SlideShare a Scribd company logo
1 of 11
 a planned system of working to prevent
illness and injury where you work by
recognizing and identifying hazards and
risks.
1. Identify the hazard.
2. Clear the area close to the hazard.
3. Partition the hazard off or clearly identify the
area to protect other people from harm.
4. If the hazard can be easily and safely
cleared, then do so.
If not…
5. Report the hazard to the appropriate person
(such as teacher in charge, principal etc.) to
obtain assistance.
6. After clearing the hazard, fill out the correct
documentation to assist in identifying improved
practice to reduce further incidence of hazards.
 Forms are used to give specific details with
regards to accidents that happened in the
laboratory during experiments or practicum
exercises.
 Accident reports contain the following details:
Name of the person injured
Date and time of the accident
Type of injury
First aid given
Action taken to prevent further
accidents
 Computer equipment can be dangerous, and
you or others can be injured or even killed if
you don’t follow proper safety guidelines
when working along with PCs. The following
are some precautionary measures to take
before working with any computer
equipment:
‐ Prepare the computer case (Install power supply, I/O
shield and spacers)
‐ Install drives (DVD, Floppy and HDD)
‐ Install the CPU, fan, heat sink and memory module on the
motherboard
‐ Install the motherboard into
the casing and expansion cards
‐ Install the cablings (Power connectors, FDD Connector, ID
E/SATA Connector, USB headers and system panel
header).
‐ Attach the monitor, keyboard, mouse and plug into a power
source.
‐ Troubleshoot if necessary
‐ Assemble and install network connection
June 20 system design, ohs, assembly procedures.pptx

More Related Content

Similar to June 20 system design, ohs, assembly procedures.pptx

CUSOHS301A Follow OH&S Procedures
CUSOHS301A Follow OH&S ProceduresCUSOHS301A Follow OH&S Procedures
CUSOHS301A Follow OH&S Procedures
Peter Branjerdporn
 
Particpate in whs processes wk 5
Particpate in whs processes wk 5Particpate in whs processes wk 5
Particpate in whs processes wk 5
catherinejyoung
 
Particpate in whs processes recap wks 2 13
Particpate in whs processes recap wks 2  13Particpate in whs processes recap wks 2  13
Particpate in whs processes recap wks 2 13
catherinejyoung
 
Hazop (incident investigation & root cause analysis )
Hazop  (incident investigation & root cause analysis )Hazop  (incident investigation & root cause analysis )
Hazop (incident investigation & root cause analysis )
umar farooq
 

Similar to June 20 system design, ohs, assembly procedures.pptx (20)

CSS 1 WEEK 02 2021-2022.pptx
CSS 1 WEEK 02 2021-2022.pptxCSS 1 WEEK 02 2021-2022.pptx
CSS 1 WEEK 02 2021-2022.pptx
 
Managing Our Risky Business - Risk Management
Managing Our Risky Business - Risk ManagementManaging Our Risky Business - Risk Management
Managing Our Risky Business - Risk Management
 
Occupational Health and Safety Procedures 2022
Occupational Health and Safety Procedures 2022Occupational Health and Safety Procedures 2022
Occupational Health and Safety Procedures 2022
 
IT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John LadoIT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John Lado
 
L4 - Accident and Report Writing.ppt
L4 - Accident and Report Writing.pptL4 - Accident and Report Writing.ppt
L4 - Accident and Report Writing.ppt
 
Safety in the Workplace.pptx
Safety in the Workplace.pptxSafety in the Workplace.pptx
Safety in the Workplace.pptx
 
CUSOHS301A Follow OH&S Procedures
CUSOHS301A Follow OH&S ProceduresCUSOHS301A Follow OH&S Procedures
CUSOHS301A Follow OH&S Procedures
 
wepik-ensuring-workplace-safety-a-comprehensive-overview-of-occupational-safe...
wepik-ensuring-workplace-safety-a-comprehensive-overview-of-occupational-safe...wepik-ensuring-workplace-safety-a-comprehensive-overview-of-occupational-safe...
wepik-ensuring-workplace-safety-a-comprehensive-overview-of-occupational-safe...
 
Particpate in whs processes wk 5
Particpate in whs processes wk 5Particpate in whs processes wk 5
Particpate in whs processes wk 5
 
man ppt.pptx
man ppt.pptxman ppt.pptx
man ppt.pptx
 
Attending Emergency/Accident and Incident Reporting (With first aid)
Attending Emergency/Accident and Incident Reporting (With first aid)Attending Emergency/Accident and Incident Reporting (With first aid)
Attending Emergency/Accident and Incident Reporting (With first aid)
 
Lesson 1 cn
Lesson 1 cnLesson 1 cn
Lesson 1 cn
 
Safety Self-Study Packet
 Safety Self-Study Packet  Safety Self-Study Packet
Safety Self-Study Packet
 
6271550.ppt
6271550.ppt6271550.ppt
6271550.ppt
 
Particpate in whs processes recap wks 2 13
Particpate in whs processes recap wks 2  13Particpate in whs processes recap wks 2  13
Particpate in whs processes recap wks 2 13
 
Hazop (incident investigation & root cause analysis )
Hazop  (incident investigation & root cause analysis )Hazop  (incident investigation & root cause analysis )
Hazop (incident investigation & root cause analysis )
 
Emba hsem ppt hazard id.ev.sg_20104006-8-9_16-9
Emba hsem ppt hazard id.ev.sg_20104006-8-9_16-9Emba hsem ppt hazard id.ev.sg_20104006-8-9_16-9
Emba hsem ppt hazard id.ev.sg_20104006-8-9_16-9
 
Practice Occupational Health and Safety Procedures.pptx
Practice Occupational Health and Safety Procedures.pptxPractice Occupational Health and Safety Procedures.pptx
Practice Occupational Health and Safety Procedures.pptx
 
Quarter 1 module
Quarter 1 moduleQuarter 1 module
Quarter 1 module
 
Risk assessment
Risk assessmentRisk assessment
Risk assessment
 

Recently uploaded

Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
FIDO Alliance
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
FIDO Alliance
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
FIDO Alliance
 

Recently uploaded (20)

ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps Productivity
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
 
الأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهالأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهله
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development Companies
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
How to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in PakistanHow to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in Pakistan
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 

June 20 system design, ohs, assembly procedures.pptx

  • 1.
  • 2.  a planned system of working to prevent illness and injury where you work by recognizing and identifying hazards and risks.
  • 3. 1. Identify the hazard. 2. Clear the area close to the hazard. 3. Partition the hazard off or clearly identify the area to protect other people from harm. 4. If the hazard can be easily and safely cleared, then do so.
  • 4. If not… 5. Report the hazard to the appropriate person (such as teacher in charge, principal etc.) to obtain assistance. 6. After clearing the hazard, fill out the correct documentation to assist in identifying improved practice to reduce further incidence of hazards.
  • 5.
  • 6.  Forms are used to give specific details with regards to accidents that happened in the laboratory during experiments or practicum exercises.  Accident reports contain the following details: Name of the person injured Date and time of the accident Type of injury First aid given Action taken to prevent further accidents
  • 7.  Computer equipment can be dangerous, and you or others can be injured or even killed if you don’t follow proper safety guidelines when working along with PCs. The following are some precautionary measures to take before working with any computer equipment:
  • 8.
  • 9.
  • 10. ‐ Prepare the computer case (Install power supply, I/O shield and spacers) ‐ Install drives (DVD, Floppy and HDD) ‐ Install the CPU, fan, heat sink and memory module on the motherboard ‐ Install the motherboard into the casing and expansion cards ‐ Install the cablings (Power connectors, FDD Connector, ID E/SATA Connector, USB headers and system panel header). ‐ Attach the monitor, keyboard, mouse and plug into a power source. ‐ Troubleshoot if necessary ‐ Assemble and install network connection