Information Sheet
Information Sheet
2-1
(Safety procedures)
Learning Objectives:
After reading this INFORMATION SHEET, YOU MUST be able to:
1. To understand the disadvantages of not following safety procedures.
2. To identify the personal protective equipment as per job requirement.
Introduction:
At the Practical work area of the training center, the trainees must be
aware of the safety procedure in the working area. In many types of work, hand
tools are used every day. They make work easier and allow people to be more
efficient. However, many students often fail to see the hazards these tools can
present. In this module safety procedures shows trainees how accidents can be
significantly reduced and reviews the various hazards that are associated with
specific types of tools.
Whenever you perform a task in the workshop you must use personal
protective clothing and equipment (PPE) that is appropriate for the task and
which conforms to your local safety regulations and policies. Among other
items, this may include.
Safety requirements
For your protection, observe the following safety requirements:
a. Follow all cautions, warnings and instructions marked on the
equipment.
b. Ensure that the voltage and frequency rating of the power outlet matches
the electrical rating labels on the system.
c. Use properly grounded power outlets.
Safety precautions
TOOLS UNSAFE EXPERIENCE DO’S AND DON’TS
AC power cord Grounded unplug AC cord
Wrist strap Discharge(ESD wear wrist strap
Electrostatic when handling
Printed
High voltage not identify high voltage marked bright yellow
Equipment warning sticker
power supply Burn/explode Change power supply
Safety check
- Make sure that you understand and observe all legislative and personal
safety procedures when carrying out the following tasks.
Learning Objectives:
After reading this INFORMATION SHEET, YOU MUST be able to:
1. Understand the importance of planning and performing computer system maintenance
2. Be able to perform routine housekeeping on computer systems
Preventive Maintenance
Condition Based Maintenance (CBM) is a maintenance strategy that uses the actual
condition of the asset to decide what maintenance needs to be done. CBM dictates that
maintenance should only be performed when certain indicators show decreasing performance
or upcoming failure. Checking a machine for these indicators may include non-invasive
measurements, visual inspection, performance data and scheduled tests. Condition data can be
gathered at certain intervals, or continuously.
Maintenance Procedures
The following topics will familiarize you with planning and preparing for installation;
installing equipment and devices; and conducting test on the installed computer system. Read
carefully all the topics and apply the skills you have gained from the lessons provided in this
module.
Computers, in general, are pretty stable, and you can usually rely on them to not fail
you. However. If you develop some basic habits, you can postpone serious computer
problems, if not avoiding them entirely.
Signs of imminent failure might include regular poor performance, frequent errors and/or
popups, unknown programs being installed, frequent power loss (the computer shuts down
automatically frequently), frequent crashes, or certain parts not working.
4. Malware issues. Make sure that your anti-virus software is updated to be able to scan
unnecessary files that enter your PC. Do not install programs that you’re not familiar with or
if do not fully trust.
Figure 12.Hardware
Network Problems
When you suddenly cannot connect to the Internet, any of several things could be
wrong. Use this checklist to find and solve common Internet connection problems.
Unplugged or loose network cables are one of the most common reasons why you might
suddenly find yourself unable to connect to the Internet. That's a problem on wireless networks,
but on most laptops the wireless-fidelity (Wi-Fi) radio can be inadvertently shut off instead. On
home networks, it's also possible that someone unplugged the router.
Action: Ensure your wired or wireless network hardware is switched on and plugged in.
What may seem to be a network problem connecting to the Internet is sometimes simply
a Web site (or whatever server is on the other end of the connection) being temporarily offline.
Action: Before assuming your Internet connection is faulty, try visiting several popular Web
sites rather than just one.
3. IP Address Conflicts
If your computer and another on the network both have the same IP address, the conflict
between them will prevent either from working properly online.
Action: To resolve an IP conflict, follow these instructions to release and renew your IP
address. If your network uses static IP addresses, manually change your IP to a different
number.
Windows 7
Step 1:
Click Start > Run. In the Run window, enter “cmd” then click OK.
Step 2:
On the command prompt, enter “ipconfig/release” then press [Enter].
Once the IP address becomes 0.0.0.0, enter “ipconfig/renew” then press [Enter].
Firewall software running on most computers is intended to prevent unwanted network traffic
from disrupting its operation. Unfortunately, these software firewalls can malfunction and start
blocking valid Internet traffic. When two software firewalls, such as Windows Firewall plus a
third-party product, are installed on the same computer, contention between the two can also
incorrectly block traffic.
Action: If you have recently installed or upgraded software firewalls on your computer,
temporarily disable them to determine whether it may be the cause of Internet connection
problems.
The performance of Wi-Fi network connections depends on distance between the device
and the wireless access point. The farther away a Wi-Fi device is, the slower the local
connection generally runs, until it breaks altogether. Wireless signal interference in the area can
also limit the effective range of a Wi-Fi connection. Whenever you are unable to reach the
access point, you also cannot connect to the Internet, obviously.
Action: Use one of the options written below to measure the strength of your wireless signal
and try these ideas to expand the range of your Wi-Fi.
Ideally, you should place the router at a height in some central location and away from other
cordless devices. Make sure that the router is not placed near something metallic (like an
almirah or window grills) as that will weaken the wireless signals. Avoid mirrors as they can
reflect the wireless signals away from the desired direction.
Wireless routers generally ship with omni-directional antennas but you can replace them with
more powerful uni-directional antennas and that will keep the signal from getting broadcast in all
directions.
Action: Check the router's lights and console if possible to ensure it is running and responding
properly. Troubleshoot and reset the router if necessary. Change the old router if necessary.
8. Blocked By Your Service Provider
Internet Service Providers (ISPs) can choose to block access from your account if you
fail to make payment or otherwise violate the provider's Terms of Service. Especially when
using paid hotspots that charge by the hour or day, sometimes people forget to keep their
subscription updated. Other common reasons an ISP might block your account include
exceeding bandwidth caps, sending spam e-mail, and downloading illegal or inappropriate
content.
Action: Contact your ISP if you suspect your account has been blocked.
9. Computer Glitches
Computers suffer from technical glitches or malfunctions. Although relatively uncommon
nowadays, a computer's network adapter hardware might suddenly fail due to overheating or
age. Failures in the operating system software that control the adapter, on the other hand, can
occur frequently especially with computers that are heavily used. Viruses and worms also may
disable or block a computer's network interfaces from functioning properly. If using a laptop or
other mobile device, transporting it from one location to another can corrupt the state of its
network.
Action: Check the computer and remove any malware that you will find. On Windows
computers, try resetting the network connection. Reboot the computer if necessary.