SlideShare a Scribd company logo
Health and Safety
requirements for Computer
Maintenance
Ajay Jassi
Before the process
Backup all of the data that is
important.
 Check system BIOS so that if any
parts of the computer is damaged it
will give a warning, so the problem is
known.

Manual handling


When lifting up a computer, legs must
be bent and back must be straight up,
as this will prevent breaking bones
when lifting heavy objects.
Electrical hazards
Firstly turn off the computer correctly
and unplug it from the mains.
 Unplug all the other cables attracted to
the back and front of the computer.
 Power cycle the computer.

Preventing Static Shocks
Once that is done lay the computer
down on a flat surface on top of an
antistatic mat.
 If there is any screws that need to be
undo, use the correct screwdriver and
take off the cover.
 Now a antistatic wristband will need to
be worn and connect it to a metal part
in the casing of the computer with the
crocodile clip.

Responsibility for employers
The employer must make sure that their
employees are safe and comfortable with
their industry. For the employer to do this they
will need a clean environment with fully
equipped uses.
 Employees will need:
1)To have regular breaks.
2)Comfortable spinning chairs with cushioning,
arm rest, foot rest and a head rest.
3)Antiglare screen to protect their eyes.
4)Strong table.
5)Safe fully working keyboard and mice.

Reasons why employers
responsibility are important
1)Employees will need to take regular breaks so that they
don’t strain the eyes and muscles, also avoids them from
getting headaches.
2)They will need a comfortable chair because they will be
sitting down for long hours and if the chair isn’t
comfortable, then this may cause back problems and long
term health problems.
3)Needs for antiglare monitor is very important as it
reduces reflections from the background, so not much
light is being lit off.
4)A strong table will need required if a monitor and a
desktop computer will need to be held. Also it will need to
be able to hold up arm weight when using keyboard and
mice.
5)It’s important for the employees to have a good
keyboard and mice, so that they don’t get an electric
shock.
Good working practice
Importance of password
Passwords are used to protect data and
personal information.
 To create a strong password it must
contain capital letters, numbers and
symbols.
 It’s important that passwords are not
shared.
 The minimum characters should be 8.
 When creating password, no personal
information or names should be used.
Such as football clubs, first name, dob

Using directory and file
names
Using directory and folders are useful
as it keeps data organised and easy to
access.
 When using directory it saves the
time, instead of looking through one
folder.

Backing up data
Backing up data is very important and
useful. This is because if the file
crashes or gets lost, you will have a
restore point, so where last been
saved in a different directory.
 This can be saving it to a different
hdd, email, memory stick or dropbox.

Anti-virus
Anti-virus is a software that is installed
onto the computer to protect data from
viruses and damage.
 Some anti-virus software automatically
backup your data, in emergency of a
virus or a error.

Methods of communication
Communication method

What each type of
communication was used

Advantages and disadvantages
of using the method

Email

Used to send work to teacher and
to get help.

Advantages: Easy and quick to
use.
Disadvantages: Not a instant
respond.

Social networking sites (Twitter)

Used to share work to peers to
view and receive information

Advantages: Receive feedback
and can improve.
Disadvantages: Work can be
copied by someone else.

Video

Used this to do a Face-to-face
discussion which got uploaded on
YouTube.

Advantages: Easy for people to
view the video as doesn’t require
downloading
Disadvantages: If the video has
high pixels, slow internet
connections wouldn’t be able to
cope.

Letter

Used to send letters to customers,
to keep in touch.

Advantages: allows people to
send vouchers and coupons
Disadvantages: customers
doesn’t have to reply

Mobile phone

Used to communicate with friends
by text.

Advantages: Instant reply and
quick send. Also no internet
connection is required.
Disadvantages: In some areas
Main disadvantage is that email, social sites and videos requires internet connection.
there is restricted signals/
How communication delays and
effects progress in workplace.
Mainly communication delays
progress because the main
communication type which is Email
isn't a instant reply and takes time to
get a response.
 Other way is if there is no signal in the
specific area.
 Another less known problem is if you
accidently email it to the wrong
person, without realising and still
waiting for a response.

Demonstrating how to restore
a file using backup
How to backup using
dropbox

1)
2)
3)
4)

Create folder
Save file in folder
Log into dropbox
Create directory folder in
dropbox
5) Open directory folder and click
on upload button
6) Choice file to upload
7) Once done it should be in
folder
Downloading from dropbox to
1) Log into dropbox
restore.
2) Go into the folder when
the file is in
3) Click on the file
4) Then click on the
download icon and it will
save into the download
folder
5) When you click on the file
it will take you to the
directory folder

File that just been
downloaded
How to backup using USB

1)
2)
3)
4)
5)

Create folder
Save file in folder
Plug in USB
Open USB
Create directory in
USB
6) Copy file over to USB
7) Delete file of computer
8) Copy back over from
USB

More Related Content

What's hot

Laptop maintenance
Laptop maintenanceLaptop maintenance
Laptop maintenance
Manu Melwin Joy
 
Top 10 PC Maintenance Tasks That You Need To Remember
Top 10 PC Maintenance Tasks That You Need To RememberTop 10 PC Maintenance Tasks That You Need To Remember
Top 10 PC Maintenance Tasks That You Need To Remember
sherireid89
 
Motherboard of a pc
Motherboard of a pcMotherboard of a pc
Motherboard of a pcTech_MX
 
Computer health & safety issues
Computer health & safety issuesComputer health & safety issues
Computer health & safety issues
Buxoo Abdullah
 
Q3 M1 Types of Components and Objects to be Measured.pptx
Q3 M1  Types of Components and Objects to be Measured.pptxQ3 M1  Types of Components and Objects to be Measured.pptx
Q3 M1 Types of Components and Objects to be Measured.pptx
RicardoRoxas2
 
Common Computer Faults and Problems
Common Computer Faults and ProblemsCommon Computer Faults and Problems
Common Computer Faults and Problems
Sef Cambaliza
 
Computer maintenance
Computer maintenanceComputer maintenance
Computer maintenance
Danladi Gambo
 
Proper Care Of Computers
Proper Care Of ComputersProper Care Of Computers
Proper Care Of Computers
LUZ PINGOL
 
Computer maintenance
Computer maintenanceComputer maintenance
Computer maintenancecapjjj
 
Install computer system,devices and peripherals
Install computer system,devices and peripheralsInstall computer system,devices and peripherals
Install computer system,devices and peripherals
Raiza Janelle
 
05. Power Supply Unit (PSU)
05. Power Supply Unit (PSU)05. Power Supply Unit (PSU)
05. Power Supply Unit (PSU)
Akhila Dakshina
 
Motherboard
MotherboardMotherboard
Motherboard
Rebaz Hamad
 
Computer safety
Computer safetyComputer safety
Computer safety
University of Jaffna
 
Computer specifications
Computer specificationsComputer specifications
Computer specifications
Leonel Rivas
 
Basic Troubleshooting
Basic TroubleshootingBasic Troubleshooting
Basic Troubleshooting
Aaron Abraham
 
Computer Ergonomics
Computer ErgonomicsComputer Ergonomics
Computer Ergonomicsvtsiri
 
Computer and Health
Computer and HealthComputer and Health
Computer and Health
Rajith Pemabandu
 
Css grade 11 week 3
Css grade 11 week 3Css grade 11 week 3
Css grade 11 week 3
Danilo Anos
 
Ergonomics For Computer Users
Ergonomics For Computer UsersErgonomics For Computer Users
Ergonomics For Computer Usersarvindnagri.nagri
 

What's hot (20)

Laptop maintenance
Laptop maintenanceLaptop maintenance
Laptop maintenance
 
Top 10 PC Maintenance Tasks That You Need To Remember
Top 10 PC Maintenance Tasks That You Need To RememberTop 10 PC Maintenance Tasks That You Need To Remember
Top 10 PC Maintenance Tasks That You Need To Remember
 
Motherboard of a pc
Motherboard of a pcMotherboard of a pc
Motherboard of a pc
 
Computer health & safety issues
Computer health & safety issuesComputer health & safety issues
Computer health & safety issues
 
Computer maintenance
Computer maintenanceComputer maintenance
Computer maintenance
 
Q3 M1 Types of Components and Objects to be Measured.pptx
Q3 M1  Types of Components and Objects to be Measured.pptxQ3 M1  Types of Components and Objects to be Measured.pptx
Q3 M1 Types of Components and Objects to be Measured.pptx
 
Common Computer Faults and Problems
Common Computer Faults and ProblemsCommon Computer Faults and Problems
Common Computer Faults and Problems
 
Computer maintenance
Computer maintenanceComputer maintenance
Computer maintenance
 
Proper Care Of Computers
Proper Care Of ComputersProper Care Of Computers
Proper Care Of Computers
 
Computer maintenance
Computer maintenanceComputer maintenance
Computer maintenance
 
Install computer system,devices and peripherals
Install computer system,devices and peripheralsInstall computer system,devices and peripherals
Install computer system,devices and peripherals
 
05. Power Supply Unit (PSU)
05. Power Supply Unit (PSU)05. Power Supply Unit (PSU)
05. Power Supply Unit (PSU)
 
Motherboard
MotherboardMotherboard
Motherboard
 
Computer safety
Computer safetyComputer safety
Computer safety
 
Computer specifications
Computer specificationsComputer specifications
Computer specifications
 
Basic Troubleshooting
Basic TroubleshootingBasic Troubleshooting
Basic Troubleshooting
 
Computer Ergonomics
Computer ErgonomicsComputer Ergonomics
Computer Ergonomics
 
Computer and Health
Computer and HealthComputer and Health
Computer and Health
 
Css grade 11 week 3
Css grade 11 week 3Css grade 11 week 3
Css grade 11 week 3
 
Ergonomics For Computer Users
Ergonomics For Computer UsersErgonomics For Computer Users
Ergonomics For Computer Users
 

Viewers also liked

Occupational safety
Occupational safetyOccupational safety
Occupational safety
myebautista01031980
 
Promoting safety and health in the workplace
Promoting safety and health in the workplacePromoting safety and health in the workplace
Promoting safety and health in the workplace
Prince Mello
 
Safety practice ( SWEDISH COLLEGE OF ENGINEERING WAHCANTT)
Safety practice ( SWEDISH COLLEGE OF ENGINEERING WAHCANTT)Safety practice ( SWEDISH COLLEGE OF ENGINEERING WAHCANTT)
Safety practice ( SWEDISH COLLEGE OF ENGINEERING WAHCANTT)Waqas Ahmad
 
Computer hazard
Computer hazardComputer hazard
K to 12 PC Hardware Servicing Learning Module
K to 12 PC Hardware Servicing Learning ModuleK to 12 PC Hardware Servicing Learning Module
K to 12 PC Hardware Servicing Learning Module
Joseph Magkalas
 
Computer health related problems
Computer health related problemsComputer health related problems
Computer health related problemsfirdaus-zailani
 
Health hazards of mobile phone and computer use
Health hazards of mobile phone and computer useHealth hazards of mobile phone and computer use
Health hazards of mobile phone and computer use
Prof. Dr. Aswinikumar Surendran
 
computer related health hazards
computer related health hazardscomputer related health hazards
computer related health hazardsvishal chaturani
 
Physical hazard
Physical hazardPhysical hazard
Physical hazardfazida76
 
CHEMICAL HAZARDS
CHEMICAL HAZARDSCHEMICAL HAZARDS
CHEMICAL HAZARDS
Mark Anthony Enoy
 
External and internal computer parts
External and internal computer partsExternal and internal computer parts
External and internal computer parts
qmaicol3
 
OHS and the Types of Hazards
OHS and the Types of HazardsOHS and the Types of Hazards
OHS and the Types of HazardsM.j. Mañago
 
Internal parts of a computer and their functions
Internal parts of a computer and their functionsInternal parts of a computer and their functions
Internal parts of a computer and their functionsEmily-scamell
 
Internal components of the computer
Internal components of the computerInternal components of the computer
Internal components of the computer
DanielAtkinson96
 
Workplace hazards
Workplace hazardsWorkplace hazards
Workplace hazardssafereps
 
Occupational Health and Safety Powerpoint Presentation
Occupational Health and Safety Powerpoint PresentationOccupational Health and Safety Powerpoint Presentation
Occupational Health and Safety Powerpoint Presentation
JoLowe72
 
Electrical hazards
Electrical hazardsElectrical hazards
Electrical hazardsNauman khan
 

Viewers also liked (20)

Occupational safety
Occupational safetyOccupational safety
Occupational safety
 
Promoting safety and health in the workplace
Promoting safety and health in the workplacePromoting safety and health in the workplace
Promoting safety and health in the workplace
 
Safety practice ( SWEDISH COLLEGE OF ENGINEERING WAHCANTT)
Safety practice ( SWEDISH COLLEGE OF ENGINEERING WAHCANTT)Safety practice ( SWEDISH COLLEGE OF ENGINEERING WAHCANTT)
Safety practice ( SWEDISH COLLEGE OF ENGINEERING WAHCANTT)
 
Computer hazard
Computer hazardComputer hazard
Computer hazard
 
Hazard
HazardHazard
Hazard
 
How can computers affect our health
How can computers affect our healthHow can computers affect our health
How can computers affect our health
 
K to 12 PC Hardware Servicing Learning Module
K to 12 PC Hardware Servicing Learning ModuleK to 12 PC Hardware Servicing Learning Module
K to 12 PC Hardware Servicing Learning Module
 
Computer health related problems
Computer health related problemsComputer health related problems
Computer health related problems
 
Health hazards of mobile phone and computer use
Health hazards of mobile phone and computer useHealth hazards of mobile phone and computer use
Health hazards of mobile phone and computer use
 
computer related health hazards
computer related health hazardscomputer related health hazards
computer related health hazards
 
Physical hazard
Physical hazardPhysical hazard
Physical hazard
 
Types of hazards pictures
Types of hazards picturesTypes of hazards pictures
Types of hazards pictures
 
CHEMICAL HAZARDS
CHEMICAL HAZARDSCHEMICAL HAZARDS
CHEMICAL HAZARDS
 
External and internal computer parts
External and internal computer partsExternal and internal computer parts
External and internal computer parts
 
OHS and the Types of Hazards
OHS and the Types of HazardsOHS and the Types of Hazards
OHS and the Types of Hazards
 
Internal parts of a computer and their functions
Internal parts of a computer and their functionsInternal parts of a computer and their functions
Internal parts of a computer and their functions
 
Internal components of the computer
Internal components of the computerInternal components of the computer
Internal components of the computer
 
Workplace hazards
Workplace hazardsWorkplace hazards
Workplace hazards
 
Occupational Health and Safety Powerpoint Presentation
Occupational Health and Safety Powerpoint PresentationOccupational Health and Safety Powerpoint Presentation
Occupational Health and Safety Powerpoint Presentation
 
Electrical hazards
Electrical hazardsElectrical hazards
Electrical hazards
 

Similar to Health and safety requirements for computer maintenance

Health and safety in the workplace.
Health and safety in the workplace.Health and safety in the workplace.
Health and safety in the workplace.
OriginalGSM
 
Computer presentation
Computer presentationComputer presentation
Computer presentation
Faseeha Sajid
 
Grade 8 ICT CSS Learning Plan - August 31 to September 2, 2022.doc
Grade 8 ICT CSS Learning Plan - August 31 to September 2, 2022.docGrade 8 ICT CSS Learning Plan - August 31 to September 2, 2022.doc
Grade 8 ICT CSS Learning Plan - August 31 to September 2, 2022.doc
Peter Garrido
 
Bathroom spy camera 4 in 1 shaver camera user guide
Bathroom spy camera 4 in 1 shaver camera user guideBathroom spy camera 4 in 1 shaver camera user guide
Bathroom spy camera 4 in 1 shaver camera user guide
george david
 
Potential problems that occur during hardware installation
Potential problems that occur during hardware installationPotential problems that occur during hardware installation
Potential problems that occur during hardware installation
Ajay Jassi
 
Computer info unit 1
Computer info unit 1Computer info unit 1
Computer info unit 1jeanprovitt
 
Project integrator
Project integratorProject integrator
Project integratorItzcel Mc'
 
(7) problem solving
(7) problem solving(7) problem solving
(7) problem solving
erinlstephen
 
(7) Problem Solving
(7) Problem Solving(7) Problem Solving
(7) Problem Solving
erinlstephen
 
shower radio camera I form radio user guide
shower radio camera I form radio user guideshower radio camera I form radio user guide
shower radio camera I form radio user guide
george david
 
Computer basic operations
Computer basic operationsComputer basic operations
Computer basic operationsHotimah Kusuma
 
Clmd4 a epasg7_8
Clmd4 a epasg7_8Clmd4 a epasg7_8
Clmd4 a epasg7_8
marilynbristol3
 
(7) problem solving
(7) problem solving(7) problem solving
(7) problem solving
erinlily1
 
You can do that with a netbook slideshare
You can do that with a netbook   slideshareYou can do that with a netbook   slideshare
You can do that with a netbook slideshare
Tami Brass
 
detailed-lesson-plan-for-senior-high-demo
detailed-lesson-plan-for-senior-high-demodetailed-lesson-plan-for-senior-high-demo
detailed-lesson-plan-for-senior-high-demo
giareysie
 
Shaver camera user guide (ey shaver001)
Shaver camera user guide (ey shaver001)Shaver camera user guide (ey shaver001)
Shaver camera user guide (ey shaver001)george david
 
E brochure it252_datarecovery
E brochure it252_datarecoveryE brochure it252_datarecovery
E brochure it252_datarecoveryI-r Papa
 
HD best toilet spy camera Air purifier spy camera user guide
HD best toilet spy camera Air purifier spy camera user guideHD best toilet spy camera Air purifier spy camera user guide
HD best toilet spy camera Air purifier spy camera user guide
george david
 
Cd radio camera user guide
Cd radio camera user guideCd radio camera user guide
Cd radio camera user guidegeorge david
 

Similar to Health and safety requirements for computer maintenance (20)

Health and safety in the workplace.
Health and safety in the workplace.Health and safety in the workplace.
Health and safety in the workplace.
 
Computer presentation
Computer presentationComputer presentation
Computer presentation
 
Grade 8 ICT CSS Learning Plan - August 31 to September 2, 2022.doc
Grade 8 ICT CSS Learning Plan - August 31 to September 2, 2022.docGrade 8 ICT CSS Learning Plan - August 31 to September 2, 2022.doc
Grade 8 ICT CSS Learning Plan - August 31 to September 2, 2022.doc
 
Bathroom spy camera 4 in 1 shaver camera user guide
Bathroom spy camera 4 in 1 shaver camera user guideBathroom spy camera 4 in 1 shaver camera user guide
Bathroom spy camera 4 in 1 shaver camera user guide
 
Potential problems that occur during hardware installation
Potential problems that occur during hardware installationPotential problems that occur during hardware installation
Potential problems that occur during hardware installation
 
Computer info unit 1
Computer info unit 1Computer info unit 1
Computer info unit 1
 
Project integrator
Project integratorProject integrator
Project integrator
 
Abhay pratap singh rajawat
Abhay pratap singh rajawatAbhay pratap singh rajawat
Abhay pratap singh rajawat
 
(7) problem solving
(7) problem solving(7) problem solving
(7) problem solving
 
(7) Problem Solving
(7) Problem Solving(7) Problem Solving
(7) Problem Solving
 
shower radio camera I form radio user guide
shower radio camera I form radio user guideshower radio camera I form radio user guide
shower radio camera I form radio user guide
 
Computer basic operations
Computer basic operationsComputer basic operations
Computer basic operations
 
Clmd4 a epasg7_8
Clmd4 a epasg7_8Clmd4 a epasg7_8
Clmd4 a epasg7_8
 
(7) problem solving
(7) problem solving(7) problem solving
(7) problem solving
 
You can do that with a netbook slideshare
You can do that with a netbook   slideshareYou can do that with a netbook   slideshare
You can do that with a netbook slideshare
 
detailed-lesson-plan-for-senior-high-demo
detailed-lesson-plan-for-senior-high-demodetailed-lesson-plan-for-senior-high-demo
detailed-lesson-plan-for-senior-high-demo
 
Shaver camera user guide (ey shaver001)
Shaver camera user guide (ey shaver001)Shaver camera user guide (ey shaver001)
Shaver camera user guide (ey shaver001)
 
E brochure it252_datarecovery
E brochure it252_datarecoveryE brochure it252_datarecovery
E brochure it252_datarecovery
 
HD best toilet spy camera Air purifier spy camera user guide
HD best toilet spy camera Air purifier spy camera user guideHD best toilet spy camera Air purifier spy camera user guide
HD best toilet spy camera Air purifier spy camera user guide
 
Cd radio camera user guide
Cd radio camera user guideCd radio camera user guide
Cd radio camera user guide
 

More from Ajay Jassi

Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices
Ajay Jassi
 
Managing IT Security
Managing IT SecurityManaging IT Security
Managing IT Security
Ajay Jassi
 
Impact on IT system breaches
Impact on IT system breachesImpact on IT system breaches
Impact on IT system breaches
Ajay Jassi
 
Testing software
Testing softwareTesting software
Testing software
Ajay Jassi
 
Configuring personal desktop
Configuring personal desktopConfiguring personal desktop
Configuring personal desktop
Ajay Jassi
 
Preaparation for new software application
Preaparation for new software applicationPreaparation for new software application
Preaparation for new software application
Ajay Jassi
 
Software Licences
Software LicencesSoftware Licences
Software Licences
Ajay Jassi
 
Hardware Documentation and Benefits of Hardware Provider
Hardware Documentation and Benefits of Hardware ProviderHardware Documentation and Benefits of Hardware Provider
Hardware Documentation and Benefits of Hardware Provider
Ajay Jassi
 
IT job role description for Technical Support Engineer
IT job role description for Technical Support EngineerIT job role description for Technical Support Engineer
IT job role description for Technical Support Engineer
Ajay Jassi
 
Characteristics for IT Employee (P1)
Characteristics for IT Employee (P1)Characteristics for IT Employee (P1)
Characteristics for IT Employee (P1)
Ajay Jassi
 
Preparation for Installing Hardware
Preparation for Installing HardwarePreparation for Installing Hardware
Preparation for Installing Hardware
Ajay Jassi
 
Installation and Testing of Hardware
Installation and Testing of HardwareInstallation and Testing of Hardware
Installation and Testing of Hardware
Ajay Jassi
 
Reasons why Hardware is Installed and Potential Problems and the Precautions
Reasons why Hardware is Installed and Potential Problems and the PrecautionsReasons why Hardware is Installed and Potential Problems and the Precautions
Reasons why Hardware is Installed and Potential Problems and the Precautions
Ajay Jassi
 
Installation of Windows 7 using USB
Installation of Windows 7 using USBInstallation of Windows 7 using USB
Installation of Windows 7 using USB
Ajay Jassi
 
Building Computer System
Building Computer SystemBuilding Computer System
Building Computer System
Ajay Jassi
 
Installation and configuration of Wireless NIC
Installation and configuration of Wireless NICInstallation and configuration of Wireless NIC
Installation and configuration of Wireless NIC
Ajay Jassi
 
Comparison between Windows 8 and Mavericks OS X
Comparison between Windows 8 and Mavericks OS XComparison between Windows 8 and Mavericks OS X
Comparison between Windows 8 and Mavericks OS X
Ajay Jassi
 
Upgrade Invoice
Upgrade InvoiceUpgrade Invoice
Upgrade Invoice
Ajay Jassi
 
Personalising Desktop
Personalising DesktopPersonalising Desktop
Personalising Desktop
Ajay Jassi
 
Computer Invoice
Computer InvoiceComputer Invoice
Computer Invoice
Ajay Jassi
 

More from Ajay Jassi (20)

Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices
 
Managing IT Security
Managing IT SecurityManaging IT Security
Managing IT Security
 
Impact on IT system breaches
Impact on IT system breachesImpact on IT system breaches
Impact on IT system breaches
 
Testing software
Testing softwareTesting software
Testing software
 
Configuring personal desktop
Configuring personal desktopConfiguring personal desktop
Configuring personal desktop
 
Preaparation for new software application
Preaparation for new software applicationPreaparation for new software application
Preaparation for new software application
 
Software Licences
Software LicencesSoftware Licences
Software Licences
 
Hardware Documentation and Benefits of Hardware Provider
Hardware Documentation and Benefits of Hardware ProviderHardware Documentation and Benefits of Hardware Provider
Hardware Documentation and Benefits of Hardware Provider
 
IT job role description for Technical Support Engineer
IT job role description for Technical Support EngineerIT job role description for Technical Support Engineer
IT job role description for Technical Support Engineer
 
Characteristics for IT Employee (P1)
Characteristics for IT Employee (P1)Characteristics for IT Employee (P1)
Characteristics for IT Employee (P1)
 
Preparation for Installing Hardware
Preparation for Installing HardwarePreparation for Installing Hardware
Preparation for Installing Hardware
 
Installation and Testing of Hardware
Installation and Testing of HardwareInstallation and Testing of Hardware
Installation and Testing of Hardware
 
Reasons why Hardware is Installed and Potential Problems and the Precautions
Reasons why Hardware is Installed and Potential Problems and the PrecautionsReasons why Hardware is Installed and Potential Problems and the Precautions
Reasons why Hardware is Installed and Potential Problems and the Precautions
 
Installation of Windows 7 using USB
Installation of Windows 7 using USBInstallation of Windows 7 using USB
Installation of Windows 7 using USB
 
Building Computer System
Building Computer SystemBuilding Computer System
Building Computer System
 
Installation and configuration of Wireless NIC
Installation and configuration of Wireless NICInstallation and configuration of Wireless NIC
Installation and configuration of Wireless NIC
 
Comparison between Windows 8 and Mavericks OS X
Comparison between Windows 8 and Mavericks OS XComparison between Windows 8 and Mavericks OS X
Comparison between Windows 8 and Mavericks OS X
 
Upgrade Invoice
Upgrade InvoiceUpgrade Invoice
Upgrade Invoice
 
Personalising Desktop
Personalising DesktopPersonalising Desktop
Personalising Desktop
 
Computer Invoice
Computer InvoiceComputer Invoice
Computer Invoice
 

Recently uploaded

DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 

Recently uploaded (20)

DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 

Health and safety requirements for computer maintenance

  • 1. Health and Safety requirements for Computer Maintenance Ajay Jassi
  • 2. Before the process Backup all of the data that is important.  Check system BIOS so that if any parts of the computer is damaged it will give a warning, so the problem is known. 
  • 3. Manual handling  When lifting up a computer, legs must be bent and back must be straight up, as this will prevent breaking bones when lifting heavy objects.
  • 4. Electrical hazards Firstly turn off the computer correctly and unplug it from the mains.  Unplug all the other cables attracted to the back and front of the computer.  Power cycle the computer. 
  • 5. Preventing Static Shocks Once that is done lay the computer down on a flat surface on top of an antistatic mat.  If there is any screws that need to be undo, use the correct screwdriver and take off the cover.  Now a antistatic wristband will need to be worn and connect it to a metal part in the casing of the computer with the crocodile clip. 
  • 6. Responsibility for employers The employer must make sure that their employees are safe and comfortable with their industry. For the employer to do this they will need a clean environment with fully equipped uses.  Employees will need: 1)To have regular breaks. 2)Comfortable spinning chairs with cushioning, arm rest, foot rest and a head rest. 3)Antiglare screen to protect their eyes. 4)Strong table. 5)Safe fully working keyboard and mice. 
  • 7. Reasons why employers responsibility are important 1)Employees will need to take regular breaks so that they don’t strain the eyes and muscles, also avoids them from getting headaches. 2)They will need a comfortable chair because they will be sitting down for long hours and if the chair isn’t comfortable, then this may cause back problems and long term health problems. 3)Needs for antiglare monitor is very important as it reduces reflections from the background, so not much light is being lit off. 4)A strong table will need required if a monitor and a desktop computer will need to be held. Also it will need to be able to hold up arm weight when using keyboard and mice. 5)It’s important for the employees to have a good keyboard and mice, so that they don’t get an electric shock.
  • 9. Importance of password Passwords are used to protect data and personal information.  To create a strong password it must contain capital letters, numbers and symbols.  It’s important that passwords are not shared.  The minimum characters should be 8.  When creating password, no personal information or names should be used. Such as football clubs, first name, dob 
  • 10. Using directory and file names Using directory and folders are useful as it keeps data organised and easy to access.  When using directory it saves the time, instead of looking through one folder. 
  • 11. Backing up data Backing up data is very important and useful. This is because if the file crashes or gets lost, you will have a restore point, so where last been saved in a different directory.  This can be saving it to a different hdd, email, memory stick or dropbox. 
  • 12. Anti-virus Anti-virus is a software that is installed onto the computer to protect data from viruses and damage.  Some anti-virus software automatically backup your data, in emergency of a virus or a error. 
  • 13. Methods of communication Communication method What each type of communication was used Advantages and disadvantages of using the method Email Used to send work to teacher and to get help. Advantages: Easy and quick to use. Disadvantages: Not a instant respond. Social networking sites (Twitter) Used to share work to peers to view and receive information Advantages: Receive feedback and can improve. Disadvantages: Work can be copied by someone else. Video Used this to do a Face-to-face discussion which got uploaded on YouTube. Advantages: Easy for people to view the video as doesn’t require downloading Disadvantages: If the video has high pixels, slow internet connections wouldn’t be able to cope. Letter Used to send letters to customers, to keep in touch. Advantages: allows people to send vouchers and coupons Disadvantages: customers doesn’t have to reply Mobile phone Used to communicate with friends by text. Advantages: Instant reply and quick send. Also no internet connection is required. Disadvantages: In some areas Main disadvantage is that email, social sites and videos requires internet connection. there is restricted signals/
  • 14. How communication delays and effects progress in workplace. Mainly communication delays progress because the main communication type which is Email isn't a instant reply and takes time to get a response.  Other way is if there is no signal in the specific area.  Another less known problem is if you accidently email it to the wrong person, without realising and still waiting for a response. 
  • 15. Demonstrating how to restore a file using backup
  • 16. How to backup using dropbox 1) 2) 3) 4) Create folder Save file in folder Log into dropbox Create directory folder in dropbox 5) Open directory folder and click on upload button 6) Choice file to upload 7) Once done it should be in folder
  • 17. Downloading from dropbox to 1) Log into dropbox restore. 2) Go into the folder when the file is in 3) Click on the file 4) Then click on the download icon and it will save into the download folder 5) When you click on the file it will take you to the directory folder File that just been downloaded
  • 18. How to backup using USB 1) 2) 3) 4) 5) Create folder Save file in folder Plug in USB Open USB Create directory in USB 6) Copy file over to USB 7) Delete file of computer 8) Copy back over from USB