Lesson 1_Safety procedures while handling a computer
Lesson 1_Safety procedures while handling a computer
•There are innumerable ESD events occurring all the time that . we
cannot see or feel.
– ESD Training
– Ground Conductors
– Ionization
Heel Grounders
Ground mobile personnel in areas where
there are ESD floors
Smocks
Smock sleeves should be in contact
with the skin, clothing underneath
should not show
Personal Grounding
Impedance
• Economic Impacts
- Loss / waste of resources that can be recycled
for re-use.
-Opportunities for recycling industries and
employment lost.
Environmental Impacts
-Air pollution, especially when it is burnt.
-Waste management problem of non-
biodegradable
equipment.
-Toxicity and radioactive nature of E-waste to
humans, soil
and animals.
Guidelines for learning institutions
• Learning institutions can be those associated
with basic education or higher education.
They are recipients of electrical and electronic
goods. Unfortunately, most of the second
hand products are not inspected before they
are donated. Coupled with poor handling and
use, their lifespan becomes shorter resulting
in huge amounts of e-waste in most learning
institutions.
Guidelines for learning institutions
• In order to manage e-waste, learning institutions need to:
• Create awareness and conduct sensitization campaigns on
responsible e-waste management
• Develop Memorandum of Understandings (MoUs) with
Producer Responsibility Organisations (PROs) for take-
back, recycling and refurbishing of e-waste at life-end
• Develop mechanisms to ensure that inspection
certificates clearly specify end-of-life date and who bears
responsibility thereafter
• Develop and mainstream e-waste education in curricula
Tools for the Job
• Identify tools and software used with personal
computer components and their purposes
• For every job there is the right tool.
• Make sure that you are familiar with the
correct use of each tool and that the right tool
is used for the current task.
• Skilled use of tools and software makes the
job less difficult and ensures that tasks are
performed properly and safely.
Proper Tool Use
Toner Probe
Software Tools
• Like hardware tools, there are a variety of
software tools that can be used to help
technicians pinpoint and troubleshoot
problems. Many of these tools are free and
several come with the Windows operating
system.
Disk Management Tools
• Software tools help diagnose computer and network
problems and determine which computer device is not
functioning correctly. A technician must be able to use
a range of software tools to diagnose problems,
maintain hardware, and protect the data stored on a
computer.
• You must be able to identify which software to use in
different situations. Disk management tools help
detect and correct disk errors, prepare a disk for data
storage, and remove unwanted files.
The following are some disk management
tools:
• FDISK: A command-line tool that creates and deletes
partitions on a hard drive. The FDISK tool is not
available in Windows XP, Vista, or 7. It has been
replaced with the Disk Management tool.
• Disk Management Tool: Initializes disks, creates
partitions, and formats partitions.
• Format: Prepares a hard drive to store information.
• ScanDisk or CHKDSK: Checks the integrity of files and
folders on a hard drive by scanning the file system.
These tools might also check the disk surface for
physical errors.
• Defrag: Optimizes space on a hard drive to
allow faster access to programs and data.
• Disk Cleanup: Clears space on a hard drive by
searching for files that can be safely deleted.
• System File Checker (SFC): A command-line
tool that scans the operating system critical
files and replaces files that are corrupted.
• Use the Windows 7 boot disk for
troubleshooting and repairing corrupted files.
The Windows 7 boot disk repairs Windows
system files, restores damaged or lost files,
and reinstalls the operating system.
• Third-party software tools are also available to
assist in troubleshooting problems.
Protection Software Tools
• Each year, viruses, spyware, and other types of
malicious attacks infect millions of computers.
These attacks can damage operating systems,
applications, and data. Computers that have
been infected may even have problems with
hardware performance or component failure.
• To protect data and the integrity of the operating
system and hardware, use software designed to
guard against attacks and to remove malicious
programs.
• Various types of software protect hardware and data:
• Windows 7 Action Center: Checks the status of
essential security settings. The Action Center
continuously checks to make sure that the software
firewall and antivirus programs are running. It also
ensures that automatic updates download and install
automatically.
• Antivirus program: Protects against virus attacks.
• Antispyware program: Protects against software that
sends information about web surfing habits to an
attacker. Spyware can be installed without the
knowledge or consent of the user.
• Window 7 Firewall: Runs continuously to protect
against unauthorized communications to and from
your computer.
Organizational Tools
• Keeping accurate records and journals during
a busy workday can be challenging. Many
organizational tools, such as work-order
systems, can help the technician document
their work.
Reference Tools
• A technician must document all repairs and
computer problems. The documentation can
then be used as a reference for future
problems or for other technicians who may
not have encountered the problem before.
The documents can be paper based, but
electronic forms are preferred because they
can be easily searched for specific problems.
• Personal Reference Tools
• Personal reference tools include troubleshooting
guides, manufacturer manuals, quick reference
guides, and repair journals. In addition to an
invoice, a technician keeps a journal of upgrades
and repairs. The documentation in the journal
includes descriptions of the problem, possible
solutions that have been attempted, and the
steps taken to repair the problem. Note any
configuration changes made to the equipment
and any replacement parts used in the repair.
This documentation is valuable when you
encounter similar situations in the future.
• Notes: Make notes as you go through the
troubleshooting and repair process. Refer to
these notes to avoid repeating previous steps
and to determine what steps to take next.
• Journal: Document the upgrades and repairs that
you perform. Include descriptions of the
problem, possible solutions that have been tried
to correct the problem, and the steps taken to
repair the problem. Note any configuration
changes made to the equipment and any
replacement parts used in the repair. Your
journal, along with your notes, can be valuable
when you encounter similar situations in the
future.
• History of repairs: Make a detailed list of
problems and repairs, including the date,
replacement parts, and customer information.
The history allows a technician to determine
what work has been performed on a specific
computer in the past.
• Internet Reference Tools
• The Internet is an excellent source of
information about specific hardware problems
and possible solutions:
• Internet search engines
• News groups
• Manufacturer FAQs
• Online computer manuals
• Online forums and chat
• Technical websites
• Miscellaneous Tools
• With experience, you will discover many
additional items to add to the toolkit.