SlideShare une entreprise Scribd logo
1  sur  17
IT Essentials PC Hardware
  and Software 4.1

  Instructional Resource
  Chapter 2: Safe Lab
  Procedures and Tool Use




Presentation_ID               © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   1
Chapter 2: Objectives
            Explain the purpose of safe working conditions and procedures.
            Identify tools and software used with personal computer components and their
             purposes.
            Implement proper tool use.




Presentation_ID                                     © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   2
Chapter 2: Critical Concepts
            What is this chapter about and why is it important?
            This chapter discusses safe lab procedures, tool use for computer maintenance, and
             proper disposal of hazardous materials. It provides an overview of safe working
             conditions in the lab and in other environments. Basic electrical, fire, and chemical
             safety guidelines are covered, as well as other potential workplace hazards. Much of
             the chapter is devoted to identification and proper usage of hand tools and software
             tools. It also discusses the importance of organization of tools, and cleaning
             procedures for all computer components.
            IT technicians have cut, burned, and even electrocuted themselves while working on
             computers. IT technicians have short-circuited working components, thus rendering
             the components unusable. This chapter is important because it explains the good
             work habits that all technicians must develop in order to avoid injury to themselves
             or others, and to avoid damaging or destroying equipment, or losing data.




Presentation_ID                                      © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   3
Chapter 2: Activities
            What activities are associated with this chapter
                  2.2.2: Worksheet: Diagnostic Software
                  2.3.4: Lab: Computer Disassembly
                  Chapter 2 Quiz




Presentation_ID                                       © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   4
Chapter 2: New Terms
            What terms are introduced in this chapter?

                  antistatic mat                                                       2.2.1

                  antistatic wrist strap                                               2.2.1

                  anti-virus application                                               2.2.2

                  blackout                                                             2.1.2

                  brownout                                                             2.1.2

                  cable tie                                                            2.2.1

                  CHKDSK                                                               2.2.2

                  compressed air                                                       2.2.1

                  conduit                                                              2.1.1

                  defrag                                                               2.2.2




Presentation_ID                                     © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   5
Chapter 2: New Terms
            What terms are introduced in this chapter?

                  digital multimeter                                                      2.2.1

                  disk cleanup                                                            2.2.2

                  disk management                                                         2.2.2

                  Electromagnetic Interference (EMI)                                      2.1.2

                  Electrostatic Discharge (ESD)                                           2.1.2

                  FDISK                                                                   2.2.2

                  flat-head screwdriver                                                   2.2.1

                  format                                                                  2.2.2

                  hex driver                                                              2.2.1

                  loopback plug                                                           2.2.1




Presentation_ID                                        © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   6
Chapter 2: New Terms
            What terms are introduced in this chapter?

                  Material Safety and Data Sheet (MSDS)                                      2.1.3

                  needle-nose pliers                                                         2.2.1

                  disk cleanup                                                               2.2.2

                  noise                                                                      2.1.2

                  Phillips-head screwdriver                                                  2.2.1

                  Radio Frequency Interference (RFI)                                         2.1.2

                  SCANDISK                                                                   2.2.2

                  spike                                                                      2.1.2

                  spyware                                                                    2.2.2

                  Standby Power Supply (SPS)                                                 2.1.2




Presentation_ID                                           © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   7
Chapter 2: New Terms
            What terms are introduced in this chapter?

                  surge                                                                2.1.2

                  surge suppressor                                                     2.1.2

                  torx screwdriver                                                     2.2.1

                  tweezers                                                             2.2.1

                  wire cutters                                                         2.2.1




Presentation_ID                                     © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   8
Chapter 2: Changes
            What has changed from the previous version (4.0) of ITEPC?
                  Page 2.1.1 Identify safety procedures and potential hazards for users and
                   technicians
                       •Electrical safety
                       •Cable management
                       •Avoiding trip hazards


                  Page 2.1.2 Identify safety procedures to protect equipment from damage and
                   data from loss
                       •EMI
                       •Network interference
                       •Magnets
                       •RFI
                       •Cordless phone interference
                       •Microwaves

Presentation_ID                                        © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   9
Chapter 2: Classroom Management
                   The instructor should ensure this chapter becomes as hand-on as possible.
                   Have different tools available. Hold up each tool and ask students what they
                    think a technician might use the tool for.
                   If enough tools are available, divide students into teams and have them
                    document the purpose of each tool in computer support. Have a computer
                    available so they can look inside to see the possibilities. Have two groups
                    share results with one another.
                   If Internet access is available, have students select suitable power protection for
                    the computers in the classroom based on different scenarios. If Internet access
                    is not available, have various vendors’ technical power protection documents
                    and have the students choose from them.
                   Keep the power and safety discussions relevant. Explain a section and then
                    have the students apply the information. An example might be to present
                    examples of relevant local or world weather events and the effects the
                    conditions might have on power and safety.
                   Have the students research the city or state rules for CRT disposal. Have them
                    brainstorm alternatives to disposal. If this is not feasible, bring the rules into
                    class as a handout.




Presentation_ID                                          © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   10
Chapter 2: Classroom Management
           (continued)
                   Download, print out, or have available MSDS data. Search the Internet with the
                    following key terms: laser printer msds.
                   Have the students determine the best place to keep MSDS information sheets
                    in the school, who might need this information, and how to get this information
                    to those who might need it.
                   Disassemble a computer in teams.
                   Have students rotate with each step so everyone gets hands-on time.
                   Lead the students through the disassembly process. For example, the first step
                    in the lab is to turn off the computer and disconnect power. It is very important
                    for the students to verify that the computer works BEFORE disassembly. Then,
                    have all the students power down and remove the power cord. No team can
                    progress until all power cords have been removed. Then, move on to step 2. In
                    this manner, the teacher can address issues or reinforce the lecture, and
                    everyone is on the same step and concept.




Presentation_ID                                         © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   11
Chapter 2: Teaching Analogies
            How often do you disassemble your car? When learning about cars, an automobile
             technician disassembles a car in sections to learn about how each particular
             section works. A student can learn about computer components by disassembling
             a computer in the same way.
            How important is doing a tune-up to a car? How important is it to have your teeth
             cleaned? Preventive maintenance is important to a computer in the same way.




Presentation_ID                                     © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   12
Chapter 2: Suggested Class Discussions
                     Safety – Laser printers possess high voltage and can burn the technician,
                      and CRTs possess high voltage and can shock the technician.
                     ESD – An electrostatic discharge can damage a computer.
                     Tools – Discuss the proper tool usage, storage, what to take on a service call,
                      and what to have in the car.
                     Software tools – Ensure you have software tools appropriate for the operating
                      system.
                     Preventive maintenance – This extends the life of the computer. Ensure
                      appropriate cleaning supplies are used.
                     Organization – Ensure computer components are organized and easy to find
                      when reassembling the computer. Emphasize the importance of taking notes
                      and being organized during disassembly.
                     Question for the class – Have you ever taken something apart and when you
                      tried to put it back together, things didn’t go as planned? Explain what
                      happened. What do you wish you had done differently?
                     Internet Search – Have students conduct an Internet search on laser printer
                      safety and disposal procedures. Discuss how students would apply this
                      knowledge in the workplace.


Presentation_ID                                         © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   13
Chapter 2: Best Practices
                     Diagram and document the computer disassembly process.
                      • Some students take photos with their phones to help reassemble the
                          computer. Encouraging the use of technology will engage the students.
                      • A good teaching practice is to have each student document the computer
                          disassembly.
                     Organize parts during the computer disassembly process.
                      • Collect egg cartons for organizing screws that are removed during
                          disassembly.
                      • Collect antistatic bags from school technicians or outside computer repair
                          companies to store computer components.
                      • Do not allow students to stack computer components.
                     Because CPUs are very expensive and easy to damage, it is not
                      recommended to allow the students to remove the CPU during the computer
                      disassembly process. Obtain bad CPUs from outside computer repair
                      companies to use for class discussion and demonstration.




Presentation_ID                                        © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   14
Chapter 2: Outside Reading
                  International Telecommunication Union (ITU)
                   http://www.itu.int/ITU-T/




Presentation_ID                                       © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   15
Presentation_ID   © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   16
Presentation_ID   © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   17

Contenu connexe

Tendances

Introduction to components of computer system
Introduction to components of computer systemIntroduction to components of computer system
Introduction to components of computer systemPooja Sharma
 
Cmp104 lec 3 component of computer
Cmp104 lec 3 component of computerCmp104 lec 3 component of computer
Cmp104 lec 3 component of computerkapil078
 
Microsoft Windows Operating System.
Microsoft Windows Operating System.Microsoft Windows Operating System.
Microsoft Windows Operating System.Swathi Vishwa
 
Bios ( Basic Input Output System )
Bios ( Basic Input Output System )Bios ( Basic Input Output System )
Bios ( Basic Input Output System )Jesthine Nesshal
 
Windows Xp Optimization
Windows Xp OptimizationWindows Xp Optimization
Windows Xp OptimizationShan Sachwani
 
Discovering Computers: Chapter 05
Discovering Computers: Chapter 05Discovering Computers: Chapter 05
Discovering Computers: Chapter 05Anna Stirling
 
Batch file programming
Batch file programmingBatch file programming
Batch file programmingswapnil kapate
 
Mes 概論 第六周
Mes 概論 第六周Mes 概論 第六周
Mes 概論 第六周信宏 陳
 
Linux command ppt
Linux command pptLinux command ppt
Linux command pptkalyanineve
 
Introduction to Firmware
Introduction to FirmwareIntroduction to Firmware
Introduction to FirmwareCaroline Murphy
 
Computer peripheral or Peripheral Devices
Computer peripheral or Peripheral Devices Computer peripheral or Peripheral Devices
Computer peripheral or Peripheral Devices Adarsh Kumar Yadav
 
Command prompt presentation
Command prompt presentationCommand prompt presentation
Command prompt presentationMuhammad Taj
 
Presentation Introduction to Windows
Presentation  Introduction to  WindowsPresentation  Introduction to  Windows
Presentation Introduction to WindowsMJ Ferdous
 
HCI Information Processing.pdf
HCI Information Processing.pdfHCI Information Processing.pdf
HCI Information Processing.pdfXanGwaps
 
Introduction to keyboard
Introduction to keyboardIntroduction to keyboard
Introduction to keyboardSanjuktaSahoo5
 

Tendances (20)

Binary to Decimal Conversion
Binary to Decimal ConversionBinary to Decimal Conversion
Binary to Decimal Conversion
 
Introduction to components of computer system
Introduction to components of computer systemIntroduction to components of computer system
Introduction to components of computer system
 
Vi editor
Vi editorVi editor
Vi editor
 
Cmp104 lec 3 component of computer
Cmp104 lec 3 component of computerCmp104 lec 3 component of computer
Cmp104 lec 3 component of computer
 
Microsoft Windows Operating System.
Microsoft Windows Operating System.Microsoft Windows Operating System.
Microsoft Windows Operating System.
 
Bios ( Basic Input Output System )
Bios ( Basic Input Output System )Bios ( Basic Input Output System )
Bios ( Basic Input Output System )
 
Windows Xp Optimization
Windows Xp OptimizationWindows Xp Optimization
Windows Xp Optimization
 
Computer Basics
Computer BasicsComputer Basics
Computer Basics
 
Discovering Computers: Chapter 05
Discovering Computers: Chapter 05Discovering Computers: Chapter 05
Discovering Computers: Chapter 05
 
Utility Programs
Utility ProgramsUtility Programs
Utility Programs
 
Batch file programming
Batch file programmingBatch file programming
Batch file programming
 
Mes 概論 第六周
Mes 概論 第六周Mes 概論 第六周
Mes 概論 第六周
 
Linux command ppt
Linux command pptLinux command ppt
Linux command ppt
 
Introduction to Firmware
Introduction to FirmwareIntroduction to Firmware
Introduction to Firmware
 
Computer peripheral or Peripheral Devices
Computer peripheral or Peripheral Devices Computer peripheral or Peripheral Devices
Computer peripheral or Peripheral Devices
 
Command prompt presentation
Command prompt presentationCommand prompt presentation
Command prompt presentation
 
Presentation Introduction to Windows
Presentation  Introduction to  WindowsPresentation  Introduction to  Windows
Presentation Introduction to Windows
 
HCI Information Processing.pdf
HCI Information Processing.pdfHCI Information Processing.pdf
HCI Information Processing.pdf
 
Computer ports
Computer portsComputer ports
Computer ports
 
Introduction to keyboard
Introduction to keyboardIntroduction to keyboard
Introduction to keyboard
 

En vedette

CCNA Exploration 4 - Chapter 8
CCNA Exploration 4 - Chapter 8CCNA Exploration 4 - Chapter 8
CCNA Exploration 4 - Chapter 8Irsandi Hasan
 
CCNA Security 010-configuring cisco asa
CCNA Security 010-configuring cisco asaCCNA Security 010-configuring cisco asa
CCNA Security 010-configuring cisco asaAhmed Habib
 
CCNA Security 012- cryptographic systems
CCNA Security 012- cryptographic systemsCCNA Security 012- cryptographic systems
CCNA Security 012- cryptographic systemsAhmed Habib
 
CCNA Discovery 1 - Chapter 4
CCNA Discovery 1 - Chapter 4CCNA Discovery 1 - Chapter 4
CCNA Discovery 1 - Chapter 4Irsandi Hasan
 
CCNA Security - Chapter 6
CCNA Security - Chapter 6CCNA Security - Chapter 6
CCNA Security - Chapter 6Irsandi Hasan
 
CCNA Security - Chapter 4
CCNA Security - Chapter 4CCNA Security - Chapter 4
CCNA Security - Chapter 4Irsandi Hasan
 
CCNA Security - Chapter 7
CCNA Security - Chapter 7CCNA Security - Chapter 7
CCNA Security - Chapter 7Irsandi Hasan
 
CCNA Security - Chapter 8
CCNA Security - Chapter 8CCNA Security - Chapter 8
CCNA Security - Chapter 8Irsandi Hasan
 
CCNA Discovery 1 - Chapter 1
CCNA Discovery 1 - Chapter 1CCNA Discovery 1 - Chapter 1
CCNA Discovery 1 - Chapter 1Irsandi Hasan
 
CCNA Security - Chapter 5
CCNA Security - Chapter 5CCNA Security - Chapter 5
CCNA Security - Chapter 5Irsandi Hasan
 
CCNA Security - Chapter 9
CCNA Security - Chapter 9CCNA Security - Chapter 9
CCNA Security - Chapter 9Irsandi Hasan
 
CCNA Security - Chapter 3
CCNA Security - Chapter 3CCNA Security - Chapter 3
CCNA Security - Chapter 3Irsandi Hasan
 
CCNA Security 06- AAA
CCNA Security 06- AAACCNA Security 06- AAA
CCNA Security 06- AAAAhmed Habib
 
CCNA RS_ITN - Chapter 4
CCNA RS_ITN - Chapter 4CCNA RS_ITN - Chapter 4
CCNA RS_ITN - Chapter 4Irsandi Hasan
 
CCNA Security 09- ios firewall fundamentals
CCNA Security 09- ios firewall fundamentalsCCNA Security 09- ios firewall fundamentals
CCNA Security 09- ios firewall fundamentalsAhmed Habib
 
CCNA Security 011- implementing ios-based ips
CCNA Security 011- implementing ios-based ipsCCNA Security 011- implementing ios-based ips
CCNA Security 011- implementing ios-based ipsAhmed Habib
 
CCNA Exploration 4 - Chapter 7
CCNA Exploration 4 - Chapter 7CCNA Exploration 4 - Chapter 7
CCNA Exploration 4 - Chapter 7Irsandi Hasan
 

En vedette (20)

CCNA Exploration 4 - Chapter 8
CCNA Exploration 4 - Chapter 8CCNA Exploration 4 - Chapter 8
CCNA Exploration 4 - Chapter 8
 
CCNA Security 010-configuring cisco asa
CCNA Security 010-configuring cisco asaCCNA Security 010-configuring cisco asa
CCNA Security 010-configuring cisco asa
 
CCNA Security 012- cryptographic systems
CCNA Security 012- cryptographic systemsCCNA Security 012- cryptographic systems
CCNA Security 012- cryptographic systems
 
CCNA Discovery 1 - Chapter 4
CCNA Discovery 1 - Chapter 4CCNA Discovery 1 - Chapter 4
CCNA Discovery 1 - Chapter 4
 
CCNA Security - Chapter 6
CCNA Security - Chapter 6CCNA Security - Chapter 6
CCNA Security - Chapter 6
 
CCNA Security - Chapter 4
CCNA Security - Chapter 4CCNA Security - Chapter 4
CCNA Security - Chapter 4
 
OSPF v3
OSPF v3OSPF v3
OSPF v3
 
CCNA Security - Chapter 7
CCNA Security - Chapter 7CCNA Security - Chapter 7
CCNA Security - Chapter 7
 
CCNA Security - Chapter 8
CCNA Security - Chapter 8CCNA Security - Chapter 8
CCNA Security - Chapter 8
 
ITE - Chapter 9
ITE - Chapter 9ITE - Chapter 9
ITE - Chapter 9
 
CCNA Discovery 1 - Chapter 1
CCNA Discovery 1 - Chapter 1CCNA Discovery 1 - Chapter 1
CCNA Discovery 1 - Chapter 1
 
CCNA Security - Chapter 5
CCNA Security - Chapter 5CCNA Security - Chapter 5
CCNA Security - Chapter 5
 
CCNA Security - Chapter 9
CCNA Security - Chapter 9CCNA Security - Chapter 9
CCNA Security - Chapter 9
 
CCNA Security - Chapter 3
CCNA Security - Chapter 3CCNA Security - Chapter 3
CCNA Security - Chapter 3
 
CCNA Security 06- AAA
CCNA Security 06- AAACCNA Security 06- AAA
CCNA Security 06- AAA
 
CCNA RS_ITN - Chapter 4
CCNA RS_ITN - Chapter 4CCNA RS_ITN - Chapter 4
CCNA RS_ITN - Chapter 4
 
CCNA Security 09- ios firewall fundamentals
CCNA Security 09- ios firewall fundamentalsCCNA Security 09- ios firewall fundamentals
CCNA Security 09- ios firewall fundamentals
 
ITE - Chapter 7
ITE - Chapter 7ITE - Chapter 7
ITE - Chapter 7
 
CCNA Security 011- implementing ios-based ips
CCNA Security 011- implementing ios-based ipsCCNA Security 011- implementing ios-based ips
CCNA Security 011- implementing ios-based ips
 
CCNA Exploration 4 - Chapter 7
CCNA Exploration 4 - Chapter 7CCNA Exploration 4 - Chapter 7
CCNA Exploration 4 - Chapter 7
 

Similaire à ITE - Chapter 2

Distributed Generation In Spain
Distributed Generation In SpainDistributed Generation In Spain
Distributed Generation In Spaindavidtrebolle
 
Easy Learn to Verilog HDL
Easy Learn to Verilog HDLEasy Learn to Verilog HDL
Easy Learn to Verilog HDLkpyes34
 
A.vivotek ip surveillance_handbook
A.vivotek ip surveillance_handbookA.vivotek ip surveillance_handbook
A.vivotek ip surveillance_handbookTSOLUTIONS
 
Microstrip patch-antenna
Microstrip patch-antennaMicrostrip patch-antenna
Microstrip patch-antennaaquibjamal123
 
Barcode reference en
Barcode reference enBarcode reference en
Barcode reference enRoger R Pe M
 
Analog optical link
Analog optical linkAnalog optical link
Analog optical linkhamedmeshkin
 
Domain-Specific Program Checking
Domain-Specific Program CheckingDomain-Specific Program Checking
Domain-Specific Program CheckingLukas Renggli
 
บทที่ 2 Mobile Aplication
บทที่ 2 Mobile Aplicationบทที่ 2 Mobile Aplication
บทที่ 2 Mobile Aplicationrubtumproject.com
 
Gsm based campus display system project report
Gsm based campus display system project reportGsm based campus display system project report
Gsm based campus display system project reportKashyap Shah
 
USB Lock RP Operation Manual
USB Lock RP Operation ManualUSB Lock RP Operation Manual
USB Lock RP Operation ManualJavier Arrospide
 
การพัฒนาเกมคอมพิวเตอร์ 3 มิติ
การพัฒนาเกมคอมพิวเตอร์ 3 มิติการพัฒนาเกมคอมพิวเตอร์ 3 มิติ
การพัฒนาเกมคอมพิวเตอร์ 3 มิติoan508
 
Programming language design_concepts
Programming language design_conceptsProgramming language design_concepts
Programming language design_conceptsYuri Dantas
 

Similaire à ITE - Chapter 2 (20)

ITE - Chapter 6
ITE - Chapter 6ITE - Chapter 6
ITE - Chapter 6
 
Distributed Generation In Spain
Distributed Generation In SpainDistributed Generation In Spain
Distributed Generation In Spain
 
Easy Learn to Verilog HDL
Easy Learn to Verilog HDLEasy Learn to Verilog HDL
Easy Learn to Verilog HDL
 
2.1 system concept
2.1 system concept2.1 system concept
2.1 system concept
 
A.vivotek ip surveillance_handbook
A.vivotek ip surveillance_handbookA.vivotek ip surveillance_handbook
A.vivotek ip surveillance_handbook
 
Controlofmachines
Controlofmachines Controlofmachines
Controlofmachines
 
Control of machines
Control of machinesControl of machines
Control of machines
 
Microstrip patch-antenna
Microstrip patch-antennaMicrostrip patch-antenna
Microstrip patch-antenna
 
Zigbee 802.15.4
Zigbee 802.15.4Zigbee 802.15.4
Zigbee 802.15.4
 
Barcode reference en
Barcode reference enBarcode reference en
Barcode reference en
 
Analog optical link
Analog optical linkAnalog optical link
Analog optical link
 
Domain-Specific Program Checking
Domain-Specific Program CheckingDomain-Specific Program Checking
Domain-Specific Program Checking
 
บทที่ 2 Mobile Aplication
บทที่ 2 Mobile Aplicationบทที่ 2 Mobile Aplication
บทที่ 2 Mobile Aplication
 
Gsm based campus display system project report
Gsm based campus display system project reportGsm based campus display system project report
Gsm based campus display system project report
 
50267584 celldoctor
50267584 celldoctor50267584 celldoctor
50267584 celldoctor
 
USB Lock RP Operation Manual
USB Lock RP Operation ManualUSB Lock RP Operation Manual
USB Lock RP Operation Manual
 
Integratedbook
IntegratedbookIntegratedbook
Integratedbook
 
การพัฒนาเกมคอมพิวเตอร์ 3 มิติ
การพัฒนาเกมคอมพิวเตอร์ 3 มิติการพัฒนาเกมคอมพิวเตอร์ 3 มิติ
การพัฒนาเกมคอมพิวเตอร์ 3 มิติ
 
Programming language design_concepts
Programming language design_conceptsProgramming language design_concepts
Programming language design_concepts
 
Ch3
Ch3Ch3
Ch3
 

Plus de Irsandi Hasan

CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 08
CCNA v6.0 ITN - Chapter 08CCNA v6.0 ITN - Chapter 08
CCNA v6.0 ITN - Chapter 08Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 07CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 07Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 06
CCNA v6.0 ITN - Chapter 06CCNA v6.0 ITN - Chapter 06
CCNA v6.0 ITN - Chapter 06Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 04
CCNA v6.0 ITN - Chapter 04CCNA v6.0 ITN - Chapter 04
CCNA v6.0 ITN - Chapter 04Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01Irsandi Hasan
 
VMware vShield - Overview
VMware vShield - OverviewVMware vShield - Overview
VMware vShield - OverviewIrsandi Hasan
 
CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11Irsandi Hasan
 
CCNA RS_NB - Chapter 10
CCNA RS_NB - Chapter 10CCNA RS_NB - Chapter 10
CCNA RS_NB - Chapter 10Irsandi Hasan
 
CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 9CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 9Irsandi Hasan
 
CCNA RS_NB - Chapter 8
CCNA RS_NB - Chapter 8CCNA RS_NB - Chapter 8
CCNA RS_NB - Chapter 8Irsandi Hasan
 
CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 7CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 7Irsandi Hasan
 
CCNA RS_NB - Chapter 6
CCNA RS_NB - Chapter 6CCNA RS_NB - Chapter 6
CCNA RS_NB - Chapter 6Irsandi Hasan
 
CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5Irsandi Hasan
 
CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4Irsandi Hasan
 

Plus de Irsandi Hasan (20)

CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11
 
CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10
 
CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09
 
CCNA v6.0 ITN - Chapter 08
CCNA v6.0 ITN - Chapter 08CCNA v6.0 ITN - Chapter 08
CCNA v6.0 ITN - Chapter 08
 
CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 07CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 07
 
CCNA v6.0 ITN - Chapter 06
CCNA v6.0 ITN - Chapter 06CCNA v6.0 ITN - Chapter 06
CCNA v6.0 ITN - Chapter 06
 
CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05
 
CCNA v6.0 ITN - Chapter 04
CCNA v6.0 ITN - Chapter 04CCNA v6.0 ITN - Chapter 04
CCNA v6.0 ITN - Chapter 04
 
CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03
 
CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02
 
CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01
 
VMware vShield - Overview
VMware vShield - OverviewVMware vShield - Overview
VMware vShield - Overview
 
CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11
 
CCNA RS_NB - Chapter 10
CCNA RS_NB - Chapter 10CCNA RS_NB - Chapter 10
CCNA RS_NB - Chapter 10
 
CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 9CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 9
 
CCNA RS_NB - Chapter 8
CCNA RS_NB - Chapter 8CCNA RS_NB - Chapter 8
CCNA RS_NB - Chapter 8
 
CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 7CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 7
 
CCNA RS_NB - Chapter 6
CCNA RS_NB - Chapter 6CCNA RS_NB - Chapter 6
CCNA RS_NB - Chapter 6
 
CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5
 
CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4
 

Dernier

Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 

Dernier (20)

Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 

ITE - Chapter 2

  • 1. IT Essentials PC Hardware and Software 4.1 Instructional Resource Chapter 2: Safe Lab Procedures and Tool Use Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 1
  • 2. Chapter 2: Objectives  Explain the purpose of safe working conditions and procedures.  Identify tools and software used with personal computer components and their purposes.  Implement proper tool use. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 2
  • 3. Chapter 2: Critical Concepts  What is this chapter about and why is it important?  This chapter discusses safe lab procedures, tool use for computer maintenance, and proper disposal of hazardous materials. It provides an overview of safe working conditions in the lab and in other environments. Basic electrical, fire, and chemical safety guidelines are covered, as well as other potential workplace hazards. Much of the chapter is devoted to identification and proper usage of hand tools and software tools. It also discusses the importance of organization of tools, and cleaning procedures for all computer components.  IT technicians have cut, burned, and even electrocuted themselves while working on computers. IT technicians have short-circuited working components, thus rendering the components unusable. This chapter is important because it explains the good work habits that all technicians must develop in order to avoid injury to themselves or others, and to avoid damaging or destroying equipment, or losing data. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 3
  • 4. Chapter 2: Activities  What activities are associated with this chapter 2.2.2: Worksheet: Diagnostic Software 2.3.4: Lab: Computer Disassembly Chapter 2 Quiz Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 4
  • 5. Chapter 2: New Terms  What terms are introduced in this chapter? antistatic mat 2.2.1 antistatic wrist strap 2.2.1 anti-virus application 2.2.2 blackout 2.1.2 brownout 2.1.2 cable tie 2.2.1 CHKDSK 2.2.2 compressed air 2.2.1 conduit 2.1.1 defrag 2.2.2 Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 5
  • 6. Chapter 2: New Terms  What terms are introduced in this chapter? digital multimeter 2.2.1 disk cleanup 2.2.2 disk management 2.2.2 Electromagnetic Interference (EMI) 2.1.2 Electrostatic Discharge (ESD) 2.1.2 FDISK 2.2.2 flat-head screwdriver 2.2.1 format 2.2.2 hex driver 2.2.1 loopback plug 2.2.1 Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 6
  • 7. Chapter 2: New Terms  What terms are introduced in this chapter? Material Safety and Data Sheet (MSDS) 2.1.3 needle-nose pliers 2.2.1 disk cleanup 2.2.2 noise 2.1.2 Phillips-head screwdriver 2.2.1 Radio Frequency Interference (RFI) 2.1.2 SCANDISK 2.2.2 spike 2.1.2 spyware 2.2.2 Standby Power Supply (SPS) 2.1.2 Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 7
  • 8. Chapter 2: New Terms  What terms are introduced in this chapter? surge 2.1.2 surge suppressor 2.1.2 torx screwdriver 2.2.1 tweezers 2.2.1 wire cutters 2.2.1 Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 8
  • 9. Chapter 2: Changes  What has changed from the previous version (4.0) of ITEPC? Page 2.1.1 Identify safety procedures and potential hazards for users and technicians •Electrical safety •Cable management •Avoiding trip hazards Page 2.1.2 Identify safety procedures to protect equipment from damage and data from loss •EMI •Network interference •Magnets •RFI •Cordless phone interference •Microwaves Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 9
  • 10. Chapter 2: Classroom Management  The instructor should ensure this chapter becomes as hand-on as possible.  Have different tools available. Hold up each tool and ask students what they think a technician might use the tool for.  If enough tools are available, divide students into teams and have them document the purpose of each tool in computer support. Have a computer available so they can look inside to see the possibilities. Have two groups share results with one another.  If Internet access is available, have students select suitable power protection for the computers in the classroom based on different scenarios. If Internet access is not available, have various vendors’ technical power protection documents and have the students choose from them.  Keep the power and safety discussions relevant. Explain a section and then have the students apply the information. An example might be to present examples of relevant local or world weather events and the effects the conditions might have on power and safety.  Have the students research the city or state rules for CRT disposal. Have them brainstorm alternatives to disposal. If this is not feasible, bring the rules into class as a handout. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 10
  • 11. Chapter 2: Classroom Management (continued)  Download, print out, or have available MSDS data. Search the Internet with the following key terms: laser printer msds.  Have the students determine the best place to keep MSDS information sheets in the school, who might need this information, and how to get this information to those who might need it.  Disassemble a computer in teams.  Have students rotate with each step so everyone gets hands-on time.  Lead the students through the disassembly process. For example, the first step in the lab is to turn off the computer and disconnect power. It is very important for the students to verify that the computer works BEFORE disassembly. Then, have all the students power down and remove the power cord. No team can progress until all power cords have been removed. Then, move on to step 2. In this manner, the teacher can address issues or reinforce the lecture, and everyone is on the same step and concept. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 11
  • 12. Chapter 2: Teaching Analogies  How often do you disassemble your car? When learning about cars, an automobile technician disassembles a car in sections to learn about how each particular section works. A student can learn about computer components by disassembling a computer in the same way.  How important is doing a tune-up to a car? How important is it to have your teeth cleaned? Preventive maintenance is important to a computer in the same way. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 12
  • 13. Chapter 2: Suggested Class Discussions  Safety – Laser printers possess high voltage and can burn the technician, and CRTs possess high voltage and can shock the technician.  ESD – An electrostatic discharge can damage a computer.  Tools – Discuss the proper tool usage, storage, what to take on a service call, and what to have in the car.  Software tools – Ensure you have software tools appropriate for the operating system.  Preventive maintenance – This extends the life of the computer. Ensure appropriate cleaning supplies are used.  Organization – Ensure computer components are organized and easy to find when reassembling the computer. Emphasize the importance of taking notes and being organized during disassembly.  Question for the class – Have you ever taken something apart and when you tried to put it back together, things didn’t go as planned? Explain what happened. What do you wish you had done differently?  Internet Search – Have students conduct an Internet search on laser printer safety and disposal procedures. Discuss how students would apply this knowledge in the workplace. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 13
  • 14. Chapter 2: Best Practices  Diagram and document the computer disassembly process. • Some students take photos with their phones to help reassemble the computer. Encouraging the use of technology will engage the students. • A good teaching practice is to have each student document the computer disassembly.  Organize parts during the computer disassembly process. • Collect egg cartons for organizing screws that are removed during disassembly. • Collect antistatic bags from school technicians or outside computer repair companies to store computer components. • Do not allow students to stack computer components.  Because CPUs are very expensive and easy to damage, it is not recommended to allow the students to remove the CPU during the computer disassembly process. Obtain bad CPUs from outside computer repair companies to use for class discussion and demonstration. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 14
  • 15. Chapter 2: Outside Reading International Telecommunication Union (ITU) http://www.itu.int/ITU-T/ Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 15
  • 16. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 16
  • 17. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 17