USE OF HAND TOOLS
Objective:
 Identify the different uses of Hand tools
 Demonstrate the proper use of hand tools
 Select properly the Hand tools according to industry standards
 Give the importance of hand tools in computer system servicing
CONTENT
• Objectives
• Key Terms
• Introduction
• Safe Lab Procedures
• Procedures to Protect Equipment and Data
• Procedures to Protect the Environment
• Proper Use of Tools
• Summary
• Check Your Understanding
• A tool is a handheld device that aids in
accomplishing a task. Tools range from a
traditional metal cutting part of a
machine to an element of a computer
program that activates and controls a
particular function.
• This chapter covers basic safety practices for
the workplace, hardware and software tools,
and the disposal of hazardous materials. Safety
guidelines help protect individuals from
accidents and injury. They also help to protect
equipment from damage. Some of these
guidelines are designed to protect the
environment from contamination caused by
improperly discarded materials. You will also
learn how to protect equipment and data, and
how to properly use hand and software tools.
Safe Lab Procedures
• Safety in the lab. Safety guidelines help
protect individuals from accidents and
injury. They also help to protect
equipment from damage. Some of these
guidelines are designed to protect the
environment from contamination
caused by improperly discarded
materials.
General Safety
• Safe working conditions help prevent
injury to people and damage to
computer equipment. A safe
workspace is clean, organized, and
properly lighted. Everyone must
understand and follow safety
procedures.
• Follow the basic safety guidelines to prevent
cuts, burns, electrical shock, and damage to
eyesight. As a best practice, make sure that a
fire extinguisher and first-aid kit are available
in case of fire or injury. Poorly placed or
unsecured cables can cause tripping hazards
in a network installation. Cables should be
installed in conduit or cable trays to prevent
hazards.
LIST OF BASIC SAFETY PRECAUTIONS
• Remove your watch and jewelry and secure loose clothing.
• Turn off the power and unplug equipment before performing
service.
• Cover sharp edges inside the computer case with tape.
• Never open a power supply or a CRT monitor.
• Do not touch areas in printers that are hot or that use high
voltage.
• Know where the fire extinguisher is located and how to use
it.
• Keep food and drinks out of your workspace.
• Keep your workspace clean and free of clutter.
• Bend your knees when lifting heavy objects to avoid injuring
your back.
Electrical Safety
• Follow electrical safety guidelines to
prevent electrical fires, injuries, and
fatalities in the home and the
workplace.
• Do not wear the antistatic wrist strap when
repairing power supplies or CRT monitors.
• Check the printer manual for the location of
high-voltage components. Make sure that
the printer has had time to cool before
making the repair.
• Electrical devices have certain power
requirements. For example, AC adapters are
manufactured for specific laptops.
CAUTION
Fire Safety
• Follow fire safety guidelines to protect
lives, structures, and equipment. To
avoid an electrical shock and to prevent
damage to the computer, turn off and
unplug the computer before beginning
a repair.
If there is a fire, follow these safety procedures:
• Never fight a fire that is out of control or not
contained.
• Always have a planned fire escape route
before beginning any work.
• Get out of the building quickly.
• Contact emergency services for help.
• Locate and read the instructions on the fire
extinguishers in your workplace before you
have to use them.
• Paper, wood, plastics, cardboard
• Gasoline, kerosene, organic solvents
• Electrical equipment
• Combustible metals
Each type of fire extinguisher has specific chemicals to fight
different types of fires:
P: Pull the pin
A: Aim at the base of the fire, not at the flames
S: Squeeze the lever
S: Sweep the nozzle from side to side
It is important to know how to use a fire extinguisher.
Use the memory aid P-A-S-S to remember the basic
rules of fire extinguisher operation:
Procedures to Protect Equipment and Data
• Replacing equipment and recovering
data is expensive and time consuming.
This section identifies potential threats
to systems and describes procedures to
help prevent loss and damage.
ESD and EMI
• Electrostatic discharge (ESD), harsh climates, and poor-quality sources
of electricity can cause damage to computer equipment.
• Electrostatic discharge (ESD) occurs when this buildup jumps to a
component and causes damage.
• ESD can be destructive to the electronics in a computer system.
• ESD can cause permanent damage to electrical components.
Follow these recommendations to help prevent ESD damage:
• Keep all components in antistatic bags until you are ready to install
them.
• Use grounded mats on workbenches.
• Use grounded floor mats in work areas.
• Use antistatic wrist straps when working on computers.
Electromagnetic interference (EMI)
• Electromagnetic interference (EMI) is the intrusion of outside
electromagnetic signals in a transmission media, such as
copper cabling.
• EMI does not always come from expected sources, such as
cellular phones. Other types of electric equipment can emit a
silent, invisible electromagnetic field that can extend for
more than a mile (1.6 km).
There are many sources of EMI:
• Any source designed to generate electromagnetic energy
• Man-made sources like power lines or motors
• Natural events such as electrical storms, or solar and
interstellar radiations
Power Fluctuation Types
• The following types of AC power fluctuations can cause data
loss or hardware failure:
• Blackout: Complete loss of AC power. A blown fuse, damaged
transformer, or downed power line can cause a blackout.
• Brownout: Reduced voltage level of AC power that lasts for a
period of time. Brownouts occur when the power line voltage
drops below 80 percent of the normal voltage level.
Overloading electrical circuits can cause a brownout.
Power fluctuations - When the voltage in a computer is not
accurate or steady, computer components might not operate
correctly.
• Noise: Interference from generators and
lightning. Noise results in poor quality power,
which can cause errors in a computer system.
• Spike: Sudden increase in voltage that lasts for a
short period and exceeds 100 percent of the
normal voltage on a line. Spikes can be caused by
lightning strikes, but can also occur when the
electrical system comes back on after a blackout.
• Power surge: Dramatic increase in voltage above
the normal flow of electrical current. A power
surge lasts for a few nanoseconds, or one-
billionth of a second.
Power Protection Devices
• To help shield against power fluctuation problems, use power
protection devices to protect the data and computer
equipment:
• Surge suppressor: Helps protect against damage from surges
and spikes. A surge suppressor diverts extra electrical voltage
that is on the line to the ground.
• Uninterruptible power supply (UPS): Helps protect against
potential electrical power problems by supplying a consistent
level of electrical power to a computer or other device. The
UPS provides a consistent quality of power when brownouts
and blackouts occur.
• Standby power supply (SPS): Helps protect against potential
electrical power problems by providing a backup battery to
supply power when the incoming voltage drops below the
normal level. The battery is on standby during normal
operation. This device is not as reliable as a UPS because of the
time it takes to switch over to the battery.
Procedures to Protect the Environment
Material Safety and Datasheet
• Computers and peripherals contain materials that can be
harmful to the environment. Hazardous materials are sometimes
called toxic waste. These materials can contain high
concentrations of heavy metals such as cadmium, lead, or
mercury. The regulations for the disposal of hazardous materials
vary by state or country. Contact the local recycling or waste
removal authorities in your community for information about
disposal procedures and services.
• A Material Safety and Data Sheet (MSDS) is a fact sheet that
summarizes information about material identification, including
hazardous ingredients that can affect personal health, fire
hazards, and first-aid requirements. The MSDS contains chemical
reactivity and incompatibility information. It also includes
protective measures for the safe handling and storage of
materials and spill, leak, and disposal procedures.
The MSDS contains valuable information:
• Name of the material
• Physical properties of the material
• Hazardous ingredients contained in the material
• Reactivity data, such as fire and explosion data
• Procedures for spills and leaks
• Special precautions
• Health hazards
• Special protection requirements
Equipment Disposal
• The proper disposal or recycling of
hazardous computer components is a
global issue. Make sure to follow
regulations that govern how to dispose
of specific items. Organizations that
violate these regulations can be fined or
face expensive legal battles.
Batteries
• Batteries often contain rare earth metals that can be harmful to the
environment. These metals do not decay and remain in the environment for
many years.
Monitors
• Monitors contain glass, metal, plastics, lead, barium, and rare earth metals.
According to the U.S. Environmental Protection Agency (EPA), monitors can
contain approximately 4 pounds (1.8 kg) of lead. Monitors must be disposed of
in compliance with environmental regulations.
Toner Kits, Cartridges, and Developers
• Used printer toner kits and printer cartridges must be disposed of properly or
recycled. Using refilled inkjet cartridges might also void the inkjet printer
warranty.
Chemical Solvents and Aerosol Cans
• Contact the local sanitation company to learn how and where to dispose of
the chemicals and solvents used to clean computers. Never dump chemicals or
solvents down a sink or dispose of them in a drain that connects to public
sewers.
Proper Use of Tools
• Using tools properly helps prevent
accidents and damage to equipment
and people.
Hardware Tools
• ESD tools
• Hand tools
• Cleaning tools
• Diagnostic tools
Hardware tools are grouped into four categories:
ESD Tools
Two ESD tools:
• antistatic wrist strap protects
computer equipment when grounded
to a computer chassis
• antistatic mat protects computer
equipment by preventing static
electricity from accumulating on the
hardware or on the technician.
Hand Tools
• Most tools used in the computer
assembly process are small hand tools.
They are available individually or as
part of a computer repair toolkit.
• Flat-head screwdriver: Used to tighten
or loosen slotted screws.
• Phillips-head screwdriver: Used to
tighten or loosen cross-headed screws.
• Torx screwdriver: Used to tighten
or loosen screws that have a star-
like depression on the top, a
feature that is mainly found on
laptops.
• Hex driver: Used to tighten or
loosen nuts in the same way that
a screwdriver tightens or loosens
screws (sometimes called a nut
driver).
• Tweezers: Used to
manipulate small parts.
Needle-nose pliers: Used to
hold small parts.
Wire cutters: Used to strip and cut wires.
Flashlight: Used to light up areas that you
cannot see well.
Part retriever: Used to retrieve parts from locations
that are too small for your hand to fit.
• Wire stripper: A wire stripper is used to
remove the insulation from wire so that
it can be twisted to other wires or
crimped to connectors to make a cable.
• Crimper: Used to attach connectors to
wires.
• Punch-down tool: Used to terminate
wire into termination blocks. Some
cable connectors must be connected to
cables using a punch down tool.
Cleaning Tools
• Cleaning tools helps ensure that computer
components are not damaged during cleaning.
Cleaning tools include the following:
• Soft cloth: Used to clean different computer
components without scratching or leaving
debris
• Compressed air: Used to blow away dust and
debris from different computer parts without
touching the components
• Cable ties: Used to bundle cables
neatly inside and outside of a computer
• Parts organizer: Used to hold screws,
jumpers, fasteners, and other small
parts and prevents them from getting
mixed together
Diagnostic Tools
• Diagnostic tools are used to test and
diagnose equipment.
Diagnostic tools include the following:
 A digital multimeter, is a device that can take many types
of measurements. It tests the integrity of circuits and the
quality of electricity in computer components.
• A loopback adapter, also called a
loopback plug, tests the basic
functionality of computer ports. The
adapter is specific to the port that you
want to test.
• The toner probe, is a two-part tool. The
toner part is connected to a cable at one
end using specific adapters, such as an
RJ-45, coaxial, or metal clips. The toner
generates a tone that travels the length
of the cable. The probe part traces the
cable.
Software Tools
• Software tools that used to help pinpoint and troubleshoot problems. Software tools help diagnose computer
and network problems and determine which computer device is not functioning correctly.
Disk Management Tools
Disk management tools help detect and
correct disk errors, prepare a disk for data
storage, and remove unwanted files.
The following are some disk management
tools:
Disk Management Tool: Initializes disks,
creates partitions, and formats partitions.
• FDISK: A command-line tool that creates and deletes
partitions on a hard drive.
• Format: Prepares a hard drive to store information.
• ScanDisk or CHKDSK: Checks the integrity of files and folders on a hard drive by
scanning the file system. These tools might also check the disk surface for
physical errors.
• Defrag: Optimizes space on a hard drive to allow faster access to programs and
data.
• Disk Cleanup: Clears space on a hard
drive by searching for files that can be
safely deleted.
System File Checker (SFC): A command-line tool that scans
the operating system critical files and replaces files that
are corrupted.
Protection Software Tools
• To protect data and the integrity of the operating system and hardware,
use software designed to guard against attacks and to remove malicious
programs.
Various types of software protect
hardware and data:
Windows 7 Action Center:
-Checks the status of essential
security settings.
-make sure that the software firewall
and antivirus programs are running.
-ensures that automatic updates
download and install automatically
• Antivirus program: Protects
against virus attacks.
• Window 7 Firewall: Runs
continuously to protect
against unauthorized
communications to and from
your computer.
Antispyware program: Protects
against software that sends
information about web surfing habits
to an attacker. Spyware can be
installed without the knowledge or
consent of the user.
Organizational Tools
• The documentation can then be used as a reference for
future problems or for other technicians who may not have
encountered the problem before. All repairs and computer
problems must be documented. It is important that a
technician document all services and repairs. These
documents need to be stored centrally and made available to
all other technicians.
Keeping accurate records and journals during a busy
workday can be challenging. Many organizational
tools, such as work-order systems, can help the
technician document their work.
Reference Tools
Personal Reference Tools
Personal reference tools include troubleshooting guides, manufacturer
manuals, quick reference guides, and repair journals. The documentation
in the journal includes descriptions of the problem, possible solutions
that have been attempted, and the steps taken to repair the problem.
• Notes: Refer to these notes to avoid repeating previous steps and to
determine what steps to take next.
• Journal: Document the upgrades and repairs that you perform.
Include descriptions of the problem, possible solutions that have
been tried to correct the problem, and the steps taken to repair the
problem.
• History of repairs: Make a detailed list of problems and repairs,
including the date, replacement parts, and customer information. The
history allows to determine what work has been performed on a
specific computer in the past.
Internet Reference Tools
• The Internet is an excellent source of
information about specific hardware
problems and possible solutions:
• Internet search engines
• News groups
• Manufacturer FAQs
• Online computer manuals
• Online forums and chat
• Technical websites
Activity • Demonstrate Proper Tool Use
Antistatic Wrist Strap
 Step 1. Wrap the strap around your wrist and secure
it using the snap or Velcro. The metal on the back
of the wrist strap must remain in contact with your
skin at all times.
 Step 2. Snap the connector on the end of the wire
to the wrist strap, and connect the other end either
to the equipment or to the same grounding point
that the antistatic mat is connected to. The metal
skeleton of the case is a good place to connect the
wire. When connecting the wire to equipment that
you are working on, choose an unpainted metal
surface. A painted surface does not conduct
electricity as well as unpainted metal.
• NOTE
• Attach the wire on the same side of the
equipment as the arm wearing the antistatic
wrist strap. This helps keep the wire out of the
way while you are working.
• Although wearing a wrist strap helps prevent
ESD, you can further reduce the risks by not
wearing clothing made of silk, polyester, or
wool. These fabrics are more likely to generate
a static charge.
Antistatic Mat • Step 1. Lay the mat on the workspace next to
or under the computer case.
• Step 2. Clip the mat to the case to provide a
grounded surface on which you can place
parts as you remove them from the system.
When you are working at a workbench, ground
the workbench and the antistatic floor mat. By
standing on the mat and wearing the wrist strap,
your body has the same charge as the
equipment and reduces the probability of ESD.
Either connect the table-top mat and the floor
mat to each other, or connect both to the
electrical earth ground.
NOTE
• Always handle components by the edges.
Summary • This chapter discussed safe lab procedures, correct tool usage, and the
proper disposal of computer components and supplies.
Some of the important concepts to remember from this chapter:
• Work in a safe manner to protect users and equipment.
• Follow all safety guidelines to prevent injuries to yourself and others.
• Know how to protect equipment from ESD damage.
• Know about and be able to prevent power issues that can cause
equipment damage or data loss.
• Know which products and supplies require special disposal procedures.
• Familiarize yourself with the MSDS for safety issues and disposal
restrictions to help protect the environment.
• Be able to use the correct tools for the task.
• Know how to clean components safely.
• Use organizational tools during computer repairs.
• What are safe working conditions and procedures?
• What procedures help protect equipment and data?
• What procedures help to properly dispose of hazardous
computer components and related material?
• What tools and software are used with personal computer
components and what is their purpose?
• What is proper tool use?
Use of hand tools

More Related Content

PPTX
CHS Tools
PPTX
Proper tool selection
PPTX
Lesson 3 using hand tools
PPTX
Use of tools chs
PDF
K to 12 computer hardware servicing
PPTX
Proper tools selection
PPTX
PPTX
Performing Computer Operations [Autosaved].pptx
CHS Tools
Proper tool selection
Lesson 3 using hand tools
Use of tools chs
K to 12 computer hardware servicing
Proper tools selection
Performing Computer Operations [Autosaved].pptx

What's hot (20)

PPTX
TLE - COMPUTER SYSTEMS SERVICING - HAND TOOLS
PPTX
Tools and equipment in computer hardware servicing
PPTX
Computer hardware servicing 7
PDF
Curriculum guide ICT 7
PPTX
Occupational health and safety procedures
PPTX
EIM 7/8 Lesson 1: Prepare Electrical Tools and Materials
PPTX
TLE7 EIM Week 4 3rd Q analyzing symbols and data.pptx
PPTX
Computer System Servicing Hand Tools
PPTX
Electrical signs and symbols
PDF
Computer Hand Tools_Lesson Plan
PDF
DepEd TLE Computer Hardware Servicing Curriculum Guide Grade 7-10
PPTX
Terminating and Connecting Electrical Wiring and Electronic Circuits (TCEC) ....
PDF
TLE-IA Carpentry Curriculum Guide
PDF
Electrical tools and equipment
PPTX
EIM 7/8 Lesson 2: Perform Mensuration and Calculation
PPTX
Lesson 7_Practice Occupational Health and Safety Procedures (LO1)
PPTX
Introduction to Electrical Installation and Maintenance
PPTX
Computer hardware servicing lesson 2:Perform Mensuration And Calculation
 
PPTX
Computer hardware servicing practice occupational health and safety procedure
PPTX
Evaluating and controlling hazards and risks
TLE - COMPUTER SYSTEMS SERVICING - HAND TOOLS
Tools and equipment in computer hardware servicing
Computer hardware servicing 7
Curriculum guide ICT 7
Occupational health and safety procedures
EIM 7/8 Lesson 1: Prepare Electrical Tools and Materials
TLE7 EIM Week 4 3rd Q analyzing symbols and data.pptx
Computer System Servicing Hand Tools
Electrical signs and symbols
Computer Hand Tools_Lesson Plan
DepEd TLE Computer Hardware Servicing Curriculum Guide Grade 7-10
Terminating and Connecting Electrical Wiring and Electronic Circuits (TCEC) ....
TLE-IA Carpentry Curriculum Guide
Electrical tools and equipment
EIM 7/8 Lesson 2: Perform Mensuration and Calculation
Lesson 7_Practice Occupational Health and Safety Procedures (LO1)
Introduction to Electrical Installation and Maintenance
Computer hardware servicing lesson 2:Perform Mensuration And Calculation
 
Computer hardware servicing practice occupational health and safety procedure
Evaluating and controlling hazards and risks
Ad

Similar to Use of hand tools (20)

DOCX
Introduction safety
PDF
POLITEKNIK MALAYSIA
PPTX
Safe Lab Procedures
PPT
Ch2 Presentation
PPT
ITE_50_Chapter2.ppt
PPTX
Chapter9_SafetyLabProcedureAndToolUse.pptx
PPTX
Week 1 Session 1 Networking Coventry University
PPTX
Occupational-Health-And-Safety.pptx
PPTX
5s and Occupational Health and Safety Procedures
PDF
CSSM-LESSON-SLIDES_061738.pdfhwhhwgggwgg
PPTX
Understanding Computer system.pptx Grade 12
PPTX
Occupational Safety and health powerpoint
PPTX
computer hardware serving lesson 3 grade 7/8
PPTX
PCO - LEC1 - Plan and prepare for task to be undertaken.pptx
PPTX
TLE 7-OHS.pptx............................................
PPTX
CSS W1.pptx
PPTX
Pace IT - Introduction to Safety Procedures
PPTX
LESSON 1-ASSEMBLE COMPUTER HARDWARE.pptx
PPTX
chapter one maintenance /chapter one maintenance
PPTX
Occupational Health Safety Standards
Introduction safety
POLITEKNIK MALAYSIA
Safe Lab Procedures
Ch2 Presentation
ITE_50_Chapter2.ppt
Chapter9_SafetyLabProcedureAndToolUse.pptx
Week 1 Session 1 Networking Coventry University
Occupational-Health-And-Safety.pptx
5s and Occupational Health and Safety Procedures
CSSM-LESSON-SLIDES_061738.pdfhwhhwgggwgg
Understanding Computer system.pptx Grade 12
Occupational Safety and health powerpoint
computer hardware serving lesson 3 grade 7/8
PCO - LEC1 - Plan and prepare for task to be undertaken.pptx
TLE 7-OHS.pptx............................................
CSS W1.pptx
Pace IT - Introduction to Safety Procedures
LESSON 1-ASSEMBLE COMPUTER HARDWARE.pptx
chapter one maintenance /chapter one maintenance
Occupational Health Safety Standards
Ad

Recently uploaded (20)

PPTX
Module 1 Introduction to Web Programming .pptx
PDF
4 layer Arch & Reference Arch of IoT.pdf
PDF
Advancing precision in air quality forecasting through machine learning integ...
PDF
Connector Corner: Transform Unstructured Documents with Agentic Automation
PDF
Human Computer Interaction Miterm Lesson
PPTX
AI-driven Assurance Across Your End-to-end Network With ThousandEyes
PDF
Early detection and classification of bone marrow changes in lumbar vertebrae...
PDF
Auditboard EB SOX Playbook 2023 edition.
PDF
Transform-Your-Supply-Chain-with-AI-Driven-Quality-Engineering.pdf
PDF
Rapid Prototyping: A lecture on prototyping techniques for interface design
PDF
Accessing-Finance-in-Jordan-MENA 2024 2025.pdf
PDF
Transform-Your-Factory-with-AI-Driven-Quality-Engineering.pdf
PDF
LMS bot: enhanced learning management systems for improved student learning e...
PPTX
MuleSoft-Compete-Deck for midddleware integrations
PDF
SaaS reusability assessment using machine learning techniques
PDF
A hybrid framework for wild animal classification using fine-tuned DenseNet12...
PDF
zbrain.ai-Scope Key Metrics Configuration and Best Practices.pdf
PDF
Transform-Quality-Engineering-with-AI-A-60-Day-Blueprint-for-Digital-Success.pdf
PPTX
SGT Report The Beast Plan and Cyberphysical Systems of Control
PDF
Build Real-Time ML Apps with Python, Feast & NoSQL
Module 1 Introduction to Web Programming .pptx
4 layer Arch & Reference Arch of IoT.pdf
Advancing precision in air quality forecasting through machine learning integ...
Connector Corner: Transform Unstructured Documents with Agentic Automation
Human Computer Interaction Miterm Lesson
AI-driven Assurance Across Your End-to-end Network With ThousandEyes
Early detection and classification of bone marrow changes in lumbar vertebrae...
Auditboard EB SOX Playbook 2023 edition.
Transform-Your-Supply-Chain-with-AI-Driven-Quality-Engineering.pdf
Rapid Prototyping: A lecture on prototyping techniques for interface design
Accessing-Finance-in-Jordan-MENA 2024 2025.pdf
Transform-Your-Factory-with-AI-Driven-Quality-Engineering.pdf
LMS bot: enhanced learning management systems for improved student learning e...
MuleSoft-Compete-Deck for midddleware integrations
SaaS reusability assessment using machine learning techniques
A hybrid framework for wild animal classification using fine-tuned DenseNet12...
zbrain.ai-Scope Key Metrics Configuration and Best Practices.pdf
Transform-Quality-Engineering-with-AI-A-60-Day-Blueprint-for-Digital-Success.pdf
SGT Report The Beast Plan and Cyberphysical Systems of Control
Build Real-Time ML Apps with Python, Feast & NoSQL

Use of hand tools

  • 1. USE OF HAND TOOLS
  • 2. Objective:  Identify the different uses of Hand tools  Demonstrate the proper use of hand tools  Select properly the Hand tools according to industry standards  Give the importance of hand tools in computer system servicing
  • 3. CONTENT • Objectives • Key Terms • Introduction • Safe Lab Procedures • Procedures to Protect Equipment and Data • Procedures to Protect the Environment • Proper Use of Tools • Summary • Check Your Understanding
  • 4. • A tool is a handheld device that aids in accomplishing a task. Tools range from a traditional metal cutting part of a machine to an element of a computer program that activates and controls a particular function.
  • 5. • This chapter covers basic safety practices for the workplace, hardware and software tools, and the disposal of hazardous materials. Safety guidelines help protect individuals from accidents and injury. They also help to protect equipment from damage. Some of these guidelines are designed to protect the environment from contamination caused by improperly discarded materials. You will also learn how to protect equipment and data, and how to properly use hand and software tools.
  • 6. Safe Lab Procedures • Safety in the lab. Safety guidelines help protect individuals from accidents and injury. They also help to protect equipment from damage. Some of these guidelines are designed to protect the environment from contamination caused by improperly discarded materials.
  • 7. General Safety • Safe working conditions help prevent injury to people and damage to computer equipment. A safe workspace is clean, organized, and properly lighted. Everyone must understand and follow safety procedures.
  • 8. • Follow the basic safety guidelines to prevent cuts, burns, electrical shock, and damage to eyesight. As a best practice, make sure that a fire extinguisher and first-aid kit are available in case of fire or injury. Poorly placed or unsecured cables can cause tripping hazards in a network installation. Cables should be installed in conduit or cable trays to prevent hazards.
  • 9. LIST OF BASIC SAFETY PRECAUTIONS • Remove your watch and jewelry and secure loose clothing. • Turn off the power and unplug equipment before performing service. • Cover sharp edges inside the computer case with tape. • Never open a power supply or a CRT monitor. • Do not touch areas in printers that are hot or that use high voltage. • Know where the fire extinguisher is located and how to use it. • Keep food and drinks out of your workspace. • Keep your workspace clean and free of clutter. • Bend your knees when lifting heavy objects to avoid injuring your back.
  • 10. Electrical Safety • Follow electrical safety guidelines to prevent electrical fires, injuries, and fatalities in the home and the workplace.
  • 11. • Do not wear the antistatic wrist strap when repairing power supplies or CRT monitors. • Check the printer manual for the location of high-voltage components. Make sure that the printer has had time to cool before making the repair. • Electrical devices have certain power requirements. For example, AC adapters are manufactured for specific laptops. CAUTION
  • 12. Fire Safety • Follow fire safety guidelines to protect lives, structures, and equipment. To avoid an electrical shock and to prevent damage to the computer, turn off and unplug the computer before beginning a repair.
  • 13. If there is a fire, follow these safety procedures: • Never fight a fire that is out of control or not contained. • Always have a planned fire escape route before beginning any work. • Get out of the building quickly. • Contact emergency services for help. • Locate and read the instructions on the fire extinguishers in your workplace before you have to use them.
  • 14. • Paper, wood, plastics, cardboard • Gasoline, kerosene, organic solvents • Electrical equipment • Combustible metals Each type of fire extinguisher has specific chemicals to fight different types of fires:
  • 15. P: Pull the pin A: Aim at the base of the fire, not at the flames S: Squeeze the lever S: Sweep the nozzle from side to side It is important to know how to use a fire extinguisher. Use the memory aid P-A-S-S to remember the basic rules of fire extinguisher operation:
  • 16. Procedures to Protect Equipment and Data • Replacing equipment and recovering data is expensive and time consuming. This section identifies potential threats to systems and describes procedures to help prevent loss and damage.
  • 17. ESD and EMI • Electrostatic discharge (ESD), harsh climates, and poor-quality sources of electricity can cause damage to computer equipment. • Electrostatic discharge (ESD) occurs when this buildup jumps to a component and causes damage. • ESD can be destructive to the electronics in a computer system. • ESD can cause permanent damage to electrical components. Follow these recommendations to help prevent ESD damage: • Keep all components in antistatic bags until you are ready to install them. • Use grounded mats on workbenches. • Use grounded floor mats in work areas. • Use antistatic wrist straps when working on computers.
  • 18. Electromagnetic interference (EMI) • Electromagnetic interference (EMI) is the intrusion of outside electromagnetic signals in a transmission media, such as copper cabling. • EMI does not always come from expected sources, such as cellular phones. Other types of electric equipment can emit a silent, invisible electromagnetic field that can extend for more than a mile (1.6 km). There are many sources of EMI: • Any source designed to generate electromagnetic energy • Man-made sources like power lines or motors • Natural events such as electrical storms, or solar and interstellar radiations
  • 19. Power Fluctuation Types • The following types of AC power fluctuations can cause data loss or hardware failure: • Blackout: Complete loss of AC power. A blown fuse, damaged transformer, or downed power line can cause a blackout. • Brownout: Reduced voltage level of AC power that lasts for a period of time. Brownouts occur when the power line voltage drops below 80 percent of the normal voltage level. Overloading electrical circuits can cause a brownout. Power fluctuations - When the voltage in a computer is not accurate or steady, computer components might not operate correctly.
  • 20. • Noise: Interference from generators and lightning. Noise results in poor quality power, which can cause errors in a computer system. • Spike: Sudden increase in voltage that lasts for a short period and exceeds 100 percent of the normal voltage on a line. Spikes can be caused by lightning strikes, but can also occur when the electrical system comes back on after a blackout. • Power surge: Dramatic increase in voltage above the normal flow of electrical current. A power surge lasts for a few nanoseconds, or one- billionth of a second.
  • 21. Power Protection Devices • To help shield against power fluctuation problems, use power protection devices to protect the data and computer equipment: • Surge suppressor: Helps protect against damage from surges and spikes. A surge suppressor diverts extra electrical voltage that is on the line to the ground. • Uninterruptible power supply (UPS): Helps protect against potential electrical power problems by supplying a consistent level of electrical power to a computer or other device. The UPS provides a consistent quality of power when brownouts and blackouts occur. • Standby power supply (SPS): Helps protect against potential electrical power problems by providing a backup battery to supply power when the incoming voltage drops below the normal level. The battery is on standby during normal operation. This device is not as reliable as a UPS because of the time it takes to switch over to the battery.
  • 22. Procedures to Protect the Environment
  • 23. Material Safety and Datasheet • Computers and peripherals contain materials that can be harmful to the environment. Hazardous materials are sometimes called toxic waste. These materials can contain high concentrations of heavy metals such as cadmium, lead, or mercury. The regulations for the disposal of hazardous materials vary by state or country. Contact the local recycling or waste removal authorities in your community for information about disposal procedures and services. • A Material Safety and Data Sheet (MSDS) is a fact sheet that summarizes information about material identification, including hazardous ingredients that can affect personal health, fire hazards, and first-aid requirements. The MSDS contains chemical reactivity and incompatibility information. It also includes protective measures for the safe handling and storage of materials and spill, leak, and disposal procedures.
  • 24. The MSDS contains valuable information: • Name of the material • Physical properties of the material • Hazardous ingredients contained in the material • Reactivity data, such as fire and explosion data • Procedures for spills and leaks • Special precautions • Health hazards • Special protection requirements
  • 25. Equipment Disposal • The proper disposal or recycling of hazardous computer components is a global issue. Make sure to follow regulations that govern how to dispose of specific items. Organizations that violate these regulations can be fined or face expensive legal battles.
  • 26. Batteries • Batteries often contain rare earth metals that can be harmful to the environment. These metals do not decay and remain in the environment for many years. Monitors • Monitors contain glass, metal, plastics, lead, barium, and rare earth metals. According to the U.S. Environmental Protection Agency (EPA), monitors can contain approximately 4 pounds (1.8 kg) of lead. Monitors must be disposed of in compliance with environmental regulations. Toner Kits, Cartridges, and Developers • Used printer toner kits and printer cartridges must be disposed of properly or recycled. Using refilled inkjet cartridges might also void the inkjet printer warranty. Chemical Solvents and Aerosol Cans • Contact the local sanitation company to learn how and where to dispose of the chemicals and solvents used to clean computers. Never dump chemicals or solvents down a sink or dispose of them in a drain that connects to public sewers.
  • 27. Proper Use of Tools • Using tools properly helps prevent accidents and damage to equipment and people.
  • 28. Hardware Tools • ESD tools • Hand tools • Cleaning tools • Diagnostic tools Hardware tools are grouped into four categories:
  • 29. ESD Tools Two ESD tools: • antistatic wrist strap protects computer equipment when grounded to a computer chassis • antistatic mat protects computer equipment by preventing static electricity from accumulating on the hardware or on the technician.
  • 30. Hand Tools • Most tools used in the computer assembly process are small hand tools. They are available individually or as part of a computer repair toolkit. • Flat-head screwdriver: Used to tighten or loosen slotted screws. • Phillips-head screwdriver: Used to tighten or loosen cross-headed screws.
  • 31. • Torx screwdriver: Used to tighten or loosen screws that have a star- like depression on the top, a feature that is mainly found on laptops. • Hex driver: Used to tighten or loosen nuts in the same way that a screwdriver tightens or loosens screws (sometimes called a nut driver).
  • 32. • Tweezers: Used to manipulate small parts. Needle-nose pliers: Used to hold small parts. Wire cutters: Used to strip and cut wires.
  • 33. Flashlight: Used to light up areas that you cannot see well. Part retriever: Used to retrieve parts from locations that are too small for your hand to fit.
  • 34. • Wire stripper: A wire stripper is used to remove the insulation from wire so that it can be twisted to other wires or crimped to connectors to make a cable. • Crimper: Used to attach connectors to wires.
  • 35. • Punch-down tool: Used to terminate wire into termination blocks. Some cable connectors must be connected to cables using a punch down tool.
  • 36. Cleaning Tools • Cleaning tools helps ensure that computer components are not damaged during cleaning. Cleaning tools include the following: • Soft cloth: Used to clean different computer components without scratching or leaving debris • Compressed air: Used to blow away dust and debris from different computer parts without touching the components
  • 37. • Cable ties: Used to bundle cables neatly inside and outside of a computer • Parts organizer: Used to hold screws, jumpers, fasteners, and other small parts and prevents them from getting mixed together
  • 38. Diagnostic Tools • Diagnostic tools are used to test and diagnose equipment. Diagnostic tools include the following:  A digital multimeter, is a device that can take many types of measurements. It tests the integrity of circuits and the quality of electricity in computer components.
  • 39. • A loopback adapter, also called a loopback plug, tests the basic functionality of computer ports. The adapter is specific to the port that you want to test. • The toner probe, is a two-part tool. The toner part is connected to a cable at one end using specific adapters, such as an RJ-45, coaxial, or metal clips. The toner generates a tone that travels the length of the cable. The probe part traces the cable.
  • 40. Software Tools • Software tools that used to help pinpoint and troubleshoot problems. Software tools help diagnose computer and network problems and determine which computer device is not functioning correctly. Disk Management Tools Disk management tools help detect and correct disk errors, prepare a disk for data storage, and remove unwanted files. The following are some disk management tools: Disk Management Tool: Initializes disks, creates partitions, and formats partitions.
  • 41. • FDISK: A command-line tool that creates and deletes partitions on a hard drive.
  • 42. • Format: Prepares a hard drive to store information. • ScanDisk or CHKDSK: Checks the integrity of files and folders on a hard drive by scanning the file system. These tools might also check the disk surface for physical errors. • Defrag: Optimizes space on a hard drive to allow faster access to programs and data.
  • 43. • Disk Cleanup: Clears space on a hard drive by searching for files that can be safely deleted. System File Checker (SFC): A command-line tool that scans the operating system critical files and replaces files that are corrupted.
  • 44. Protection Software Tools • To protect data and the integrity of the operating system and hardware, use software designed to guard against attacks and to remove malicious programs. Various types of software protect hardware and data: Windows 7 Action Center: -Checks the status of essential security settings. -make sure that the software firewall and antivirus programs are running. -ensures that automatic updates download and install automatically
  • 45. • Antivirus program: Protects against virus attacks.
  • 46. • Window 7 Firewall: Runs continuously to protect against unauthorized communications to and from your computer. Antispyware program: Protects against software that sends information about web surfing habits to an attacker. Spyware can be installed without the knowledge or consent of the user.
  • 47. Organizational Tools • The documentation can then be used as a reference for future problems or for other technicians who may not have encountered the problem before. All repairs and computer problems must be documented. It is important that a technician document all services and repairs. These documents need to be stored centrally and made available to all other technicians. Keeping accurate records and journals during a busy workday can be challenging. Many organizational tools, such as work-order systems, can help the technician document their work. Reference Tools
  • 48. Personal Reference Tools Personal reference tools include troubleshooting guides, manufacturer manuals, quick reference guides, and repair journals. The documentation in the journal includes descriptions of the problem, possible solutions that have been attempted, and the steps taken to repair the problem. • Notes: Refer to these notes to avoid repeating previous steps and to determine what steps to take next. • Journal: Document the upgrades and repairs that you perform. Include descriptions of the problem, possible solutions that have been tried to correct the problem, and the steps taken to repair the problem. • History of repairs: Make a detailed list of problems and repairs, including the date, replacement parts, and customer information. The history allows to determine what work has been performed on a specific computer in the past.
  • 49. Internet Reference Tools • The Internet is an excellent source of information about specific hardware problems and possible solutions: • Internet search engines • News groups • Manufacturer FAQs • Online computer manuals • Online forums and chat • Technical websites
  • 50. Activity • Demonstrate Proper Tool Use Antistatic Wrist Strap  Step 1. Wrap the strap around your wrist and secure it using the snap or Velcro. The metal on the back of the wrist strap must remain in contact with your skin at all times.  Step 2. Snap the connector on the end of the wire to the wrist strap, and connect the other end either to the equipment or to the same grounding point that the antistatic mat is connected to. The metal skeleton of the case is a good place to connect the wire. When connecting the wire to equipment that you are working on, choose an unpainted metal surface. A painted surface does not conduct electricity as well as unpainted metal.
  • 51. • NOTE • Attach the wire on the same side of the equipment as the arm wearing the antistatic wrist strap. This helps keep the wire out of the way while you are working. • Although wearing a wrist strap helps prevent ESD, you can further reduce the risks by not wearing clothing made of silk, polyester, or wool. These fabrics are more likely to generate a static charge.
  • 52. Antistatic Mat • Step 1. Lay the mat on the workspace next to or under the computer case. • Step 2. Clip the mat to the case to provide a grounded surface on which you can place parts as you remove them from the system. When you are working at a workbench, ground the workbench and the antistatic floor mat. By standing on the mat and wearing the wrist strap, your body has the same charge as the equipment and reduces the probability of ESD. Either connect the table-top mat and the floor mat to each other, or connect both to the electrical earth ground. NOTE • Always handle components by the edges.
  • 53. Summary • This chapter discussed safe lab procedures, correct tool usage, and the proper disposal of computer components and supplies. Some of the important concepts to remember from this chapter: • Work in a safe manner to protect users and equipment. • Follow all safety guidelines to prevent injuries to yourself and others. • Know how to protect equipment from ESD damage. • Know about and be able to prevent power issues that can cause equipment damage or data loss. • Know which products and supplies require special disposal procedures. • Familiarize yourself with the MSDS for safety issues and disposal restrictions to help protect the environment. • Be able to use the correct tools for the task. • Know how to clean components safely. • Use organizational tools during computer repairs.
  • 54. • What are safe working conditions and procedures? • What procedures help protect equipment and data? • What procedures help to properly dispose of hazardous computer components and related material? • What tools and software are used with personal computer components and what is their purpose? • What is proper tool use?

Editor's Notes

  • #45: Each year, viruses, spyware, and other types of malicious attacks infect millions of computers. These attacks can damage operating systems, applications, and data. Computers that have been infected may even have problems with hardware performance or component failure.
  • #48: The documents can be paper based, but electronic forms are preferred because they can be easily searched for specific problems. The documentation can then be used as reference material for similar problems that are encountered in the future. Good customer service includes providing the customer with a detailed description of the problem and the solution.