SlideShare a Scribd company logo
1 of 17
IT Essentials PC Hardware
  and Software 4.1

  Instructional Resource
  Chapter 2: Safe Lab
  Procedures and Tool Use




Presentation_ID               © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   1
Chapter 2: Objectives
            Explain the purpose of safe working conditions and procedures.
            Identify tools and software used with personal computer components and their
             purposes.
            Implement proper tool use.




Presentation_ID                                     © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   2
Chapter 2: Critical Concepts
            What is this chapter about and why is it important?
            This chapter discusses safe lab procedures, tool use for computer maintenance, and
             proper disposal of hazardous materials. It provides an overview of safe working
             conditions in the lab and in other environments. Basic electrical, fire, and chemical
             safety guidelines are covered, as well as other potential workplace hazards. Much of
             the chapter is devoted to identification and proper usage of hand tools and software
             tools. It also discusses the importance of organization of tools, and cleaning
             procedures for all computer components.
            IT technicians have cut, burned, and even electrocuted themselves while working on
             computers. IT technicians have short-circuited working components, thus rendering
             the components unusable. This chapter is important because it explains the good
             work habits that all technicians must develop in order to avoid injury to themselves
             or others, and to avoid damaging or destroying equipment, or losing data.




Presentation_ID                                      © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   3
Chapter 2: Activities
            What activities are associated with this chapter
                  2.2.2: Worksheet: Diagnostic Software
                  2.3.4: Lab: Computer Disassembly
                  Chapter 2 Quiz




Presentation_ID                                       © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   4
Chapter 2: New Terms
            What terms are introduced in this chapter?

                  antistatic mat                                                       2.2.1

                  antistatic wrist strap                                               2.2.1

                  anti-virus application                                               2.2.2

                  blackout                                                             2.1.2

                  brownout                                                             2.1.2

                  cable tie                                                            2.2.1

                  CHKDSK                                                               2.2.2

                  compressed air                                                       2.2.1

                  conduit                                                              2.1.1

                  defrag                                                               2.2.2




Presentation_ID                                     © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   5
Chapter 2: New Terms
            What terms are introduced in this chapter?

                  digital multimeter                                                      2.2.1

                  disk cleanup                                                            2.2.2

                  disk management                                                         2.2.2

                  Electromagnetic Interference (EMI)                                      2.1.2

                  Electrostatic Discharge (ESD)                                           2.1.2

                  FDISK                                                                   2.2.2

                  flat-head screwdriver                                                   2.2.1

                  format                                                                  2.2.2

                  hex driver                                                              2.2.1

                  loopback plug                                                           2.2.1




Presentation_ID                                        © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   6
Chapter 2: New Terms
            What terms are introduced in this chapter?

                  Material Safety and Data Sheet (MSDS)                                      2.1.3

                  needle-nose pliers                                                         2.2.1

                  disk cleanup                                                               2.2.2

                  noise                                                                      2.1.2

                  Phillips-head screwdriver                                                  2.2.1

                  Radio Frequency Interference (RFI)                                         2.1.2

                  SCANDISK                                                                   2.2.2

                  spike                                                                      2.1.2

                  spyware                                                                    2.2.2

                  Standby Power Supply (SPS)                                                 2.1.2




Presentation_ID                                           © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   7
Chapter 2: New Terms
            What terms are introduced in this chapter?

                  surge                                                                2.1.2

                  surge suppressor                                                     2.1.2

                  torx screwdriver                                                     2.2.1

                  tweezers                                                             2.2.1

                  wire cutters                                                         2.2.1




Presentation_ID                                     © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   8
Chapter 2: Changes
            What has changed from the previous version (4.0) of ITEPC?
                  Page 2.1.1 Identify safety procedures and potential hazards for users and
                   technicians
                       •Electrical safety
                       •Cable management
                       •Avoiding trip hazards


                  Page 2.1.2 Identify safety procedures to protect equipment from damage and
                   data from loss
                       •EMI
                       •Network interference
                       •Magnets
                       •RFI
                       •Cordless phone interference
                       •Microwaves

Presentation_ID                                        © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   9
Chapter 2: Classroom Management
                   The instructor should ensure this chapter becomes as hand-on as possible.
                   Have different tools available. Hold up each tool and ask students what they
                    think a technician might use the tool for.
                   If enough tools are available, divide students into teams and have them
                    document the purpose of each tool in computer support. Have a computer
                    available so they can look inside to see the possibilities. Have two groups
                    share results with one another.
                   If Internet access is available, have students select suitable power protection for
                    the computers in the classroom based on different scenarios. If Internet access
                    is not available, have various vendors’ technical power protection documents
                    and have the students choose from them.
                   Keep the power and safety discussions relevant. Explain a section and then
                    have the students apply the information. An example might be to present
                    examples of relevant local or world weather events and the effects the
                    conditions might have on power and safety.
                   Have the students research the city or state rules for CRT disposal. Have them
                    brainstorm alternatives to disposal. If this is not feasible, bring the rules into
                    class as a handout.




Presentation_ID                                          © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   10
Chapter 2: Classroom Management
           (continued)
                   Download, print out, or have available MSDS data. Search the Internet with the
                    following key terms: laser printer msds.
                   Have the students determine the best place to keep MSDS information sheets
                    in the school, who might need this information, and how to get this information
                    to those who might need it.
                   Disassemble a computer in teams.
                   Have students rotate with each step so everyone gets hands-on time.
                   Lead the students through the disassembly process. For example, the first step
                    in the lab is to turn off the computer and disconnect power. It is very important
                    for the students to verify that the computer works BEFORE disassembly. Then,
                    have all the students power down and remove the power cord. No team can
                    progress until all power cords have been removed. Then, move on to step 2. In
                    this manner, the teacher can address issues or reinforce the lecture, and
                    everyone is on the same step and concept.




Presentation_ID                                         © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   11
Chapter 2: Teaching Analogies
            How often do you disassemble your car? When learning about cars, an automobile
             technician disassembles a car in sections to learn about how each particular
             section works. A student can learn about computer components by disassembling
             a computer in the same way.
            How important is doing a tune-up to a car? How important is it to have your teeth
             cleaned? Preventive maintenance is important to a computer in the same way.




Presentation_ID                                     © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   12
Chapter 2: Suggested Class Discussions
                     Safety – Laser printers possess high voltage and can burn the technician,
                      and CRTs possess high voltage and can shock the technician.
                     ESD – An electrostatic discharge can damage a computer.
                     Tools – Discuss the proper tool usage, storage, what to take on a service call,
                      and what to have in the car.
                     Software tools – Ensure you have software tools appropriate for the operating
                      system.
                     Preventive maintenance – This extends the life of the computer. Ensure
                      appropriate cleaning supplies are used.
                     Organization – Ensure computer components are organized and easy to find
                      when reassembling the computer. Emphasize the importance of taking notes
                      and being organized during disassembly.
                     Question for the class – Have you ever taken something apart and when you
                      tried to put it back together, things didn’t go as planned? Explain what
                      happened. What do you wish you had done differently?
                     Internet Search – Have students conduct an Internet search on laser printer
                      safety and disposal procedures. Discuss how students would apply this
                      knowledge in the workplace.


Presentation_ID                                         © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   13
Chapter 2: Best Practices
                     Diagram and document the computer disassembly process.
                      • Some students take photos with their phones to help reassemble the
                          computer. Encouraging the use of technology will engage the students.
                      • A good teaching practice is to have each student document the computer
                          disassembly.
                     Organize parts during the computer disassembly process.
                      • Collect egg cartons for organizing screws that are removed during
                          disassembly.
                      • Collect antistatic bags from school technicians or outside computer repair
                          companies to store computer components.
                      • Do not allow students to stack computer components.
                     Because CPUs are very expensive and easy to damage, it is not
                      recommended to allow the students to remove the CPU during the computer
                      disassembly process. Obtain bad CPUs from outside computer repair
                      companies to use for class discussion and demonstration.




Presentation_ID                                        © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   14
Chapter 2: Outside Reading
                  International Telecommunication Union (ITU)
                   http://www.itu.int/ITU-T/




Presentation_ID                                       © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   15
Presentation_ID   © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   16
Presentation_ID   © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   17

More Related Content

What's hot

Cisco Cyber Security Essentials Chapter-1
Cisco Cyber Security Essentials Chapter-1Cisco Cyber Security Essentials Chapter-1
Cisco Cyber Security Essentials Chapter-1Mukesh Chinta
 
Multilevel architecture& structured org.
Multilevel architecture& structured org.Multilevel architecture& structured org.
Multilevel architecture& structured org.Mahesh Kumar Attri
 
Chap 5, Traitement d'images
Chap 5, Traitement d'imagesChap 5, Traitement d'images
Chap 5, Traitement d'imagesTunisie collège
 
Introduction to ICT - lecture 1
Introduction to ICT - lecture 1Introduction to ICT - lecture 1
Introduction to ICT - lecture 1Mohamed Thawuship
 
Basic computerparts
Basic computerpartsBasic computerparts
Basic computerpartssaidfuad91
 
Computer Troubleshooting
Computer TroubleshootingComputer Troubleshooting
Computer TroubleshootingLisa Hartman
 
Computer Security Lecture 1: Overview
Computer Security Lecture 1: OverviewComputer Security Lecture 1: Overview
Computer Security Lecture 1: OverviewMohamed Loey
 
Chapter 1 Introduction To Computers
Chapter 1 Introduction To ComputersChapter 1 Introduction To Computers
Chapter 1 Introduction To Computersnorzaini
 
Hard disk drive
Hard disk driveHard disk drive
Hard disk driveAwais Alam
 
booting steps of a computer
booting steps of a computerbooting steps of a computer
booting steps of a computerAnusha Babooa
 
Install Windows Server 2008 Step-by-Step
Install Windows Server 2008 Step-by-StepInstall Windows Server 2008 Step-by-Step
Install Windows Server 2008 Step-by-StepMehdi Poustchi Amin
 
02 computer parts and ports
02 computer parts  and ports02 computer parts  and ports
02 computer parts and portsMelchor Balolong
 
Cia security model
Cia security modelCia security model
Cia security modelImran Ahmed
 

What's hot (20)

Computer security and
Computer security andComputer security and
Computer security and
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Cisco Cyber Security Essentials Chapter-1
Cisco Cyber Security Essentials Chapter-1Cisco Cyber Security Essentials Chapter-1
Cisco Cyber Security Essentials Chapter-1
 
Multilevel architecture& structured org.
Multilevel architecture& structured org.Multilevel architecture& structured org.
Multilevel architecture& structured org.
 
WINDOWS SERVER 2008
WINDOWS SERVER 2008WINDOWS SERVER 2008
WINDOWS SERVER 2008
 
Chap 5, Traitement d'images
Chap 5, Traitement d'imagesChap 5, Traitement d'images
Chap 5, Traitement d'images
 
File management
File management File management
File management
 
Introduction to ICT - lecture 1
Introduction to ICT - lecture 1Introduction to ICT - lecture 1
Introduction to ICT - lecture 1
 
Basic computerparts
Basic computerpartsBasic computerparts
Basic computerparts
 
Computer Troubleshooting
Computer TroubleshootingComputer Troubleshooting
Computer Troubleshooting
 
Mobile Hardware
Mobile HardwareMobile Hardware
Mobile Hardware
 
Computer Security Lecture 1: Overview
Computer Security Lecture 1: OverviewComputer Security Lecture 1: Overview
Computer Security Lecture 1: Overview
 
Chapter 1 Introduction To Computers
Chapter 1 Introduction To ComputersChapter 1 Introduction To Computers
Chapter 1 Introduction To Computers
 
Computer security
Computer securityComputer security
Computer security
 
Hard disk drive
Hard disk driveHard disk drive
Hard disk drive
 
booting steps of a computer
booting steps of a computerbooting steps of a computer
booting steps of a computer
 
Install Windows Server 2008 Step-by-Step
Install Windows Server 2008 Step-by-StepInstall Windows Server 2008 Step-by-Step
Install Windows Server 2008 Step-by-Step
 
02 computer parts and ports
02 computer parts  and ports02 computer parts  and ports
02 computer parts and ports
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Cia security model
Cia security modelCia security model
Cia security model
 

Viewers also liked

CCNA Exploration 4 - Chapter 8
CCNA Exploration 4 - Chapter 8CCNA Exploration 4 - Chapter 8
CCNA Exploration 4 - Chapter 8Irsandi Hasan
 
CCNA Security 010-configuring cisco asa
CCNA Security 010-configuring cisco asaCCNA Security 010-configuring cisco asa
CCNA Security 010-configuring cisco asaAhmed Habib
 
CCNA Security 012- cryptographic systems
CCNA Security 012- cryptographic systemsCCNA Security 012- cryptographic systems
CCNA Security 012- cryptographic systemsAhmed Habib
 
CCNA Discovery 1 - Chapter 4
CCNA Discovery 1 - Chapter 4CCNA Discovery 1 - Chapter 4
CCNA Discovery 1 - Chapter 4Irsandi Hasan
 
CCNA Security - Chapter 6
CCNA Security - Chapter 6CCNA Security - Chapter 6
CCNA Security - Chapter 6Irsandi Hasan
 
CCNA Security - Chapter 4
CCNA Security - Chapter 4CCNA Security - Chapter 4
CCNA Security - Chapter 4Irsandi Hasan
 
CCNA Security - Chapter 7
CCNA Security - Chapter 7CCNA Security - Chapter 7
CCNA Security - Chapter 7Irsandi Hasan
 
CCNA Security - Chapter 8
CCNA Security - Chapter 8CCNA Security - Chapter 8
CCNA Security - Chapter 8Irsandi Hasan
 
CCNA Discovery 1 - Chapter 1
CCNA Discovery 1 - Chapter 1CCNA Discovery 1 - Chapter 1
CCNA Discovery 1 - Chapter 1Irsandi Hasan
 
CCNA Security - Chapter 5
CCNA Security - Chapter 5CCNA Security - Chapter 5
CCNA Security - Chapter 5Irsandi Hasan
 
CCNA Security - Chapter 9
CCNA Security - Chapter 9CCNA Security - Chapter 9
CCNA Security - Chapter 9Irsandi Hasan
 
CCNA Security - Chapter 3
CCNA Security - Chapter 3CCNA Security - Chapter 3
CCNA Security - Chapter 3Irsandi Hasan
 
CCNA Security 06- AAA
CCNA Security 06- AAACCNA Security 06- AAA
CCNA Security 06- AAAAhmed Habib
 
CCNA RS_ITN - Chapter 4
CCNA RS_ITN - Chapter 4CCNA RS_ITN - Chapter 4
CCNA RS_ITN - Chapter 4Irsandi Hasan
 
CCNA Security 09- ios firewall fundamentals
CCNA Security 09- ios firewall fundamentalsCCNA Security 09- ios firewall fundamentals
CCNA Security 09- ios firewall fundamentalsAhmed Habib
 
CCNA Security 011- implementing ios-based ips
CCNA Security 011- implementing ios-based ipsCCNA Security 011- implementing ios-based ips
CCNA Security 011- implementing ios-based ipsAhmed Habib
 
CCNA Exploration 4 - Chapter 7
CCNA Exploration 4 - Chapter 7CCNA Exploration 4 - Chapter 7
CCNA Exploration 4 - Chapter 7Irsandi Hasan
 

Viewers also liked (20)

CCNA Exploration 4 - Chapter 8
CCNA Exploration 4 - Chapter 8CCNA Exploration 4 - Chapter 8
CCNA Exploration 4 - Chapter 8
 
CCNA Security 010-configuring cisco asa
CCNA Security 010-configuring cisco asaCCNA Security 010-configuring cisco asa
CCNA Security 010-configuring cisco asa
 
CCNA Security 012- cryptographic systems
CCNA Security 012- cryptographic systemsCCNA Security 012- cryptographic systems
CCNA Security 012- cryptographic systems
 
CCNA Discovery 1 - Chapter 4
CCNA Discovery 1 - Chapter 4CCNA Discovery 1 - Chapter 4
CCNA Discovery 1 - Chapter 4
 
CCNA Security - Chapter 6
CCNA Security - Chapter 6CCNA Security - Chapter 6
CCNA Security - Chapter 6
 
CCNA Security - Chapter 4
CCNA Security - Chapter 4CCNA Security - Chapter 4
CCNA Security - Chapter 4
 
OSPF v3
OSPF v3OSPF v3
OSPF v3
 
CCNA Security - Chapter 7
CCNA Security - Chapter 7CCNA Security - Chapter 7
CCNA Security - Chapter 7
 
CCNA Security - Chapter 8
CCNA Security - Chapter 8CCNA Security - Chapter 8
CCNA Security - Chapter 8
 
ITE - Chapter 9
ITE - Chapter 9ITE - Chapter 9
ITE - Chapter 9
 
CCNA Discovery 1 - Chapter 1
CCNA Discovery 1 - Chapter 1CCNA Discovery 1 - Chapter 1
CCNA Discovery 1 - Chapter 1
 
CCNA Security - Chapter 5
CCNA Security - Chapter 5CCNA Security - Chapter 5
CCNA Security - Chapter 5
 
CCNA Security - Chapter 9
CCNA Security - Chapter 9CCNA Security - Chapter 9
CCNA Security - Chapter 9
 
CCNA Security - Chapter 3
CCNA Security - Chapter 3CCNA Security - Chapter 3
CCNA Security - Chapter 3
 
CCNA Security 06- AAA
CCNA Security 06- AAACCNA Security 06- AAA
CCNA Security 06- AAA
 
CCNA RS_ITN - Chapter 4
CCNA RS_ITN - Chapter 4CCNA RS_ITN - Chapter 4
CCNA RS_ITN - Chapter 4
 
CCNA Security 09- ios firewall fundamentals
CCNA Security 09- ios firewall fundamentalsCCNA Security 09- ios firewall fundamentals
CCNA Security 09- ios firewall fundamentals
 
ITE - Chapter 7
ITE - Chapter 7ITE - Chapter 7
ITE - Chapter 7
 
CCNA Security 011- implementing ios-based ips
CCNA Security 011- implementing ios-based ipsCCNA Security 011- implementing ios-based ips
CCNA Security 011- implementing ios-based ips
 
CCNA Exploration 4 - Chapter 7
CCNA Exploration 4 - Chapter 7CCNA Exploration 4 - Chapter 7
CCNA Exploration 4 - Chapter 7
 

Similar to ITE - Chapter 2

Distributed Generation In Spain
Distributed Generation In SpainDistributed Generation In Spain
Distributed Generation In Spaindavidtrebolle
 
Easy Learn to Verilog HDL
Easy Learn to Verilog HDLEasy Learn to Verilog HDL
Easy Learn to Verilog HDLkpyes34
 
A.vivotek ip surveillance_handbook
A.vivotek ip surveillance_handbookA.vivotek ip surveillance_handbook
A.vivotek ip surveillance_handbookTSOLUTIONS
 
Microstrip patch-antenna
Microstrip patch-antennaMicrostrip patch-antenna
Microstrip patch-antennaaquibjamal123
 
Barcode reference en
Barcode reference enBarcode reference en
Barcode reference enRoger R Pe M
 
Analog optical link
Analog optical linkAnalog optical link
Analog optical linkhamedmeshkin
 
Domain-Specific Program Checking
Domain-Specific Program CheckingDomain-Specific Program Checking
Domain-Specific Program CheckingLukas Renggli
 
บทที่ 2 Mobile Aplication
บทที่ 2 Mobile Aplicationบทที่ 2 Mobile Aplication
บทที่ 2 Mobile Aplicationrubtumproject.com
 
Gsm based campus display system project report
Gsm based campus display system project reportGsm based campus display system project report
Gsm based campus display system project reportKashyap Shah
 
USB Lock RP Operation Manual
USB Lock RP Operation ManualUSB Lock RP Operation Manual
USB Lock RP Operation ManualJavier Arrospide
 
การพัฒนาเกมคอมพิวเตอร์ 3 มิติ
การพัฒนาเกมคอมพิวเตอร์ 3 มิติการพัฒนาเกมคอมพิวเตอร์ 3 มิติ
การพัฒนาเกมคอมพิวเตอร์ 3 มิติoan508
 
Programming language design_concepts
Programming language design_conceptsProgramming language design_concepts
Programming language design_conceptsYuri Dantas
 

Similar to ITE - Chapter 2 (20)

ITE - Chapter 6
ITE - Chapter 6ITE - Chapter 6
ITE - Chapter 6
 
Distributed Generation In Spain
Distributed Generation In SpainDistributed Generation In Spain
Distributed Generation In Spain
 
Easy Learn to Verilog HDL
Easy Learn to Verilog HDLEasy Learn to Verilog HDL
Easy Learn to Verilog HDL
 
2.1 system concept
2.1 system concept2.1 system concept
2.1 system concept
 
A.vivotek ip surveillance_handbook
A.vivotek ip surveillance_handbookA.vivotek ip surveillance_handbook
A.vivotek ip surveillance_handbook
 
Controlofmachines
Controlofmachines Controlofmachines
Controlofmachines
 
Control of machines
Control of machinesControl of machines
Control of machines
 
Microstrip patch-antenna
Microstrip patch-antennaMicrostrip patch-antenna
Microstrip patch-antenna
 
Zigbee 802.15.4
Zigbee 802.15.4Zigbee 802.15.4
Zigbee 802.15.4
 
Barcode reference en
Barcode reference enBarcode reference en
Barcode reference en
 
Analog optical link
Analog optical linkAnalog optical link
Analog optical link
 
Domain-Specific Program Checking
Domain-Specific Program CheckingDomain-Specific Program Checking
Domain-Specific Program Checking
 
บทที่ 2 Mobile Aplication
บทที่ 2 Mobile Aplicationบทที่ 2 Mobile Aplication
บทที่ 2 Mobile Aplication
 
Gsm based campus display system project report
Gsm based campus display system project reportGsm based campus display system project report
Gsm based campus display system project report
 
50267584 celldoctor
50267584 celldoctor50267584 celldoctor
50267584 celldoctor
 
USB Lock RP Operation Manual
USB Lock RP Operation ManualUSB Lock RP Operation Manual
USB Lock RP Operation Manual
 
Integratedbook
IntegratedbookIntegratedbook
Integratedbook
 
การพัฒนาเกมคอมพิวเตอร์ 3 มิติ
การพัฒนาเกมคอมพิวเตอร์ 3 มิติการพัฒนาเกมคอมพิวเตอร์ 3 มิติ
การพัฒนาเกมคอมพิวเตอร์ 3 มิติ
 
Programming language design_concepts
Programming language design_conceptsProgramming language design_concepts
Programming language design_concepts
 
Manual
ManualManual
Manual
 

More from Irsandi Hasan

CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 08
CCNA v6.0 ITN - Chapter 08CCNA v6.0 ITN - Chapter 08
CCNA v6.0 ITN - Chapter 08Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 07CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 07Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 06
CCNA v6.0 ITN - Chapter 06CCNA v6.0 ITN - Chapter 06
CCNA v6.0 ITN - Chapter 06Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 04
CCNA v6.0 ITN - Chapter 04CCNA v6.0 ITN - Chapter 04
CCNA v6.0 ITN - Chapter 04Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01Irsandi Hasan
 
VMware vShield - Overview
VMware vShield - OverviewVMware vShield - Overview
VMware vShield - OverviewIrsandi Hasan
 
CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11Irsandi Hasan
 
CCNA RS_NB - Chapter 10
CCNA RS_NB - Chapter 10CCNA RS_NB - Chapter 10
CCNA RS_NB - Chapter 10Irsandi Hasan
 
CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 9CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 9Irsandi Hasan
 
CCNA RS_NB - Chapter 8
CCNA RS_NB - Chapter 8CCNA RS_NB - Chapter 8
CCNA RS_NB - Chapter 8Irsandi Hasan
 
CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 7CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 7Irsandi Hasan
 
CCNA RS_NB - Chapter 6
CCNA RS_NB - Chapter 6CCNA RS_NB - Chapter 6
CCNA RS_NB - Chapter 6Irsandi Hasan
 
CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5Irsandi Hasan
 
CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4Irsandi Hasan
 

More from Irsandi Hasan (20)

CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11
 
CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10
 
CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09
 
CCNA v6.0 ITN - Chapter 08
CCNA v6.0 ITN - Chapter 08CCNA v6.0 ITN - Chapter 08
CCNA v6.0 ITN - Chapter 08
 
CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 07CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 07
 
CCNA v6.0 ITN - Chapter 06
CCNA v6.0 ITN - Chapter 06CCNA v6.0 ITN - Chapter 06
CCNA v6.0 ITN - Chapter 06
 
CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05
 
CCNA v6.0 ITN - Chapter 04
CCNA v6.0 ITN - Chapter 04CCNA v6.0 ITN - Chapter 04
CCNA v6.0 ITN - Chapter 04
 
CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03
 
CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02
 
CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01
 
VMware vShield - Overview
VMware vShield - OverviewVMware vShield - Overview
VMware vShield - Overview
 
CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11
 
CCNA RS_NB - Chapter 10
CCNA RS_NB - Chapter 10CCNA RS_NB - Chapter 10
CCNA RS_NB - Chapter 10
 
CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 9CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 9
 
CCNA RS_NB - Chapter 8
CCNA RS_NB - Chapter 8CCNA RS_NB - Chapter 8
CCNA RS_NB - Chapter 8
 
CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 7CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 7
 
CCNA RS_NB - Chapter 6
CCNA RS_NB - Chapter 6CCNA RS_NB - Chapter 6
CCNA RS_NB - Chapter 6
 
CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5
 
CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4
 

Recently uploaded

Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 

Recently uploaded (20)

Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 

ITE - Chapter 2

  • 1. IT Essentials PC Hardware and Software 4.1 Instructional Resource Chapter 2: Safe Lab Procedures and Tool Use Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 1
  • 2. Chapter 2: Objectives  Explain the purpose of safe working conditions and procedures.  Identify tools and software used with personal computer components and their purposes.  Implement proper tool use. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 2
  • 3. Chapter 2: Critical Concepts  What is this chapter about and why is it important?  This chapter discusses safe lab procedures, tool use for computer maintenance, and proper disposal of hazardous materials. It provides an overview of safe working conditions in the lab and in other environments. Basic electrical, fire, and chemical safety guidelines are covered, as well as other potential workplace hazards. Much of the chapter is devoted to identification and proper usage of hand tools and software tools. It also discusses the importance of organization of tools, and cleaning procedures for all computer components.  IT technicians have cut, burned, and even electrocuted themselves while working on computers. IT technicians have short-circuited working components, thus rendering the components unusable. This chapter is important because it explains the good work habits that all technicians must develop in order to avoid injury to themselves or others, and to avoid damaging or destroying equipment, or losing data. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 3
  • 4. Chapter 2: Activities  What activities are associated with this chapter 2.2.2: Worksheet: Diagnostic Software 2.3.4: Lab: Computer Disassembly Chapter 2 Quiz Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 4
  • 5. Chapter 2: New Terms  What terms are introduced in this chapter? antistatic mat 2.2.1 antistatic wrist strap 2.2.1 anti-virus application 2.2.2 blackout 2.1.2 brownout 2.1.2 cable tie 2.2.1 CHKDSK 2.2.2 compressed air 2.2.1 conduit 2.1.1 defrag 2.2.2 Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 5
  • 6. Chapter 2: New Terms  What terms are introduced in this chapter? digital multimeter 2.2.1 disk cleanup 2.2.2 disk management 2.2.2 Electromagnetic Interference (EMI) 2.1.2 Electrostatic Discharge (ESD) 2.1.2 FDISK 2.2.2 flat-head screwdriver 2.2.1 format 2.2.2 hex driver 2.2.1 loopback plug 2.2.1 Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 6
  • 7. Chapter 2: New Terms  What terms are introduced in this chapter? Material Safety and Data Sheet (MSDS) 2.1.3 needle-nose pliers 2.2.1 disk cleanup 2.2.2 noise 2.1.2 Phillips-head screwdriver 2.2.1 Radio Frequency Interference (RFI) 2.1.2 SCANDISK 2.2.2 spike 2.1.2 spyware 2.2.2 Standby Power Supply (SPS) 2.1.2 Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 7
  • 8. Chapter 2: New Terms  What terms are introduced in this chapter? surge 2.1.2 surge suppressor 2.1.2 torx screwdriver 2.2.1 tweezers 2.2.1 wire cutters 2.2.1 Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 8
  • 9. Chapter 2: Changes  What has changed from the previous version (4.0) of ITEPC? Page 2.1.1 Identify safety procedures and potential hazards for users and technicians •Electrical safety •Cable management •Avoiding trip hazards Page 2.1.2 Identify safety procedures to protect equipment from damage and data from loss •EMI •Network interference •Magnets •RFI •Cordless phone interference •Microwaves Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 9
  • 10. Chapter 2: Classroom Management  The instructor should ensure this chapter becomes as hand-on as possible.  Have different tools available. Hold up each tool and ask students what they think a technician might use the tool for.  If enough tools are available, divide students into teams and have them document the purpose of each tool in computer support. Have a computer available so they can look inside to see the possibilities. Have two groups share results with one another.  If Internet access is available, have students select suitable power protection for the computers in the classroom based on different scenarios. If Internet access is not available, have various vendors’ technical power protection documents and have the students choose from them.  Keep the power and safety discussions relevant. Explain a section and then have the students apply the information. An example might be to present examples of relevant local or world weather events and the effects the conditions might have on power and safety.  Have the students research the city or state rules for CRT disposal. Have them brainstorm alternatives to disposal. If this is not feasible, bring the rules into class as a handout. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 10
  • 11. Chapter 2: Classroom Management (continued)  Download, print out, or have available MSDS data. Search the Internet with the following key terms: laser printer msds.  Have the students determine the best place to keep MSDS information sheets in the school, who might need this information, and how to get this information to those who might need it.  Disassemble a computer in teams.  Have students rotate with each step so everyone gets hands-on time.  Lead the students through the disassembly process. For example, the first step in the lab is to turn off the computer and disconnect power. It is very important for the students to verify that the computer works BEFORE disassembly. Then, have all the students power down and remove the power cord. No team can progress until all power cords have been removed. Then, move on to step 2. In this manner, the teacher can address issues or reinforce the lecture, and everyone is on the same step and concept. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 11
  • 12. Chapter 2: Teaching Analogies  How often do you disassemble your car? When learning about cars, an automobile technician disassembles a car in sections to learn about how each particular section works. A student can learn about computer components by disassembling a computer in the same way.  How important is doing a tune-up to a car? How important is it to have your teeth cleaned? Preventive maintenance is important to a computer in the same way. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 12
  • 13. Chapter 2: Suggested Class Discussions  Safety – Laser printers possess high voltage and can burn the technician, and CRTs possess high voltage and can shock the technician.  ESD – An electrostatic discharge can damage a computer.  Tools – Discuss the proper tool usage, storage, what to take on a service call, and what to have in the car.  Software tools – Ensure you have software tools appropriate for the operating system.  Preventive maintenance – This extends the life of the computer. Ensure appropriate cleaning supplies are used.  Organization – Ensure computer components are organized and easy to find when reassembling the computer. Emphasize the importance of taking notes and being organized during disassembly.  Question for the class – Have you ever taken something apart and when you tried to put it back together, things didn’t go as planned? Explain what happened. What do you wish you had done differently?  Internet Search – Have students conduct an Internet search on laser printer safety and disposal procedures. Discuss how students would apply this knowledge in the workplace. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 13
  • 14. Chapter 2: Best Practices  Diagram and document the computer disassembly process. • Some students take photos with their phones to help reassemble the computer. Encouraging the use of technology will engage the students. • A good teaching practice is to have each student document the computer disassembly.  Organize parts during the computer disassembly process. • Collect egg cartons for organizing screws that are removed during disassembly. • Collect antistatic bags from school technicians or outside computer repair companies to store computer components. • Do not allow students to stack computer components.  Because CPUs are very expensive and easy to damage, it is not recommended to allow the students to remove the CPU during the computer disassembly process. Obtain bad CPUs from outside computer repair companies to use for class discussion and demonstration. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 14
  • 15. Chapter 2: Outside Reading International Telecommunication Union (ITU) http://www.itu.int/ITU-T/ Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 15
  • 16. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 16
  • 17. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 17