SlideShare a Scribd company logo
1 of 30
CERTIFICATE OF COMPETENCY TITLE
 COC1 – INSTALL AND CONFIGURE COMPUTER SYSTEMS
 COC2 – SET UP COMPUTER NETWORKS
 COC3 – SET UP COMPUTER SERVERS
 COC4 – MAINTAIN AND REPAIR COMPUTER SYSTEMS
AND NETWORKS
COC1 – INSTALL AND CONFIGURE COMPUTER SYSTEMS
 Assemble computer hardware
 Prepare installer
 Install operating system and drivers for peripherals/ devices
 Install application software
 Conduct testing and documentation
COC2 – SET UP COMPUTER NETWORKS
Install network cables
Set network configuration
Set router/Wi-Fi/ wireless access point/repeater
configuration
Inspect and test the configured computer networks
COC3 – SET UP COMPUTER SERVERS
Set – up user access
Configure network services
Perform Testing, documentation and pre deployment
procedures
COC4 – MAINTAIN AND REPAIR COMPUTER
SYSTEMS AND NETWORKS
 Plan and prepare for maintenance and repair
 Maintain computer system and networks
 Diagnose faults of computer system and networks
 Rectify/correct defects in computer systems and networks
 Inspect and test the computer systems and networks
 Course Title: COMPUTER SYSTEMS SERVICING NC Level: NC II
 Training Hours:
 40 Hours (Basic)
 80 Hours (Common)
 160 Hours (CORE)
------------------------------
280 Hours – TOTAL
A person who has achieved this Qualification is
competent to be:
Computer Assembler
Computer Service Technician
Network Technician
Computer Maintenance Technician
OCCUPATIONAL HEALTH AND SAFETY
PROCEDURES (OHS)
 Always ground or discharge yourself before touching any
part of the computer.
 Do not work alone so that there’s someone who can
take care of you in case of accident or emergency.
 Be careful with the tools that may cause short circuit.
 Always full the cable connector on the handle and
not on the cable itself.
 Use only rubber shoes when standing on the ground or
in a concrete floor.
Make sure that the pins are properly aligned when
connecting a cable connector.
 Always power off and unplug the computer before
working on it.
Take away any liquid such as mineral water or soft
drinks near your working area or near computers.
 Keep your work area well lighted and well ventilated.
Personal protective equipment is correctly used in
accordance with organization OHS procedures and practice.
 Take necessary precautions to protect the component of
the computer from damaged cause by ElectroStatics
Discharge(ESD).
Hold the components by edges and do not touch the IC’s.
Read and follow instruction on the manual carefully.
Do not use excessive force if things don’t quite slip into
place.
Personal Protective Equipment
refers to protective equipment or other garments
designed to protect the wearer's body from injury or infection
Personal Protective Equipment
rubber shoes
goggles
gloves
anti-wrist trap
fit clothes
hair tie (for those who have long hair)
handkerchief (for those who have wet hands)
AVOID: metal rings, bracelet, necklace and other accessories when working
Electrostatic Discharge (ESD)
is the sudden flow of electricity between two electrically
charged objects caused by contact, an electrical short, or
dielectric breakdown. A buildup of static electricity can be
caused by turbocharging or by electrostatic induction.
A PERSON GAIN ELECTROSTATIC FORCE
Our body has a charges, both negative
and positive charges, while ground is on negative
charge. There is a tendency that after walking or
touching anything that is connected to ground
makes adapt our positive charges. This is called as
static because this force stays in our body.
5’s
Sort Eliminate whatever is not needed
Straighten Organize whatever remains
Shine Clean the work area
Standardize Schedule regular cleaning and maintenance
Sustain Make 5S a way of life
Some Do’s and Don'ts before working any
operation
Do not work when you are tired or drowsy.
Do not work on dump areas but on clear areas away from
obstacles.
Do not work if your hands, body or clothes are wet.
Do not work in area which not well lighted and ventilated.
Do not work in wet areas.
Keep drinks or any liquids away from computer at all time
Do not use defective cables and plugs. Always check before
using it.
Do not work when you are drunk.
Do not work while you are eating or drinking.
Avoid horse playing.
GOLDEN RULE IN PC REPAIR
“ IF IN DOUBT DON’T “
Don’t take the risk or do something you are uncertain
about. Not only you can damage your self but you can
also damage the PC.
NEXT
1. CSS-OHS.pptx

More Related Content

Similar to 1. CSS-OHS.pptx

Safety issues with ICT
Safety issues with ICTSafety issues with ICT
Safety issues with ICTcomputers 11
 
TLE 7-OHS.pptx............................................
TLE 7-OHS.pptx............................................TLE 7-OHS.pptx............................................
TLE 7-OHS.pptx............................................RegineManuel2
 
The Samsung Series 7 15.6" Notebook (NP700Z5C-S02UB) manual / User Guide
 The Samsung Series 7 15.6" Notebook (NP700Z5C-S02UB) manual / User Guide The Samsung Series 7 15.6" Notebook (NP700Z5C-S02UB) manual / User Guide
The Samsung Series 7 15.6" Notebook (NP700Z5C-S02UB) manual / User Guidemanualsheet
 
ITE_50_Chapter2.ppt
ITE_50_Chapter2.pptITE_50_Chapter2.ppt
ITE_50_Chapter2.pptRossy719186
 
Safety Issues with ict
Safety Issues with ictSafety Issues with ict
Safety Issues with ictsromero26
 
OCCUPATIONAL HEALTH AND SAFETY.ppt
OCCUPATIONAL HEALTH AND SAFETY.pptOCCUPATIONAL HEALTH AND SAFETY.ppt
OCCUPATIONAL HEALTH AND SAFETY.pptjhudy
 
CSSM-LESSON-SLIDES_061738.pdfhwhhwgggwgg
CSSM-LESSON-SLIDES_061738.pdfhwhhwgggwggCSSM-LESSON-SLIDES_061738.pdfhwhhwgggwgg
CSSM-LESSON-SLIDES_061738.pdfhwhhwgggwggjomariefurio1
 
MODULE 1- Q4MODULE 1 IN CSS COMPUTER SYSTEM.pptx
MODULE 1- Q4MODULE 1 IN CSS COMPUTER SYSTEM.pptxMODULE 1- Q4MODULE 1 IN CSS COMPUTER SYSTEM.pptx
MODULE 1- Q4MODULE 1 IN CSS COMPUTER SYSTEM.pptxreynaldo glendro
 
Performing Computer Operations.pptx
Performing Computer Operations.pptxPerforming Computer Operations.pptx
Performing Computer Operations.pptxMaryGraceHeredero3
 
vostro-3888-desktop_owners-manual5_en-us.pdf
vostro-3888-desktop_owners-manual5_en-us.pdfvostro-3888-desktop_owners-manual5_en-us.pdf
vostro-3888-desktop_owners-manual5_en-us.pdfMohamedAAmin2
 
precision-15-7530-laptop_setup-guide2_en-us.pdf
precision-15-7530-laptop_setup-guide2_en-us.pdfprecision-15-7530-laptop_setup-guide2_en-us.pdf
precision-15-7530-laptop_setup-guide2_en-us.pdfssuserad36061
 
INTRODUCTION COMPUTER SYSTEM SERVICING NC II.pptx
INTRODUCTION COMPUTER SYSTEM SERVICING NC II.pptxINTRODUCTION COMPUTER SYSTEM SERVICING NC II.pptx
INTRODUCTION COMPUTER SYSTEM SERVICING NC II.pptxJerome Surio
 
As5110 5100 3100 Eng Olm 0425
As5110 5100 3100 Eng Olm 0425As5110 5100 3100 Eng Olm 0425
As5110 5100 3100 Eng Olm 0425guestdee8e1
 
POLITEKNIK MALAYSIA
POLITEKNIK MALAYSIAPOLITEKNIK MALAYSIA
POLITEKNIK MALAYSIAAiman Hud
 
Chs safety and hazard
Chs safety and hazardChs safety and hazard
Chs safety and hazardanjgulf
 
Computer Hand Tools_Presentation
Computer Hand Tools_PresentationComputer Hand Tools_Presentation
Computer Hand Tools_PresentationBryan Corpuz
 
John deere e gator utility vehicle service repair manual (tm1766)
John deere e gator utility vehicle service repair manual (tm1766)John deere e gator utility vehicle service repair manual (tm1766)
John deere e gator utility vehicle service repair manual (tm1766)fsjefjskekmm
 
John deere e gator utility vehicle service repair manual (tm1766)
John deere e gator utility vehicle service repair manual (tm1766)John deere e gator utility vehicle service repair manual (tm1766)
John deere e gator utility vehicle service repair manual (tm1766)fusjefjskekmem
 

Similar to 1. CSS-OHS.pptx (20)

Safety issues with ICT
Safety issues with ICTSafety issues with ICT
Safety issues with ICT
 
TLE 7-OHS.pptx............................................
TLE 7-OHS.pptx............................................TLE 7-OHS.pptx............................................
TLE 7-OHS.pptx............................................
 
The Samsung Series 7 15.6" Notebook (NP700Z5C-S02UB) manual / User Guide
 The Samsung Series 7 15.6" Notebook (NP700Z5C-S02UB) manual / User Guide The Samsung Series 7 15.6" Notebook (NP700Z5C-S02UB) manual / User Guide
The Samsung Series 7 15.6" Notebook (NP700Z5C-S02UB) manual / User Guide
 
ITE_50_Chapter2.ppt
ITE_50_Chapter2.pptITE_50_Chapter2.ppt
ITE_50_Chapter2.ppt
 
Manualwqc 24
Manualwqc 24Manualwqc 24
Manualwqc 24
 
Safety Issues with ict
Safety Issues with ictSafety Issues with ict
Safety Issues with ict
 
OCCUPATIONAL HEALTH AND SAFETY.ppt
OCCUPATIONAL HEALTH AND SAFETY.pptOCCUPATIONAL HEALTH AND SAFETY.ppt
OCCUPATIONAL HEALTH AND SAFETY.ppt
 
CSSM-LESSON-SLIDES_061738.pdfhwhhwgggwgg
CSSM-LESSON-SLIDES_061738.pdfhwhhwgggwggCSSM-LESSON-SLIDES_061738.pdfhwhhwgggwgg
CSSM-LESSON-SLIDES_061738.pdfhwhhwgggwgg
 
MODULE 1- Q4MODULE 1 IN CSS COMPUTER SYSTEM.pptx
MODULE 1- Q4MODULE 1 IN CSS COMPUTER SYSTEM.pptxMODULE 1- Q4MODULE 1 IN CSS COMPUTER SYSTEM.pptx
MODULE 1- Q4MODULE 1 IN CSS COMPUTER SYSTEM.pptx
 
Performing Computer Operations.pptx
Performing Computer Operations.pptxPerforming Computer Operations.pptx
Performing Computer Operations.pptx
 
CSS W1.pptx
CSS W1.pptxCSS W1.pptx
CSS W1.pptx
 
vostro-3888-desktop_owners-manual5_en-us.pdf
vostro-3888-desktop_owners-manual5_en-us.pdfvostro-3888-desktop_owners-manual5_en-us.pdf
vostro-3888-desktop_owners-manual5_en-us.pdf
 
precision-15-7530-laptop_setup-guide2_en-us.pdf
precision-15-7530-laptop_setup-guide2_en-us.pdfprecision-15-7530-laptop_setup-guide2_en-us.pdf
precision-15-7530-laptop_setup-guide2_en-us.pdf
 
INTRODUCTION COMPUTER SYSTEM SERVICING NC II.pptx
INTRODUCTION COMPUTER SYSTEM SERVICING NC II.pptxINTRODUCTION COMPUTER SYSTEM SERVICING NC II.pptx
INTRODUCTION COMPUTER SYSTEM SERVICING NC II.pptx
 
As5110 5100 3100 Eng Olm 0425
As5110 5100 3100 Eng Olm 0425As5110 5100 3100 Eng Olm 0425
As5110 5100 3100 Eng Olm 0425
 
POLITEKNIK MALAYSIA
POLITEKNIK MALAYSIAPOLITEKNIK MALAYSIA
POLITEKNIK MALAYSIA
 
Chs safety and hazard
Chs safety and hazardChs safety and hazard
Chs safety and hazard
 
Computer Hand Tools_Presentation
Computer Hand Tools_PresentationComputer Hand Tools_Presentation
Computer Hand Tools_Presentation
 
John deere e gator utility vehicle service repair manual (tm1766)
John deere e gator utility vehicle service repair manual (tm1766)John deere e gator utility vehicle service repair manual (tm1766)
John deere e gator utility vehicle service repair manual (tm1766)
 
John deere e gator utility vehicle service repair manual (tm1766)
John deere e gator utility vehicle service repair manual (tm1766)John deere e gator utility vehicle service repair manual (tm1766)
John deere e gator utility vehicle service repair manual (tm1766)
 

Recently uploaded

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 

Recently uploaded (20)

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 

1. CSS-OHS.pptx

  • 1.
  • 2. CERTIFICATE OF COMPETENCY TITLE  COC1 – INSTALL AND CONFIGURE COMPUTER SYSTEMS  COC2 – SET UP COMPUTER NETWORKS  COC3 – SET UP COMPUTER SERVERS  COC4 – MAINTAIN AND REPAIR COMPUTER SYSTEMS AND NETWORKS
  • 3. COC1 – INSTALL AND CONFIGURE COMPUTER SYSTEMS  Assemble computer hardware  Prepare installer  Install operating system and drivers for peripherals/ devices  Install application software  Conduct testing and documentation
  • 4. COC2 – SET UP COMPUTER NETWORKS Install network cables Set network configuration Set router/Wi-Fi/ wireless access point/repeater configuration Inspect and test the configured computer networks
  • 5. COC3 – SET UP COMPUTER SERVERS Set – up user access Configure network services Perform Testing, documentation and pre deployment procedures
  • 6. COC4 – MAINTAIN AND REPAIR COMPUTER SYSTEMS AND NETWORKS  Plan and prepare for maintenance and repair  Maintain computer system and networks  Diagnose faults of computer system and networks  Rectify/correct defects in computer systems and networks  Inspect and test the computer systems and networks
  • 7.  Course Title: COMPUTER SYSTEMS SERVICING NC Level: NC II  Training Hours:  40 Hours (Basic)  80 Hours (Common)  160 Hours (CORE) ------------------------------ 280 Hours – TOTAL
  • 8.
  • 9. A person who has achieved this Qualification is competent to be: Computer Assembler Computer Service Technician Network Technician Computer Maintenance Technician
  • 10. OCCUPATIONAL HEALTH AND SAFETY PROCEDURES (OHS)
  • 11.  Always ground or discharge yourself before touching any part of the computer.  Do not work alone so that there’s someone who can take care of you in case of accident or emergency.  Be careful with the tools that may cause short circuit.  Always full the cable connector on the handle and not on the cable itself.  Use only rubber shoes when standing on the ground or in a concrete floor.
  • 12. Make sure that the pins are properly aligned when connecting a cable connector.  Always power off and unplug the computer before working on it. Take away any liquid such as mineral water or soft drinks near your working area or near computers.  Keep your work area well lighted and well ventilated.
  • 13. Personal protective equipment is correctly used in accordance with organization OHS procedures and practice.  Take necessary precautions to protect the component of the computer from damaged cause by ElectroStatics Discharge(ESD).
  • 14. Hold the components by edges and do not touch the IC’s. Read and follow instruction on the manual carefully. Do not use excessive force if things don’t quite slip into place.
  • 15.
  • 16. Personal Protective Equipment refers to protective equipment or other garments designed to protect the wearer's body from injury or infection
  • 17. Personal Protective Equipment rubber shoes goggles gloves anti-wrist trap fit clothes hair tie (for those who have long hair) handkerchief (for those who have wet hands) AVOID: metal rings, bracelet, necklace and other accessories when working
  • 18.
  • 19. Electrostatic Discharge (ESD) is the sudden flow of electricity between two electrically charged objects caused by contact, an electrical short, or dielectric breakdown. A buildup of static electricity can be caused by turbocharging or by electrostatic induction.
  • 20.
  • 21. A PERSON GAIN ELECTROSTATIC FORCE Our body has a charges, both negative and positive charges, while ground is on negative charge. There is a tendency that after walking or touching anything that is connected to ground makes adapt our positive charges. This is called as static because this force stays in our body.
  • 22.
  • 23. 5’s Sort Eliminate whatever is not needed Straighten Organize whatever remains Shine Clean the work area Standardize Schedule regular cleaning and maintenance Sustain Make 5S a way of life
  • 24.
  • 25.
  • 26.
  • 27. Some Do’s and Don'ts before working any operation Do not work when you are tired or drowsy. Do not work on dump areas but on clear areas away from obstacles. Do not work if your hands, body or clothes are wet. Do not work in area which not well lighted and ventilated.
  • 28. Do not work in wet areas. Keep drinks or any liquids away from computer at all time Do not use defective cables and plugs. Always check before using it. Do not work when you are drunk. Do not work while you are eating or drinking. Avoid horse playing.
  • 29. GOLDEN RULE IN PC REPAIR “ IF IN DOUBT DON’T “ Don’t take the risk or do something you are uncertain about. Not only you can damage your self but you can also damage the PC. NEXT