Introduction To Lab Procedures and Tool Use Objectives
Introduction To Lab Procedures and Tool Use Objectives
com/articles/printerfriendly/2756481
Cisco Press
This sample chapter from IT Essentials Companion Guide v6, 6th Edition,
covers basic safety practices for the workplace, hardware and software tools,
and the disposal of hazardous materials. Safety guidelines help protect
individuals from accidents and injury. They also help to protect equipment
from damage. Some of these guidelines are designed to protect the
environment from contamination caused by improperly discarded materials.
Objectives
Upon completion of this chapter, you will be able to answer the following
questions:
Key Terms
This chapter uses the following key terms. You can nd the denitions in the
Glossary.
• Brownout Page 78
• Spike Page 78
• Noise Page 78
• Blackout Page 78
1 of 26 3/28/23, 7:57 AM
Introduction to Lab Procedures and Tool Use | Objectives https://www.ciscopress.com/articles/printerfriendly/2756481
• Multimeter Page 94
• Format Page 88
• CHKDSK Page 88
Introduction (2.0)
Safety is an important topic and exercise in the workplace. Safety guidelines
help protect individuals from accidents and injury. They also help to protect
equipment from damage.
Welcome (2.0.1)
The consequences of poor safety practices in the workplace can result in
serious injury, increased equipment damage, harm to the environment, and other
problems. Even a small incident will decrease productivity and increase costs. It
is essential for all employees to understand safety at work.
This chapter covers basic safety practices for the workplace, hardware and
software tools, and the disposal of hazardous materials. Safety guidelines help
protect individuals from accidents and injury. They also help to protect
equipment from damage. Some of these guidelines are designed to protect the
environment from contamination caused by improperly discarded materials.
2 of 26 3/28/23, 7:57 AM
Introduction to Lab Procedures and Tool Use | Objectives https://www.ciscopress.com/articles/printerfriendly/2756481
Follow safety guidelines to prevent cuts, burns, electrical shock, and damage to
eyesight. As a best practice, make sure that a re extinguisher and rst-aid kit
are available. Poorly placed or unsecured cables can cause tripping hazards in a
network installation. Cable management techniques such as installation of cables
in conduit or cable trays help to prevent hazards.
• Do not touch areas in printers that are hot or that use high voltage.
• Know where the re extinguisher is located and how to use it.
• Bend your knees when lifting heavy objects to avoid injuring your back.
Before cleaning or repairing equipment, make sure that your tools are in good
condition. Clean, repair, or replace items that are not functioning adequately.
Some printer parts become hot during use, and other parts, such as power
supplies, contain high voltage. Check the printer manual for the location of high-
voltage components. Some components retain a high voltage even after the
printer is turned o. Make sure that the printer has had time to cool before
making the repair.
Follow re safety guidelines to protect lives, structures, and equipment. To avoid
an electrical shock and to prevent damage to the computer, turn o and unplug
the computer before beginning a repair.
Fire can spread rapidly and be very costly. Proper use of a re extinguisher can
prevent a small re from getting out of control. Use the memory aid P-A-S-S to
remember the basic rules of re extinguisher operation:
3 of 26 3/28/23, 7:57 AM
Introduction to Lab Procedures and Tool Use | Objectives https://www.ciscopress.com/articles/printerfriendly/2756481
Be familiar with the types of re extinguishers used in your country or region.
Each type of re extinguisher has specic chemicals to ght dierent types of
res:
• Electrical equipment
• Combustible metals
When working with computer components, be alert for odors emitting from
computers and electronic devices. When electronic components overheat or
short out, they emit a burning smell. If there is a re, follow these safety
procedures:
• Always have a planned re escape route before beginning any work.
Replacing equipment and recovering data is expensive and time consuming. This
section identies potential threats to systems and describes procedures to help
prevent loss and damage.
Electrostatic Discharge
At least 3,000 volts of static electricity must build up before a person can feel
ESD. For example, static electricity can build up on you as you walk across a
carpeted oor. When you touch another person, you both receive a shock. If the
4 of 26 3/28/23, 7:57 AM
Introduction to Lab Procedures and Tool Use | Objectives https://www.ciscopress.com/articles/printerfriendly/2756481
discharge causes pain or makes a noise, the charge was probably above 10,000
volts. By comparison, less than 30 volts of static electricity can damage a
computer component.
• Keep all components in antistatic bags until you are ready to install them.
Electromagnetic Interference
EMI does not always come from expected sources, such as cellular phones.
Other types of electric equipment can emit a silent, invisible electromagnetic
eld that can extend for more than a mile.
Climate
• If the humidity level is very high, equipment can suer from moisture
damage.
5 of 26 3/28/23, 7:57 AM
Introduction to Lab Procedures and Tool Use | Objectives https://www.ciscopress.com/articles/printerfriendly/2756481
The following types of AC power uctuations can cause data loss or hardware
failure:
To help shield against power uctuation problems, use devices to protect the
data and computer equipment:
6 of 26 3/28/23, 7:57 AM
Introduction to Lab Procedures and Tool Use | Objectives https://www.ciscopress.com/articles/printerfriendly/2756481
CAUTION
UPS manufacturers suggest never plugging a laser printer into a UPS because
the printer could overload the UPS.
A safety data sheet (SDS) used to be known as a material safety and data
sheet (MSDS). A safety data sheet is a fact sheet that summarizes information
about material identication, including hazardous ingredients that can aect
personal health, re hazards, and rst-aid requirements. The SDS contains
chemical reactivity and incompatibility information. It also includes protective
measures for the safe handling and storage of materials and spill, leak, and
disposal procedures.
7 of 26 3/28/23, 7:57 AM
Introduction to Lab Procedures and Tool Use | Objectives https://www.ciscopress.com/articles/printerfriendly/2756481
that they are working with and be provided with material safety information.
The SDS explains how to dispose of potentially hazardous materials in the safest
manner. Always check local regulations concerning acceptable disposal
methods before disposing of any electronic equipment.
• Special precautions
• Health hazards
Batteries
Batteries often contain rare earth metals that can be harmful to the environment.
Batteries from portable computer systems can contain lead, cadmium, lithium,
alkaline manganese, and mercury. These metals do not decay and remain in the
environment for many years. Mercury is commonly used in the manufacturing of
batteries and is extremely toxic and harmful to humans.
Monitors
Handle CRT monitors with care. Extremely high voltage can be stored in CRT
monitors, even after being disconnected from a power source.
Monitors contain glass, metal, plastics, lead, barium, and rare earth metals.
According to the U.S. Environmental Protection Agency (EPA), monitors can
contain approximately 4 pounds (1.8 kg) of lead. Monitors must be disposed of
in compliance with environmental regulations.
8 of 26 3/28/23, 7:57 AM
Introduction to Lab Procedures and Tool Use | Objectives https://www.ciscopress.com/articles/printerfriendly/2756481
Used printer toner kits and printer cartridges must be disposed of properly in
compliance with environmental regulations. They can also be recycled. Some
toner cartridge suppliers and manufacturers take empty cartridges for relling.
Some companies specialize in relling empty cartridges. Kits to rell inkjet printer
cartridges are available but are not recommended, because the ink might leak
into the printer, causing irreparable damage. Using relled inkjet cartridges might
also void the inkjet printer warranty.
Contact the local sanitation company to learn how and where to dispose of the
chemicals and solvents used to clean computers. Never dump chemicals or
solvents down a sink or dispose of them in a drain that connects to public
sewers.
The cans or bottles that contain solvents and other cleaning supplies must be
handled carefully. Make sure that they are identied and treated as special
hazardous waste. For example, some aerosol cans explode when exposed to
heat if the contents are not completely used.
9 of 26 3/28/23, 7:57 AM
Introduction to Lab Procedures and Tool Use | Objectives https://www.ciscopress.com/articles/printerfriendly/2756481
Computer repair requires some task-specic tools. Make sure that you are
familiar with the correct use of each tool and that the correct tool is used for the
task. Skilled use of tools and software makes the job less dicult and ensures
that tasks are performed properly and safely.
A toolkit should contain all the tools necessary to complete hardware repairs. Fig
ure 2-3 shows an example of a PC repair toolkit.
As you gain experience, you learn which tools to have available for dierent
types of jobs. Hardware tools are grouped into four categories:
• ESD tools
• Hand tools
• Cleaning tools
• Diagnostic tools
10 of 26 3/28/23, 7:57 AM
Introduction to Lab Procedures and Tool Use | Objectives https://www.ciscopress.com/articles/printerfriendly/2756481
There are two ESD tools: the antistatic wrist strap and the antistatic mat. The
antistatic wrist strap protects computer equipment when grounded to a
computer chassis. The antistatic mat protects computer equipment by
preventing static electricity from accumulating on the hardware or on the
technician. Figures 2-4 and 2-5 show the two types of ESD tools discussed
above.
Most tools used in the computer assembly process are small hand tools. They
are available individually or as part of a computer repair toolkit. Toolkits range
widely in size, quality, and price.
Tools for repairing and creating cables are also part of a computer repair toolkit.
Figures 2-6 and 2-7 provide images of common cable tools.
11 of 26 3/28/23, 7:57 AM
Introduction to Lab Procedures and Tool Use | Objectives https://www.ciscopress.com/articles/printerfriendly/2756481
Having the appropriate cleaning tools is essential when maintaining and repairing
computers. Using the appropriate cleaning tools such as lint-free cloth,
compressed air, cable ties, a parts organizer for small parts helps ensure that
computer components are not damaged during cleaning.
Digital Multimeter
A digital multimeter, as shown in Figure 2-8, is a device that can take many
types of measurements. It tests the integrity of circuits and the quality of
electricity in computer components. A digital multimeter displays the information
on an LCD or LED screen.
12 of 26 3/28/23, 7:57 AM
Introduction to Lab Procedures and Tool Use | Objectives https://www.ciscopress.com/articles/printerfriendly/2756481
Loopback Adapter
A loopback adapter, also called a loopback plug, tests the basic functionality of
computer ports. The adapter is specic to the port that you want to test.
The tone generator and probe, as shown in Figure 2-9, is a two-part tool. The
tone part is connected to a cable at one end using specic adapters. The tone
generates a tone that travels the length of the cable. The probe traces the cable.
When the probe is in near proximity to the cable to which the tone is attached,
the tone can be heard through a speaker in the probe.
13 of 26 3/28/23, 7:57 AM
Introduction to Lab Procedures and Tool Use | Objectives https://www.ciscopress.com/articles/printerfriendly/2756481
WiFi Analyzer
WiFi analyzers are mobile tools for auditing and troubleshooting wireless
networks. Many WiFi analyzers are robust tools designed for enterprise network
planning, security, compliance, and maintenance. But WiFi analyzers can also be
used for smaller, wireless LANs. Technicians can see all available wireless
networks in a given area, determine signal strengths, and position access points
to adjust wireless coverage.
Although an external hard drive enclosure is not a diagnostic tool, it is often used
when diagnosing and repairing computers. The customer hard drive is placed
into the external enclosure for inspection, diagnosis, and repair using a known-
working computer. Backups can also be recorded to a drive in an external
14 of 26 3/28/23, 7:57 AM
Introduction to Lab Procedures and Tool Use | Objectives https://www.ciscopress.com/articles/printerfriendly/2756481
You must be able to identify which software to use in dierent situations. Disk
management tools help detect and correct disk errors, prepare a disk for data
storage, and remove unwanted les:
• Disk Cleanup—Clears space on a hard drive by searching for les that can
be safely deleted.
Each year, viruses, spyware, and other types of malicious attacks infect millions
of computers. These attacks can damage operating systems, applications, and
data. Computers that have been infected may even have problems with
hardware performance or component failure.
To protect data and the integrity of the operating system and hardware, use
software designed to guard against attacks and to remove malicious programs.
15 of 26 3/28/23, 7:57 AM
Introduction to Lab Procedures and Tool Use | Objectives https://www.ciscopress.com/articles/printerfriendly/2756481
In this Lab, you gather information about a hard drive diagnostic program. Refer
to the Lab in IT Essentials v6 Lab Manual.
• News groups
• Manufacturer FAQs
16 of 26 3/28/23, 7:57 AM
Introduction to Lab Procedures and Tool Use | Objectives https://www.ciscopress.com/articles/printerfriendly/2756481
• Technical websites
With experience, you will discover many additional items to add to the toolkit; for
example, masking tape can be used to label parts that have been removed from
a computer when a parts organizer is not available.
The antistatic wrist strap is a conductor that connects your body to the
equipment that you are working on. When static electricity builds up in your
body, the connection made by the wrist strap to the equipment, or ground,
channels the electricity through the wire that connects the strap, keeping the
charge between you and the equipment equal.
An example of static electricity is the small shock that you receive when you
walk across a carpeted room and touch a doorknob. Although the small shock is
harmless to you, the same electrical charge passing from you to a computer can
damage its components. Wearing an antistatic wrist strap can prevent static
electricity damage to computer components.
The wrist strap (seen previously in Figure 2-4) has two parts and is easy to
wear:
• Step 1. Wrap the strap around your wrist and secure it using the snap or
17 of 26 3/28/23, 7:57 AM
Introduction to Lab Procedures and Tool Use | Objectives https://www.ciscopress.com/articles/printerfriendly/2756481
Velcro. The metal on the back of the wrist strap must remain in contact
with your skin at all times.
• Step 2. Snap the connector on the end of the wire to the wrist strap, and
connect the other end either to the equipment or to the same grounding
point that the antistatic mat is connected to. The metal skeleton of the
case is a good place to connect the wire. When connecting the wire to
equipment that you are working on, choose an unpainted metal surface. A
painted surface does not conduct electricity as well as unpainted metal.
NOTE
Attach the wire on the same side of the equipment as the arm wearing the
antistatic wrist strap. This helps keep the wire out of the way while you are
working.
Although wearing a wrist strap helps prevent ESD, you can further reduce the
risks by not wearing clothing made of silk, polyester, or wool. These fabrics are
more likely to generate a static charge.
NOTE
Technicians should roll up their sleeves, remove scarves or ties, and tuck in
shirts to prevent interference from clothing. Ensure that earrings, necklaces,
rings and other loose jewelry are properly secured.
CAUTION
Never wear an antistatic wrist strap if you are repairing a power supply unit. Do
not work on the internal components of a power supply unit unless you have
specic electronics training.
• Step 1. Lay the mat on the workspace next to or under the computer
case.
• Step 2. Clip the mat to the case to provide a grounded surface on which
you can place parts as you remove them from the system.
When you are working at a workbench, ground the workbench and the antistatic
oor mat. By standing on the mat and wearing the wrist strap, your body has the
same charge as the equipment and reduces the probability of ESD.
Reducing the potential for ESD reduces the likelihood of damage to delicate
circuits or components.
NOTE
A technician needs to be able to properly use each tool in the toolkit. This page
18 of 26 3/28/23, 7:57 AM
Introduction to Lab Procedures and Tool Use | Objectives https://www.ciscopress.com/articles/printerfriendly/2756481
covers many of the various hand tools used when repairing computers.
Screws
Match each screw with the proper screwdriver. Place the tip of the screwdriver
on the head of the screw. Turn the screwdriver clockwise to tighten the screw
and counter clockwise to loosen the screw.
Screws can become stripped if you do not use the correct size and type of
screwdriver. A stripped screw may not tighten rmly or it may not be easily
removed. Discard stripped screws.
Use a at head screwdriver when you are working with a slotted screw. Do not
use a at head screwdriver to remove a Phillips head screw. Never use a
screwdriver as a pry bar. If you cannot remove a component, check to see if
there is a clip or latch that is securing the component in place.
CAUTION
Use a Phillips head screwdriver with crosshead screws. Do not use this type of
screwdriver to puncture anything. This will damage the head of the screwdriver.
Hex Driver
Use a hex driver to loosen and tighten bolts that have a hexagonal (six-sided)
head. Hex bolts should not be over-tightened because the threads of the bolts
can be damaged. Do not use a hex driver that is too large for the bolt that you
are using.
CAUTION
Some tools are magnetized. When working around electronic devices, be sure
that the tools you are using have not been magnetized. Magnetic elds can be
harmful to data stored on magnetic media. Magnetic tools can also induce
current, which can damage internal computer components. Test your tool by
touching the tool with a screw. If the screw is attracted to the tool, do not use
the tool.
A parts retriever is used to place and retrieve parts that may be hard to reach
with your ngers. Do not scratch or hit any components when using these tools.
19 of 26 3/28/23, 7:57 AM
Introduction to Lab Procedures and Tool Use | Objectives https://www.ciscopress.com/articles/printerfriendly/2756481
CAUTION
Pencils should not be used inside the computer to change the setting of
switches. The pencil lead can act as a conductor and may damage the computer
components.
Various specialty tools, such as Torx bits, antistatic bags and gloves, and
integrated circuit pullers, can be used to repair and maintain computers. Always
avoid magnetized tools, such as screwdrivers with magnetic heads, or tools that
use extension magnets to retrieve small metal objects that are out of reach.
Additionally, there are specialized testing devices used to diagnose computer
and cable problems:
• Power supply tester—A device that checks whether the computer power
supply is working properly. A simple power supply tester might just have
indicator lights, whereas more advanced versions show the amount of
voltage and amperage.
• Cable tester—A device that checks for wiring shorts, faults, or wires
connected to the wrong pins.
In this lab, you learn how to use and handle a multimeter and a power supply
tester. Refer to the lab in IT Essentials v6 Lab Manual.
NOTE
When using compressed air to clean inside the computer, blow the air around
the components with a minimum distance of 4 inches (10 cm) from the nozzle.
Clean the power supply and the fan blowing from inside the computer toward
the fan at the back of the case so as not to blow dust back into the system.
CAUTION
Before cleaning any device, turn it o and unplug the device from the power
source.
Clean computer cases and the outside of monitors with a mild cleaning solution
20 of 26 3/28/23, 7:57 AM
Introduction to Lab Procedures and Tool Use | Objectives https://www.ciscopress.com/articles/printerfriendly/2756481
on a damp, lint-free cloth. Mix one drop of dishwashing liquid with 4 oz. (118 ml)
of water to create the cleaning solution. If water drips inside the case, allow
enough time for the liquid to dry before powering on the computer.
When computers are in areas where there is excessive dirt and dust, use an
enclosure to prevent much of the dirt from harming the computer. The enclosure
should have lters to prevent dirt from entering the enclosure. These lters need
to be cleaned or replaced on a regular basis.
LCD Screens
Do not use ammoniated glass cleaners or any other solution on an LCD screen,
unless the cleaner is specically designed for the purpose. Harsh chemicals
damage the coating on the screen. Often, there is no glass protecting these
screens, so be gentle when cleaning them and do not press rmly on the
screen.
Clean dusty components with a can of compressed air. Compressed air does
not cause electrostatic buildup on components. Make sure that you are in a well
ventilated area before blowing the dust out of the computer. A best practice is to
wear an air lter mask to make sure that you do not breathe in the dust particles.
Blow out the dust using short bursts from the can. Never tip the can or use the
can upside down because doing so will cause the can to freeze. Do not allow
the fan blades to spin from the force of the compressed air. Hold the fan in
place. Fan motors can be ruined from spinning when the motor is not turned on.
Component Contacts
Use a lint-free cloth that is slightly moistened with isopropyl alcohol to clean the
contacts on components. Do not use rubbing alcohol. Rubbing alcohol contains
impurities that can damage contacts. Before reinstallation, use compressed air
to blow lint o the contacts.
Keyboards
Clean a desktop keyboard with compressed air and then use a handheld vacuum
cleaner with a brush attachment to remove the loose dust.
CAUTION
Never use a standard vacuum cleaner inside a computer case. The plastic parts
of the vacuum cleaner can build up static electricity and discharge to the
components. Use only vacuums that are approved for electronic components.
Mice
Use glass cleaner and a soft cloth to clean the outside of the mouse. Do not
spray glass cleaner directly on the mouse. If cleaning a ball mouse, you can
remove the ball and clean it with glass cleaner and a soft cloth. Wipe the rollers
clean inside the mouse with the same cloth. Do not spray any liquids inside the
mouse.
Table 2-1 shows the computer items that you should clean and the cleaning
21 of 26 3/28/23, 7:57 AM
Introduction to Lab Procedures and Tool Use | Objectives https://www.ciscopress.com/articles/printerfriendly/2756481
materials to use.
In this lab, you disassemble a computer using safe lab procedures and the
proper tools. Refer to the lab in IT Essentials v6 Lab Manual.
Summary (2.3)
This chapter emphasizes the behavior and processes that a worker should use
to help in keeping the workplace a safe and productive environment.
Summary (2.3.1)
You have familiarized yourself in the lab with many of the tools used to build,
service, and clean computer and electronic components. You have also learned
the importance of organizational tools and how these tools help you work more
eciently. Some of the important concepts to remember from this chapter:
22 of 26 3/28/23, 7:57 AM