SlideShare a Scribd company logo
Introduction to
safety practices I.
Page 2
Instructor, PACE-IT Program – Edmonds Community College
Areas of Expertise Industry Certifications
 PC Hardware
 Network Administration
 IT Project Management
 Network Design
 User Training
 IT Troubleshooting
Qualifications Summary
Education
 M.B.A., IT Management, Western Governor’s University
 B.S., IT Security, Western Governor’s University
Entrepreneur, executive leader, and proven manger
with 10+ years of experience turning complex issues
into efficient and effective solutions.
Strengths include developing and mentoring diverse
workforces, improving processes, analyzing
business needs and creating the solutions
required— with a focus on technology.
Page 3
– Electrical safety.
– Installation safety.
PACE-IT.
Page 4
Introduction to safety practices I.
Page 5
– Electrical grounding.
» Electrical grounding is used to protect technicians in the case of
electrical insulation failure.
• Provides an alternate path for the electricity; this is often
referred to as a return to earth.
» All electrical systems should be connected to properly
grounded circuits.
• This helps to protect technicians and equipment.
– ESD (electrostatic discharge).
» ESD is caused when two electrically charged objects that have
different amounts of electrical charge come into contact,
creating a flow of energy between the objects as they normalize
the levels.
• ESD can damage sensitive components, particularly the CPU
and/or RAM.
» Using an ESD mat helps to reduce the chances of ESD.
» Using an ESD strap will also reduce the chances for ESD.
• The strap goes around the wrist and then is clipped to a
ground source (usually to an exposed metal surface inside of
the case).
Introduction to safety practices I.
Page 6
– Practice self grounding.
» Self grounding is a normalization technique used to equalize
the amount of electrical charge between the worker and the
equipment being worked on.
• After the case has been opened and the ESD strap is
attached to a ground source, touch an exposed metal surface
inside of the case (before actually touching any of the
components).
– Additional equipment grounding.
» In some cases, actually attaching a ground strap from the piece
of equipment to a ground source is advised.
– Electrical fire safety.
» In case of fire:
• Unplug the power source or turn off the circuit breaker.
• Use a class C or multiclass fire extinguisher.
• Never use water.
Introduction to safety practices I.
Page 7
– Fire suppression systems.
» Building codes often call for the installation of fire suppression
systems. There are several different types of common systems.
» Wet pipe: the pipes are pressurized and contain water.
» Dry pipe: the pipes are not pressurized; the water is contained
in a holding tank.
» Pre-action: similar to a dry pipe system, but the sprinkler head
contains a thermal-fusible link that must melt before the water
is released.
» Deluge: designed to release a large amount of water in a short
amount of time into a predefined space.
• Least desirable option for electrical components.
» Halon: a non-conducting—does not carry an electrical
charge—volatile gaseous chemical.
• Works by chemically disrupting combustion.
• Does not leave a residue upon evaporation; unlike water,
halon will not ruin electrical components.
• Safe for exposure to humans—in limited amounts for a limited
amount of time.
• Environmentally safe; also known as a clean agent.
Introduction to safety practices I.
Page 8
Introduction to safety practices I.
Page 9
– Use proper lifting techniques.
» Bend at the knees, not the waist.
» Keep the head up.
» Avoid twisting when carrying items.
» If the item is heavy or awkward, request help in lifting it.
• Most companies establish weight limitations.
– Rack installation.
» Racks are used to help create a clean organized environment.
• Especially when used with proper cable management
techniques.
» Racks are designed to provide sufficient airflow for the
electrical components that are placed in them.
» When assembling and installing racks, always follow the
manufacturer’s instructions.
• Always use the proper tools to prevent damaging the racks or
the fasteners that hold them together.
» Many servers and networking components come rack ready—
specifically designed to be placed in a rack.
Introduction to safety practices I.
Page 10
– Rack placement.
» When designing a room that is going to hold multiple racks of
computing systems (e.g., servers and networking gear) some
thought needs to go into the placement of those racks.
» HVAC and rack placement should be done concurrently.
• HVAC systems should be designed to control both heat and
humidity levels.
» Creating a hot aisle/cold aisle design is recommended.
» The hot aisle is the side or aisle that receives the exhaust
airflow from the computing equipment.
• The aisle should face an HVAC air intake.
» The cold aisle is the side or aisle that the air intakes of the
computing equipment face.
• The aisle should face an HVAC air vent.
» Whenever possible, a server room should be designed with a
raised floor to help protect against water damage.
• The raised floor, like a drop ceiling, can also be utilized as
part of the cable management system.
Introduction to safety practices I.
Page 11
– Tool safety.
» Always use the proper tool for the job; that is what it was
designed for.
» Do not use a pencil as a probe; it is possible for the pencil to
conduct electricity, leading to an ESD situation or shock
hazard.
» Do not use magnetized tools when working on electrical
components—as the magnetic charge can be harmful to
magnetically kept data.
» When using compressed air to blow out debris, maintain a
minimum distance of four inches from the nozzle to the
component.
» Use isopropyl alcohol to clean contacts.
• Rubbing alcohol contains a higher water content—
approximately 30 percent.
» Never use a standard vacuum cleaner when vacuuming
electrical components is necessary.
• Due to the design of standard vacuums, electrostatic
discharges are a common occurrence.
• There are specially designed vacuums that can be used.
Introduction to safety practices I.
Page 12
Introduction to safety practices I.
Electrical safety is something that needs to be considered. Grounding
provides some protection. ESD is a hazard to electrical components. When
facing an electrical fire, use a class C or multiclass fire extinguisher. A
Halon fire suppression system is the best option for protecting electronic
components.
Topic
Electrical safety.
Summary
Use the proper lifting techniques. Place components in properly designed
racks. A hot aisle/cold aisle design should be used when multiple racks are
located in the same area. When possible, design server rooms with raised
floors. Use the proper tools for the job at hand to increase safety and
reduce risk to components.
Installation safety.
Page 13
THANK YOU!
This workforce solution was 100 percent funded by a $3 million grant awarded by the
U.S. Department of Labor's Employment and Training Administration. The solution was
created by the grantee and does not necessarily reflect the official position of the U.S.
Department of Labor. The Department of Labor makes no guarantees, warranties, or
assurances of any kind, express or implied, with respect to such information, including
any information on linked sites and including, but not limited to, accuracy of the
information or its completeness, timeliness, usefulness, adequacy, continued availability
or ownership. Funded by the Department of Labor, Employment and Training
Administration, Grant #TC-23745-12-60-A-53.
PACE-IT is an equal opportunity employer/program and auxiliary aids and services are
available upon request to individuals with disabilities. For those that are hearing
impaired, a video phone is available at the Services for Students with Disabilities (SSD)
office in Mountlake Terrace Hall 159. Check www.edcc.edu/ssd for office hours. Call
425.354.3113 on a video phone for more information about the PACE-IT program. For
any additional special accommodations needed, call the SSD office at 425.640.1814.
Edmonds Community College does not discriminate on the basis of race; color; religion;
national origin; sex; disability; sexual orientation; age; citizenship, marital, or veteran
status; or genetic information in its programs and activities.

More Related Content

What's hot

PACE-IT: Analyzing Monitoring Reports
PACE-IT: Analyzing Monitoring ReportsPACE-IT: Analyzing Monitoring Reports
PACE-IT: Analyzing Monitoring Reports
Pace IT at Edmonds Community College
 
Lesson 2
Lesson 2Lesson 2
Site Selection for Mission Critical Facilities
Site Selection for Mission Critical FacilitiesSite Selection for Mission Critical Facilities
Site Selection for Mission Critical Facilities
Schneider Electric
 
PACE-IT: Network Troubleshooting Methodology
PACE-IT: Network Troubleshooting MethodologyPACE-IT: Network Troubleshooting Methodology
PACE-IT: Network Troubleshooting Methodology
Pace IT at Edmonds Community College
 
Implementation of security standards and procedures
Implementation of security standards and proceduresImplementation of security standards and procedures
Implementation of security standards and procedures
StevenSegaert
 
Success with Electrical Testing
Success with Electrical TestingSuccess with Electrical Testing
Success with Electrical Testing
Jrock8020
 
Cybersecurity 3 cybersecurity costs and causes
Cybersecurity 3 cybersecurity costs and causesCybersecurity 3 cybersecurity costs and causes
Cybersecurity 3 cybersecurity costs and causes
sommerville-videos
 
Lesson 3
Lesson 3Lesson 3
Lesson 3
MrsNunn
 
Infrastructure dependability
Infrastructure dependabilityInfrastructure dependability
Infrastructure dependability
sommerville-videos
 
System success and failure
System success and failureSystem success and failure
System success and failure
sommerville-videos
 
Electrical maintenance work profile & need of it
Electrical maintenance work profile & need of itElectrical maintenance work profile & need of it
Electrical maintenance work profile & need of it
Amit Kumar
 
Introduction to Critical Systems Engineering (CS 5032 2012)
Introduction to Critical Systems Engineering (CS 5032 2012)Introduction to Critical Systems Engineering (CS 5032 2012)
Introduction to Critical Systems Engineering (CS 5032 2012)
Ian Sommerville
 
Safety climbing and working in trees
Safety climbing and working in treesSafety climbing and working in trees
Safety climbing and working in trees
AnnKoenig
 
Hardware installation- Dheelan RS
Hardware installation- Dheelan RSHardware installation- Dheelan RS
Hardware installation- Dheelan RS
dheelan2995
 

What's hot (14)

PACE-IT: Analyzing Monitoring Reports
PACE-IT: Analyzing Monitoring ReportsPACE-IT: Analyzing Monitoring Reports
PACE-IT: Analyzing Monitoring Reports
 
Lesson 2
Lesson 2Lesson 2
Lesson 2
 
Site Selection for Mission Critical Facilities
Site Selection for Mission Critical FacilitiesSite Selection for Mission Critical Facilities
Site Selection for Mission Critical Facilities
 
PACE-IT: Network Troubleshooting Methodology
PACE-IT: Network Troubleshooting MethodologyPACE-IT: Network Troubleshooting Methodology
PACE-IT: Network Troubleshooting Methodology
 
Implementation of security standards and procedures
Implementation of security standards and proceduresImplementation of security standards and procedures
Implementation of security standards and procedures
 
Success with Electrical Testing
Success with Electrical TestingSuccess with Electrical Testing
Success with Electrical Testing
 
Cybersecurity 3 cybersecurity costs and causes
Cybersecurity 3 cybersecurity costs and causesCybersecurity 3 cybersecurity costs and causes
Cybersecurity 3 cybersecurity costs and causes
 
Lesson 3
Lesson 3Lesson 3
Lesson 3
 
Infrastructure dependability
Infrastructure dependabilityInfrastructure dependability
Infrastructure dependability
 
System success and failure
System success and failureSystem success and failure
System success and failure
 
Electrical maintenance work profile & need of it
Electrical maintenance work profile & need of itElectrical maintenance work profile & need of it
Electrical maintenance work profile & need of it
 
Introduction to Critical Systems Engineering (CS 5032 2012)
Introduction to Critical Systems Engineering (CS 5032 2012)Introduction to Critical Systems Engineering (CS 5032 2012)
Introduction to Critical Systems Engineering (CS 5032 2012)
 
Safety climbing and working in trees
Safety climbing and working in treesSafety climbing and working in trees
Safety climbing and working in trees
 
Hardware installation- Dheelan RS
Hardware installation- Dheelan RSHardware installation- Dheelan RS
Hardware installation- Dheelan RS
 

Viewers also liked

Motorcycle safety in malaysia
Motorcycle safety in malaysiaMotorcycle safety in malaysia
Motorcycle safety in malaysia
Abdikarim Omar
 
Safety as a value
Safety as a valueSafety as a value
Safety as a value
guestbbec14
 
OSHA Compliance
OSHA ComplianceOSHA Compliance
OSHA Compliance
adamwarne
 
Module 2 Legislation of OSH in Malaysia
Module 2 Legislation of OSH in MalaysiaModule 2 Legislation of OSH in Malaysia
Module 2 Legislation of OSH in Malaysia
Norrazman Zaiha Zainol
 
Safe injection practice
Safe injection practiceSafe injection practice
Safe injection practice
Sandy McLellan
 
Good Manufacturing Practices
Good Manufacturing PracticesGood Manufacturing Practices
Good Manufacturing Practices
Jorge Torres
 
LinkedIn SlideShare: Knowledge, Well-Presented
LinkedIn SlideShare: Knowledge, Well-PresentedLinkedIn SlideShare: Knowledge, Well-Presented
LinkedIn SlideShare: Knowledge, Well-Presented
SlideShare
 

Viewers also liked (7)

Motorcycle safety in malaysia
Motorcycle safety in malaysiaMotorcycle safety in malaysia
Motorcycle safety in malaysia
 
Safety as a value
Safety as a valueSafety as a value
Safety as a value
 
OSHA Compliance
OSHA ComplianceOSHA Compliance
OSHA Compliance
 
Module 2 Legislation of OSH in Malaysia
Module 2 Legislation of OSH in MalaysiaModule 2 Legislation of OSH in Malaysia
Module 2 Legislation of OSH in Malaysia
 
Safe injection practice
Safe injection practiceSafe injection practice
Safe injection practice
 
Good Manufacturing Practices
Good Manufacturing PracticesGood Manufacturing Practices
Good Manufacturing Practices
 
LinkedIn SlideShare: Knowledge, Well-Presented
LinkedIn SlideShare: Knowledge, Well-PresentedLinkedIn SlideShare: Knowledge, Well-Presented
LinkedIn SlideShare: Knowledge, Well-Presented
 

Similar to PACE-IT: Introduction to Safety Practices (part 1)

Pace it environmental-impact_and_control_sw_nm
Pace it environmental-impact_and_control_sw_nmPace it environmental-impact_and_control_sw_nm
Pace it environmental-impact_and_control_sw_nm
Edward Sargent
 
REMINDING SAFETY
REMINDING SAFETYREMINDING SAFETY
REMINDING SAFETY
YAWAR H.KHAN
 
Safety issues with ict
Safety issues with ictSafety issues with ict
Safety issues with ict
computers 11
 
Safety issues with ICT
Safety issues with ICTSafety issues with ICT
Safety issues with ICT
computers 11
 
Construction safety session 1 (new)
Construction safety session 1 (new)Construction safety session 1 (new)
Construction safety session 1 (new)
VancityInstitute
 
ECCU_211_MANUAL_T_16 inglés técnico (1).pdf
ECCU_211_MANUAL_T_16  inglés técnico (1).pdfECCU_211_MANUAL_T_16  inglés técnico (1).pdf
ECCU_211_MANUAL_T_16 inglés técnico (1).pdf
ElvisEnriqueLlanqueP
 
Diagnosing a problem 18b modified
Diagnosing a problem  18b modifiedDiagnosing a problem  18b modified
Diagnosing a problem 18b modified
ironblacklion
 
How to control electrical safety risk
How to control electrical safety riskHow to control electrical safety risk
How to control electrical safety risk
Verde Ventures Pvt. Ltd.
 
ITE_50_Chapter2.ppt
ITE_50_Chapter2.pptITE_50_Chapter2.ppt
ITE_50_Chapter2.ppt
Rossy719186
 
Pace IT - Thermal and Impact Printers
Pace IT - Thermal and Impact PrintersPace IT - Thermal and Impact Printers
Pace IT - Thermal and Impact Printers
Pace IT at Edmonds Community College
 
Finaltechwrit&CADproj
Finaltechwrit&CADprojFinaltechwrit&CADproj
Finaltechwrit&CADproj
Andrew Obenshain
 
Key Elements of Australian Wiring Standards
Key Elements of Australian Wiring StandardsKey Elements of Australian Wiring Standards
Key Elements of Australian Wiring Standards
Living Online
 
Knowledge Based System (Expert System) : Equipment Safety Control & Management
Knowledge Based System (Expert System) : Equipment Safety Control & ManagementKnowledge Based System (Expert System) : Equipment Safety Control & Management
Knowledge Based System (Expert System) : Equipment Safety Control & Management
Amr El-Ganainy
 
Stay Safety Savvy in the Power Industry
Stay Safety Savvy in the Power IndustryStay Safety Savvy in the Power Industry
Stay Safety Savvy in the Power Industry
NES Global Talent
 
Css 2 ndsem_q3_usedofhandtools 2222
Css 2 ndsem_q3_usedofhandtools 2222Css 2 ndsem_q3_usedofhandtools 2222
Css 2 ndsem_q3_usedofhandtools 2222
Brian Magan
 
PACE-IT: Network Monitoring (part 2) - N10 006
PACE-IT: Network Monitoring (part 2) - N10 006 PACE-IT: Network Monitoring (part 2) - N10 006
PACE-IT: Network Monitoring (part 2) - N10 006
Pace IT at Edmonds Community College
 
CSS 10 WEEK 1.pptx
CSS 10 WEEK 1.pptxCSS 10 WEEK 1.pptx
CSS 10 WEEK 1.pptx
ANNIEROSEDULANG1
 
Construction Safety Protocol PPT by Rajesh Prasad, ED RVNL at Lucknow on 26.0...
Construction Safety Protocol PPT by Rajesh Prasad, ED RVNL at Lucknow on 26.0...Construction Safety Protocol PPT by Rajesh Prasad, ED RVNL at Lucknow on 26.0...
Construction Safety Protocol PPT by Rajesh Prasad, ED RVNL at Lucknow on 26.0...
Rajesh Prasad
 
High Voltage Electrical Compliance and Safety Operating Procedures
High Voltage Electrical Compliance and Safety Operating ProceduresHigh Voltage Electrical Compliance and Safety Operating Procedures
High Voltage Electrical Compliance and Safety Operating Procedures
Living Online
 
Driving Electrical Safety in Your Plant
Driving Electrical Safety in Your Plant Driving Electrical Safety in Your Plant
Driving Electrical Safety in Your Plant
PlantEngineering
 

Similar to PACE-IT: Introduction to Safety Practices (part 1) (20)

Pace it environmental-impact_and_control_sw_nm
Pace it environmental-impact_and_control_sw_nmPace it environmental-impact_and_control_sw_nm
Pace it environmental-impact_and_control_sw_nm
 
REMINDING SAFETY
REMINDING SAFETYREMINDING SAFETY
REMINDING SAFETY
 
Safety issues with ict
Safety issues with ictSafety issues with ict
Safety issues with ict
 
Safety issues with ICT
Safety issues with ICTSafety issues with ICT
Safety issues with ICT
 
Construction safety session 1 (new)
Construction safety session 1 (new)Construction safety session 1 (new)
Construction safety session 1 (new)
 
ECCU_211_MANUAL_T_16 inglés técnico (1).pdf
ECCU_211_MANUAL_T_16  inglés técnico (1).pdfECCU_211_MANUAL_T_16  inglés técnico (1).pdf
ECCU_211_MANUAL_T_16 inglés técnico (1).pdf
 
Diagnosing a problem 18b modified
Diagnosing a problem  18b modifiedDiagnosing a problem  18b modified
Diagnosing a problem 18b modified
 
How to control electrical safety risk
How to control electrical safety riskHow to control electrical safety risk
How to control electrical safety risk
 
ITE_50_Chapter2.ppt
ITE_50_Chapter2.pptITE_50_Chapter2.ppt
ITE_50_Chapter2.ppt
 
Pace IT - Thermal and Impact Printers
Pace IT - Thermal and Impact PrintersPace IT - Thermal and Impact Printers
Pace IT - Thermal and Impact Printers
 
Finaltechwrit&CADproj
Finaltechwrit&CADprojFinaltechwrit&CADproj
Finaltechwrit&CADproj
 
Key Elements of Australian Wiring Standards
Key Elements of Australian Wiring StandardsKey Elements of Australian Wiring Standards
Key Elements of Australian Wiring Standards
 
Knowledge Based System (Expert System) : Equipment Safety Control & Management
Knowledge Based System (Expert System) : Equipment Safety Control & ManagementKnowledge Based System (Expert System) : Equipment Safety Control & Management
Knowledge Based System (Expert System) : Equipment Safety Control & Management
 
Stay Safety Savvy in the Power Industry
Stay Safety Savvy in the Power IndustryStay Safety Savvy in the Power Industry
Stay Safety Savvy in the Power Industry
 
Css 2 ndsem_q3_usedofhandtools 2222
Css 2 ndsem_q3_usedofhandtools 2222Css 2 ndsem_q3_usedofhandtools 2222
Css 2 ndsem_q3_usedofhandtools 2222
 
PACE-IT: Network Monitoring (part 2) - N10 006
PACE-IT: Network Monitoring (part 2) - N10 006 PACE-IT: Network Monitoring (part 2) - N10 006
PACE-IT: Network Monitoring (part 2) - N10 006
 
CSS 10 WEEK 1.pptx
CSS 10 WEEK 1.pptxCSS 10 WEEK 1.pptx
CSS 10 WEEK 1.pptx
 
Construction Safety Protocol PPT by Rajesh Prasad, ED RVNL at Lucknow on 26.0...
Construction Safety Protocol PPT by Rajesh Prasad, ED RVNL at Lucknow on 26.0...Construction Safety Protocol PPT by Rajesh Prasad, ED RVNL at Lucknow on 26.0...
Construction Safety Protocol PPT by Rajesh Prasad, ED RVNL at Lucknow on 26.0...
 
High Voltage Electrical Compliance and Safety Operating Procedures
High Voltage Electrical Compliance and Safety Operating ProceduresHigh Voltage Electrical Compliance and Safety Operating Procedures
High Voltage Electrical Compliance and Safety Operating Procedures
 
Driving Electrical Safety in Your Plant
Driving Electrical Safety in Your Plant Driving Electrical Safety in Your Plant
Driving Electrical Safety in Your Plant
 

More from Pace IT at Edmonds Community College

PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
Pace IT at Edmonds Community College
 
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
Pace IT at Edmonds Community College
 
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
Pace IT at Edmonds Community College
 
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
Pace IT at Edmonds Community College
 
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
Pace IT at Edmonds Community College
 
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
Pace IT at Edmonds Community College
 
PACE-IT, Security + 5.3: Security Controls for Account Management
PACE-IT, Security + 5.3: Security Controls for Account ManagementPACE-IT, Security + 5.3: Security Controls for Account Management
PACE-IT, Security + 5.3: Security Controls for Account Management
Pace IT at Edmonds Community College
 
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
Pace IT at Edmonds Community College
 
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
Pace IT at Edmonds Community College
 
PACE-IT, Security + 5.1: Summary of Authentication Services
PACE-IT, Security + 5.1: Summary of Authentication ServicesPACE-IT, Security + 5.1: Summary of Authentication Services
PACE-IT, Security + 5.1: Summary of Authentication Services
Pace IT at Edmonds Community College
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
Pace IT at Edmonds Community College
 
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and TechniquesPACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
Pace IT at Edmonds Community College
 
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative EnvironmentsPACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
Pace IT at Edmonds Community College
 
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
PACE-IT, Security+ 4.4: Controls to Ensure Data SecurityPACE-IT, Security+ 4.4: Controls to Ensure Data Security
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
Pace IT at Edmonds Community College
 
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
PACE-IT, Security+ 4.3: Solutions to Establish Host SecurityPACE-IT, Security+ 4.3: Solutions to Establish Host Security
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
Pace IT at Edmonds Community College
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
Pace IT at Edmonds Community College
 
PACE-IT, Security+3.7: Overview of Security Assessment Tools
PACE-IT, Security+3.7: Overview of Security Assessment ToolsPACE-IT, Security+3.7: Overview of Security Assessment Tools
PACE-IT, Security+3.7: Overview of Security Assessment Tools
Pace IT at Edmonds Community College
 
PACE-IT, Security+3.6: Security Enhancement Techniques
PACE-IT, Security+3.6: Security Enhancement TechniquesPACE-IT, Security+3.6: Security Enhancement Techniques
PACE-IT, Security+3.6: Security Enhancement Techniques
Pace IT at Edmonds Community College
 
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PACE-IT, Security+3.5: Types of Application Attacks (part 2)PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
Pace IT at Edmonds Community College
 
PACE-IT, Security+3.5: Types of Application Attacks (part 1)
PACE-IT, Security+3.5: Types of Application Attacks (part 1)PACE-IT, Security+3.5: Types of Application Attacks (part 1)
PACE-IT, Security+3.5: Types of Application Attacks (part 1)
Pace IT at Edmonds Community College
 

More from Pace IT at Edmonds Community College (20)

PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
 
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
 
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
 
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
 
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
 
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
 
PACE-IT, Security + 5.3: Security Controls for Account Management
PACE-IT, Security + 5.3: Security Controls for Account ManagementPACE-IT, Security + 5.3: Security Controls for Account Management
PACE-IT, Security + 5.3: Security Controls for Account Management
 
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
 
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
 
PACE-IT, Security + 5.1: Summary of Authentication Services
PACE-IT, Security + 5.1: Summary of Authentication ServicesPACE-IT, Security + 5.1: Summary of Authentication Services
PACE-IT, Security + 5.1: Summary of Authentication Services
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
 
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and TechniquesPACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
 
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative EnvironmentsPACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
 
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
PACE-IT, Security+ 4.4: Controls to Ensure Data SecurityPACE-IT, Security+ 4.4: Controls to Ensure Data Security
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
 
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
PACE-IT, Security+ 4.3: Solutions to Establish Host SecurityPACE-IT, Security+ 4.3: Solutions to Establish Host Security
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
 
PACE-IT, Security+3.7: Overview of Security Assessment Tools
PACE-IT, Security+3.7: Overview of Security Assessment ToolsPACE-IT, Security+3.7: Overview of Security Assessment Tools
PACE-IT, Security+3.7: Overview of Security Assessment Tools
 
PACE-IT, Security+3.6: Security Enhancement Techniques
PACE-IT, Security+3.6: Security Enhancement TechniquesPACE-IT, Security+3.6: Security Enhancement Techniques
PACE-IT, Security+3.6: Security Enhancement Techniques
 
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PACE-IT, Security+3.5: Types of Application Attacks (part 2)PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
 
PACE-IT, Security+3.5: Types of Application Attacks (part 1)
PACE-IT, Security+3.5: Types of Application Attacks (part 1)PACE-IT, Security+3.5: Types of Application Attacks (part 1)
PACE-IT, Security+3.5: Types of Application Attacks (part 1)
 

Recently uploaded

MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
Colégio Santa Teresinha
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
mulvey2
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
Celine George
 
Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
paigestewart1632
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience
Wahiba Chair Training & Consulting
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
Celine George
 
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
สมใจ จันสุกสี
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
Dr. Mulla Adam Ali
 
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptxChapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Denish Jangid
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
heathfieldcps1
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
National Information Standards Organization (NISO)
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
RAHUL
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
Celine George
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
GeorgeMilliken2
 

Recently uploaded (20)

MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
 
Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
 
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
 
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptxChapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptx
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
 

PACE-IT: Introduction to Safety Practices (part 1)

  • 2. Page 2 Instructor, PACE-IT Program – Edmonds Community College Areas of Expertise Industry Certifications  PC Hardware  Network Administration  IT Project Management  Network Design  User Training  IT Troubleshooting Qualifications Summary Education  M.B.A., IT Management, Western Governor’s University  B.S., IT Security, Western Governor’s University Entrepreneur, executive leader, and proven manger with 10+ years of experience turning complex issues into efficient and effective solutions. Strengths include developing and mentoring diverse workforces, improving processes, analyzing business needs and creating the solutions required— with a focus on technology.
  • 3. Page 3 – Electrical safety. – Installation safety. PACE-IT.
  • 4. Page 4 Introduction to safety practices I.
  • 5. Page 5 – Electrical grounding. » Electrical grounding is used to protect technicians in the case of electrical insulation failure. • Provides an alternate path for the electricity; this is often referred to as a return to earth. » All electrical systems should be connected to properly grounded circuits. • This helps to protect technicians and equipment. – ESD (electrostatic discharge). » ESD is caused when two electrically charged objects that have different amounts of electrical charge come into contact, creating a flow of energy between the objects as they normalize the levels. • ESD can damage sensitive components, particularly the CPU and/or RAM. » Using an ESD mat helps to reduce the chances of ESD. » Using an ESD strap will also reduce the chances for ESD. • The strap goes around the wrist and then is clipped to a ground source (usually to an exposed metal surface inside of the case). Introduction to safety practices I.
  • 6. Page 6 – Practice self grounding. » Self grounding is a normalization technique used to equalize the amount of electrical charge between the worker and the equipment being worked on. • After the case has been opened and the ESD strap is attached to a ground source, touch an exposed metal surface inside of the case (before actually touching any of the components). – Additional equipment grounding. » In some cases, actually attaching a ground strap from the piece of equipment to a ground source is advised. – Electrical fire safety. » In case of fire: • Unplug the power source or turn off the circuit breaker. • Use a class C or multiclass fire extinguisher. • Never use water. Introduction to safety practices I.
  • 7. Page 7 – Fire suppression systems. » Building codes often call for the installation of fire suppression systems. There are several different types of common systems. » Wet pipe: the pipes are pressurized and contain water. » Dry pipe: the pipes are not pressurized; the water is contained in a holding tank. » Pre-action: similar to a dry pipe system, but the sprinkler head contains a thermal-fusible link that must melt before the water is released. » Deluge: designed to release a large amount of water in a short amount of time into a predefined space. • Least desirable option for electrical components. » Halon: a non-conducting—does not carry an electrical charge—volatile gaseous chemical. • Works by chemically disrupting combustion. • Does not leave a residue upon evaporation; unlike water, halon will not ruin electrical components. • Safe for exposure to humans—in limited amounts for a limited amount of time. • Environmentally safe; also known as a clean agent. Introduction to safety practices I.
  • 8. Page 8 Introduction to safety practices I.
  • 9. Page 9 – Use proper lifting techniques. » Bend at the knees, not the waist. » Keep the head up. » Avoid twisting when carrying items. » If the item is heavy or awkward, request help in lifting it. • Most companies establish weight limitations. – Rack installation. » Racks are used to help create a clean organized environment. • Especially when used with proper cable management techniques. » Racks are designed to provide sufficient airflow for the electrical components that are placed in them. » When assembling and installing racks, always follow the manufacturer’s instructions. • Always use the proper tools to prevent damaging the racks or the fasteners that hold them together. » Many servers and networking components come rack ready— specifically designed to be placed in a rack. Introduction to safety practices I.
  • 10. Page 10 – Rack placement. » When designing a room that is going to hold multiple racks of computing systems (e.g., servers and networking gear) some thought needs to go into the placement of those racks. » HVAC and rack placement should be done concurrently. • HVAC systems should be designed to control both heat and humidity levels. » Creating a hot aisle/cold aisle design is recommended. » The hot aisle is the side or aisle that receives the exhaust airflow from the computing equipment. • The aisle should face an HVAC air intake. » The cold aisle is the side or aisle that the air intakes of the computing equipment face. • The aisle should face an HVAC air vent. » Whenever possible, a server room should be designed with a raised floor to help protect against water damage. • The raised floor, like a drop ceiling, can also be utilized as part of the cable management system. Introduction to safety practices I.
  • 11. Page 11 – Tool safety. » Always use the proper tool for the job; that is what it was designed for. » Do not use a pencil as a probe; it is possible for the pencil to conduct electricity, leading to an ESD situation or shock hazard. » Do not use magnetized tools when working on electrical components—as the magnetic charge can be harmful to magnetically kept data. » When using compressed air to blow out debris, maintain a minimum distance of four inches from the nozzle to the component. » Use isopropyl alcohol to clean contacts. • Rubbing alcohol contains a higher water content— approximately 30 percent. » Never use a standard vacuum cleaner when vacuuming electrical components is necessary. • Due to the design of standard vacuums, electrostatic discharges are a common occurrence. • There are specially designed vacuums that can be used. Introduction to safety practices I.
  • 12. Page 12 Introduction to safety practices I. Electrical safety is something that needs to be considered. Grounding provides some protection. ESD is a hazard to electrical components. When facing an electrical fire, use a class C or multiclass fire extinguisher. A Halon fire suppression system is the best option for protecting electronic components. Topic Electrical safety. Summary Use the proper lifting techniques. Place components in properly designed racks. A hot aisle/cold aisle design should be used when multiple racks are located in the same area. When possible, design server rooms with raised floors. Use the proper tools for the job at hand to increase safety and reduce risk to components. Installation safety.
  • 14. This workforce solution was 100 percent funded by a $3 million grant awarded by the U.S. Department of Labor's Employment and Training Administration. The solution was created by the grantee and does not necessarily reflect the official position of the U.S. Department of Labor. The Department of Labor makes no guarantees, warranties, or assurances of any kind, express or implied, with respect to such information, including any information on linked sites and including, but not limited to, accuracy of the information or its completeness, timeliness, usefulness, adequacy, continued availability or ownership. Funded by the Department of Labor, Employment and Training Administration, Grant #TC-23745-12-60-A-53. PACE-IT is an equal opportunity employer/program and auxiliary aids and services are available upon request to individuals with disabilities. For those that are hearing impaired, a video phone is available at the Services for Students with Disabilities (SSD) office in Mountlake Terrace Hall 159. Check www.edcc.edu/ssd for office hours. Call 425.354.3113 on a video phone for more information about the PACE-IT program. For any additional special accommodations needed, call the SSD office at 425.640.1814. Edmonds Community College does not discriminate on the basis of race; color; religion; national origin; sex; disability; sexual orientation; age; citizenship, marital, or veteran status; or genetic information in its programs and activities.