Enviar pesquisa
Carregar
ITE - Chapter 2
•
1 gostou
•
1,724 visualizações
Irsandi Hasan
Seguir
Tecnologia
Negócios
Denunciar
Compartilhar
Denunciar
Compartilhar
1 de 17
Recomendados
Projet bt1 informatique
Projet bt1 informatique
Majida Antonios, M.Ed.
ITE - Chapter 1
ITE - Chapter 1
Irsandi Hasan
ITE v5.0 - Chapter 5
ITE v5.0 - Chapter 5
Irsandi Hasan
Cours 1 -_bases_d_informatique
Cours 1 -_bases_d_informatique
Tarik Taleb Bendiab
Cobit
Cobit
ifourkhushbooshah
ITE v5.0 - Chapter 2
ITE v5.0 - Chapter 2
Irsandi Hasan
Architecture ordinateur-2-architecture-de-base
Architecture ordinateur-2-architecture-de-base
Abdoulaye Dieng
Déclaration d'applicabilité (DdA) - ISO27002:2013
Déclaration d'applicabilité (DdA) - ISO27002:2013
Bachir Benyammi
Recomendados
Projet bt1 informatique
Projet bt1 informatique
Majida Antonios, M.Ed.
ITE - Chapter 1
ITE - Chapter 1
Irsandi Hasan
ITE v5.0 - Chapter 5
ITE v5.0 - Chapter 5
Irsandi Hasan
Cours 1 -_bases_d_informatique
Cours 1 -_bases_d_informatique
Tarik Taleb Bendiab
Cobit
Cobit
ifourkhushbooshah
ITE v5.0 - Chapter 2
ITE v5.0 - Chapter 2
Irsandi Hasan
Architecture ordinateur-2-architecture-de-base
Architecture ordinateur-2-architecture-de-base
Abdoulaye Dieng
Déclaration d'applicabilité (DdA) - ISO27002:2013
Déclaration d'applicabilité (DdA) - ISO27002:2013
Bachir Benyammi
Chapitre 1 Définitions et vocabulaires de base.pdf
Chapitre 1 Définitions et vocabulaires de base.pdf
YounesAziz3
Cybersécurité et Cyberdéfense: Etat des lieux et perspective en Afrique
Cybersécurité et Cyberdéfense: Etat des lieux et perspective en Afrique
Francois-Xavier DJIMGOU
Audit sécurité des systèmes d’information
Audit sécurité des systèmes d’information
Abbes Rharrab
ISO 27001
ISO 27001
MELLAH MOULOUD Sorbonne Université - Sciences et Ingénierie
La continuité des affaires et la relève TI
La continuité des affaires et la relève TI
ISACA Chapitre de Québec
Architecture des ordinateurs
Architecture des ordinateurs
RMwebsite
BSides Algiers - Normes ISO 2700x - Badis Remli
BSides Algiers - Normes ISO 2700x - Badis Remli
Shellmates
Bureautique
Bureautique
sarrasarsora
Formation Informatique base et généralités
Formation Informatique base et généralités
Sinovatia
Audit de sécurité informatique
Audit de sécurité informatique
Mohamed Ali Hadhri
De l'expression de besoins vers spécifications de la solution
De l'expression de besoins vers spécifications de la solution
COMPETENSIS
Introduction to COBIT 2019 and IT management
Introduction to COBIT 2019 and IT management
Christian F. Nissen
Internet
Internet
Anissa Teyeb
introduction à l'informatique abderrahim jabbar
introduction à l'informatique abderrahim jabbar
hassan II university mohammedia
Initiation à l'informatique avec windows 7
Initiation à l'informatique avec windows 7
Théodoric THEOTISTE
Bios and cmos
Bios and cmos
Online
Cours en maintenance pc
Cours en maintenance pc
mohamednacim
ITE v5.0 - Chapter 3
ITE v5.0 - Chapter 3
Irsandi Hasan
02 computer parts and ports
02 computer parts and ports
Melchor Balolong
Cours d'informatique du prof Heimer
Cours d'informatique du prof Heimer
rochats
CCNA Exploration 4 - Chapter 8
CCNA Exploration 4 - Chapter 8
Irsandi Hasan
CCNA Security 010-configuring cisco asa
CCNA Security 010-configuring cisco asa
Ahmed Habib
Mais conteúdo relacionado
Mais procurados
Chapitre 1 Définitions et vocabulaires de base.pdf
Chapitre 1 Définitions et vocabulaires de base.pdf
YounesAziz3
Cybersécurité et Cyberdéfense: Etat des lieux et perspective en Afrique
Cybersécurité et Cyberdéfense: Etat des lieux et perspective en Afrique
Francois-Xavier DJIMGOU
Audit sécurité des systèmes d’information
Audit sécurité des systèmes d’information
Abbes Rharrab
ISO 27001
ISO 27001
MELLAH MOULOUD Sorbonne Université - Sciences et Ingénierie
La continuité des affaires et la relève TI
La continuité des affaires et la relève TI
ISACA Chapitre de Québec
Architecture des ordinateurs
Architecture des ordinateurs
RMwebsite
BSides Algiers - Normes ISO 2700x - Badis Remli
BSides Algiers - Normes ISO 2700x - Badis Remli
Shellmates
Bureautique
Bureautique
sarrasarsora
Formation Informatique base et généralités
Formation Informatique base et généralités
Sinovatia
Audit de sécurité informatique
Audit de sécurité informatique
Mohamed Ali Hadhri
De l'expression de besoins vers spécifications de la solution
De l'expression de besoins vers spécifications de la solution
COMPETENSIS
Introduction to COBIT 2019 and IT management
Introduction to COBIT 2019 and IT management
Christian F. Nissen
Internet
Internet
Anissa Teyeb
introduction à l'informatique abderrahim jabbar
introduction à l'informatique abderrahim jabbar
hassan II university mohammedia
Initiation à l'informatique avec windows 7
Initiation à l'informatique avec windows 7
Théodoric THEOTISTE
Bios and cmos
Bios and cmos
Online
Cours en maintenance pc
Cours en maintenance pc
mohamednacim
ITE v5.0 - Chapter 3
ITE v5.0 - Chapter 3
Irsandi Hasan
02 computer parts and ports
02 computer parts and ports
Melchor Balolong
Cours d'informatique du prof Heimer
Cours d'informatique du prof Heimer
rochats
Mais procurados
(20)
Chapitre 1 Définitions et vocabulaires de base.pdf
Chapitre 1 Définitions et vocabulaires de base.pdf
Cybersécurité et Cyberdéfense: Etat des lieux et perspective en Afrique
Cybersécurité et Cyberdéfense: Etat des lieux et perspective en Afrique
Audit sécurité des systèmes d’information
Audit sécurité des systèmes d’information
ISO 27001
ISO 27001
La continuité des affaires et la relève TI
La continuité des affaires et la relève TI
Architecture des ordinateurs
Architecture des ordinateurs
BSides Algiers - Normes ISO 2700x - Badis Remli
BSides Algiers - Normes ISO 2700x - Badis Remli
Bureautique
Bureautique
Formation Informatique base et généralités
Formation Informatique base et généralités
Audit de sécurité informatique
Audit de sécurité informatique
De l'expression de besoins vers spécifications de la solution
De l'expression de besoins vers spécifications de la solution
Introduction to COBIT 2019 and IT management
Introduction to COBIT 2019 and IT management
Internet
Internet
introduction à l'informatique abderrahim jabbar
introduction à l'informatique abderrahim jabbar
Initiation à l'informatique avec windows 7
Initiation à l'informatique avec windows 7
Bios and cmos
Bios and cmos
Cours en maintenance pc
Cours en maintenance pc
ITE v5.0 - Chapter 3
ITE v5.0 - Chapter 3
02 computer parts and ports
02 computer parts and ports
Cours d'informatique du prof Heimer
Cours d'informatique du prof Heimer
Destaque
CCNA Exploration 4 - Chapter 8
CCNA Exploration 4 - Chapter 8
Irsandi Hasan
CCNA Security 010-configuring cisco asa
CCNA Security 010-configuring cisco asa
Ahmed Habib
CCNA Security 012- cryptographic systems
CCNA Security 012- cryptographic systems
Ahmed Habib
CCNA Discovery 1 - Chapter 4
CCNA Discovery 1 - Chapter 4
Irsandi Hasan
CCNA Security - Chapter 6
CCNA Security - Chapter 6
Irsandi Hasan
CCNA Security - Chapter 4
CCNA Security - Chapter 4
Irsandi Hasan
OSPF v3
OSPF v3
Irsandi Hasan
CCNA Security - Chapter 7
CCNA Security - Chapter 7
Irsandi Hasan
CCNA Security - Chapter 8
CCNA Security - Chapter 8
Irsandi Hasan
ITE - Chapter 9
ITE - Chapter 9
Irsandi Hasan
CCNA Discovery 1 - Chapter 1
CCNA Discovery 1 - Chapter 1
Irsandi Hasan
CCNA Security - Chapter 5
CCNA Security - Chapter 5
Irsandi Hasan
CCNA Security - Chapter 9
CCNA Security - Chapter 9
Irsandi Hasan
CCNA Security - Chapter 3
CCNA Security - Chapter 3
Irsandi Hasan
CCNA Security 06- AAA
CCNA Security 06- AAA
Ahmed Habib
CCNA RS_ITN - Chapter 4
CCNA RS_ITN - Chapter 4
Irsandi Hasan
CCNA Security 09- ios firewall fundamentals
CCNA Security 09- ios firewall fundamentals
Ahmed Habib
ITE - Chapter 7
ITE - Chapter 7
Irsandi Hasan
CCNA Security 011- implementing ios-based ips
CCNA Security 011- implementing ios-based ips
Ahmed Habib
CCNA Exploration 4 - Chapter 7
CCNA Exploration 4 - Chapter 7
Irsandi Hasan
Destaque
(20)
CCNA Exploration 4 - Chapter 8
CCNA Exploration 4 - Chapter 8
CCNA Security 010-configuring cisco asa
CCNA Security 010-configuring cisco asa
CCNA Security 012- cryptographic systems
CCNA Security 012- cryptographic systems
CCNA Discovery 1 - Chapter 4
CCNA Discovery 1 - Chapter 4
CCNA Security - Chapter 6
CCNA Security - Chapter 6
CCNA Security - Chapter 4
CCNA Security - Chapter 4
OSPF v3
OSPF v3
CCNA Security - Chapter 7
CCNA Security - Chapter 7
CCNA Security - Chapter 8
CCNA Security - Chapter 8
ITE - Chapter 9
ITE - Chapter 9
CCNA Discovery 1 - Chapter 1
CCNA Discovery 1 - Chapter 1
CCNA Security - Chapter 5
CCNA Security - Chapter 5
CCNA Security - Chapter 9
CCNA Security - Chapter 9
CCNA Security - Chapter 3
CCNA Security - Chapter 3
CCNA Security 06- AAA
CCNA Security 06- AAA
CCNA RS_ITN - Chapter 4
CCNA RS_ITN - Chapter 4
CCNA Security 09- ios firewall fundamentals
CCNA Security 09- ios firewall fundamentals
ITE - Chapter 7
ITE - Chapter 7
CCNA Security 011- implementing ios-based ips
CCNA Security 011- implementing ios-based ips
CCNA Exploration 4 - Chapter 7
CCNA Exploration 4 - Chapter 7
Semelhante a ITE - Chapter 2
ITE - Chapter 6
ITE - Chapter 6
Irsandi Hasan
Distributed Generation In Spain
Distributed Generation In Spain
davidtrebolle
Easy Learn to Verilog HDL
Easy Learn to Verilog HDL
kpyes34
2.1 system concept
2.1 system concept
KMJ Science Computer
A.vivotek ip surveillance_handbook
A.vivotek ip surveillance_handbook
TSOLUTIONS
Controlofmachines
Controlofmachines
Anirudh Chaiworaporn
Control of machines
Control of machines
Thangarajjebamani
Microstrip patch-antenna
Microstrip patch-antenna
aquibjamal123
Zigbee 802.15.4
Zigbee 802.15.4
Prasad Narasimha
Barcode reference en
Barcode reference en
Roger R Pe M
Analog optical link
Analog optical link
hamedmeshkin
Domain-Specific Program Checking
Domain-Specific Program Checking
Lukas Renggli
บทที่ 2 Mobile Aplication
บทที่ 2 Mobile Aplication
rubtumproject.com
Gsm based campus display system project report
Gsm based campus display system project report
Kashyap Shah
50267584 celldoctor
50267584 celldoctor
Prasoon Singh
USB Lock RP Operation Manual
USB Lock RP Operation Manual
Javier Arrospide
Integratedbook
Integratedbook
eLearningGchu
การพัฒนาเกมคอมพิวเตอร์ 3 มิติ
การพัฒนาเกมคอมพิวเตอร์ 3 มิติ
oan508
Programming language design_concepts
Programming language design_concepts
Yuri Dantas
Manual
Manual
guesta8db17
Semelhante a ITE - Chapter 2
(20)
ITE - Chapter 6
ITE - Chapter 6
Distributed Generation In Spain
Distributed Generation In Spain
Easy Learn to Verilog HDL
Easy Learn to Verilog HDL
2.1 system concept
2.1 system concept
A.vivotek ip surveillance_handbook
A.vivotek ip surveillance_handbook
Controlofmachines
Controlofmachines
Control of machines
Control of machines
Microstrip patch-antenna
Microstrip patch-antenna
Zigbee 802.15.4
Zigbee 802.15.4
Barcode reference en
Barcode reference en
Analog optical link
Analog optical link
Domain-Specific Program Checking
Domain-Specific Program Checking
บทที่ 2 Mobile Aplication
บทที่ 2 Mobile Aplication
Gsm based campus display system project report
Gsm based campus display system project report
50267584 celldoctor
50267584 celldoctor
USB Lock RP Operation Manual
USB Lock RP Operation Manual
Integratedbook
Integratedbook
การพัฒนาเกมคอมพิวเตอร์ 3 มิติ
การพัฒนาเกมคอมพิวเตอร์ 3 มิติ
Programming language design_concepts
Programming language design_concepts
Manual
Manual
Mais de Irsandi Hasan
CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11
Irsandi Hasan
CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10
Irsandi Hasan
CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09
Irsandi Hasan
CCNA v6.0 ITN - Chapter 08
CCNA v6.0 ITN - Chapter 08
Irsandi Hasan
CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 07
Irsandi Hasan
CCNA v6.0 ITN - Chapter 06
CCNA v6.0 ITN - Chapter 06
Irsandi Hasan
CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05
Irsandi Hasan
CCNA v6.0 ITN - Chapter 04
CCNA v6.0 ITN - Chapter 04
Irsandi Hasan
CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03
Irsandi Hasan
CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02
Irsandi Hasan
CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01
Irsandi Hasan
VMware vShield - Overview
VMware vShield - Overview
Irsandi Hasan
CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11
Irsandi Hasan
CCNA RS_NB - Chapter 10
CCNA RS_NB - Chapter 10
Irsandi Hasan
CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 9
Irsandi Hasan
CCNA RS_NB - Chapter 8
CCNA RS_NB - Chapter 8
Irsandi Hasan
CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 7
Irsandi Hasan
CCNA RS_NB - Chapter 6
CCNA RS_NB - Chapter 6
Irsandi Hasan
CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5
Irsandi Hasan
CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4
Irsandi Hasan
Mais de Irsandi Hasan
(20)
CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 08
CCNA v6.0 ITN - Chapter 08
CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 06
CCNA v6.0 ITN - Chapter 06
CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 04
CCNA v6.0 ITN - Chapter 04
CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01
VMware vShield - Overview
VMware vShield - Overview
CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 10
CCNA RS_NB - Chapter 10
CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 8
CCNA RS_NB - Chapter 8
CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 6
CCNA RS_NB - Chapter 6
CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4
Último
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
BookNet Canada
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
Sergiu Bodiu
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
Florian Wilhelm
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
hariprasad279825
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
SeasiaInfotech2
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
Rizwan Syed
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
Padma Pradeep
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
Fwdays
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
Fwdays
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
RankYa
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
Kalema Edgar
Training state-of-the-art general text embedding
Training state-of-the-art general text embedding
Zilliz
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Patryk Bandurski
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
Memoori
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
gvaughan
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Safe Software
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
Zilliz
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
null - The Open Security Community
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
Alfredo García Lavilla
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
Enterprise Knowledge
Último
(20)
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
Training state-of-the-art general text embedding
Training state-of-the-art general text embedding
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
ITE - Chapter 2
1.
IT Essentials PC
Hardware and Software 4.1 Instructional Resource Chapter 2: Safe Lab Procedures and Tool Use Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 1
2.
Chapter 2: Objectives
Explain the purpose of safe working conditions and procedures. Identify tools and software used with personal computer components and their purposes. Implement proper tool use. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 2
3.
Chapter 2: Critical
Concepts What is this chapter about and why is it important? This chapter discusses safe lab procedures, tool use for computer maintenance, and proper disposal of hazardous materials. It provides an overview of safe working conditions in the lab and in other environments. Basic electrical, fire, and chemical safety guidelines are covered, as well as other potential workplace hazards. Much of the chapter is devoted to identification and proper usage of hand tools and software tools. It also discusses the importance of organization of tools, and cleaning procedures for all computer components. IT technicians have cut, burned, and even electrocuted themselves while working on computers. IT technicians have short-circuited working components, thus rendering the components unusable. This chapter is important because it explains the good work habits that all technicians must develop in order to avoid injury to themselves or others, and to avoid damaging or destroying equipment, or losing data. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 3
4.
Chapter 2: Activities
What activities are associated with this chapter 2.2.2: Worksheet: Diagnostic Software 2.3.4: Lab: Computer Disassembly Chapter 2 Quiz Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 4
5.
Chapter 2: New
Terms What terms are introduced in this chapter? antistatic mat 2.2.1 antistatic wrist strap 2.2.1 anti-virus application 2.2.2 blackout 2.1.2 brownout 2.1.2 cable tie 2.2.1 CHKDSK 2.2.2 compressed air 2.2.1 conduit 2.1.1 defrag 2.2.2 Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 5
6.
Chapter 2: New
Terms What terms are introduced in this chapter? digital multimeter 2.2.1 disk cleanup 2.2.2 disk management 2.2.2 Electromagnetic Interference (EMI) 2.1.2 Electrostatic Discharge (ESD) 2.1.2 FDISK 2.2.2 flat-head screwdriver 2.2.1 format 2.2.2 hex driver 2.2.1 loopback plug 2.2.1 Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 6
7.
Chapter 2: New
Terms What terms are introduced in this chapter? Material Safety and Data Sheet (MSDS) 2.1.3 needle-nose pliers 2.2.1 disk cleanup 2.2.2 noise 2.1.2 Phillips-head screwdriver 2.2.1 Radio Frequency Interference (RFI) 2.1.2 SCANDISK 2.2.2 spike 2.1.2 spyware 2.2.2 Standby Power Supply (SPS) 2.1.2 Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 7
8.
Chapter 2: New
Terms What terms are introduced in this chapter? surge 2.1.2 surge suppressor 2.1.2 torx screwdriver 2.2.1 tweezers 2.2.1 wire cutters 2.2.1 Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 8
9.
Chapter 2: Changes
What has changed from the previous version (4.0) of ITEPC? Page 2.1.1 Identify safety procedures and potential hazards for users and technicians •Electrical safety •Cable management •Avoiding trip hazards Page 2.1.2 Identify safety procedures to protect equipment from damage and data from loss •EMI •Network interference •Magnets •RFI •Cordless phone interference •Microwaves Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 9
10.
Chapter 2: Classroom
Management The instructor should ensure this chapter becomes as hand-on as possible. Have different tools available. Hold up each tool and ask students what they think a technician might use the tool for. If enough tools are available, divide students into teams and have them document the purpose of each tool in computer support. Have a computer available so they can look inside to see the possibilities. Have two groups share results with one another. If Internet access is available, have students select suitable power protection for the computers in the classroom based on different scenarios. If Internet access is not available, have various vendors’ technical power protection documents and have the students choose from them. Keep the power and safety discussions relevant. Explain a section and then have the students apply the information. An example might be to present examples of relevant local or world weather events and the effects the conditions might have on power and safety. Have the students research the city or state rules for CRT disposal. Have them brainstorm alternatives to disposal. If this is not feasible, bring the rules into class as a handout. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 10
11.
Chapter 2: Classroom
Management (continued) Download, print out, or have available MSDS data. Search the Internet with the following key terms: laser printer msds. Have the students determine the best place to keep MSDS information sheets in the school, who might need this information, and how to get this information to those who might need it. Disassemble a computer in teams. Have students rotate with each step so everyone gets hands-on time. Lead the students through the disassembly process. For example, the first step in the lab is to turn off the computer and disconnect power. It is very important for the students to verify that the computer works BEFORE disassembly. Then, have all the students power down and remove the power cord. No team can progress until all power cords have been removed. Then, move on to step 2. In this manner, the teacher can address issues or reinforce the lecture, and everyone is on the same step and concept. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 11
12.
Chapter 2: Teaching
Analogies How often do you disassemble your car? When learning about cars, an automobile technician disassembles a car in sections to learn about how each particular section works. A student can learn about computer components by disassembling a computer in the same way. How important is doing a tune-up to a car? How important is it to have your teeth cleaned? Preventive maintenance is important to a computer in the same way. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 12
13.
Chapter 2: Suggested
Class Discussions Safety – Laser printers possess high voltage and can burn the technician, and CRTs possess high voltage and can shock the technician. ESD – An electrostatic discharge can damage a computer. Tools – Discuss the proper tool usage, storage, what to take on a service call, and what to have in the car. Software tools – Ensure you have software tools appropriate for the operating system. Preventive maintenance – This extends the life of the computer. Ensure appropriate cleaning supplies are used. Organization – Ensure computer components are organized and easy to find when reassembling the computer. Emphasize the importance of taking notes and being organized during disassembly. Question for the class – Have you ever taken something apart and when you tried to put it back together, things didn’t go as planned? Explain what happened. What do you wish you had done differently? Internet Search – Have students conduct an Internet search on laser printer safety and disposal procedures. Discuss how students would apply this knowledge in the workplace. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 13
14.
Chapter 2: Best
Practices Diagram and document the computer disassembly process. • Some students take photos with their phones to help reassemble the computer. Encouraging the use of technology will engage the students. • A good teaching practice is to have each student document the computer disassembly. Organize parts during the computer disassembly process. • Collect egg cartons for organizing screws that are removed during disassembly. • Collect antistatic bags from school technicians or outside computer repair companies to store computer components. • Do not allow students to stack computer components. Because CPUs are very expensive and easy to damage, it is not recommended to allow the students to remove the CPU during the computer disassembly process. Obtain bad CPUs from outside computer repair companies to use for class discussion and demonstration. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 14
15.
Chapter 2: Outside
Reading International Telecommunication Union (ITU) http://www.itu.int/ITU-T/ Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 15
16.
Presentation_ID
© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 16
17.
Presentation_ID
© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 17