0% found this document useful (0 votes)
49 views15 pages

Information Sheet

The document provides guidelines for safety procedures and maintenance of computer systems. It outlines the importance of following safety precautions like wearing personal protective equipment appropriate for the task. Proper preventative maintenance is key to avoiding equipment issues and includes monitoring equipment condition, performing routine cleaning, and updating software and virus protection. The document provides checklists for inspecting computer equipment and guidelines for proper computer placement, usage, and handling to maximize safety and performance.

Uploaded by

raziel yurag
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
49 views15 pages

Information Sheet

The document provides guidelines for safety procedures and maintenance of computer systems. It outlines the importance of following safety precautions like wearing personal protective equipment appropriate for the task. Proper preventative maintenance is key to avoiding equipment issues and includes monitoring equipment condition, performing routine cleaning, and updating software and virus protection. The document provides checklists for inspecting computer equipment and guidelines for proper computer placement, usage, and handling to maximize safety and performance.

Uploaded by

raziel yurag
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 15

Information Sheet 4.

2-1
(Safety procedures)

Learning Objectives:
After reading this INFORMATION SHEET, YOU MUST be able to:
1. To understand the disadvantages of not following safety procedures.
2. To identify the personal protective equipment as per job requirement.

Introduction:
At the Practical work area of the training center, the trainees must be
aware of the safety procedure in the working area. In many types of work, hand
tools are used every day. They make work easier and allow people to be more
efficient. However, many students often fail to see the hazards these tools can
present. In this module safety procedures shows trainees how accidents can be
significantly reduced and reviews the various hazards that are associated with
specific types of tools.
Whenever you perform a task in the workshop you must use personal
protective clothing and equipment (PPE) that is appropriate for the task and
which conforms to your local safety regulations and policies. Among other
items, this may include.

Safety requirements
For your protection, observe the following safety requirements:
a. Follow all cautions, warnings and instructions marked on the
equipment.
b. Ensure that the voltage and frequency rating of the power outlet matches
the electrical rating labels on the system.
c. Use properly grounded power outlets.

Safety precautions
TOOLS UNSAFE EXPERIENCE DO’S AND DON’TS
AC power cord Grounded unplug AC cord
Wrist strap Discharge(ESD wear wrist strap
Electrostatic when handling
Printed
High voltage not identify high voltage marked bright yellow
Equipment warning sticker
power supply Burn/explode Change power supply

Date Developed: Document No. _________


Computer Systems ____________
Issued by:
Servicing NCII Date Revised:
______________ Page 1 of 250
Developed by: _________
Data Gathering
GRETCHELL C. YURAG
Instrument Revision # ___
Date Developed: Document No. _________
Computer Systems ____________
Issued by:
Servicing NCII Date Revised:
______________ Page 2 of 250
Developed by: _________
Data Gathering
GRETCHELL C. YURAG
Instrument Revision # ___
KINDS & USE OF PERSONAL PROTECTIVE EQUIPMENT

Work clothing - refers to the various suits and


uniforms worn to protect the user from harm.

Eye protection- provide better protection than


safety glasses, and are effective in preventing
eye injury from chemical splashes, impact,
dusty environments.

Anti-static wrist strap-ground bracelet is an


antistatic device used to safely ground a person
working on very sensitive electronic equipment.

Gloves – the covering materials with a separate


Sheath for each finger used for hand protection.

Rubber sole – a special type of shoes used


to prevent electrical shock and for waterproofing
and insulating purposes.

Dust mask- a covering for the face to prevent the


Inhaling or absorbing dust and other chemicals

Safety check

- Make sure designated walkways are kept clear of any obstruction.

- Do not use flammable cleaners or water on electrical equipment.

- Always wear protective clothing and the appropriate safety equipment.

- Make sure that you understand and observe all legislative and personal
safety procedures when carrying out the following tasks.

Date Developed: Document No. _________


Computer Systems ____________
Issued by:
Servicing NCII Date Revised:
______________ Page 3 of 250
Developed by: _________
Data Gathering
GRETCHELL C. YURAG
Instrument Revision # ___
Information Sheet 4.2-2
(Procedures in Planning and Conducting Maintenance)

Learning Objectives:
After reading this INFORMATION SHEET, YOU MUST be able to:
1. Understand the importance of planning and performing computer system maintenance
2. Be able to perform routine housekeeping on computer systems

Preventive Maintenance

Preventive maintenance can be described as maintenance of equipment or systems


before fault occurs. It can be divided into two subgroups: Planned Maintenance and
Conditioned-Based Maintenance.

Planned Maintenance (PM) is any variety of scheduled maintenance to an object or item


of equipment. Specifically, PM is a scheduled service visit carried out by a competent and
suitable agent, to ensure that an item of equipment is operating correctly to avoid any
unscheduled breakdown and downtime of an equipment.

Condition Based Maintenance (CBM) is a maintenance strategy that uses the actual
condition of the asset to decide what maintenance needs to be done. CBM dictates that
maintenance should only be performed when certain indicators show decreasing performance
or upcoming failure. Checking a machine for these indicators may include non-invasive
measurements, visual inspection, performance data and scheduled tests. Condition data can be
gathered at certain intervals, or continuously.

Maintenance Procedures

In preparing maintenance procedure, you also have to consider designing a systematic


plan for both for hardware and software. This saves time, money and frustration and ensures
safe conditions to prevent injury to people and damage to computer equipment.

Date Developed: Document No. _________


Computer Systems ____________
Issued by:
Servicing NCII Date Revised:
______________ Page 4 of 250
Developed by: _________
Data Gathering
GRETCHELL C. YURAG
Instrument Revision # ___
Figure 1. Computer Inspection
Planning Maintenance Procedures for Computer System and Networking:

Design a systematic maintenance plan for hardware.


Design a monitoring, evaluating and updating plan.

Place your computer in a well-ventilated area.

Schedule the use of computer for its longer life.

Move the computer only when it is turned off and unplugged.

Treat your computer properly.

Design a systematic maintenance plan for your software.

Backup your files.

Install or secure passwords.

Delete temporary files.

Update anti-virus and spyware.

Design a systematic monitoring, evaluating and updating plan for


hardware.

Computers have significantly changed the working environment, simplifying and


speeding up many tasks across many work areas. However, with these advances are
some potential problems and maintenance issues. These guidelines describe how
computer technicians, students and computer users can work together to achieve a
productive workplace environment. The guidelines reflect current knowledge and best
practice for the use of computers so you can achieve maximum efficiency and safety in
your workplace.

MAINTENANCE INSPECTION CHECKLIST


Equipment Type PERSONAL COMPUTER
Property Code PC001
Location   Practical Work Area
YES NO INSPECTION ITEMS
Monitor is functional.
Printer Cartridges are replaced.
Storage devices are functional.
Optical Drives are functional.

Date Developed: Document No. _________


Computer Systems ____________
Issued by:
Servicing NCII Date Revised:
______________ Page 5 of 250
Developed by: _________
Data Gathering
GRETCHELL C. YURAG
Instrument Revision # ___
Place your computer in a well-ventilated area.

This will allow proper circulation of air inside


the computer unit.

Figure 2. Computer Laboratory

Schedule the use of computer for its longer life.


This will help lessen the attacks of viruses and
increases the life span of your computer.

Figure 3.Computer Usage

Move the computer only when it is turned off and unplugged.

To avoid damage to the computer unit


always turn off and unplugg it when
transferring the computer to another
location.

Figure 4. Unplugged Power Cable

Treat your computer properly.

 This means taking care of your computer. PCs and


laptops should be properly turned off.

Figure 5. Computer care

Date Developed: Document No. _________


Computer Systems ____________
Issued by:
Servicing NCII Date Revised:
______________ Page 6 of 250
Developed by: _________
Data Gathering
GRETCHELL C. YURAG
Instrument Revision # ___
DO SYSTEMATIC MAINTENANCE PLAN OR YOUR COMPUTER SOFTWARE.

Back-up your files

Protecting your files means creating backups, storing


your file backups on your hard drive or any
removable storage device regularly.

Figure 6.Backup Media

Install or secure passwords.

Installing passwords makes your files more


secure.

Figure 7. Installing Passwords

Delete temporary files.

Deleting the temporary files on your computer


will enhance its speed and will create more
disk space for your files.

Figure 8. Deleting Temporary Files

Update anti-virus and spy ware.

Regularly update your anti-virus for your


computer protection against viruses.

Figure 8.Updating Anti-Virus

Date Developed: Document No. _________


Computer Systems ____________
Issued by:
Servicing NCII Date Revised:
______________ Page 7 of 250
Developed by: _________
Data Gathering
GRETCHELL C. YURAG
Instrument Revision # ___
Diagnoses and Identification of Faulty Computer and Network Systems

The following topics will familiarize you with planning and preparing for installation;
installing equipment and devices; and conducting test on the installed computer system. Read
carefully all the topics and apply the skills you have gained from the lessons provided in this
module.

A. Preventing Computer Systems Failure

Computers, in general, are pretty stable, and you can usually rely on them to not fail
you. However. If you develop some basic habits, you can postpone serious computer
problems, if not avoiding them entirely.

1. Computer issues. Know that your


computer is going to fail. You need to
treat your computer as if it were a
2. doomed failure. Always assume that
failure is imminent.

A fatal error results in data loss,


damage to your computer and/or its Figure 9. Computer issues
ability to function, hardware failure, or
other serious issues.

Signs of imminent failure might include regular poor performance, frequent errors and/or
popups, unknown programs being installed, frequent power loss (the computer shuts down
automatically frequently), frequent crashes, or certain parts not working.

2. Dust issues. Preventing failure means making


sure your computer is physically clean in its
operations. Make sure that there is not too much
dust inside, especially on the fans. Dust can
reduce performance and cause overheating

Figure 10. Inside the System Unit

Date Developed: Document No. _________


Computer Systems ____________
Issued by:
Servicing NCII Date Revised:
______________ Page 8 of 250
Developed by: _________
Data Gathering
GRETCHELL C. YURAG
Instrument Revision # ___
3. RAM issues. Know your computer's
specifications and its limits. RAM runs even the PC
is running idly. It consumes RAM storages capacity
making you difficult to open a program if RAM
storage had been consumed.

Figure 11. Random Access Memory

4. Malware issues. Make sure that your anti-virus software is updated to be able to scan
unnecessary files that enter your PC. Do not install programs that you’re not familiar with or
if do not fully trust.

5. Hardware issues. When something is not

working properly, either diagnose the problem yourself


and fix it, to prevent further damage or contact a
professional and have them look at it for you. Take
advantage of warranties on parts if they fail.

Figure 12.Hardware

6. Warning issues. If the same error message


shows up every time you log in, be sure to
investigate it. Although unlikely, these errors
could be important.

Figure 13.Error Messages


7. Usage issues. Give your computer a break. Believe it or not,
your computer likes rest, too. Leaving it on all of the time wears
out hardware, and puts unnecessary wear and tear on the
hardware. Giving your computer a break also saves you money
(electrical bills).

Figure 14. Power Off

Date Developed: Document No. _________


Computer Systems ____________
Issued by:
Servicing NCII Date Revised:
______________ Page 9 of 250
Developed by: _________
Data Gathering
GRETCHELL C. YURAG
Instrument Revision # ___
8. Warranty issues. Always take advantage of warranties.
Get a warranty to protect your hardware, so it can be
replaced in case of failure.

Figure 15. Warranty Sticker

9. Backup issues. Back-up everything. Run regular


backup of your important files to other disks, computers,
or an online backup service.

Figure 16. Storage Media

10. Error message issues. If your PC fails to function,


diagnose the problem. Write down the necessary info
such as error messages or things don’t work properly. If
you know how to fix it, do it, to avoid further damage but
if not then seek for professional help.
Figure 17. Error Messages

Network Problems

When you suddenly cannot connect to the Internet, any of several things could be
wrong. Use this checklist to find and solve common Internet connection problems.

1. Unplugged Network Cable

Unplugged or loose network cables are one of the most common reasons why you might
suddenly find yourself unable to connect to the Internet. That's a problem on wireless networks,
but on most laptops the wireless-fidelity (Wi-Fi) radio can be inadvertently shut off instead. On
home networks, it's also possible that someone unplugged the router.

Action: Ensure your wired or wireless network hardware is switched on and plugged in.

Date Developed: Document No. _________


Computer Systems ____________
Issued by:
Servicing NCII Date Revised:
______________ Page 10 of 250
Developed by: _________
Data Gathering
GRETCHELL C. YURAG
Instrument Revision # ___
2. Website Temporarily Offline

What may seem to be a network problem connecting to the Internet is sometimes simply
a Web site (or whatever server is on the other end of the connection) being temporarily offline.

Action: Before assuming your Internet connection is faulty, try visiting several popular Web
sites rather than just one.

3. IP Address Conflicts

If your computer and another on the network both have the same IP address, the conflict
between them will prevent either from working properly online.

Action: To resolve an IP conflict, follow these instructions to release and renew your IP
address. If your network uses static IP addresses, manually change your IP to a different
number.

Windows 7

Step 1:
Click Start > Run. In the Run window, enter “cmd” then click OK.

Step 2:
On the command prompt, enter “ipconfig/release” then press [Enter].

Date Developed: Document No. _________


Computer Systems ____________
Issued by:
Servicing NCII Date Revised:
______________ Page 11 of 250
Developed by: _________
Data Gathering
GRETCHELL C. YURAG
Instrument Revision # ___
Step 3:

Once the IP address becomes 0.0.0.0, enter “ipconfig/renew” then press [Enter].

4. Computer Firewall Malfunctions

Firewall software running on most computers is intended to prevent unwanted network traffic
from disrupting its operation. Unfortunately, these software firewalls can malfunction and start
blocking valid Internet traffic. When two software firewalls, such as Windows Firewall plus a
third-party product, are installed on the same computer, contention between the two can also
incorrectly block traffic.

Action: If you have recently installed or upgraded software firewalls on your computer,
temporarily disable them to determine whether it may be the cause of Internet connection
problems.

5. Outside Wireless Signal Range

The performance of Wi-Fi network connections depends on distance between the device
and the wireless access point. The farther away a Wi-Fi device is, the slower the local
connection generally runs, until it breaks altogether. Wireless signal interference in the area can
also limit the effective range of a Wi-Fi connection. Whenever you are unable to reach the
access point, you also cannot connect to the Internet, obviously.

Action: Use one of the options written below to measure the strength of your wireless signal
and try these ideas to expand the range of your Wi-Fi.

Ideally, you should place the router at a height in some central location and away from other
cordless devices. Make sure that the router is not placed near something metallic (like an
almirah or window grills) as that will weaken the wireless signals. Avoid mirrors as they can
reflect the wireless signals away from the desired direction.

Wireless routers generally ship with omni-directional antennas but you can replace them with
more powerful uni-directional antennas and that will keep the signal from getting broadcast in all
directions.

6. Wireless Network Configuration


Wi-Fi networks with encryption options like WPA or WEP turned on require computers to
use matching security keys when connecting. If someone changes the encryption keys or
password on the access point, devices that worked before will suddenly be unable to establish
sessions and Internet connections. Likewise (though less likely), if the access point settings are
changed to require using a specific Wi-Fi channel number, some computers may be unable to
discover it.

Date Developed: Document No. _________


Computer Systems ____________
Issued by:
Servicing NCII Date Revised:
______________ Page 12 of 250
Developed by: _________
Data Gathering
GRETCHELL C. YURAG
Instrument Revision # ___
Action: Confirm that the Wi-Fi channel number and encryption keys on your router have not
recently changed (check with the network administrator if necessary). When using a hotspot,
follow the provider's instructors for signing in carefully.

7. Broadband Router or Access Point Malfunctions


Home networks that use broadband routers are easier to manage than those without
one, but technical glitches with the router can also prevent computers from connecting to the
Internet. Router failures are caused by overheating, excessive traffic, or simply a faulty unit.
Typical symptoms of a flaky router include computers on the network not being able to obtain IP
addresses, or the router console not responding to requests.

Action: Check the router's lights and console if possible to ensure it is running and responding
properly. Troubleshoot and reset the router if necessary. Change the old router if necessary.
8. Blocked By Your Service Provider
Internet Service Providers (ISPs) can choose to block access from your account if you
fail to make payment or otherwise violate the provider's Terms of Service. Especially when
using paid hotspots that charge by the hour or day, sometimes people forget to keep their
subscription updated. Other common reasons an ISP might block your account include
exceeding bandwidth caps, sending spam e-mail, and downloading illegal or inappropriate
content.

Action: Contact your ISP if you suspect your account has been blocked.

9. Computer Glitches
Computers suffer from technical glitches or malfunctions. Although relatively uncommon
nowadays, a computer's network adapter hardware might suddenly fail due to overheating or
age. Failures in the operating system software that control the adapter, on the other hand, can
occur frequently especially with computers that are heavily used. Viruses and worms also may
disable or block a computer's network interfaces from functioning properly. If using a laptop or
other mobile device, transporting it from one location to another can corrupt the state of its
network.

Action: Check the computer and remove any malware that you will find. On Windows
computers, try resetting the network connection. Reboot the computer if necessary.

10. Network Downtime


Those using satellite Internet service may notice they canot connect to the Internet
during periods of very bad weather. Providers in dense urban areas (including cellular Internet
carriers) sometimes are unable to support peaks in network traffic that causes sporadic
outages for some customers. Finally, those who subscribe to newer or more complex forms of
Internet services (such as fixed wireless broadband) may experience more downtime than
others as providers encounter more issues with relatively less mature equipment.

Date Developed: Document No. _________


Computer Systems ____________
Issued by:
Servicing NCII Date Revised:
______________ Page 13 of 250
Developed by: _________
Data Gathering
GRETCHELL C. YURAG
Instrument Revision # ___
Action - If all else fails, contact your Internet provider to verify whether they are experiencing
an outage. Some providers also give advice on troubleshooting problems connecting to their
network.

Date Developed: Document No. _________


Computer Systems ____________
Issued by:
Servicing NCII Date Revised:
______________ Page 14 of 250
Developed by: _________
Data Gathering
GRETCHELL C. YURAG
Instrument Revision # ___
Date Developed: Document No. _________
Computer Systems ____________
Issued by:
Servicing NCII Date Revised:
______________ Page 15 of 250
Developed by: _________
Data Gathering
GRETCHELL C. YURAG
Instrument Revision # ___

You might also like