.
                      • Collect egg cartons for organizing screws that are removed during
                          disassembly.
                      • Collect antistatic bags from school technicians or outside computer repair
                          companies to store computer components.
                      • Do not allow students to stack computer components.
                     Because CPUs are very expensive and easy to damage, it is not
                      recommended to allow the students to remove the CPU during the computer
                      disassembly process. Obtain bad CPUs from outside computer repair
                      companies to use for class discussion and demonstration.




Presentation_ID                                        © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   14
Chapter 2: Outside Reading
                  International Telecommunication Union (ITU)
                   http://www.itu.int/ITU-T/




Presentation_ID                                       © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   15
Presentation_ID   © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   16
Presentation_ID   © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   17

More Related Content

What's hot

ITE v5.0 - Chapter 3
ITE v5.0 - Chapter 3ITE v5.0 - Chapter 3
ITE v5.0 - Chapter 3Irsandi Hasan
 
Linux Serial Driver
Linux Serial DriverLinux Serial Driver
Linux Serial Driver艾鍗科技
 
Browsing Linux Kernel Source
Browsing Linux Kernel SourceBrowsing Linux Kernel Source
Browsing Linux Kernel SourceMotaz Saad
 
Preventive maintenance and troubleshooting
Preventive maintenance and troubleshootingPreventive maintenance and troubleshooting
Preventive maintenance and troubleshootingChristian Macatangay
 
Intel Processor pentium to i9
Intel Processor pentium to i9Intel Processor pentium to i9
Intel Processor pentium to i9chrizjohn896
 
Chapter 3 Motherboard and BIOS
Chapter 3 Motherboard and BIOSChapter 3 Motherboard and BIOS
Chapter 3 Motherboard and BIOSaskme
 
Fast track to troubleshooting your pc
Fast track to troubleshooting your pcFast track to troubleshooting your pc
Fast track to troubleshooting your pcMik Endale
 
IT Documents for IT Department
IT Documents for IT DepartmentIT Documents for IT Department
IT Documents for IT DepartmentAhmad Suhendro
 
It Technical Support
It Technical SupportIt Technical Support
It Technical SupportElena Benson
 
Linux kernel modules
Linux kernel modulesLinux kernel modules
Linux kernel modulesEddy Reyes
 
The Components of The System Unit
The Components of The System UnitThe Components of The System Unit
The Components of The System UnitSamudin Kassan
 
Computer maintenance 1 lesson 1
Computer maintenance 1 lesson 1Computer maintenance 1 lesson 1
Computer maintenance 1 lesson 1abbas mohd
 
Architecture ordinateur-2-architecture-de-base
Architecture ordinateur-2-architecture-de-baseArchitecture ordinateur-2-architecture-de-base
Architecture ordinateur-2-architecture-de-baseAbdoulaye Dieng
 

What's hot (20)

ITE v5.0 - Chapter 3
ITE v5.0 - Chapter 3ITE v5.0 - Chapter 3
ITE v5.0 - Chapter 3
 
Linux Serial Driver
Linux Serial DriverLinux Serial Driver
Linux Serial Driver
 
Browsing Linux Kernel Source
Browsing Linux Kernel SourceBrowsing Linux Kernel Source
Browsing Linux Kernel Source
 
Preventive maintenance and troubleshooting
Preventive maintenance and troubleshootingPreventive maintenance and troubleshooting
Preventive maintenance and troubleshooting
 
Linux scheduler
Linux schedulerLinux scheduler
Linux scheduler
 
Intel Processor pentium to i9
Intel Processor pentium to i9Intel Processor pentium to i9
Intel Processor pentium to i9
 
Chapter 3 Motherboard and BIOS
Chapter 3 Motherboard and BIOSChapter 3 Motherboard and BIOS
Chapter 3 Motherboard and BIOS
 
Fast track to troubleshooting your pc
Fast track to troubleshooting your pcFast track to troubleshooting your pc
Fast track to troubleshooting your pc
 
Ntroduction to computer architecture and organization
Ntroduction to computer architecture and organizationNtroduction to computer architecture and organization
Ntroduction to computer architecture and organization
 
Introduction to Unix
Introduction to UnixIntroduction to Unix
Introduction to Unix
 
IT Documents for IT Department
IT Documents for IT DepartmentIT Documents for IT Department
IT Documents for IT Department
 
It Technical Support
It Technical SupportIt Technical Support
It Technical Support
 
Linux kernel modules
Linux kernel modulesLinux kernel modules
Linux kernel modules
 
Pipelining In computer
Pipelining In computer Pipelining In computer
Pipelining In computer
 
Motherboard
MotherboardMotherboard
Motherboard
 
The Components of The System Unit
The Components of The System UnitThe Components of The System Unit
The Components of The System Unit
 
Computer maintenance 1 lesson 1
Computer maintenance 1 lesson 1Computer maintenance 1 lesson 1
Computer maintenance 1 lesson 1
 
Pentium 8086 Instruction Format
Pentium 8086 Instruction FormatPentium 8086 Instruction Format
Pentium 8086 Instruction Format
 
Architecture ordinateur-2-architecture-de-base
Architecture ordinateur-2-architecture-de-baseArchitecture ordinateur-2-architecture-de-base
Architecture ordinateur-2-architecture-de-base
 
La carte mère
La carte mèreLa carte mère
La carte mère
 

Viewers also liked

CCNA Exploration 4 - Chapter 8
CCNA Exploration 4 - Chapter 8CCNA Exploration 4 - Chapter 8
CCNA Exploration 4 - Chapter 8Irsandi Hasan
 
CCNA Security 010-configuring cisco asa
CCNA Security 010-configuring cisco asaCCNA Security 010-configuring cisco asa
CCNA Security 010-configuring cisco asaAhmed Habib
 
CCNA Security 012- cryptographic systems
CCNA Security 012- cryptographic systemsCCNA Security 012- cryptographic systems
CCNA Security 012- cryptographic systemsAhmed Habib
 
CCNA Discovery 1 - Chapter 4
CCNA Discovery 1 - Chapter 4CCNA Discovery 1 - Chapter 4
CCNA Discovery 1 - Chapter 4Irsandi Hasan
 
CCNA Security - Chapter 6
CCNA Security - Chapter 6CCNA Security - Chapter 6
CCNA Security - Chapter 6Irsandi Hasan
 
CCNA Security - Chapter 4
CCNA Security - Chapter 4CCNA Security - Chapter 4
CCNA Security - Chapter 4Irsandi Hasan
 
CCNA Security - Chapter 7
CCNA Security - Chapter 7CCNA Security - Chapter 7
CCNA Security - Chapter 7Irsandi Hasan
 
CCNA Security - Chapter 8
CCNA Security - Chapter 8CCNA Security - Chapter 8
CCNA Security - Chapter 8Irsandi Hasan
 
CCNA Discovery 1 - Chapter 1
CCNA Discovery 1 - Chapter 1CCNA Discovery 1 - Chapter 1
CCNA Discovery 1 - Chapter 1Irsandi Hasan
 
CCNA Security - Chapter 5
CCNA Security - Chapter 5CCNA Security - Chapter 5
CCNA Security - Chapter 5Irsandi Hasan
 
CCNA Security - Chapter 9
CCNA Security - Chapter 9CCNA Security - Chapter 9
CCNA Security - Chapter 9Irsandi Hasan
 
CCNA Security - Chapter 3
CCNA Security - Chapter 3CCNA Security - Chapter 3
CCNA Security - Chapter 3Irsandi Hasan
 
CCNA Security 06- AAA
CCNA Security 06- AAACCNA Security 06- AAA
CCNA Security 06- AAAAhmed Habib
 
CCNA RS_ITN - Chapter 4
CCNA RS_ITN - Chapter 4CCNA RS_ITN - Chapter 4
CCNA RS_ITN - Chapter 4Irsandi Hasan
 
CCNA Security 09- ios firewall fundamentals
CCNA Security 09- ios firewall fundamentalsCCNA Security 09- ios firewall fundamentals
CCNA Security 09- ios firewall fundamentalsAhmed Habib
 
CCNA Security 011- implementing ios-based ips
CCNA Security 011- implementing ios-based ipsCCNA Security 011- implementing ios-based ips
CCNA Security 011- implementing ios-based ipsAhmed Habib
 
CCNA Exploration 4 - Chapter 7
CCNA Exploration 4 - Chapter 7CCNA Exploration 4 - Chapter 7
CCNA Exploration 4 - Chapter 7Irsandi Hasan
 

Viewers also liked (20)

CCNA Exploration 4 - Chapter 8
CCNA Exploration 4 - Chapter 8CCNA Exploration 4 - Chapter 8
CCNA Exploration 4 - Chapter 8
 
CCNA Security 010-configuring cisco asa
CCNA Security 010-configuring cisco asaCCNA Security 010-configuring cisco asa
CCNA Security 010-configuring cisco asa
 
CCNA Security 012- cryptographic systems
CCNA Security 012- cryptographic systemsCCNA Security 012- cryptographic systems
CCNA Security 012- cryptographic systems
 
CCNA Discovery 1 - Chapter 4
CCNA Discovery 1 - Chapter 4CCNA Discovery 1 - Chapter 4
CCNA Discovery 1 - Chapter 4
 
CCNA Security - Chapter 6
CCNA Security - Chapter 6CCNA Security - Chapter 6
CCNA Security - Chapter 6
 
CCNA Security - Chapter 4
CCNA Security - Chapter 4CCNA Security - Chapter 4
CCNA Security - Chapter 4
 
OSPF v3
OSPF v3OSPF v3
OSPF v3
 
CCNA Security - Chapter 7
CCNA Security - Chapter 7CCNA Security - Chapter 7
CCNA Security - Chapter 7
 
CCNA Security - Chapter 8
CCNA Security - Chapter 8CCNA Security - Chapter 8
CCNA Security - Chapter 8
 
ITE - Chapter 9
ITE - Chapter 9ITE - Chapter 9
ITE - Chapter 9
 
CCNA Discovery 1 - Chapter 1
CCNA Discovery 1 - Chapter 1CCNA Discovery 1 - Chapter 1
CCNA Discovery 1 - Chapter 1
 
CCNA Security - Chapter 5
CCNA Security - Chapter 5CCNA Security - Chapter 5
CCNA Security - Chapter 5
 
CCNA Security - Chapter 9
CCNA Security - Chapter 9CCNA Security - Chapter 9
CCNA Security - Chapter 9
 
CCNA Security - Chapter 3
CCNA Security - Chapter 3CCNA Security - Chapter 3
CCNA Security - Chapter 3
 
CCNA Security 06- AAA
CCNA Security 06- AAACCNA Security 06- AAA
CCNA Security 06- AAA
 
CCNA RS_ITN - Chapter 4
CCNA RS_ITN - Chapter 4CCNA RS_ITN - Chapter 4
CCNA RS_ITN - Chapter 4
 
CCNA Security 09- ios firewall fundamentals
CCNA Security 09- ios firewall fundamentalsCCNA Security 09- ios firewall fundamentals
CCNA Security 09- ios firewall fundamentals
 
ITE - Chapter 7
ITE - Chapter 7ITE - Chapter 7
ITE - Chapter 7
 
CCNA Security 011- implementing ios-based ips
CCNA Security 011- implementing ios-based ipsCCNA Security 011- implementing ios-based ips
CCNA Security 011- implementing ios-based ips
 
CCNA Exploration 4 - Chapter 7
CCNA Exploration 4 - Chapter 7CCNA Exploration 4 - Chapter 7
CCNA Exploration 4 - Chapter 7
 

Similar to ITE - Chapter 2

Distributed Generation In Spain
Distributed Generation In SpainDistributed Generation In Spain
Distributed Generation In Spaindavidtrebolle
 
Easy Learn to Verilog HDL
Easy Learn to Verilog HDLEasy Learn to Verilog HDL
Easy Learn to Verilog HDLkpyes34
 
A.vivotek ip surveillance_handbook
A.vivotek ip surveillance_handbookA.vivotek ip surveillance_handbook
A.vivotek ip surveillance_handbookTSOLUTIONS
 
Microstrip patch-antenna
Microstrip patch-antennaMicrostrip patch-antenna
Microstrip patch-antennaaquibjamal123
 
Barcode reference en
Barcode reference enBarcode reference en
Barcode reference enRoger R Pe M
 
Analog optical link
Analog optical linkAnalog optical link
Analog optical linkhamedmeshkin
 
Domain-Specific Program Checking
Domain-Specific Program CheckingDomain-Specific Program Checking
Domain-Specific Program CheckingLukas Renggli
 
บทที่ 2 Mobile Aplication
บทที่ 2 Mobile Aplicationบทที่ 2 Mobile Aplication
บทที่ 2 Mobile Aplicationrubtumproject.com
 
Gsm based campus display system project report
Gsm based campus display system project reportGsm based campus display system project report
Gsm based campus display system project reportKashyap Shah
 
USB Lock RP Operation Manual
USB Lock RP Operation ManualUSB Lock RP Operation Manual
USB Lock RP Operation ManualJavier Arrospide
 
การพัฒนาเกมคอมพิวเตอร์ 3 มิติ
การพัฒนาเกมคอมพิวเตอร์ 3 มิติการพัฒนาเกมคอมพิวเตอร์ 3 มิติ
การพัฒนาเกมคอมพิวเตอร์ 3 มิติoan508
 
Programming language design_concepts
Programming language design_conceptsProgramming language design_concepts
Programming language design_conceptsYuri Dantas
 

Similar to ITE - Chapter 2 (20)

ITE - Chapter 6
ITE - Chapter 6ITE - Chapter 6
ITE - Chapter 6
 
Distributed Generation In Spain
Distributed Generation In SpainDistributed Generation In Spain
Distributed Generation In Spain
 
Easy Learn to Verilog HDL
Easy Learn to Verilog HDLEasy Learn to Verilog HDL
Easy Learn to Verilog HDL
 
2.1 system concept
2.1 system concept2.1 system concept
2.1 system concept
 
A.vivotek ip surveillance_handbook
A.vivotek ip surveillance_handbookA.vivotek ip surveillance_handbook
A.vivotek ip surveillance_handbook
 
Control of machines
Control of machinesControl of machines
Control of machines
 
Controlofmachines
Controlofmachines Controlofmachines
Controlofmachines
 
Microstrip patch-antenna
Microstrip patch-antennaMicrostrip patch-antenna
Microstrip patch-antenna
 
Zigbee 802.15.4
Zigbee 802.15.4Zigbee 802.15.4
Zigbee 802.15.4
 
Barcode reference en
Barcode reference enBarcode reference en
Barcode reference en
 
Analog optical link
Analog optical linkAnalog optical link
Analog optical link
 
Domain-Specific Program Checking
Domain-Specific Program CheckingDomain-Specific Program Checking
Domain-Specific Program Checking
 
บทที่ 2 Mobile Aplication
บทที่ 2 Mobile Aplicationบทที่ 2 Mobile Aplication
บทที่ 2 Mobile Aplication
 
Gsm based campus display system project report
Gsm based campus display system project reportGsm based campus display system project report
Gsm based campus display system project report
 
50267584 celldoctor
50267584 celldoctor50267584 celldoctor
50267584 celldoctor
 
USB Lock RP Operation Manual
USB Lock RP Operation ManualUSB Lock RP Operation Manual
USB Lock RP Operation Manual
 
Integratedbook
IntegratedbookIntegratedbook
Integratedbook
 
การพัฒนาเกมคอมพิวเตอร์ 3 มิติ
การพัฒนาเกมคอมพิวเตอร์ 3 มิติการพัฒนาเกมคอมพิวเตอร์ 3 มิติ
การพัฒนาเกมคอมพิวเตอร์ 3 มิติ
 
Programming language design_concepts
Programming language design_conceptsProgramming language design_concepts
Programming language design_concepts
 
Ch3
Ch3Ch3
Ch3
 

More from Irsandi Hasan

CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 08
CCNA v6.0 ITN - Chapter 08CCNA v6.0 ITN - Chapter 08
CCNA v6.0 ITN - Chapter 08Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 07CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 07Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 06
CCNA v6.0 ITN - Chapter 06CCNA v6.0 ITN - Chapter 06
CCNA v6.0 ITN - Chapter 06Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 04
CCNA v6.0 ITN - Chapter 04CCNA v6.0 ITN - Chapter 04
CCNA v6.0 ITN - Chapter 04Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01Irsandi Hasan
 
VMware vShield - Overview
VMware vShield - OverviewVMware vShield - Overview
VMware vShield - OverviewIrsandi Hasan
 
CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11Irsandi Hasan
 
CCNA RS_NB - Chapter 10
CCNA RS_NB - Chapter 10CCNA RS_NB - Chapter 10
CCNA RS_NB - Chapter 10Irsandi Hasan
 
CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 9CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 9Irsandi Hasan
 
CCNA RS_NB - Chapter 8
CCNA RS_NB - Chapter 8CCNA RS_NB - Chapter 8
CCNA RS_NB - Chapter 8Irsandi Hasan
 
CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 7CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 7Irsandi Hasan
 
CCNA RS_NB - Chapter 6
CCNA RS_NB - Chapter 6CCNA RS_NB - Chapter 6
CCNA RS_NB - Chapter 6Irsandi Hasan
 
CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5Irsandi Hasan
 
CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4Irsandi Hasan
 

More from Irsandi Hasan (20)

CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11
 
CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10
 
CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09
 
CCNA v6.0 ITN - Chapter 08
CCNA v6.0 ITN - Chapter 08CCNA v6.0 ITN - Chapter 08
CCNA v6.0 ITN - Chapter 08
 
CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 07CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 07
 
CCNA v6.0 ITN - Chapter 06
CCNA v6.0 ITN - Chapter 06CCNA v6.0 ITN - Chapter 06
CCNA v6.0 ITN - Chapter 06
 
CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05
 
CCNA v6.0 ITN - Chapter 04
CCNA v6.0 ITN - Chapter 04CCNA v6.0 ITN - Chapter 04
CCNA v6.0 ITN - Chapter 04
 
CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03
 
CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02
 
CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01
 
VMware vShield - Overview
VMware vShield - OverviewVMware vShield - Overview
VMware vShield - Overview
 
CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11
 
CCNA RS_NB - Chapter 10
CCNA RS_NB - Chapter 10CCNA RS_NB - Chapter 10
CCNA RS_NB - Chapter 10
 
CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 9CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 9
 
CCNA RS_NB - Chapter 8
CCNA RS_NB - Chapter 8CCNA RS_NB - Chapter 8
CCNA RS_NB - Chapter 8
 
CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 7CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 7
 
CCNA RS_NB - Chapter 6
CCNA RS_NB - Chapter 6CCNA RS_NB - Chapter 6
CCNA RS_NB - Chapter 6
 
CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5
 
CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4
 

Recently uploaded

KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostMatt Ray
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URLRuncy Oommen
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...DianaGray10
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfDianaGray10
 
Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxBuilding AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxUdaiappa Ramachandran
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesDavid Newbury
 
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?IES VE
 
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsIgniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsSafe Software
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopBachir Benyammi
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfAijun Zhang
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxMatsuo Lab
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7DianaGray10
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024SkyPlanner
 
20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-pyJamie (Taka) Wang
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6DianaGray10
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDELiveplex
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.YounusS2
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Brian Pichman
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureEric D. Schabell
 

Recently uploaded (20)

KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URL
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
 
Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxBuilding AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptx
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond Ontologies
 
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?
 
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsIgniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 Workshop
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdf
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptx
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024
 
20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-py
 
201610817 - edge part1
201610817 - edge part1201610817 - edge part1
201610817 - edge part1
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability Adventure
 

ITE - Chapter 2

  • 1. IT Essentials PC Hardware and Software 4.1 Instructional Resource Chapter 2: Safe Lab Procedures and Tool Use Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 1
  • 2. Chapter 2: Objectives  Explain the purpose of safe working conditions and procedures.  Identify tools and software used with personal computer components and their purposes.  Implement proper tool use. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 2
  • 3. Chapter 2: Critical Concepts  What is this chapter about and why is it important?  This chapter discusses safe lab procedures, tool use for computer maintenance, and proper disposal of hazardous materials. It provides an overview of safe working conditions in the lab and in other environments. Basic electrical, fire, and chemical safety guidelines are covered, as well as other potential workplace hazards. Much of the chapter is devoted to identification and proper usage of hand tools and software tools. It also discusses the importance of organization of tools, and cleaning procedures for all computer components.  IT technicians have cut, burned, and even electrocuted themselves while working on computers. IT technicians have short-circuited working components, thus rendering the components unusable. This chapter is important because it explains the good work habits that all technicians must develop in order to avoid injury to themselves or others, and to avoid damaging or destroying equipment, or losing data. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 3
  • 4. Chapter 2: Activities  What activities are associated with this chapter 2.2.2: Worksheet: Diagnostic Software 2.3.4: Lab: Computer Disassembly Chapter 2 Quiz Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 4
  • 5. Chapter 2: New Terms  What terms are introduced in this chapter? antistatic mat 2.2.1 antistatic wrist strap 2.2.1 anti-virus application 2.2.2 blackout 2.1.2 brownout 2.1.2 cable tie 2.2.1 CHKDSK 2.2.2 compressed air 2.2.1 conduit 2.1.1 defrag 2.2.2 Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 5
  • 6. Chapter 2: New Terms  What terms are introduced in this chapter? digital multimeter 2.2.1 disk cleanup 2.2.2 disk management 2.2.2 Electromagnetic Interference (EMI) 2.1.2 Electrostatic Discharge (ESD) 2.1.2 FDISK 2.2.2 flat-head screwdriver 2.2.1 format 2.2.2 hex driver 2.2.1 loopback plug 2.2.1 Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 6
  • 7. Chapter 2: New Terms  What terms are introduced in this chapter? Material Safety and Data Sheet (MSDS) 2.1.3 needle-nose pliers 2.2.1 disk cleanup 2.2.2 noise 2.1.2 Phillips-head screwdriver 2.2.1 Radio Frequency Interference (RFI) 2.1.2 SCANDISK 2.2.2 spike 2.1.2 spyware 2.2.2 Standby Power Supply (SPS) 2.1.2 Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 7
  • 8. Chapter 2: New Terms  What terms are introduced in this chapter? surge 2.1.2 surge suppressor 2.1.2 torx screwdriver 2.2.1 tweezers 2.2.1 wire cutters 2.2.1 Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 8
  • 9. Chapter 2: Changes  What has changed from the previous version (4.0) of ITEPC? Page 2.1.1 Identify safety procedures and potential hazards for users and technicians •Electrical safety •Cable management •Avoiding trip hazards Page 2.1.2 Identify safety procedures to protect equipment from damage and data from loss •EMI •Network interference •Magnets •RFI •Cordless phone interference •Microwaves Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 9
  • 10. Chapter 2: Classroom Management  The instructor should ensure this chapter becomes as hand-on as possible.  Have different tools available. Hold up each tool and ask students what they think a technician might use the tool for.  If enough tools are available, divide students into teams and have them document the purpose of each tool in computer support. Have a computer available so they can look inside to see the possibilities. Have two groups share results with one another.  If Internet access is available, have students select suitable power protection for the computers in the classroom based on different scenarios. If Internet access is not available, have various vendors’ technical power protection documents and have the students choose from them.  Keep the power and safety discussions relevant. Explain a section and then have the students apply the information. An example might be to present examples of relevant local or world weather events and the effects the conditions might have on power and safety.  Have the students research the city or state rules for CRT disposal. Have them brainstorm alternatives to disposal. If this is not feasible, bring the rules into class as a handout. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 10
  • 11. Chapter 2: Classroom Management (continued)  Download, print out, or have available MSDS data. Search the Internet with the following key terms: laser printer msds.  Have the students determine the best place to keep MSDS information sheets in the school, who might need this information, and how to get this information to those who might need it.  Disassemble a computer in teams.  Have students rotate with each step so everyone gets hands-on time.  Lead the students through the disassembly process. For example, the first step in the lab is to turn off the computer and disconnect power. It is very important for the students to verify that the computer works BEFORE disassembly. Then, have all the students power down and remove the power cord. No team can progress until all power cords have been removed. Then, move on to step 2. In this manner, the teacher can address issues or reinforce the lecture, and everyone is on the same step and concept. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 11
  • 12. Chapter 2: Teaching Analogies  How often do you disassemble your car? When learning about cars, an automobile technician disassembles a car in sections to learn about how each particular section works. A student can learn about computer components by disassembling a computer in the same way.  How important is doing a tune-up to a car? How important is it to have your teeth cleaned? Preventive maintenance is important to a computer in the same way. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 12
  • 13. Chapter 2: Suggested Class Discussions  Safety – Laser printers possess high voltage and can burn the technician, and CRTs possess high voltage and can shock the technician.  ESD – An electrostatic discharge can damage a computer.  Tools – Discuss the proper tool usage, storage, what to take on a service call, and what to have in the car.  Software tools – Ensure you have software tools appropriate for the operating system.  Preventive maintenance – This extends the life of the computer. Ensure appropriate cleaning supplies are used.  Organization – Ensure computer components are organized and easy to find when reassembling the computer. Emphasize the importance of taking notes and being organized during disassembly.  Question for the class – Have you ever taken something apart and when you tried to put it back together, things didn’t go as planned? Explain what happened. What do you wish you had done differently?  Internet Search – Have students conduct an Internet search on laser printer safety and disposal procedures. Discuss how students would apply this knowledge in the workplace. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 13
  • 14. Chapter 2: Best Practices  Diagram and document the computer disassembly process. • Some students take photos with their phones to help reassemble the computer. Encouraging the use of technology will engage the students. • A good teaching practice is to have each student document the computer disassembly.  Organize parts during the computer disassembly process. • Collect egg cartons for organizing screws that are removed during disassembly. • Collect antistatic bags from school technicians or outside computer repair companies to store computer components. • Do not allow students to stack computer components.  Because CPUs are very expensive and easy to damage, it is not recommended to allow the students to remove the CPU during the computer disassembly process. Obtain bad CPUs from outside computer repair companies to use for class discussion and demonstration. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 14
  • 15. Chapter 2: Outside Reading International Telecommunication Union (ITU) http://www.itu.int/ITU-T/ Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 15
  • 16. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 16
  • 17. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 17