Computer Systems Servicing NCII Quarter 2 Week 1
Computer Systems Servicing NCII Quarter 2 Week 1
Now dear learners, let us talk about the basic information of planning and preparing unit
assembly ensuring the operational health and safety policies and procedures in accordance
with the system requirements set by DepEd and TESDA.
Proper preparation is the key to a successful build. Before you begin, make sure you
have all the tools you will need, secure a clear, well-lit workspace, gather all the components
you’ll be using and unpack them one at a time, verifying that everything that is supposed to
be there is actually present. At this point you should leave the parts themselves in their
protective anti-static bags and assemble all the accompanying manuals. Now I know you want
to get started, but trust me, read the manuals, check the diagrams, make sure you understand
where each part goes and how it attaches. If there is anything you don’t understand, now is
the time to do a little extra internet research.
Find a dry, well-ventilated place to do your work. You should have plenty of light and if
possible, you should choose an area without carpet on the floor, as carpet tends to generate
a lot of static. An unfurnished basement is a good work location.
Safety precautions are important for your own security. Please read the safety
precautions thoroughly
Safety Precautions
Static electricity is the biggest danger to the expensive parts you are about to assemble.
Even a tiny shock which is much too small for you to feel can damage or ruin the delicate
electronic traces many times smaller than a human hair that make up your CPU, RAM and
other chips. It’s important to use your anti-static wrist strap to prevent damage to these
components. Once you have the power supply installed in the case, clip the end of the wrist
strap to the outside of the power supply. (Never plug your computer in while you are
connected to it by a wrist strap.) This will ensure that you, the case and the power supply are
all connected to a common ground, in other words there will be no inequality of charge that
will allow a spark to jump from you to the case. It is also helpful to have an anti-static mat to
set the case and other components on.
Nobody but you is at fault if you shock your components with static electricity. Make sure
that you take the precautions in the previous paragraph to ground yourself from static
electricity. (Note: if you really must work on a computer and have not got proper anti-static
equipment, it is usually okay if you make sure that you do not move about much; are not
wearing any static-prone clothing; handle components by the edges; and regularly (once a
minute or so), touch a grounded object). The case metal of your PC's power supply will usually
be a suitable grounded object (please note that the metal must be unpainted). As noted
above, touch it every few minutes while you are working on your PC if you haven’t got a wrist
strap.
Turn off your computer and switch off your Power Supply at the wall before installing or
removing any components - if power is flowing to components as they are installed or
removed, they can be seriously damaged. In order to have a computer properly grounded, you
need it plugged in at the wall but turned off at the power supply and at the wall. The neutral
line may be earthed.
Never cut the grounding pin off your power cord. This "safety ground" stands between
you and potentially lethal voltages inside the power supply.
Be wary of sharp edges! Many lower-end PC cases have sharp, unfinished edges. This
is especially so on interior surfaces, and where the case has been cut or punched-out. Use
care and take your time to avoid cutting your hands. If your case has this problem, a little time
with some sandpaper before you begin construction can spare you a lot of pain. Be extra
careful not to cut yourself when installing the I/O Shield.
EFFECTS OF COMPUTERS
Some effects of computers relating to the violation of privacy, the impact on the labor
force, health risks, and the impact on the environment.
1. Violation of Privacy
Nearly every life event is stored in a computer somewhere--in medical records, credit
reports, tax records, etc. It is crucial that personal and confidential records be protected
properly. In many instances, where these records were not properly protected, individuals
have found their privacy violated and identities stolen.
3. Health Risks
Prolonged or improper computer use can lead to injuries or disorders of the hands,
wrists, elbows, eyes, necks, and back. Computer users can protect themselves from these
health risks through proper workplace design, good posture while at the computer, and
appropriately spaced work breaks. Another health risk, called computer addiction, occurs
when someone becomes obsessed with using the computer. Once recognized, computer
addiction is a treatable disorder.
4. Public Safety
Adults, teen, and children around the world are using computers to share publicly their
photos, videos, journals, music, and other personal information. Some of these unsuspecting,
innocent computer users have fallen victim to crimes committed by dangerous strangers.
Protect yourself and your dependents from these criminals by being cautious. For example,
do not share information that would allow others to identify or locate you.
5. Impact on Environment
ACTIVITY 3.
Directions: Create a safety signage that is applicable inside the computer laboratory and in
accordance with the systems requirements.
For example:
ASSESSMENT
Directions: Write W if the statement should be observed in the WORKPLACE. Write CS if the
Directions: Identify the Operational Health & Safety Precautions and Procedures, write TRUE
if the statement is correct and FALSE if the statement is wrong. Then change the
italized word or group of words to make the whole statement true
__________11. Failure to do the proper jumper setting may cause damage to your CPU.
__________12. After adding and removing any other system components, make sure that you
unplug your power supply.
__________13. Test the computer, insuring that it meets the necessary system requirements
before booting up.
__________14. With an effective cooling fan, the CPU can overheat and cause damage to
both CPU and the motherboard.
__________15. After starting the installation, carefully read the documentation and
procedures on any hardware and software settings that may be required.