SlideShare a Scribd company logo
IT Essentials PC Hardware
  and Software 4.1

  Instructional Resource
  Chapter 2: Safe Lab
  Procedures and Tool Use




Presentation_ID               © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   1
Chapter 2: Objectives
            Explain the purpose of safe working conditions and procedures.
            Identify tools and software used with personal computer components and their
             purposes.
            Implement proper tool use.




Presentation_ID                                     © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   2
Chapter 2: Critical Concepts
            What is this chapter about and why is it important?
            This chapter discusses safe lab procedures, tool use for computer maintenance, and
             proper disposal of hazardous materials. It provides an overview of safe working
             conditions in the lab and in other environments. Basic electrical, fire, and chemical
             safety guidelines are covered, as well as other potential workplace hazards. Much of
             the chapter is devoted to identification and proper usage of hand tools and software
             tools. It also discusses the importance of organization of tools, and cleaning
             procedures for all computer components.
            IT technicians have cut, burned, and even electrocuted themselves while working on
             computers. IT technicians have short-circuited working components, thus rendering
             the components unusable. This chapter is important because it explains the good
             work habits that all technicians must develop in order to avoid injury to themselves
             or others, and to avoid damaging or destroying equipment, or losing data.




Presentation_ID                                      © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   3
Chapter 2: Activities
            What activities are associated with this chapter
                  2.2.2: Worksheet: Diagnostic Software
                  2.3.4: Lab: Computer Disassembly
                  Chapter 2 Quiz




Presentation_ID                                       © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   4
Chapter 2: New Terms
            What terms are introduced in this chapter?

                  antistatic mat                                                       2.2.1

                  antistatic wrist strap                                               2.2.1

                  anti-virus application                                               2.2.2

                  blackout                                                             2.1.2

                  brownout                                                             2.1.2

                  cable tie                                                            2.2.1

                  CHKDSK                                                               2.2.2

                  compressed air                                                       2.2.1

                  conduit                                                              2.1.1

                  defrag                                                               2.2.2




Presentation_ID                                     © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   5
Chapter 2: New Terms
            What terms are introduced in this chapter?

                  digital multimeter                                                      2.2.1

                  disk cleanup                                                            2.2.2

                  disk management                                                         2.2.2

                  Electromagnetic Interference (EMI)                                      2.1.2

                  Electrostatic Discharge (ESD)                                           2.1.2

                  FDISK                                                                   2.2.2

                  flat-head screwdriver                                                   2.2.1

                  format                                                                  2.2.2

                  hex driver                                                              2.2.1

                  loopback plug                                                           2.2.1




Presentation_ID                                        © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   6
Chapter 2: New Terms
            What terms are introduced in this chapter?

                  Material Safety and Data Sheet (MSDS)                                      2.1.3

                  needle-nose pliers                                                         2.2.1

                  disk cleanup                                                               2.2.2

                  noise                                                                      2.1.2

                  Phillips-head screwdriver                                                  2.2.1

                  Radio Frequency Interference (RFI)                                         2.1.2

                  SCANDISK                                                                   2.2.2

                  spike                                                                      2.1.2

                  spyware                                                                    2.2.2

                  Standby Power Supply (SPS)                                                 2.1.2




Presentation_ID                                           © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   7
Chapter 2: New Terms
            What terms are introduced in this chapter?

                  surge                                                                2.1.2

                  surge suppressor                                                     2.1.2

                  torx screwdriver                                                     2.2.1

                  tweezers                                                             2.2.1

                  wire cutters                                                         2.2.1




Presentation_ID                                     © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   8
Chapter 2: Changes
            What has changed from the previous version (4.0) of ITEPC?
                  Page 2.1.1 Identify safety procedures and potential hazards for users and
                   technicians
                       •Electrical safety
                       •Cable management
                       •Avoiding trip hazards


                  Page 2.1.2 Identify safety procedures to protect equipment from damage and
                   data from loss
                       •EMI
                       •Network interference
                       •Magnets
                       •RFI
                       •Cordless phone interference
                       •Microwaves

Presentation_ID                                        © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   9
Chapter 2: Classroom Management
                   The instructor should ensure this chapter becomes as hand-on as possible.
                   Have different tools available. Hold up each tool and ask students what they
                    think a technician might use the tool for.
                   If enough tools are available, divide students into teams and have them
                    document the purpose of each tool in computer support. Have a computer
                    available so they can look inside to see the possibilities. Have two groups
                    share results with one another.
                   If Internet access is available, have students select suitable power protection for
                    the computers in the classroom based on different scenarios. If Internet access
                    is not available, have various vendors’ technical power protection documents
                    and have the students choose from them.
                   Keep the power and safety discussions relevant. Explain a section and then
                    have the students apply the information. An example might be to present
                    examples of relevant local or world weather events and the effects the
                    conditions might have on power and safety.
                   Have the students research the city or state rules for CRT disposal. Have them
                    brainstorm alternatives to disposal. If this is not feasible, bring the rules into
                    class as a handout.




Presentation_ID                                          © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   10
Chapter 2: Classroom Management
           (continued)
                   Download, print out, or have available MSDS data. Search the Internet with the
                    following key terms: laser printer msds.
                   Have the students determine the best place to keep MSDS information sheets
                    in the school, who might need this information, and how to get this information
                    to those who might need it.
                   Disassemble a computer in teams.
                   Have students rotate with each step so everyone gets hands-on time.
                   Lead the students through the disassembly process. For example, the first step
                    in the lab is to turn off the computer and disconnect power. It is very important
                    for the students to verify that the computer works BEFORE disassembly. Then,
                    have all the students power down and remove the power cord. No team can
                    progress until all power cords have been removed. Then, move on to step 2. In
                    this manner, the teacher can address issues or reinforce the lecture, and
                    everyone is on the same step and concept.




Presentation_ID                                         © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   11
Chapter 2: Teaching Analogies
            How often do you disassemble your car? When learning about cars, an automobile
             technician disassembles a car in sections to learn about how each particular
             section works. A student can learn about computer components by disassembling
             a computer in the same way.
            How important is doing a tune-up to a car? How important is it to have your teeth
             cleaned? Preventive maintenance is important to a computer in the same way.




Presentation_ID                                     © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   12
Chapter 2: Suggested Class Discussions
                     Safety – Laser printers possess high voltage and can burn the technician,
                      and CRTs possess high voltage and can shock the technician.
                     ESD – An electrostatic discharge can damage a computer.
                     Tools – Discuss the proper tool usage, storage, what to take on a service call,
                      and what to have in the car.
                     Software tools – Ensure you have software tools appropriate for the operating
                      system.
                     Preventive maintenance – This extends the life of the computer. Ensure
                      appropriate cleaning supplies are used.
                     Organization – Ensure computer components are organized and easy to find
                      when reassembling the computer. Emphasize the importance of taking notes
                      and being organized during disassembly.
                     Question for the class – Have you ever taken something apart and when you
                      tried to put it back together, things didn’t go as planned? Explain what
                      happened. What do you wish you had done differently?
                     Internet Search – Have students conduct an Internet search on laser printer
                      safety and disposal procedures. Discuss how students would apply this
                      knowledge in the workplace.


Presentation_ID                                         © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   13
Chapter 2: Best Practices
                     Diagram and document the computer disassembly process.
                      • Some students take photos with their phones to help reassemble the
                          computer. Encouraging the use of technology will engage the students.
                      • A good teaching practice is to have each student document the computer
                          disassembly.
                     Organize parts during the computer disassembly process.
                      • Collect egg cartons for organizing screws that are removed during
                          disassembly.
                      • Collect antistatic bags from school technicians or outside computer repair
                          companies to store computer components.
                      • Do not allow students to stack computer components.
                     Because CPUs are very expensive and easy to damage, it is not
                      recommended to allow the students to remove the CPU during the computer
                      disassembly process. Obtain bad CPUs from outside computer repair
                      companies to use for class discussion and demonstration.




Presentation_ID                                        © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   14
Chapter 2: Outside Reading
                  International Telecommunication Union (ITU)
                   http://www.itu.int/ITU-T/




Presentation_ID                                       © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   15
Presentation_ID   © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   16
Presentation_ID   © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   17

More Related Content

What's hot

Ch 2 computer assembly disassembly
Ch 2 computer  assembly disassemblyCh 2 computer  assembly disassembly
Ch 2 computer assembly disassembly
mekashaw tizazu
 
Introduction motherboard
Introduction motherboardIntroduction motherboard
Introduction motherboard
Prof. Dr. K. Adisesha
 
Bios
BiosBios
ITE v5.0 - Chapter 10
ITE v5.0 - Chapter 10ITE v5.0 - Chapter 10
ITE v5.0 - Chapter 10
Irsandi Hasan
 
Basic Computer Concepts
Basic Computer ConceptsBasic Computer Concepts
Basic Computer Concepts
Reynz Anario
 
Understanding Computers - Introduction to Computers
Understanding Computers - Introduction to ComputersUnderstanding Computers - Introduction to Computers
Understanding Computers - Introduction to Computers
GufranAhmadJU
 
BIOS basic input output system
BIOS basic input output systemBIOS basic input output system
BIOS basic input output system
Vipul Buchade
 
Assembling a computer
Assembling a computerAssembling a computer
Assembling a computer
Jagpal Singh Bais
 
Presentation about modern cpu.pptx
Presentation about modern cpu.pptxPresentation about modern cpu.pptx
Presentation about modern cpu.pptx
AsifKhan605177
 
System unit
System unitSystem unit
System unit
Muhamad Yussof
 
Computer maintenance-and-repair
Computer maintenance-and-repairComputer maintenance-and-repair
Computer maintenance-and-repair
MBARUSHIMANA anaclet
 
Introduction, Installation Operating System and Application
Introduction, Installation Operating System and ApplicationIntroduction, Installation Operating System and Application
Introduction, Installation Operating System and Application
Vichhaiy Serey
 
01. Basics of Computer Hardware
01. Basics of Computer Hardware01. Basics of Computer Hardware
01. Basics of Computer Hardware
Akhila Dakshina
 
System unit
System unitSystem unit
System unit
Dhani Ahmad
 
ITE v5.0 - Chapter 4
ITE v5.0 - Chapter 4ITE v5.0 - Chapter 4
ITE v5.0 - Chapter 4
Irsandi Hasan
 
Device Drivers
Device DriversDevice Drivers
Device Drivers
Suhas S R
 
Parts of System Unit
Parts of System UnitParts of System Unit
Parts of System Unit
Sef Cambaliza
 
THE COMPUTER MOTHERBOARD AND ITS COMPONENTS
THE COMPUTER MOTHERBOARD AND ITS COMPONENTSTHE COMPUTER MOTHERBOARD AND ITS COMPONENTS
THE COMPUTER MOTHERBOARD AND ITS COMPONENTS
Aqsa Mushtaq
 
COMPUTER HARDWARE ASSEMBLING
COMPUTER HARDWARE ASSEMBLING COMPUTER HARDWARE ASSEMBLING
COMPUTER HARDWARE ASSEMBLING
Nikhil Sasikumar
 
Computer maintenance
Computer maintenanceComputer maintenance
Computer maintenance
Gener Luis Morada
 

What's hot (20)

Ch 2 computer assembly disassembly
Ch 2 computer  assembly disassemblyCh 2 computer  assembly disassembly
Ch 2 computer assembly disassembly
 
Introduction motherboard
Introduction motherboardIntroduction motherboard
Introduction motherboard
 
Bios
BiosBios
Bios
 
ITE v5.0 - Chapter 10
ITE v5.0 - Chapter 10ITE v5.0 - Chapter 10
ITE v5.0 - Chapter 10
 
Basic Computer Concepts
Basic Computer ConceptsBasic Computer Concepts
Basic Computer Concepts
 
Understanding Computers - Introduction to Computers
Understanding Computers - Introduction to ComputersUnderstanding Computers - Introduction to Computers
Understanding Computers - Introduction to Computers
 
BIOS basic input output system
BIOS basic input output systemBIOS basic input output system
BIOS basic input output system
 
Assembling a computer
Assembling a computerAssembling a computer
Assembling a computer
 
Presentation about modern cpu.pptx
Presentation about modern cpu.pptxPresentation about modern cpu.pptx
Presentation about modern cpu.pptx
 
System unit
System unitSystem unit
System unit
 
Computer maintenance-and-repair
Computer maintenance-and-repairComputer maintenance-and-repair
Computer maintenance-and-repair
 
Introduction, Installation Operating System and Application
Introduction, Installation Operating System and ApplicationIntroduction, Installation Operating System and Application
Introduction, Installation Operating System and Application
 
01. Basics of Computer Hardware
01. Basics of Computer Hardware01. Basics of Computer Hardware
01. Basics of Computer Hardware
 
System unit
System unitSystem unit
System unit
 
ITE v5.0 - Chapter 4
ITE v5.0 - Chapter 4ITE v5.0 - Chapter 4
ITE v5.0 - Chapter 4
 
Device Drivers
Device DriversDevice Drivers
Device Drivers
 
Parts of System Unit
Parts of System UnitParts of System Unit
Parts of System Unit
 
THE COMPUTER MOTHERBOARD AND ITS COMPONENTS
THE COMPUTER MOTHERBOARD AND ITS COMPONENTSTHE COMPUTER MOTHERBOARD AND ITS COMPONENTS
THE COMPUTER MOTHERBOARD AND ITS COMPONENTS
 
COMPUTER HARDWARE ASSEMBLING
COMPUTER HARDWARE ASSEMBLING COMPUTER HARDWARE ASSEMBLING
COMPUTER HARDWARE ASSEMBLING
 
Computer maintenance
Computer maintenanceComputer maintenance
Computer maintenance
 

Viewers also liked

CCNA Exploration 4 - Chapter 8
CCNA Exploration 4 - Chapter 8CCNA Exploration 4 - Chapter 8
CCNA Exploration 4 - Chapter 8
Irsandi Hasan
 
CCNA Security 010-configuring cisco asa
CCNA Security 010-configuring cisco asaCCNA Security 010-configuring cisco asa
CCNA Security 010-configuring cisco asa
Ahmed Habib
 
CCNA Security 012- cryptographic systems
CCNA Security 012- cryptographic systemsCCNA Security 012- cryptographic systems
CCNA Security 012- cryptographic systems
Ahmed Habib
 
CCNA Discovery 1 - Chapter 4
CCNA Discovery 1 - Chapter 4CCNA Discovery 1 - Chapter 4
CCNA Discovery 1 - Chapter 4
Irsandi Hasan
 
CCNA Security - Chapter 6
CCNA Security - Chapter 6CCNA Security - Chapter 6
CCNA Security - Chapter 6
Irsandi Hasan
 
CCNA Security - Chapter 4
CCNA Security - Chapter 4CCNA Security - Chapter 4
CCNA Security - Chapter 4
Irsandi Hasan
 
OSPF v3
OSPF v3OSPF v3
OSPF v3
Irsandi Hasan
 
CCNA Security - Chapter 7
CCNA Security - Chapter 7CCNA Security - Chapter 7
CCNA Security - Chapter 7
Irsandi Hasan
 
CCNA Security - Chapter 8
CCNA Security - Chapter 8CCNA Security - Chapter 8
CCNA Security - Chapter 8
Irsandi Hasan
 
ITE - Chapter 9
ITE - Chapter 9ITE - Chapter 9
ITE - Chapter 9
Irsandi Hasan
 
CCNA Discovery 1 - Chapter 1
CCNA Discovery 1 - Chapter 1CCNA Discovery 1 - Chapter 1
CCNA Discovery 1 - Chapter 1
Irsandi Hasan
 
CCNA Security - Chapter 5
CCNA Security - Chapter 5CCNA Security - Chapter 5
CCNA Security - Chapter 5
Irsandi Hasan
 
CCNA Security - Chapter 9
CCNA Security - Chapter 9CCNA Security - Chapter 9
CCNA Security - Chapter 9
Irsandi Hasan
 
CCNA Security - Chapter 3
CCNA Security - Chapter 3CCNA Security - Chapter 3
CCNA Security - Chapter 3
Irsandi Hasan
 
CCNA Security 06- AAA
CCNA Security 06- AAACCNA Security 06- AAA
CCNA Security 06- AAA
Ahmed Habib
 
CCNA RS_ITN - Chapter 4
CCNA RS_ITN - Chapter 4CCNA RS_ITN - Chapter 4
CCNA RS_ITN - Chapter 4
Irsandi Hasan
 
CCNA Security 09- ios firewall fundamentals
CCNA Security 09- ios firewall fundamentalsCCNA Security 09- ios firewall fundamentals
CCNA Security 09- ios firewall fundamentals
Ahmed Habib
 
ITE - Chapter 7
ITE - Chapter 7ITE - Chapter 7
ITE - Chapter 7
Irsandi Hasan
 
CCNA Security 011- implementing ios-based ips
CCNA Security 011- implementing ios-based ipsCCNA Security 011- implementing ios-based ips
CCNA Security 011- implementing ios-based ips
Ahmed Habib
 
CCNA Exploration 4 - Chapter 7
CCNA Exploration 4 - Chapter 7CCNA Exploration 4 - Chapter 7
CCNA Exploration 4 - Chapter 7
Irsandi Hasan
 

Viewers also liked (20)

CCNA Exploration 4 - Chapter 8
CCNA Exploration 4 - Chapter 8CCNA Exploration 4 - Chapter 8
CCNA Exploration 4 - Chapter 8
 
CCNA Security 010-configuring cisco asa
CCNA Security 010-configuring cisco asaCCNA Security 010-configuring cisco asa
CCNA Security 010-configuring cisco asa
 
CCNA Security 012- cryptographic systems
CCNA Security 012- cryptographic systemsCCNA Security 012- cryptographic systems
CCNA Security 012- cryptographic systems
 
CCNA Discovery 1 - Chapter 4
CCNA Discovery 1 - Chapter 4CCNA Discovery 1 - Chapter 4
CCNA Discovery 1 - Chapter 4
 
CCNA Security - Chapter 6
CCNA Security - Chapter 6CCNA Security - Chapter 6
CCNA Security - Chapter 6
 
CCNA Security - Chapter 4
CCNA Security - Chapter 4CCNA Security - Chapter 4
CCNA Security - Chapter 4
 
OSPF v3
OSPF v3OSPF v3
OSPF v3
 
CCNA Security - Chapter 7
CCNA Security - Chapter 7CCNA Security - Chapter 7
CCNA Security - Chapter 7
 
CCNA Security - Chapter 8
CCNA Security - Chapter 8CCNA Security - Chapter 8
CCNA Security - Chapter 8
 
ITE - Chapter 9
ITE - Chapter 9ITE - Chapter 9
ITE - Chapter 9
 
CCNA Discovery 1 - Chapter 1
CCNA Discovery 1 - Chapter 1CCNA Discovery 1 - Chapter 1
CCNA Discovery 1 - Chapter 1
 
CCNA Security - Chapter 5
CCNA Security - Chapter 5CCNA Security - Chapter 5
CCNA Security - Chapter 5
 
CCNA Security - Chapter 9
CCNA Security - Chapter 9CCNA Security - Chapter 9
CCNA Security - Chapter 9
 
CCNA Security - Chapter 3
CCNA Security - Chapter 3CCNA Security - Chapter 3
CCNA Security - Chapter 3
 
CCNA Security 06- AAA
CCNA Security 06- AAACCNA Security 06- AAA
CCNA Security 06- AAA
 
CCNA RS_ITN - Chapter 4
CCNA RS_ITN - Chapter 4CCNA RS_ITN - Chapter 4
CCNA RS_ITN - Chapter 4
 
CCNA Security 09- ios firewall fundamentals
CCNA Security 09- ios firewall fundamentalsCCNA Security 09- ios firewall fundamentals
CCNA Security 09- ios firewall fundamentals
 
ITE - Chapter 7
ITE - Chapter 7ITE - Chapter 7
ITE - Chapter 7
 
CCNA Security 011- implementing ios-based ips
CCNA Security 011- implementing ios-based ipsCCNA Security 011- implementing ios-based ips
CCNA Security 011- implementing ios-based ips
 
CCNA Exploration 4 - Chapter 7
CCNA Exploration 4 - Chapter 7CCNA Exploration 4 - Chapter 7
CCNA Exploration 4 - Chapter 7
 

Similar to ITE - Chapter 2

ITE - Chapter 6
ITE - Chapter 6ITE - Chapter 6
ITE - Chapter 6
Irsandi Hasan
 
Distributed Generation In Spain
Distributed Generation In SpainDistributed Generation In Spain
Distributed Generation In Spain
davidtrebolle
 
Easy Learn to Verilog HDL
Easy Learn to Verilog HDLEasy Learn to Verilog HDL
Easy Learn to Verilog HDL
kpyes34
 
2.1 system concept
2.1 system concept2.1 system concept
2.1 system concept
KMJ Science Computer
 
A.vivotek ip surveillance_handbook
A.vivotek ip surveillance_handbookA.vivotek ip surveillance_handbook
A.vivotek ip surveillance_handbook
TSOLUTIONS
 
Control of machines
Control of machinesControl of machines
Control of machines
Thangarajjebamani
 
Controlofmachines
Controlofmachines Controlofmachines
Controlofmachines
Anirudh Chaiworaporn
 
Microstrip patch-antenna
Microstrip patch-antennaMicrostrip patch-antenna
Microstrip patch-antenna
aquibjamal123
 
Zigbee 802.15.4
Zigbee 802.15.4Zigbee 802.15.4
Zigbee 802.15.4
Prasad Narasimha
 
Barcode reference en
Barcode reference enBarcode reference en
Barcode reference en
Roger R Pe M
 
Analog optical link
Analog optical linkAnalog optical link
Analog optical link
hamedmeshkin
 
Domain-Specific Program Checking
Domain-Specific Program CheckingDomain-Specific Program Checking
Domain-Specific Program Checking
Lukas Renggli
 
บทที่ 2 Mobile Aplication
บทที่ 2 Mobile Aplicationบทที่ 2 Mobile Aplication
บทที่ 2 Mobile Aplication
rubtumproject.com
 
Gsm based campus display system project report
Gsm based campus display system project reportGsm based campus display system project report
Gsm based campus display system project report
Kashyap Shah
 
50267584 celldoctor
50267584 celldoctor50267584 celldoctor
50267584 celldoctor
Prasoon Singh
 
USB Lock RP Operation Manual
USB Lock RP Operation ManualUSB Lock RP Operation Manual
USB Lock RP Operation Manual
Javier Arrospide
 
Integratedbook
IntegratedbookIntegratedbook
Integratedbook
eLearningGchu
 
การพัฒนาเกมคอมพิวเตอร์ 3 มิติ
การพัฒนาเกมคอมพิวเตอร์ 3 มิติการพัฒนาเกมคอมพิวเตอร์ 3 มิติ
การพัฒนาเกมคอมพิวเตอร์ 3 มิติ
oan508
 
Ch3
Ch3Ch3
Manual
ManualManual
Manual
guesta8db17
 

Similar to ITE - Chapter 2 (20)

ITE - Chapter 6
ITE - Chapter 6ITE - Chapter 6
ITE - Chapter 6
 
Distributed Generation In Spain
Distributed Generation In SpainDistributed Generation In Spain
Distributed Generation In Spain
 
Easy Learn to Verilog HDL
Easy Learn to Verilog HDLEasy Learn to Verilog HDL
Easy Learn to Verilog HDL
 
2.1 system concept
2.1 system concept2.1 system concept
2.1 system concept
 
A.vivotek ip surveillance_handbook
A.vivotek ip surveillance_handbookA.vivotek ip surveillance_handbook
A.vivotek ip surveillance_handbook
 
Control of machines
Control of machinesControl of machines
Control of machines
 
Controlofmachines
Controlofmachines Controlofmachines
Controlofmachines
 
Microstrip patch-antenna
Microstrip patch-antennaMicrostrip patch-antenna
Microstrip patch-antenna
 
Zigbee 802.15.4
Zigbee 802.15.4Zigbee 802.15.4
Zigbee 802.15.4
 
Barcode reference en
Barcode reference enBarcode reference en
Barcode reference en
 
Analog optical link
Analog optical linkAnalog optical link
Analog optical link
 
Domain-Specific Program Checking
Domain-Specific Program CheckingDomain-Specific Program Checking
Domain-Specific Program Checking
 
บทที่ 2 Mobile Aplication
บทที่ 2 Mobile Aplicationบทที่ 2 Mobile Aplication
บทที่ 2 Mobile Aplication
 
Gsm based campus display system project report
Gsm based campus display system project reportGsm based campus display system project report
Gsm based campus display system project report
 
50267584 celldoctor
50267584 celldoctor50267584 celldoctor
50267584 celldoctor
 
USB Lock RP Operation Manual
USB Lock RP Operation ManualUSB Lock RP Operation Manual
USB Lock RP Operation Manual
 
Integratedbook
IntegratedbookIntegratedbook
Integratedbook
 
การพัฒนาเกมคอมพิวเตอร์ 3 มิติ
การพัฒนาเกมคอมพิวเตอร์ 3 มิติการพัฒนาเกมคอมพิวเตอร์ 3 มิติ
การพัฒนาเกมคอมพิวเตอร์ 3 มิติ
 
Ch3
Ch3Ch3
Ch3
 
Manual
ManualManual
Manual
 

More from Irsandi Hasan

CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11
Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10
Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09
Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 08
CCNA v6.0 ITN - Chapter 08CCNA v6.0 ITN - Chapter 08
CCNA v6.0 ITN - Chapter 08
Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 07CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 07
Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 06
CCNA v6.0 ITN - Chapter 06CCNA v6.0 ITN - Chapter 06
CCNA v6.0 ITN - Chapter 06
Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05
Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 04
CCNA v6.0 ITN - Chapter 04CCNA v6.0 ITN - Chapter 04
CCNA v6.0 ITN - Chapter 04
Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03
Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02
Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01
Irsandi Hasan
 
VMware vShield - Overview
VMware vShield - OverviewVMware vShield - Overview
VMware vShield - Overview
Irsandi Hasan
 
CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11
Irsandi Hasan
 
CCNA RS_NB - Chapter 10
CCNA RS_NB - Chapter 10CCNA RS_NB - Chapter 10
CCNA RS_NB - Chapter 10
Irsandi Hasan
 
CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 9CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 9
Irsandi Hasan
 
CCNA RS_NB - Chapter 8
CCNA RS_NB - Chapter 8CCNA RS_NB - Chapter 8
CCNA RS_NB - Chapter 8
Irsandi Hasan
 
CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 7CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 7
Irsandi Hasan
 
CCNA RS_NB - Chapter 6
CCNA RS_NB - Chapter 6CCNA RS_NB - Chapter 6
CCNA RS_NB - Chapter 6
Irsandi Hasan
 
CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5
Irsandi Hasan
 
CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4
Irsandi Hasan
 

More from Irsandi Hasan (20)

CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11
 
CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10
 
CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09
 
CCNA v6.0 ITN - Chapter 08
CCNA v6.0 ITN - Chapter 08CCNA v6.0 ITN - Chapter 08
CCNA v6.0 ITN - Chapter 08
 
CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 07CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 07
 
CCNA v6.0 ITN - Chapter 06
CCNA v6.0 ITN - Chapter 06CCNA v6.0 ITN - Chapter 06
CCNA v6.0 ITN - Chapter 06
 
CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05
 
CCNA v6.0 ITN - Chapter 04
CCNA v6.0 ITN - Chapter 04CCNA v6.0 ITN - Chapter 04
CCNA v6.0 ITN - Chapter 04
 
CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03
 
CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02
 
CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01
 
VMware vShield - Overview
VMware vShield - OverviewVMware vShield - Overview
VMware vShield - Overview
 
CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11
 
CCNA RS_NB - Chapter 10
CCNA RS_NB - Chapter 10CCNA RS_NB - Chapter 10
CCNA RS_NB - Chapter 10
 
CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 9CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 9
 
CCNA RS_NB - Chapter 8
CCNA RS_NB - Chapter 8CCNA RS_NB - Chapter 8
CCNA RS_NB - Chapter 8
 
CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 7CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 7
 
CCNA RS_NB - Chapter 6
CCNA RS_NB - Chapter 6CCNA RS_NB - Chapter 6
CCNA RS_NB - Chapter 6
 
CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5
 
CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4
 

Recently uploaded

Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Neo4j
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
ScyllaDB
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
operationspcvita
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
Miro Wengner
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
Edge AI and Vision Alliance
 
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham HillinQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
LizaNolte
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
Christine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptxChristine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptx
christinelarrosa
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
Alex Pruden
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
Jason Yip
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
Antonios Katsarakis
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
Pablo Gómez Abajo
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Pitangent Analytics & Technology Solutions Pvt. Ltd
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
c5vrf27qcz
 
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
DanBrown980551
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
AstuteBusiness
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
Neo4j
 
A Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's ArchitectureA Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's Architecture
ScyllaDB
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
Neo4j
 

Recently uploaded (20)

Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
 
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham HillinQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
Christine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptxChristine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptx
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
 
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
 
A Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's ArchitectureA Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's Architecture
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
 

ITE - Chapter 2

  • 1. IT Essentials PC Hardware and Software 4.1 Instructional Resource Chapter 2: Safe Lab Procedures and Tool Use Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 1
  • 2. Chapter 2: Objectives  Explain the purpose of safe working conditions and procedures.  Identify tools and software used with personal computer components and their purposes.  Implement proper tool use. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 2
  • 3. Chapter 2: Critical Concepts  What is this chapter about and why is it important?  This chapter discusses safe lab procedures, tool use for computer maintenance, and proper disposal of hazardous materials. It provides an overview of safe working conditions in the lab and in other environments. Basic electrical, fire, and chemical safety guidelines are covered, as well as other potential workplace hazards. Much of the chapter is devoted to identification and proper usage of hand tools and software tools. It also discusses the importance of organization of tools, and cleaning procedures for all computer components.  IT technicians have cut, burned, and even electrocuted themselves while working on computers. IT technicians have short-circuited working components, thus rendering the components unusable. This chapter is important because it explains the good work habits that all technicians must develop in order to avoid injury to themselves or others, and to avoid damaging or destroying equipment, or losing data. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 3
  • 4. Chapter 2: Activities  What activities are associated with this chapter 2.2.2: Worksheet: Diagnostic Software 2.3.4: Lab: Computer Disassembly Chapter 2 Quiz Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 4
  • 5. Chapter 2: New Terms  What terms are introduced in this chapter? antistatic mat 2.2.1 antistatic wrist strap 2.2.1 anti-virus application 2.2.2 blackout 2.1.2 brownout 2.1.2 cable tie 2.2.1 CHKDSK 2.2.2 compressed air 2.2.1 conduit 2.1.1 defrag 2.2.2 Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 5
  • 6. Chapter 2: New Terms  What terms are introduced in this chapter? digital multimeter 2.2.1 disk cleanup 2.2.2 disk management 2.2.2 Electromagnetic Interference (EMI) 2.1.2 Electrostatic Discharge (ESD) 2.1.2 FDISK 2.2.2 flat-head screwdriver 2.2.1 format 2.2.2 hex driver 2.2.1 loopback plug 2.2.1 Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 6
  • 7. Chapter 2: New Terms  What terms are introduced in this chapter? Material Safety and Data Sheet (MSDS) 2.1.3 needle-nose pliers 2.2.1 disk cleanup 2.2.2 noise 2.1.2 Phillips-head screwdriver 2.2.1 Radio Frequency Interference (RFI) 2.1.2 SCANDISK 2.2.2 spike 2.1.2 spyware 2.2.2 Standby Power Supply (SPS) 2.1.2 Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 7
  • 8. Chapter 2: New Terms  What terms are introduced in this chapter? surge 2.1.2 surge suppressor 2.1.2 torx screwdriver 2.2.1 tweezers 2.2.1 wire cutters 2.2.1 Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 8
  • 9. Chapter 2: Changes  What has changed from the previous version (4.0) of ITEPC? Page 2.1.1 Identify safety procedures and potential hazards for users and technicians •Electrical safety •Cable management •Avoiding trip hazards Page 2.1.2 Identify safety procedures to protect equipment from damage and data from loss •EMI •Network interference •Magnets •RFI •Cordless phone interference •Microwaves Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 9
  • 10. Chapter 2: Classroom Management  The instructor should ensure this chapter becomes as hand-on as possible.  Have different tools available. Hold up each tool and ask students what they think a technician might use the tool for.  If enough tools are available, divide students into teams and have them document the purpose of each tool in computer support. Have a computer available so they can look inside to see the possibilities. Have two groups share results with one another.  If Internet access is available, have students select suitable power protection for the computers in the classroom based on different scenarios. If Internet access is not available, have various vendors’ technical power protection documents and have the students choose from them.  Keep the power and safety discussions relevant. Explain a section and then have the students apply the information. An example might be to present examples of relevant local or world weather events and the effects the conditions might have on power and safety.  Have the students research the city or state rules for CRT disposal. Have them brainstorm alternatives to disposal. If this is not feasible, bring the rules into class as a handout. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 10
  • 11. Chapter 2: Classroom Management (continued)  Download, print out, or have available MSDS data. Search the Internet with the following key terms: laser printer msds.  Have the students determine the best place to keep MSDS information sheets in the school, who might need this information, and how to get this information to those who might need it.  Disassemble a computer in teams.  Have students rotate with each step so everyone gets hands-on time.  Lead the students through the disassembly process. For example, the first step in the lab is to turn off the computer and disconnect power. It is very important for the students to verify that the computer works BEFORE disassembly. Then, have all the students power down and remove the power cord. No team can progress until all power cords have been removed. Then, move on to step 2. In this manner, the teacher can address issues or reinforce the lecture, and everyone is on the same step and concept. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 11
  • 12. Chapter 2: Teaching Analogies  How often do you disassemble your car? When learning about cars, an automobile technician disassembles a car in sections to learn about how each particular section works. A student can learn about computer components by disassembling a computer in the same way.  How important is doing a tune-up to a car? How important is it to have your teeth cleaned? Preventive maintenance is important to a computer in the same way. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 12
  • 13. Chapter 2: Suggested Class Discussions  Safety – Laser printers possess high voltage and can burn the technician, and CRTs possess high voltage and can shock the technician.  ESD – An electrostatic discharge can damage a computer.  Tools – Discuss the proper tool usage, storage, what to take on a service call, and what to have in the car.  Software tools – Ensure you have software tools appropriate for the operating system.  Preventive maintenance – This extends the life of the computer. Ensure appropriate cleaning supplies are used.  Organization – Ensure computer components are organized and easy to find when reassembling the computer. Emphasize the importance of taking notes and being organized during disassembly.  Question for the class – Have you ever taken something apart and when you tried to put it back together, things didn’t go as planned? Explain what happened. What do you wish you had done differently?  Internet Search – Have students conduct an Internet search on laser printer safety and disposal procedures. Discuss how students would apply this knowledge in the workplace. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 13
  • 14. Chapter 2: Best Practices  Diagram and document the computer disassembly process. • Some students take photos with their phones to help reassemble the computer. Encouraging the use of technology will engage the students. • A good teaching practice is to have each student document the computer disassembly.  Organize parts during the computer disassembly process. • Collect egg cartons for organizing screws that are removed during disassembly. • Collect antistatic bags from school technicians or outside computer repair companies to store computer components. • Do not allow students to stack computer components.  Because CPUs are very expensive and easy to damage, it is not recommended to allow the students to remove the CPU during the computer disassembly process. Obtain bad CPUs from outside computer repair companies to use for class discussion and demonstration. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 14
  • 15. Chapter 2: Outside Reading International Telecommunication Union (ITU) http://www.itu.int/ITU-T/ Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 15
  • 16. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 16
  • 17. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 17