Presentation is loading. Please wait.

Presentation is loading. Please wait.

© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 2: Introduction to Lab Procedures and Tool Use IT Essentials.

Similar presentations


Presentation on theme: "© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 2: Introduction to Lab Procedures and Tool Use IT Essentials."— Presentation transcript:

1 © 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 2: Introduction to Lab Procedures and Tool Use IT Essentials v6.0

2 Presentation_ID 2 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Safe Lab Procedures Procedures to Protect People  General Safety Make sure a first-aid kit is available. Unsecured cables create tripping hazards. Food and drinks should not be in the workspace. Remove jewelry.  Electrical Safety Computer power supplies are dangerous when disassembled. Watch for printer areas that are hot or that use high voltage. Check the voltage output of AC adapters and chargers before connecting them to devices.

3 Presentation_ID 3 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Safe Lab Procedures Procedures to Protect People Fire Safety Turn off the power and unplug equipment before performing service. Different types of fires require different types of fire extinguishers; make sure to use to correct one. Be alert for odors emitting from computers and electronic devices. It is important to know how to use a fire extinguisher. Use the memory aid P-A-S-S to help you remember the basic rules of fire extinguisher operation: P - Pull the pin. A - Aim at the base of the fire, not at the flames. S -Squeeze the lever. S -Sweep the nozzle from side to side.

4 Presentation_ID 4 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Safe Lab Procedures Procedures to Protect Equipment and Data  ESD and EMI ESD can cause damage to computer equipment if not discharged properly. Wrist straps equalize the electrical charge between a person and the equipment. ESD can build up on you as you walk on a carpeted floor. EMI distorts the signals, degrading computer communication. EMI can be generated by large motors, power lines, electrical storms, or any other source of electromagnetic energy. Wireless networks are affected by RFI. RFI is caused by radio transmitters transmitting in the same frequency. EMI is recoverable, ESD is not. Do NOT wear a wrist strap when working on CRTs or power supplies.  Environmental temperature and humidity levels also affect computers.

5 Presentation_ID 5 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Safe Lab Procedures Procedures to Protect Equipment and Data (cont.)  Power Fluctuation Types Power fluctuations may impact the operation of computer components. Blackouts, brownouts, noise, spike and power surge are types of power fluctuations that can cause data loss or hardware failure.  Power Protection Devices Surge suppressors, UPSs, and SPSs are devices designed to protect computer systems from power fluctuations by providing a constant level of voltage.Surge suppressors UPSs helps protect against potential electrical power problems by supplying electrical power to a computer or other device for a length dependent upon the battery. SPSs helps protect against potential electrical power problems by providing a backup battery to supply power when the incoming voltage drops below the normal level. It does not provide constant power, like the UPS. An SPS is not as effective as a UPS because the SPS must detect a power-out condition first and then switch over to the battery to supply power to the computer. Laser printers should not be plugged to UPSs.

6 Presentation_ID 6 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Safe Lab Procedures Procedures to Protect the Environment  Safety Data Sheet Use an SDS to obtain information about a material, including procedures for proper disposal. The SDS contains information on the material’s composition, how it can affect personal health, fire hazards, and first-aid requirements. It also includes protective measures for the safe handling and storage of materials and spill, leak, and disposal procedures.  Equipment Disposal Computer equipment contains hazardous materials and should be properly disposed. Follow regulations to protect the environment and avoid fines. Batteries, monitors, toner kits, cartridges, developers, chemical solvents and aerosol cans are examples of equipment that must be properly disposed. Older CTRs often retain residual electricity due to capacitors inside.

7 Presentation_ID 7 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Proper Use of Tools Hardware Tools Hardware tools are grouped into:  ESD Tools antistatic wrist strap and antistatic mat  Hand Tools include screwdrivers, flashlights, pliers, magnifying glass  Cable Tools include wire cutters and strippers, crimpers and punch down tool, cable tester, tone probe  Cleaning Tools Include special cloths, isopropyl alcohol, canned air, and cable ties  Diagnostic Tools Include digital multimeters, power supply testers, WiFi analyzer, external HDD enclosuremultimeters

8 Presentation_ID 8 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Let’s see what you have learned... Q:Do not wear an ESD wrist strap when working on _____ or _____ _____. A:monitors, power supplies Q:Which is recoverable, ESD or EMI? A:EMI Q:What is a reduced voltage level of AC power that lasts for a period of time? A:brownout Q:Where would you find ways to effectively dispose of hazardous materials? A:on the MSDS effectively dispose of them

9 Presentation_ID 9 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Proper Use of Tools Software Tools  Like hardware tools, software tools are task- specific.  Programs are used to diagnose problems, maintain hardware, and protect the data stored on a computer. Check Now, System File Checker, Defrag, Disk Cleanup  Disk Management Tools used for disk management, formatting, error checking, drive optimization, disk cleanup and more  Protection Software Tools Malicious software can damage or compromise operating systems, applications, and data. Software protection tools include antivirus, antispyware, firewalls and update manager software.

10 Presentation_ID 10 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Proper Use of Tools Organizational Tools It is important that a technician document all services and repairs for future reference.  Personal Reference Tools include troubleshooting guides, manufacturer manuals, quick reference guides, and repair journals History of repairs and a notepad can be extremely useful as a technician performs troubleshooting and repairs. The Internet can be a great reference tool by providing access to specialized forums, search engines, manufacturer’s FAQs, and more.  Miscellaneous Tools Additional secondary items can be added to the toolkit. Electrical tape, a working computer and even pencil eraser can be very useful additions to a technician’s kit.

11 Presentation_ID 11 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Let’s see what you have learned... Q:What software utility is used to optimize space on a hard drive? A:defrag Q:What command-line utility scans the operating system critical files and replaces any files that are corrupted? A:system file checker Q:What system utility is used to manage hard drives and partitions? A:disk management Q:What system utility is used to clear space on a hard drive by searching for files that can be safely deleted? A:disk cleanup

12 Presentation_ID 12 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential  This chapter discussed safe lab procedures, correct tool usage, and the proper disposal of computer components and supplies.  Work in a safe manner to protect users and equipment.  Follow all safety guidelines to prevent injuries to yourself and others.  Know how to protect equipment from ESD damage.  Know about and be able to prevent power issues that can cause equipment damage or data loss.  Know which products and supplies require special disposal procedures.  Familiarize yourself with the SDS for safety issues and disposal restrictions to help protect the environment.  Be able to use the correct tools for the task.  Know how to clean components safely.  Use organizational tools during computer repairs. Chapter Summary Summary

13 Presentation_ID 13 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Assignments  Carefully read Chapter 2 completing any interactive activities included and watching any embedded videos.  Complete Lab 2.2.2.3 - Diagnostic Software  Complete Lab 2.2.4.4 - Using a Multimeter and a Power Supply Tester  Go to http://www.professormesser.com/free-a-plus-training/220- 801/motherboard-expansion-slots-and-bus-speeds/. Watch the video about motherboard expansion slots and bus speeds. Write up a summary that includes your name, the name of the video (“Motherboard Expansion Slots and Bus Speeds”), and a five- to six- sentence paragraph summarizing the video. Save as Professor Messer Video No. 2.http://www.professormesser.com/free-a-plus-training/220- 801/motherboard-expansion-slots-and-bus-speeds/

14 Presentation_ID 14 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential


Download ppt "© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 2: Introduction to Lab Procedures and Tool Use IT Essentials."

Similar presentations


Ads by Google