SlideShare a Scribd company logo
© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
ITE PC v4.0
Chapter 2 1
Chapter 2: Safe
Lab Procedures
and Tool Use
IT Essentials: PC Hardware and Software v4.0
ITE PC v4.0
Chapter 2 2© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Purpose of this Presentation
 List of chapter objectives
 Overview of the chapter contents, including
student worksheets
student activities
some potential student misconceptions
 Reflection/Activities for instructors to complete to
prepare to teach
 Additional resources
To provide to instructors an overview of Chapter 2:
ITE PC v4.0
Chapter 2 3© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Chapter 2 Objectives
 2.1 Explain the purpose of
safe working conditions and
procedures
 2.2 Identify tools and
software used with personal
computer components and
their purposes
 2.3 Implement proper tool
use
ITE PC v4.0
Chapter 2 4© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Chapter 2 Worksheets and Labs
 2.2.2 Worksheet: Security and Diagnostic Software
 2.3.4 Lab: Computer Disassembly
ITE PC v4.0
Chapter 2 5© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Safe Lab Procedures and Tool Use
The workplace should have safety guidelines to follow to:
 Protect people from injury
 Protect equipment from damage
 Protect the environment from contamination
ITE PC v4.0
Chapter 2 6© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Recognize Safe Working Conditions
Some things to look for:
 Clean, organized, and properly lit workspace
 Proper procedures for handling equipment
 Proper disposal or
recycling of components
containing hazardous
materials
ITE PC v4.0
Chapter 2 7© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
General Safety Guidelines
 Most companies require reporting any
injuries, including description of safety
procedures not followed.
 Damage to equipment may result in
claims for damages from the customer.
 CAUTION: Power supplies and
monitors contain very high voltage.
Do not wear the antistatic wrist strap when repairing power
supplies or monitors.
 CAUTION: Some printer parts may become very hot when
in use and other parts may contain very high voltages.
ITE PC v4.0
Chapter 2 8© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Fire Safety Guidelines
 Know the location of fire extinguishers, how to use
them, and which to use for electrical fires and for
combustible fires
 Have an escape route in case
a fire gets out of control
 Know how to contact
emergency services quickly
 Keep the workspace clean
 Keep most solvents in a
separate area
Have a fire plan before you begin work:
ITE PC v4.0
Chapter 2 9© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Electrostatic Discharge (ESD)
 Static electricity is the buildup of an electric
charge resting on a surface. This buildup
may zap a component and cause damage.
 At least 3,000 volts of static electricity must
build up before a person can feel ESD, but
less than 30 volts of static electricity can
damage a computer component.
Preventing ESD Damage
 Use antistatic bags to store components
 Use grounded mats on workbenches
 Use grounded floor mats in work areas
 Use antistatic wrist straps when working on
computers
ITE PC v4.0
Chapter 2 10© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Power Fluctuation
AC power fluctuations can cause data loss or hardware
failure:
 Blackouts, brownouts, noise, spikes, power surges
To help shield against power fluctuation issues, use
power protection devices to protect the data and
computer equipment:
 Surge suppressors
 UPS
 SPS
CAUTION: Never plug a printer into a UPS device. UPS
manufacturers suggest not plugging a printer into a
UPS for fear of burning up the printer motor.
ITE PC v4.0
Chapter 2 11© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Material Safety Data Sheet (MSDS)
 The name of the material
 The physical properties of the material
 Any hazardous ingredients contained in the material
 Reactivity data, such as fire and explosion data
 Special protection requirements
 Procedures for spills
or leaks
 Special precautions
 Health hazards
ITE PC v4.0
Chapter 2 12© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Proper Disposal
 Batteries from portable computer systems
may contain lead, cadmium, lithium, alkaline
manganese, and mercury. Recycling batteries should
be a standard practice for a technician.
 Monitors contain up to 4 pounds of lead, as well as rare
earth metals. Monitors must be disposed of in
compliance with environmental regulations.
 Used printer toner kits and printer cartridges must be
disposed of properly or recycled.
 Contact the local sanitation company to learn how and
where to dispose of the chemicals and solvents used to
clean computers.
ITE PC v4.0
Chapter 2 13© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Skilled use of tools and software makes the
job less difficult and ensures that tasks
are performed properly and safely.
 ESD Tools
antistatic wrist strap, mat
 Hand Tools
screwdrivers, needle-nose pliers
 Cleaning Tools
soft cloth, compressed air can
 Diagnostic Tools
digital multimeter, loopback adapter
Tools for the Job
ITE PC v4.0
Chapter 2 14© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Software Tools
 Fdisk - create and delete disk partitions
 Format - prepare a hard drive prior to use
 Scandisk or Chkdsk - check for physical errors on the disk
surface
 Defrag - optimize use of space on a disk
 Disk Cleanup - remove unused files
 Disk Management - creates partitions and formats disks
(GUI interface)
 System File Checker (SFC) – scans the operating system
critical files and replaces any files that are corrupt
Disk management tools
ITE PC v4.0
Chapter 2 15© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Organizational Tools
 Personal reference tools
Notes, journal, history of repairs
 Internet reference tools
Search engines, news groups,
manufacturer FAQs, online
computer manuals, online forums
and chats, technical websites
 Miscellaneous tools
Spare parts, a working laptop
ITE PC v4.0
Chapter 2 16© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Proper Use of Antistatic Wrist Strap
 Connect the cable to the metal chassis of
the computer
 Wrap the strap around your wrist
 The connection will keep your body at the
same voltage (potential) as the computer
 Attach the wire on the same side of the equipment as
the arm wearing the antistatic wrist strap to keep the
wire out of the way while you are working.
CAUTION: Never wear an antistatic wrist strap if you are
repairing a monitor or CRT.
Can prevent ESD damage to computer components.
ITE PC v4.0
Chapter 2 17© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Proper Use of Antistatic Mat
 Lay the computer on the mat.
 Connect the computer to the mat with the cable.
 Connect the mat to a reliable electrical ground with its
cable.
 Now, you and the computer are at ground potential.
ITE PC v4.0
Chapter 2 18© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Proper Use of Hand Tools
 Use the proper type and size of screwdriver by
matching it to the screw.
Phillips, Flat Head and Hex are the most common types.
 Do not over tighten screws because the threads
may become stripped.
 Caution: If excessive force is needed to remove
or add a component, something may be wrong.
 Caution: Magnetized tools should not be used
around electronic devices.
 Caution: Pencils should not be used inside the
computer because the pencil lead can act as a
conductor and may damage the computer
components.
ITE PC v4.0
Chapter 2 19© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Proper Use of Cleaning Materials
To clean computers and accessories:
 Use mild cleaning solution and lint-free cloth to clean
computer cases, outside of monitor, LCD screen, CRT
screen, and mouse.
 Use compressed air to clean heat sinks.
 Use Isopropyl alcohol and lint-free swabs to clean
RAM.
 Use hand-held vacuum cleaner
with a brush attachment to clean
a keyboard.
 CAUTION: Before cleaning any
device, turn it off and unplug the
device from the power source.
ITE PC v4.0
Chapter 2 20© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Chapter 2 Summary
Safe Lab Procedures and Tool Use
 Follow safety procedures for personal protection,
equipment protection, and environmental protection.
 Know what tools and software to use in working with
computers and computer components.
 Follow proper use of tools.
Anti-static wrist strap, anti-static mat, various hand tools, and
cleaning materials
ITE PC v4.0
Chapter 2 21© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Instructor
Training
Activities
ITE PC v4.0
Chapter 2 22© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Activities for Instructor Training
1. Take the Quiz provided in Chapter 2 course content.
2. Conduct Internet research to pre-screen online
resources for students to use in completing the 2.2.2
Worksheet: Diagnostic Software.
3. Disassemble a computer as outlined in 2.3.4 Lab:
Computer Disassembly.
4. Familiarize yourself with the general safety policies
and the fire safety policies for your building.
5. Research the safety standards for your region.
6. Research the Internet for MSDS sheets for a few
substances that technicians would encounter in their
work.
ITE PC v4.0
Chapter 2 23© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Instructor Training Discussion
 Do you have a story about damage to equipment or an
injury to a colleague in the workplace due to lack of
safety procedures?
 Would students benefit from hearing this or other
stories to illustrate the importance of following safety
guidelines?
 Discuss ways that you will effectively coach students
through the Computer Disassembly lab.
 Share with the other instructors:
The list of online resources
The results of your research on safety policies and standards
The resources for finding MSDS sheets online
ITE PC v4.0
Chapter 2 24© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Additional Resources
 U.S. Dept of Labor, Occupational Safety & Health Administration
http://www.osha.gov
 Microsoft Technet website http://www.technet.microsoft.com
 The PC Guide http://www.pcguide.com
 Computer Hope.com: Free computer help for everyone.
http://www.computerhope.com
 Tech Support Forum http://www.techsupportforum.com/
 PC Technology Guide: What We Learn, We Share
http://www.pctechguide.com
 PC TechBytes: Computers Made Easy, Computer Repair Support
http://www.pctechbytes.com
 TechWatch: Your Source For Technology, News, Reviews and Pricing
http://www.techwatch.com.au
 TechRepublic: A Resource for IT Professionals
http://www.techrepublic.com
 The Tech Zone.com http://www.thetechzone.com
ITE PC v4.0
Chapter 2 25© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Q and A
ITE PC v4.0
Chapter 2 26© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

More Related Content

What's hot

ITE v5.0 - Chapter 2
ITE v5.0 - Chapter 2ITE v5.0 - Chapter 2
ITE v5.0 - Chapter 2
Irsandi Hasan
 
Ite v5.0 chapter4
Ite v5.0 chapter4Ite v5.0 chapter4
Ite v5.0 chapter4
Kazi Rafsun Shaanto
 
ITE v5.0 - Chapter 12
ITE v5.0 - Chapter 12ITE v5.0 - Chapter 12
ITE v5.0 - Chapter 12
Irsandi Hasan
 
It essentials pc hardware and software overview
It essentials pc hardware and software overviewIt essentials pc hardware and software overview
It essentials pc hardware and software overviewAhmed Sultan
 
ITE v5.0 - Chapter 4
ITE v5.0 - Chapter 4ITE v5.0 - Chapter 4
ITE v5.0 - Chapter 4
Irsandi Hasan
 
Chapter 12.0
Chapter 12.0Chapter 12.0
Chapter 12.0
Adebisi Tolulope
 
IT Essentials (Version 7.0) - ITE Final Exam Answers
IT Essentials (Version 7.0) - ITE Final Exam AnswersIT Essentials (Version 7.0) - ITE Final Exam Answers
IT Essentials (Version 7.0) - ITE Final Exam Answers
ITExamAnswers.net
 
It essentials chapter 4
It essentials chapter 4It essentials chapter 4
It essentials chapter 4
ahmed mohamed
 
Ite pc v40_chapter6
Ite pc v40_chapter6Ite pc v40_chapter6
Ite pc v40_chapter6jaquelinn3
 
IT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 13 Exam AnswersIT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers
ITExamAnswers.net
 
IT Essentials (Version 7.0) - ITE Chapter 12 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 12 Exam AnswersIT Essentials (Version 7.0) - ITE Chapter 12 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 12 Exam Answers
ITExamAnswers.net
 
NIST WiFi Security SP 800-97
NIST WiFi Security SP 800-97NIST WiFi Security SP 800-97
NIST WiFi Security SP 800-97
David Sweigert
 
IT Essentials (Version 7.0) - ITE Chapter 14 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 14 Exam AnswersIT Essentials (Version 7.0) - ITE Chapter 14 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 14 Exam Answers
ITExamAnswers.net
 
Chapter 10.0
Chapter 10.0Chapter 10.0
Chapter 10.0
Adebisi Tolulope
 
Sb securing-industrial-control-systems-with-fortinet
Sb securing-industrial-control-systems-with-fortinetSb securing-industrial-control-systems-with-fortinet
Sb securing-industrial-control-systems-with-fortinet
Ivan Carmona
 
lesson 3; inspect and test the configured cs and network handouts
lesson 3; inspect and test the configured cs and network handoutslesson 3; inspect and test the configured cs and network handouts
lesson 3; inspect and test the configured cs and network handouts
lorbz
 
NIST SP 800-125 Security for Virtualized Technologies
NIST SP 800-125 Security for Virtualized TechnologiesNIST SP 800-125 Security for Virtualized Technologies
NIST SP 800-125 Security for Virtualized Technologies
David Sweigert
 
CCNA Security - Chapter 1
CCNA Security - Chapter 1CCNA Security - Chapter 1
CCNA Security - Chapter 1Irsandi Hasan
 
TLE ICT CSS 10 Weekly budget of lesson
TLE ICT CSS 10 Weekly budget of lessonTLE ICT CSS 10 Weekly budget of lesson
TLE ICT CSS 10 Weekly budget of lesson
Leonel Rivas
 

What's hot (20)

ITE v5.0 - Chapter 2
ITE v5.0 - Chapter 2ITE v5.0 - Chapter 2
ITE v5.0 - Chapter 2
 
Ite v5.0 chapter4
Ite v5.0 chapter4Ite v5.0 chapter4
Ite v5.0 chapter4
 
ITE v5.0 - Chapter 12
ITE v5.0 - Chapter 12ITE v5.0 - Chapter 12
ITE v5.0 - Chapter 12
 
It essentials pc hardware and software overview
It essentials pc hardware and software overviewIt essentials pc hardware and software overview
It essentials pc hardware and software overview
 
ITE v5.0 - Chapter 4
ITE v5.0 - Chapter 4ITE v5.0 - Chapter 4
ITE v5.0 - Chapter 4
 
Ite pc v40_chapter10
Ite pc v40_chapter10Ite pc v40_chapter10
Ite pc v40_chapter10
 
Chapter 12.0
Chapter 12.0Chapter 12.0
Chapter 12.0
 
IT Essentials (Version 7.0) - ITE Final Exam Answers
IT Essentials (Version 7.0) - ITE Final Exam AnswersIT Essentials (Version 7.0) - ITE Final Exam Answers
IT Essentials (Version 7.0) - ITE Final Exam Answers
 
It essentials chapter 4
It essentials chapter 4It essentials chapter 4
It essentials chapter 4
 
Ite pc v40_chapter6
Ite pc v40_chapter6Ite pc v40_chapter6
Ite pc v40_chapter6
 
IT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 13 Exam AnswersIT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers
 
IT Essentials (Version 7.0) - ITE Chapter 12 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 12 Exam AnswersIT Essentials (Version 7.0) - ITE Chapter 12 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 12 Exam Answers
 
NIST WiFi Security SP 800-97
NIST WiFi Security SP 800-97NIST WiFi Security SP 800-97
NIST WiFi Security SP 800-97
 
IT Essentials (Version 7.0) - ITE Chapter 14 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 14 Exam AnswersIT Essentials (Version 7.0) - ITE Chapter 14 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 14 Exam Answers
 
Chapter 10.0
Chapter 10.0Chapter 10.0
Chapter 10.0
 
Sb securing-industrial-control-systems-with-fortinet
Sb securing-industrial-control-systems-with-fortinetSb securing-industrial-control-systems-with-fortinet
Sb securing-industrial-control-systems-with-fortinet
 
lesson 3; inspect and test the configured cs and network handouts
lesson 3; inspect and test the configured cs and network handoutslesson 3; inspect and test the configured cs and network handouts
lesson 3; inspect and test the configured cs and network handouts
 
NIST SP 800-125 Security for Virtualized Technologies
NIST SP 800-125 Security for Virtualized TechnologiesNIST SP 800-125 Security for Virtualized Technologies
NIST SP 800-125 Security for Virtualized Technologies
 
CCNA Security - Chapter 1
CCNA Security - Chapter 1CCNA Security - Chapter 1
CCNA Security - Chapter 1
 
TLE ICT CSS 10 Weekly budget of lesson
TLE ICT CSS 10 Weekly budget of lessonTLE ICT CSS 10 Weekly budget of lesson
TLE ICT CSS 10 Weekly budget of lesson
 

Similar to Ite pc v40_chapter2

GENERAL H and S plus tools Pre-Practical ITE6_Instructor_Materials_Chapter2.pptx
GENERAL H and S plus tools Pre-Practical ITE6_Instructor_Materials_Chapter2.pptxGENERAL H and S plus tools Pre-Practical ITE6_Instructor_Materials_Chapter2.pptx
GENERAL H and S plus tools Pre-Practical ITE6_Instructor_Materials_Chapter2.pptx
Amanda Weaver
 
Ite v5.0 chapter2
Ite v5.0 chapter2Ite v5.0 chapter2
Ite v5.0 chapter2
Kazi Rafsun Shaanto
 
Chapter 1 - Personal Computers and Applications.pptx
Chapter 1 - Personal Computers and Applications.pptxChapter 1 - Personal Computers and Applications.pptx
Chapter 1 - Personal Computers and Applications.pptx
Mard Geer
 
Ite pc v40_chapter11
Ite pc v40_chapter11Ite pc v40_chapter11
Ite pc v40_chapter11
Nada Ariff
 
ITE_50_Chapter2.ppt
ITE_50_Chapter2.pptITE_50_Chapter2.ppt
ITE_50_Chapter2.ppt
Rossy719186
 
IT ESSENTIALS 6.0
IT ESSENTIALS 6.0IT ESSENTIALS 6.0
IT ESSENTIALS 6.0
JAVIER PABLO TOCTO
 
Ite1 chapter1 - introduction to the personal computer
Ite1   chapter1 - introduction to the personal computerIte1   chapter1 - introduction to the personal computer
Ite1 chapter1 - introduction to the personal computer
Assefa Million
 
CREATIVE TECHNOLOGY 7 QI-L3
CREATIVE TECHNOLOGY 7 QI-L3CREATIVE TECHNOLOGY 7 QI-L3
CREATIVE TECHNOLOGY 7 QI-L3
FLORENCE FERNNADEZ
 
Discovery home sb_chapter_ 1
Discovery home sb_chapter_ 1Discovery home sb_chapter_ 1
Discovery home sb_chapter_ 1
tendye
 
Computer Assembly and Disassembly Procedures_student.pptx
Computer Assembly and Disassembly Procedures_student.pptxComputer Assembly and Disassembly Procedures_student.pptx
Computer Assembly and Disassembly Procedures_student.pptx
ssusercb53d4
 
Proper Use of Tools
Proper Use of ToolsProper Use of Tools
Proper Use of Tools
MLG College of Learning, Inc
 
IT Essentials (Version 7.0) - ITE Practice Final Exam Answers
IT Essentials (Version 7.0) - ITE Practice Final Exam AnswersIT Essentials (Version 7.0) - ITE Practice Final Exam Answers
IT Essentials (Version 7.0) - ITE Practice Final Exam Answers
ITExamAnswers.net
 
ITE7_Chp1 (1).pptx
ITE7_Chp1 (1).pptxITE7_Chp1 (1).pptx
ITE7_Chp1 (1).pptx
serieux1
 
ITE7_Chp1 (1).pptx
ITE7_Chp1 (1).pptxITE7_Chp1 (1).pptx
ITE7_Chp1 (1).pptx
serieux1
 
SIWES REPORT ON NETWORKING AND BASIC WEB DESIGN
SIWES REPORT ON NETWORKING AND BASIC WEB DESIGNSIWES REPORT ON NETWORKING AND BASIC WEB DESIGN
SIWES REPORT ON NETWORKING AND BASIC WEB DESIGN
Ejiro Ndifereke
 
Power Point Lesson 03
Power Point  Lesson 03Power Point  Lesson 03
Power Point Lesson 03Nasir Jumani
 
ITE7_Chapter 01: Introduction to Personal Computer Hardware
ITE7_Chapter 01: Introduction to Personal Computer HardwareITE7_Chapter 01: Introduction to Personal Computer Hardware
ITE7_Chapter 01: Introduction to Personal Computer Hardware
Regional Polytechnic Institute Techo Sen Takeo
 
AEE Cybersecurity for the IOT in Facility Energy Distribution Slides
AEE Cybersecurity for the IOT in Facility Energy Distribution SlidesAEE Cybersecurity for the IOT in Facility Energy Distribution Slides
AEE Cybersecurity for the IOT in Facility Energy Distribution Slides
Andy Taylor
 
It Essentials (Version 7.0) A+ Cert Practice Exam 1 Answers
It Essentials (Version 7.0) A+ Cert Practice Exam 1 AnswersIt Essentials (Version 7.0) A+ Cert Practice Exam 1 Answers
It Essentials (Version 7.0) A+ Cert Practice Exam 1 Answers
ITExamAnswers.net
 

Similar to Ite pc v40_chapter2 (20)

GENERAL H and S plus tools Pre-Practical ITE6_Instructor_Materials_Chapter2.pptx
GENERAL H and S plus tools Pre-Practical ITE6_Instructor_Materials_Chapter2.pptxGENERAL H and S plus tools Pre-Practical ITE6_Instructor_Materials_Chapter2.pptx
GENERAL H and S plus tools Pre-Practical ITE6_Instructor_Materials_Chapter2.pptx
 
Ite v5.0 chapter2
Ite v5.0 chapter2Ite v5.0 chapter2
Ite v5.0 chapter2
 
Chapter 1 - Personal Computers and Applications.pptx
Chapter 1 - Personal Computers and Applications.pptxChapter 1 - Personal Computers and Applications.pptx
Chapter 1 - Personal Computers and Applications.pptx
 
Ch2 Presentation
Ch2 PresentationCh2 Presentation
Ch2 Presentation
 
Ite pc v40_chapter11
Ite pc v40_chapter11Ite pc v40_chapter11
Ite pc v40_chapter11
 
ITE_50_Chapter2.ppt
ITE_50_Chapter2.pptITE_50_Chapter2.ppt
ITE_50_Chapter2.ppt
 
IT ESSENTIALS 6.0
IT ESSENTIALS 6.0IT ESSENTIALS 6.0
IT ESSENTIALS 6.0
 
Ite1 chapter1 - introduction to the personal computer
Ite1   chapter1 - introduction to the personal computerIte1   chapter1 - introduction to the personal computer
Ite1 chapter1 - introduction to the personal computer
 
CREATIVE TECHNOLOGY 7 QI-L3
CREATIVE TECHNOLOGY 7 QI-L3CREATIVE TECHNOLOGY 7 QI-L3
CREATIVE TECHNOLOGY 7 QI-L3
 
Discovery home sb_chapter_ 1
Discovery home sb_chapter_ 1Discovery home sb_chapter_ 1
Discovery home sb_chapter_ 1
 
Computer Assembly and Disassembly Procedures_student.pptx
Computer Assembly and Disassembly Procedures_student.pptxComputer Assembly and Disassembly Procedures_student.pptx
Computer Assembly and Disassembly Procedures_student.pptx
 
Proper Use of Tools
Proper Use of ToolsProper Use of Tools
Proper Use of Tools
 
IT Essentials (Version 7.0) - ITE Practice Final Exam Answers
IT Essentials (Version 7.0) - ITE Practice Final Exam AnswersIT Essentials (Version 7.0) - ITE Practice Final Exam Answers
IT Essentials (Version 7.0) - ITE Practice Final Exam Answers
 
ITE7_Chp1 (1).pptx
ITE7_Chp1 (1).pptxITE7_Chp1 (1).pptx
ITE7_Chp1 (1).pptx
 
ITE7_Chp1 (1).pptx
ITE7_Chp1 (1).pptxITE7_Chp1 (1).pptx
ITE7_Chp1 (1).pptx
 
SIWES REPORT ON NETWORKING AND BASIC WEB DESIGN
SIWES REPORT ON NETWORKING AND BASIC WEB DESIGNSIWES REPORT ON NETWORKING AND BASIC WEB DESIGN
SIWES REPORT ON NETWORKING AND BASIC WEB DESIGN
 
Power Point Lesson 03
Power Point  Lesson 03Power Point  Lesson 03
Power Point Lesson 03
 
ITE7_Chapter 01: Introduction to Personal Computer Hardware
ITE7_Chapter 01: Introduction to Personal Computer HardwareITE7_Chapter 01: Introduction to Personal Computer Hardware
ITE7_Chapter 01: Introduction to Personal Computer Hardware
 
AEE Cybersecurity for the IOT in Facility Energy Distribution Slides
AEE Cybersecurity for the IOT in Facility Energy Distribution SlidesAEE Cybersecurity for the IOT in Facility Energy Distribution Slides
AEE Cybersecurity for the IOT in Facility Energy Distribution Slides
 
It Essentials (Version 7.0) A+ Cert Practice Exam 1 Answers
It Essentials (Version 7.0) A+ Cert Practice Exam 1 AnswersIt Essentials (Version 7.0) A+ Cert Practice Exam 1 Answers
It Essentials (Version 7.0) A+ Cert Practice Exam 1 Answers
 

Recently uploaded

The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 

Recently uploaded (20)

The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 

Ite pc v40_chapter2

  • 1. © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public ITE PC v4.0 Chapter 2 1 Chapter 2: Safe Lab Procedures and Tool Use IT Essentials: PC Hardware and Software v4.0
  • 2. ITE PC v4.0 Chapter 2 2© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Purpose of this Presentation  List of chapter objectives  Overview of the chapter contents, including student worksheets student activities some potential student misconceptions  Reflection/Activities for instructors to complete to prepare to teach  Additional resources To provide to instructors an overview of Chapter 2:
  • 3. ITE PC v4.0 Chapter 2 3© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Chapter 2 Objectives  2.1 Explain the purpose of safe working conditions and procedures  2.2 Identify tools and software used with personal computer components and their purposes  2.3 Implement proper tool use
  • 4. ITE PC v4.0 Chapter 2 4© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Chapter 2 Worksheets and Labs  2.2.2 Worksheet: Security and Diagnostic Software  2.3.4 Lab: Computer Disassembly
  • 5. ITE PC v4.0 Chapter 2 5© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Safe Lab Procedures and Tool Use The workplace should have safety guidelines to follow to:  Protect people from injury  Protect equipment from damage  Protect the environment from contamination
  • 6. ITE PC v4.0 Chapter 2 6© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Recognize Safe Working Conditions Some things to look for:  Clean, organized, and properly lit workspace  Proper procedures for handling equipment  Proper disposal or recycling of components containing hazardous materials
  • 7. ITE PC v4.0 Chapter 2 7© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public General Safety Guidelines  Most companies require reporting any injuries, including description of safety procedures not followed.  Damage to equipment may result in claims for damages from the customer.  CAUTION: Power supplies and monitors contain very high voltage. Do not wear the antistatic wrist strap when repairing power supplies or monitors.  CAUTION: Some printer parts may become very hot when in use and other parts may contain very high voltages.
  • 8. ITE PC v4.0 Chapter 2 8© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Fire Safety Guidelines  Know the location of fire extinguishers, how to use them, and which to use for electrical fires and for combustible fires  Have an escape route in case a fire gets out of control  Know how to contact emergency services quickly  Keep the workspace clean  Keep most solvents in a separate area Have a fire plan before you begin work:
  • 9. ITE PC v4.0 Chapter 2 9© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Electrostatic Discharge (ESD)  Static electricity is the buildup of an electric charge resting on a surface. This buildup may zap a component and cause damage.  At least 3,000 volts of static electricity must build up before a person can feel ESD, but less than 30 volts of static electricity can damage a computer component. Preventing ESD Damage  Use antistatic bags to store components  Use grounded mats on workbenches  Use grounded floor mats in work areas  Use antistatic wrist straps when working on computers
  • 10. ITE PC v4.0 Chapter 2 10© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Power Fluctuation AC power fluctuations can cause data loss or hardware failure:  Blackouts, brownouts, noise, spikes, power surges To help shield against power fluctuation issues, use power protection devices to protect the data and computer equipment:  Surge suppressors  UPS  SPS CAUTION: Never plug a printer into a UPS device. UPS manufacturers suggest not plugging a printer into a UPS for fear of burning up the printer motor.
  • 11. ITE PC v4.0 Chapter 2 11© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Material Safety Data Sheet (MSDS)  The name of the material  The physical properties of the material  Any hazardous ingredients contained in the material  Reactivity data, such as fire and explosion data  Special protection requirements  Procedures for spills or leaks  Special precautions  Health hazards
  • 12. ITE PC v4.0 Chapter 2 12© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Proper Disposal  Batteries from portable computer systems may contain lead, cadmium, lithium, alkaline manganese, and mercury. Recycling batteries should be a standard practice for a technician.  Monitors contain up to 4 pounds of lead, as well as rare earth metals. Monitors must be disposed of in compliance with environmental regulations.  Used printer toner kits and printer cartridges must be disposed of properly or recycled.  Contact the local sanitation company to learn how and where to dispose of the chemicals and solvents used to clean computers.
  • 13. ITE PC v4.0 Chapter 2 13© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Skilled use of tools and software makes the job less difficult and ensures that tasks are performed properly and safely.  ESD Tools antistatic wrist strap, mat  Hand Tools screwdrivers, needle-nose pliers  Cleaning Tools soft cloth, compressed air can  Diagnostic Tools digital multimeter, loopback adapter Tools for the Job
  • 14. ITE PC v4.0 Chapter 2 14© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Software Tools  Fdisk - create and delete disk partitions  Format - prepare a hard drive prior to use  Scandisk or Chkdsk - check for physical errors on the disk surface  Defrag - optimize use of space on a disk  Disk Cleanup - remove unused files  Disk Management - creates partitions and formats disks (GUI interface)  System File Checker (SFC) – scans the operating system critical files and replaces any files that are corrupt Disk management tools
  • 15. ITE PC v4.0 Chapter 2 15© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Organizational Tools  Personal reference tools Notes, journal, history of repairs  Internet reference tools Search engines, news groups, manufacturer FAQs, online computer manuals, online forums and chats, technical websites  Miscellaneous tools Spare parts, a working laptop
  • 16. ITE PC v4.0 Chapter 2 16© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Proper Use of Antistatic Wrist Strap  Connect the cable to the metal chassis of the computer  Wrap the strap around your wrist  The connection will keep your body at the same voltage (potential) as the computer  Attach the wire on the same side of the equipment as the arm wearing the antistatic wrist strap to keep the wire out of the way while you are working. CAUTION: Never wear an antistatic wrist strap if you are repairing a monitor or CRT. Can prevent ESD damage to computer components.
  • 17. ITE PC v4.0 Chapter 2 17© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Proper Use of Antistatic Mat  Lay the computer on the mat.  Connect the computer to the mat with the cable.  Connect the mat to a reliable electrical ground with its cable.  Now, you and the computer are at ground potential.
  • 18. ITE PC v4.0 Chapter 2 18© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Proper Use of Hand Tools  Use the proper type and size of screwdriver by matching it to the screw. Phillips, Flat Head and Hex are the most common types.  Do not over tighten screws because the threads may become stripped.  Caution: If excessive force is needed to remove or add a component, something may be wrong.  Caution: Magnetized tools should not be used around electronic devices.  Caution: Pencils should not be used inside the computer because the pencil lead can act as a conductor and may damage the computer components.
  • 19. ITE PC v4.0 Chapter 2 19© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Proper Use of Cleaning Materials To clean computers and accessories:  Use mild cleaning solution and lint-free cloth to clean computer cases, outside of monitor, LCD screen, CRT screen, and mouse.  Use compressed air to clean heat sinks.  Use Isopropyl alcohol and lint-free swabs to clean RAM.  Use hand-held vacuum cleaner with a brush attachment to clean a keyboard.  CAUTION: Before cleaning any device, turn it off and unplug the device from the power source.
  • 20. ITE PC v4.0 Chapter 2 20© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Chapter 2 Summary Safe Lab Procedures and Tool Use  Follow safety procedures for personal protection, equipment protection, and environmental protection.  Know what tools and software to use in working with computers and computer components.  Follow proper use of tools. Anti-static wrist strap, anti-static mat, various hand tools, and cleaning materials
  • 21. ITE PC v4.0 Chapter 2 21© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Instructor Training Activities
  • 22. ITE PC v4.0 Chapter 2 22© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Activities for Instructor Training 1. Take the Quiz provided in Chapter 2 course content. 2. Conduct Internet research to pre-screen online resources for students to use in completing the 2.2.2 Worksheet: Diagnostic Software. 3. Disassemble a computer as outlined in 2.3.4 Lab: Computer Disassembly. 4. Familiarize yourself with the general safety policies and the fire safety policies for your building. 5. Research the safety standards for your region. 6. Research the Internet for MSDS sheets for a few substances that technicians would encounter in their work.
  • 23. ITE PC v4.0 Chapter 2 23© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Instructor Training Discussion  Do you have a story about damage to equipment or an injury to a colleague in the workplace due to lack of safety procedures?  Would students benefit from hearing this or other stories to illustrate the importance of following safety guidelines?  Discuss ways that you will effectively coach students through the Computer Disassembly lab.  Share with the other instructors: The list of online resources The results of your research on safety policies and standards The resources for finding MSDS sheets online
  • 24. ITE PC v4.0 Chapter 2 24© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Additional Resources  U.S. Dept of Labor, Occupational Safety & Health Administration http://www.osha.gov  Microsoft Technet website http://www.technet.microsoft.com  The PC Guide http://www.pcguide.com  Computer Hope.com: Free computer help for everyone. http://www.computerhope.com  Tech Support Forum http://www.techsupportforum.com/  PC Technology Guide: What We Learn, We Share http://www.pctechguide.com  PC TechBytes: Computers Made Easy, Computer Repair Support http://www.pctechbytes.com  TechWatch: Your Source For Technology, News, Reviews and Pricing http://www.techwatch.com.au  TechRepublic: A Resource for IT Professionals http://www.techrepublic.com  The Tech Zone.com http://www.thetechzone.com
  • 25. ITE PC v4.0 Chapter 2 25© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Q and A
  • 26. ITE PC v4.0 Chapter 2 26© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

Editor's Notes

  1. Cisco Networking Academy program IT Essentials: PC Hardware and Software v4.0 Chapter 2: Safe Lab Procedures and Tool Use
  2. Slide 2 – Purpose of this Presentation The purpose of this PowerPoint is to provide to instructors an overview of ITE PC v4.0 Chapter 2, including the following: List of chapter objectives Overview of the chapter contents, including student worksheets and student activities included in the course content and some potential student misconceptions Reflection/Activities for instructors to complete to prepare to teach Additional resources
  3. Slide 3 – Chapter 2 Objectives The purpose of this chapter is to protect users from accident and injury, equipment from damage, and the environment from contamination. Upon completion of this Chapter, students will be able to perform tasks related to: 2.1 Explain the purpose of safe working conditions and procedures 2.2 Identify tools and software used with personal computer components and their purposes 2.3 Implement proper tool use
  4. Slide 4 – Chapter 2 Worksheets and Labs There is one worksheet and one lab included in Chapter 2. These are available at the bottom of associated pages of course content and by clicking on the “Labs” link in the Index window of Chapter 2. 2.2.2 Worksheet: Diagnostic Software (Research hard drive diagnostic programs from at least two different hard drive manufacturers. Answer questions about one of the manufacturers and its diagnostic software.) 2.3.4 Lab: Computer Disassembly (Disassemble a computer using safe lab procedures and proper tools.)
  5. Slide 5 – Safe Lab Procedures and Tool Use 2.0 Chapter Introduction This chapter covers basic safety practices for the workplace, hardware and software tools, and the disposal of hazardous materials. The workplace should have safety guidelines to follow to: Protect people from injury Protect equipment from damage Protect the environment from contamination Teaching Strategy: Injury prevention is everyone’s responsibility. Stay alert to situations that could result in an injury. Developing and using safe work practices is by far the best method for preventing injuries in the workplace. In order to best prevent injury, follow these simple rules at all times: Follow all national, industry, and workplace safety rules. Be alert and be awake. A tired worker can be a danger to one’s self and others. Training is essential when working with electricity, power tools, or any other potentially hazardous equipment. Use safety equipment. Lift with the legs, not the back. Many back injuries are caused by people bending over to lift a heavy object. The work place is never the place for drugs or alcohol. Always act professionally. Clowning around or playing practical jokes can result in injury. Stay current on issues related to safety and health in the workplace. After completing this chapter, students will meet these objectives: Explain the purpose of safe working conditions and procedures. Identify tools and software used with personal computer components and their purposes. Implement proper tool use.
  6. Slide 6 – Can You Recognize Safe Working Conditions? 2.1 Explain the purpose of safe working conditions and procedures Some things to look for: Clean, organized, and properly lit workspace Proper procedures for handling equipment Proper disposal or recycling of components containing hazardous materials After completing this section, students will meet these objectives: Identify safety procedures and potential hazards for users and technicians Identify safety procedures to protect equipment from damage and data loss Identify correct disposal procedures to protect the environment from contamination Teaching Strategy: Safe working conditions protect users from accident and injury. Proper procedures for handling computer components prevent equipment damage and data from loss. Proper disposal of computer components protects the environment. Professional technicians follow proper safety procedures. Customers prefer to deal with responsible technicians. Ask the students to think of themselves as technicians about to enter the workforce. They may see the importance of learning good safety procedures in that context.
  7. Slide 7 – General Safety Guidelines Most companies require reporting any injuries, including description of safety procedures not followed. Damage to equipment may result in claims for damages from the customer. 2.1.1 Identify safety procedures and potential hazards for users and technicians General Safety Guidelines - Follow the basic safety guidelines to prevent cuts, burns, electrical shock, and damage to eyesight. As is best practice, make sure that a fire extinguisher and first-aid kit are available in case of fire or injury. CAUTION: Power supplies and monitors contain very high voltage. Do not wear the antistatic wrist strap when repairing power supplies or monitors. CAUTION: Some printer parts may become very hot when in use and other parts may contain very high voltages. Teaching Strategy: This chapter does not cover the repair of power supplies or monitors. Emphasize that additional training is needed for people who will open those devices. Even though the voltages a student will see in this course are not dangerous, you could explain the "one hand rule" used by electricians. When using a test probe in a circuit with high voltages, use one hand only, to prevent the body from forming a complete circuit. 1) Dangers of working on computers - List possible dangers to technicians (cuts, burns, shocked, laser dangers, etc.) 2) Precautions and warnings – List ways to protect the technician Cuts - sharp edges and sharp tools Burns - hot components such as fuser roller of laser printer Electrical shock - Unplug power cords. Do not open power supplies or monitors unless qualified. Some high voltage capacitors (in monitors) retain dangerous voltages after power is removed Damage to eyes - Wear safety glasses. Pieces of cut wire can fly from the wire cutter. 3) You may have a story about damage to equipment or an injury to a colleague in the workplace due to lack of safety procedures. You might consider sharing this and other stories with your students to illustrate the importance of following safety guidelines. It might have a big impact on them .
  8. Slide 8 – Fire Safety Guidelines Fire Safety Guidelines - Follow fire safety guidelines to protect lives, structures, and equipment. To avoid an electrical shock, and to prevent damage to the computer, turn off and unplug the computer before beginning a repair. Have a fire plan before you begin work: Know the location of fire extinguishers, how to use them, and which to use for electrical fires and for combustible fires Have an escape route in case a fire gets out of control Know how to contact emergency services quickly Keep the workspace clean Keep most solvents in a separate area In the United States, there are four classifications for fire extinguishers. A different letter, color, and shape identifies each fire extinguisher classification. Each type of fire extinguisher has specific chemicals to fight different types of fires: Class A – Paper, wood, plastics, cardboard Class B – Gasoline, kerosene, organic solvents Class C – Electrical equipment Class D – Combustible metals What types of fire extinguisher classifications are there in your country? It is important to know how to use a fire extinguisher. Use the memory aid P-A-S-S to help you remember the basic rules of fire extinguisher operation: P - Pull the pin. A - Aim at the base of the fire, not at the flames. S - Squeeze the lever. S - Sweep the nozzle from side to side. Teaching Strategy: In the US, contacting emergency services will often consist of calling 911. If the technician always carries a working cell phone on his/her person, the contact can be made very quickly, immediately after leaving the fire. Some types of fire extinguishers will spread fires of the wrong type. Some will be ineffective on other types of fires. More than one type of extinguisher will be needed in most repair facilities. You might challenge your students to locate and identify the nearest fire extinguishers in your lab.
  9. Slide 9 – Electrostatic Discharge (ESD) 2.1.2 Identify safety procedures to protect equipment from damage and data from loss Static electricity is the buildup of an electric charge resting on a surface. This buildup may zap a component and cause damage. This is known as electrostatic discharge (ESD). ESD can be destructive to the electronics in a computer system. Static electricity can build up on you as they walk across a carpeted floor. When you touch another person, you both receive a shock. If the discharge causes pain or makes a noise, the charge was probably above 10,000 volts. At least 3,000 volts of static electricity must build up before a person can feel ESD, but less than 30 volts of static electricity can damage a computer component. Preventing ESD Damage Keep all components in antistatic bags until you are ready to install them. Use grounded mats on workbenches. Use grounded floor mats in work areas. Use antistatic wrist straps when working on computers. Climate affects computer equipment in a variety of ways: If the environment temperature is too high, equipment can overheat. If the humidity level is too low, the chance of ESD increases. If the humidity level is too high, equipment can suffer from moisture damage. Teaching Strategy: ESD is one of the potential dangers to computer equipment and data. Climate impacts probability of ESD. Devices that can protect the equipment from ESD damage include; antistatic mats, antistatic bags, and antistatic wrist straps. Antistatic bags are somewhat electrically conductive, to eliminate differences in potential across the circuit boards stored in them. They are typically colored to indicate this. If the conditions are conducive, consider letting a student demonstrate static electricity.
  10. Slide 10 – Power Fluctuation Voltage is the force that moves electrons through a circuit. The movement of electrons is called current. Computer circuits need voltage and current to operate electronic components. When the voltage in a computer is not accurate or steady, computer components may not operate correctly. Unsteady voltages are called power fluctuations. The following types of AC power fluctuations can cause data loss or hardware failure: Blackout - Complete loss of AC power Brownout - Reduced voltage level of AC power that lasts for a period of time Noise - Electrical interference from generators and lightning Spike - Sudden increase in voltage that lasts for a very short period and exceeds 100% of the normal voltage on a line Power surge - Dramatic increase in voltage above the normal flow of electrical current To help shield against power fluctuation issues, use power protection devices to protect the data and computer equipment: A surge suppressor helps protect against damage from surges and spikes. A surge suppressor diverts extra electrical voltage on the line to the ground. Uninterruptible Power Supply (UPS) helps protect against potential electrical power problems by supplying electrical power to a computer or other device. Standby Power Supply (SPS) helps protect against potential electrical power problems by providing a backup battery to supply power when the incoming voltage drops below the normal level. CAUTION: Never plug a printer into a UPS device. UPS manufacturers suggest not plugging a printer into a UPS for fear of burning up the printer motor. Teaching Strategy: Dangers to computer equipment and data include; spike, power-in rush, brownout, blackout, lightning, jewelry, spills, and drops. Climate impacts probability of ESD. Devices that can protect the equipment from electrical damage include; Surge protector, UPS, antistatic mats and bags, antistatic wrist straps.
  11. Slide 11 – Material Safety Data Sheet (MSDS) 2.1.3 Identify safety procedures to protect the environment from contamination Computers and peripherals contain materials that can be harmful to the environment. Hazardous materials are sometimes called toxic waste. These materials can contain high concentrations of heavy metals such as cadmium, lead, or mercury. The regulations for the disposal of hazardous materials vary according to state or country. Contact the local recycling or waste removal authorities in your community for information about disposal procedures and services. MSDS is a fact sheet summarizing information about material identification, including hazardous ingredients that can affect personal health, fire hazards, and first aid requirements. The name of the material The physical properties of the material Any hazardous ingredients contained in the material Reactivity data, such as fire and explosion data Procedures for spills or leaks Special precautions Health hazards Special protection requirements NOTE: The MSDS is valuable in determining how to dispose of any potentially hazardous materials in the safest manner. What organization governs the use of hazardous chemicals in your country? Are MSDS sheets mandatory? Teaching Strategy: Explain Material Safety and Data Sheets and OSHA. These are different for each country. Check for these relevant to your local area. OSHA has no bearing outside of the US. Businesses may get fined for contamination and employees could be fired. Ethics dictate that we protect the planet. In your student class, you might ask students to locate MSDS sheets for a few substances they will encounter in their work. Different trade names and chemical names can create some confusion, but that is part of the learning experience.
  12. Slide 12 – Proper Disposal Protecting the environment by responsibly disposing and recycling Batteries from portable computer systems may contain lead, cadmium, lithium, alkaline manganese, and mercury. Recycling batteries should be a standard practice for a technician. Monitors contain up to 4 pounds of lead, as well as rare earth metals. Monitors must be disposed of in compliance with environmental regulations. Used printer toner kits and printer cartridges must be disposed of properly or recycled. Contact the local sanitation company to learn how and where to dispose of the chemicals and solvents used to clean computers. Teaching Strategy: Computers and peripherals contain some environmentally unfriendly materials. Most computer components are either hazardous or contain some level of hazardous substances. Describe the proper disposal/recycling of hazardous materials (batteries, electronic devices, and chemical solvents)
  13. Slide 13 – Tools for the Job 2.2 Identify tools and software used with personal computer components and their purposes For every job there is the right tool. Make sure that you are familiar with the correct use of each tool and that the right tool is used for the current task. Skilled use of tools and software makes the job less difficult and ensures that tasks are performed properly and safely. Teaching Strategy: Tools can keep you safe, can keep the equipment and data you’re working on safe, can keep your customer safe, and can identify you as a professional. Technicians need to know the proper use of a tool before using it. Technicians collaborate using journals, FAQs, and blogs. These communication tools help in creating a knowledge base and help technicians work more effectively. After completing this section, students will be able to perform the following tasks: • Identify Hardware Tools and Their Purpose • Identify Software Tools and Their Purpose • Identify Organizational Tools and Their Purpose 2.2.1 Identify hardware tools and their purpose ESD Tools, include antistatic wrist strap and antistatic mat An antistatic wrist strap is used to prevent ESD damage to computer equipment. An antistatic mat is used to stand on or to place hardware on to prevent static electricity from building up. Hand Tools, include various screwdrivers, needle-nose pliers, hex drivers, wire cutters, tweezers, part retriever, and flashlight Cleaning Tools, include soft cloth, compressed air can, cable ties, and parts organizer Diagnostic Tools, include digital multimeter and loopback adapter Teaching Strategy: There is a tool for every job. The wrong tool for the job can injure the technician and the computer component. A professional technician should always have their toolkit available for use in their work. Have tools arranged for easy grabbing when needed.
  14. Slide 14 – Software Tools 2.2.2 Identify software tools and their purpose A technician must be able to use a range of software tools to help diagnose problems, maintain hardware, and protect the data stored on a computer. A technician must be able to identify which software to use in different situations. Fdisk - used to create and delete partitions on a hard drive Format - used to prepare a hard drive to store information Scandisk or Chkdsk - used to check the integrity of files and folders on a hard drive by scanning the disk surface for physical errors Defrag - used to optimize space on a hard drive to allow faster access to programs and data Disk Cleanup - used to clear space on a hard drive by searching for files that can be safely deleted Disk Management - a system utility used to manage hard drives and partitions, such as initializing disks, creating partitions, and formatting partitions. Disk Management has the functions of FORMAT and FDISK, and a few more, but it is performed from the Windows GUI interface. System File Checker (SFC) – a command-line utility that scans the operating system critical files and replaces any files that are corrupted. Use the Windows XP boot disk for troubleshooting and repairing corrupted files. The Windows XP boot disk is designed to repair Windows system files, restore damaged or lost files, or reinstall the operating system. Third-party software tools are available to assist in troubleshooting problems. To protect data and the integrity of the operating system and hardware, you should use software designed to guard against attacks and to remove malicious programs. Here is a list of various types of software used to protect hardware and data: Windows XP Security Center – allows you to check the status of essential security settings on the computer. The Security Center continuously checks to make sure that the software firewall and antivirus programs are running. It also ensures that automatic updates are set to download and install automatically. Antivirus Program – protects a computer against virus attacks. Spyware Remover – protects against software that sends information about web surfing habits to an attacker. Spyware can be installed without the knowledge or consent of the user. Firewall – a program that runs continuously to protect against unauthorized communications to and from your computer. Student Activity: The student course content includes the worksheet, 2.2.2 Worksheet: Diagnostic Software. To complete this worksheet, students will conduct research on hard drive diagnostic programs from at least two different hard drive manufacturers. Answer questions about one of the manufacturer and its diagnostic software.
  15. Slide 15 – Organizational Tools 2.2.3 Identify organizational tools and their purpose It is important that a technician document all services and repairs. The documentation can then be used as reference material for similar problems that are encountered in the future. Good customer service includes providing the customer with a detailed description of the problem and the solution. Personal reference tools Notes – Make notes as you go through the investigation and repair process. Refer to these notes to avoid repeating previous steps and to determine what steps to take next. Journal – Document the upgrades and repairs that you perform. The documentation should include descriptions of the problem, possible solutions that have been tried in order to correct the problem, and the steps taken to repair the problem. Be sure to note any configuration changes made to the equipment and any replacement parts used in the repair. Your journal, along with your notes, can be valuable when you encounter similar situations in the future. History of repairs – Make a detailed list of problems and repairs, including the date, replacement parts, and customer information. The history allows a technician to determine what work has been performed on a computer in the past. Internet reference tools - The Internet is an excellent source of information about specific hardware problems and possible solutions: Internet search engines News groups Manufacturer FAQs Online computer manuals Online forums and chat Technical websites Manufacturer download areas for new drivers Miscellaneous tools – With experience, you will discover many additional items to add to the toolkit. A working computer is a valuable resource to take with you on computer repairs in the field. A working computer can be used to research information, download tools or drivers, or communicate with other technicians. Using known good working components to replace possible bad ones in computers will help you quickly determine which component may not be working properly. Teaching Strategy: Organizational tools are an important part of a technician’s toolkit. Good technicians keep journals. Technicians post their journal on the Internet to be shared with other technicians. (PC Guide, Computer Hope, Techsupportforum.com) Carry some common working parts for repairs in the field. Power supply, hard drive, memory, adapter cards and Ethernet cable may be useful. With the variety of technologies used, you may not have exactly the part needed. Hard drives may be ATA or SATA. There are many different RAM technologies, speeds and physical sizes. Laptops especially have proprietary parts. You will probably have to diagnose, and then order a part for a laptop.
  16. Slide 16 – Proper Tool Use 2.3 Implement proper tool use Safety in the workplace is everyone's responsibility. You are much less likely to injure yourself or damage components when using the proper tool for the job. Before cleaning or repairing equipment, check to make sure that your tools are in good condition. Clean, repair, or replace any items that are not functioning adequately. Teaching Strategy: Proper use of tools is mandatory to be an effective, professional technician. You can hurt yourself and others if you do not follow safety procedures when using tools. You can also damage equipment if tools are not used properly. Keep equipment and tools clean; dirt reduces their operation and efficiency. At the end of this section, students will meet these objectives: Demonstrate Proper Use of Wrist Strap Demonstrate Proper Use of Antistatic mat Demonstrate Proper Use of Various Hand Tools Demonstrate Proper Use of Cleaning Materials 2.3.1 Demonstrate proper use of an antistatic wrist strap Properly using an antistatic wrist strap can prevent ESD damage to computer components. The wrist strap is a conductor that connects your body to the equipment you are working on. The main purpose for using a wrist strap is to equalize the electrical charge between the technician and the equipment. The connection to the person's wrist may not be complete (zero ohms), but even a fairly high resistance connection is sufficient to keep the person and the chassis at the same potential. The strap has two parts and is easy to wear: Wrap the strap around your wrist and secure it using the snap or Velcro. The metal on the back of the wrist strap must remain in contact with the skin at all times. Snap the connector on the end of the wire to the wrist strap and connect the other end either to the equipment or to the same grounding point that the antistatic mat is connected to. The metal skeleton of the case is a good place to connect the wire. When connecting the wire to equipment you are working on, choose an unpainted metal surface. A painted surface does not conduct the electricity as well as unpainted metal. NOTE: Attach the wire on the same side of the equipment as the arm wearing the antistatic wrist strap. This will help to keep the wire out of the way while you are working. Although wearing a wrist strap will help to prevent ESD, you can further reduce the risks by not wearing clothing made of silk, polyester, or wool. These fabrics are more likely to generate a static charge. NOTE: Technicians should roll up their sleeves, remove scarves or ties, and tuck in their shirts to prevent interference from clothing. Ensure that earrings, necklaces, and other loose jewelry are properly secured. Caution: A wrist strap does not protect you against high voltages. Do not use it to repair monitors or power supplies. Only qualified personnel should open monitors or power supplies.
  17. Slide 17 – Proper Use of Antistatic Mat 2.3.2 Demonstrate proper use of an antistatic mat An antistatic mat is slightly conductive and works by drawing static electricity away from a component, and transferring it safely from equipment to a grounding point. Lay the mat on the workspace next to or under the computer case. Clip the mat to the case to provide a grounded surface on which you can place parts as you remove them from the system. Reducing the potential for ESD reduces the likelihood of damage to delicate circuits or components. NOTE: Always handle components by the edges. When you are working at a workbench, ground the workbench and the antistatic floor mat. By standing on the mat and wearing the wrist strap, your body has the same charge as the equipment and reduces the probability of ESD. Teaching Strategy: Anti-static mats are electrical conductors. The anti-static mat on the computer bench and the anti-static you stand on are both grounded. Key Points: Ground antistatic mat.
  18. Slide 18 – Proper Use of Hand Tools 2.3.3 Demonstrate proper use of various hand tools Use the proper type and size of screwdriver by matching it to the screw. Phillips, Flat Head and Hex are the most common types. Do not over tighten screws because the threads may become stripped. Caution: If excessive force is needed to remove or add a component, something is likely to be wrong. Do not force the removal or assembly of any components. Instead, look for the cause to avoid breaking components. Caution: Magnetized tools should not be used around electronic devices. Caution: Pencils should not be used inside the computer because the pencil lead can act as a conductor and may damage the computer components. Teaching Strategy: Using any tool improperly can be dangerous. Use the correct tool for the right job. For example, do not use needle-nose pliers to remove screws. Be careful not to cut wires. Do not use a flat head screwdriver to install or remove Phillips screws. Do not use screw drivers as a prying tool. Anything that has to be forced is a problem! Needle nose pliers and tweezers can retrieve small parts. Be careful not to scratch the small copper circuit board traces. Do not use a pencil as a tool inside a computer. Pencil lead is conductive, and traces of it may alter the operation of circuits. No magnetic tips with screwdrivers. Instead, stab a screw through a piece of masking tape to hold it in place. If you have an old motherboard, you could show students how small the circuit traces are.
  19. Slide 19 – Proper Use of Cleaning Materials 2.3.4 Demonstrate proper use of cleaning materials Keeping computers clean inside and out is a vital part of a maintenance program. Dirt can cause problems with the physical operation of fans, buttons, and other mechanical components. CAUTION: Before cleaning any device, turn it off and unplug the device from the power source. Teaching Strategy: Computer components get dirty. Dirt reduces their operations and efficiency due to heat build up. Components that need to be cleaned periodically include monitor/LCD, exterior of the computer, optical drive, floppy drive, keyboard, printers and the inside of the case or chassis. When cleaning, shut down and turn off the device to be cleaned. Disconnect any attached devices and disconnect them from their electrical outlets. Electronic components should never be near water. Use isopropyl alcohol to clean contacts. However, de-mineralized water can be used on a cloth to clean keyboards. Only use products specifically designed for cleaning computer components. Use a can of compressed air to remove dust from the slots and holes on your laptop and between the keys on the keyboard. Use compressed air rather than vacuum. Vacuuming can produce ESD. To clean the outside of the computer and video display, moisten a soft, lint-free cloth with the proper cleaning solution, and wipe the component until it is clean. To avoid damaging the computer or display, never spray cleaning solution directly onto the display. Moisten a soft, lint-free cloth with water or an LCD cleaner, and wipe the display until it is clean. To avoid damaging the computer or display, do not spray cleaning solution directly onto the display. Only use products specifically designed for cleaning LCD displays. Student Activity: The student course content includes the lab activity, 2.3.4 Lab: Computer Disassembly. To complete this lab activity, students will disassemble a computer using safe lab procedures and proper tools.
  20. Slide 20 – Chapter 2 Summary Some of the important concepts to remember from this module:  Work in a safe manner to protect both users and equipment. Follow all safety guidelines to prevent injuries to yourself and to others. Know how to protect equipment from ESD damage. Know about and be able to prevent power issues that can cause equipment damage or data loss. Know which products and supplies require special disposal procedures. Familiarize yourself with MSDS sheets for both safety issues and disposal restrictions to help protect the environment. Be able to use the correct tools for the task. Know how to clean components safely. Use organizational tools during computer repairs.
  21. Slide 21 – Instructor Training Activities
  22. Slide 22 – Activities for Instructor Training These activities are suggested for use in instructor training. Take the Quiz provided in Chapter 2 course content. Conduct Internet research to pre-screen online resources for students to use in completing the 2.2.2 Worksheet: Diagnostic Software. Disassemble a computer using safe lab procedures and proper tools as outlined in 2.3.4 Lab: Computer Disassembly. Familiarize yourself with the general safety policies and the fire safety policies for your building. Research the safety standards for your region. Research the Internet for MSDS sheets for a few substances that technicians would encounter in their work. Different trade names and chemical names can create some confusion, but that is part of the learning experience.
  23. Slide 23 – Instructor Training Discussion Discuss questions. Participate in discussion or journal your answers to discussion questions. Do you have a story about damage to equipment or an injury to a colleague in the workplace due to lack of safety procedures? Would students benefit from hearing this or other stories to illustrate the importance of following safety guidelines? In 2.3.4 Lab: Computer Disassembly, students will disassemble a computer. Now that you have disassembled a computer as outlined in this handout, discuss ways that you will effectively coach students through this lab activity. Share with the other instructors: the list of online resources found that students might use in completing the research activity worksheet the results of your research on safety policies and safety standards the resources for finding MSDS sheets online
  24. Slide 24 – Additional Resources U.S. Dept of Labor, Occupational Safety & Health Administration http://www.osha.gov Microsoft Technet website http://www.technet.microsoft.com The PC Guide http://www.pcguide.com Computer Hope.com: Free computer help for everyone. http://www.computerhope.com Tech Support Forum http://www.techsupportforum.com/ PC Technology Guide: What We Learn, We Share http://www.pctechguide.com PC TechBytes: Computers Made Easy, Computer Repair Support http://www.pctechbytes.com TechWatch: Your Source For Technology, News, Reviews and Pricing http://www.techwatch.com.au TechRepublic: A Resource for IT Professionals http://www.techrepublic.com The Tech Zone.com http://www.thetechzone.com Whatis?com: IT Encyclopedia and Learning Center http://whatis.com TechTarget: The Most Targeted IT Media http://techtarget.com ZDNet: Tech News, Blogs and White Papers for IT Professionals http://www.zdnet.com HowStuffWorks: It's Good to Know http://computer.howstuffworks.com CNET.com http://www.cnet.com PC World http://www.pcworld.com ComputerWorld http://www.computerworld.com WIRED NEWS http://www.wired.com eWEEK.com http://www.eweek.com
  25. Slide 25 – Q and A