Sunteți pe pagina 1din 28

CONNECTING HARDWARE PERIPHERALS

LO1 Confirming requirements of clients 1.1 Introduction to the Module This unit defines the competence required to connect hardware peripherals according to instructions and a workstation or networked computer to the internet. The Clients' peripheral requirements are identified and are confirmed in accordance with organisation standards and reported to the supervisor with vendor's warranty and support services. The clients must be Obtain required peripherals with under instruction, inventory according to organisation's procedures, Contents are validated and method of ensuring the physical contents match the packing list is demonstrated and Peripherals are stored according to vendor/manual guidelines. The clients connecting the peripheral according to the vender manual and the new hardware configures. 1.2 Introduction to hardware peripherals and connecting peripherals Computer hardware is a collection of separate items working together as team. Some of these components are essential: others simply make working more pleasant and efficient.Adding extra item expands the variety of tasks you accomplish with your machine. The connecting peripherals that are connected with the system unite those are like mouse , keyboard, scanner, speakers, monitor e.t.c. 1.3 Defining terms related to hardware and peripherals Peripheral, in computer science, a term used for devices, such as disk drives, printers, modems, and joysticks, that are connected to a computer and are controlled by its microprocessor. Although peripheral often implies additional but not essential, many peripheral devices are critical elements of a fully functioning and useful computer system. Few people, for example, would argue that disk drives are nonessential, although computers can function without them. Keyboards, monitors, and mice are also strictly considered peripheral devices, but because they represent primary sources of input and output in most computer systems, they can be considered more as extensions of the system unit than as peripherals. 1.4 Identifying Categories of hardware and peripheral devices Definition: a peripheral device is a hardware component that transfers information to and from the computer. Peripheral devices can be one of three types: input, output and storage peripherals. Examples of input peripherals are a keyboard and a mouse; examples of output peripherals are a monitor and a speaker; examples of storage peripherals are a floppy disk drive and a tape drive. We can use special diagrams called dataflow diagrams to illustrate the way that peripherals enable information to flow through a computer system. Consider Figure 1.3. The arrows indicate information flow between different devices in the system. Note the direction of information flow in the diagram: for the input devices the information flows into the system unit, for the output devices the information flows out of the system unit, whereas for the storage devices the information flow is two way, since we need to both store and retrieve the information.

Figure 3.1 A dataflow diagram of a computer system BY TEWODROS BOGALE 1

1.4.1 Input devices Input devices are the part of the computer hardware through which the computer gets data and instructions from the outside world. Keyboard, light pen, graphics tablet, barcode reader, mouse, scanner, digital camera, and microphone are some examples of input devices.

1.4.2 Output devices Output devices are devices that are used to display/present the processed data from the processing unit. There are different types of out put devices. They differ in output format, type, quality etc. the most common output devices are: the screen, Printer, Speaker, Modem, Plotters 1.4.3 Processors The heart of the computer that can be named as the the brain of the computer is the Central Processing Unit (CPU), also called the microprocessor. The micro processor that makes up your personal computers (PCs) CPU is the ultimate computer brain, messenger, bring master and boss. All the other components RAM (Random Access Memory), disk drives, the monitor-exist only to bridge the gap between you and the processor. They take your data and instructions and turn it over the processor. The first processor in IBM and PC was an 8088. The generation of Intel processors that followed in 80*86, 80286, 80386, 80486 and Pentium processor. All are similar except some differences in speed and handling more data simultaneously. The current standard is an Intel Pentium micro processor chip. It combines memory cache (a frequently used memory in CPU) with the micro processor circuitry to speed up data access. The CPU has two major functions: 1. It coordinates and controls the computers activities. For example: retrieving files from disks, interpreting data and commands entered from the keyboard, sending data to a printer etc 2. It performs Arithmetic and Logic Operations using the binary number system The CPU has three major components 1. The arithmetic logic unit (ALU) 2. The control unit (CU) 3. The registers 1. The arithmetic Logic Unit (ALU) The Arithmetic Logic Unit is the part of the CPU that performs Arithmetic and Logical operations. BY TEWODROS BOGALE 2

Arithmetic operations include addition, subtraction, multiplication and division. Logical operations are used to compare one element of information with the other. These operations include less than, greater than equal to etc The comparison is used to determine whether one data is less than, greater than or equal to the other. For example arranging data in ascending /descending order requires logical comparison. Generally, The ALU of the CPU is the place where the actual execution of the instructions takes place during data processing operation. That is, when the control unit encounters an instruction that involves an arithmetic operation or a logical operation, it passes control to the ALU. 2. The Control Unit (CU) The control unit is part of the CPU, which is responsible for controlling the overall operation of the computer system. The control unit of CPU selects and interprets program instructions and then sees that they are executed. Although, the control unit doesnt perform any actual processing on the data, it acts as a central nervous system for the other components of the computer. It manages and coordinates the entire computer system including the input and out put units. Like it tells: the input devices what data to be input The ALU where to find the data, what operation to perform and where to store the result. The memory unit where to store the data The output devices what information to record and where to display etc Therefore the control unit has the following major functions: It coordinates and controls the operation of the computer system Accepts instructions, interprets them and executes it by appropriate parts of the system in the correct sequence. Ensures that the right operation is performed on the right data at the right time.

3. Registers: registers are temporary, high speed storage elements inside CPU. There are different types of registers like: Memory Address Registers (MAR): it holds the address of the active memory location. It is loaded from the program control registers when an instruction is read from memory. Memory Buffer Register (MBR): it acts as interface between CPU and main memory. It holds instruction read from, or written on to memory. Program Control Registers (PC): it holds the address of the next instruction to be executed. This register goes through a step by step counting sequence and causes the computer to read successive instructions previously stored in memory. Accumulator Register (AC): this register holds the initial data to be operated up on, the intermediate results, and also the final results of processing operations. It is used during the execution of most instructions. The results of arithmetic operations are returned to the accumulator register for transfer to main memory through MBR. In many computers, there are one or more AC register. Instruction registers (IR): this holds instruction that is being executed currently. As soon as the instruction is stored in this register, the operation part and the address part of the instruction are separated. The address part of the instruction is sent to the MAR while its operation part is sent to the control section where it is decoded and interpreted and ultimately command signals are generated to carry out the task specified by the instruction. 1.4.4 Storage devices

Memory (Storage Devices)

BY TEWODROS BOGALE 3

The memory unit of the computer system is the storage element of the computer. The memory unit is classified in to two categories: i.e. The main memory (primary memory) and The Auxiliary memory (secondary memory)

The Main Memory The main memory, also known as the primary memory or primary storage device, is used to hold pieces of information/program instruction and data, intermediate results of processing and recently produced results of processing of the job(s) that the computer system currently working on. The main memory is also divided in to two categories such as: Random Access Memory (RAM) and Read Only Memory (ROM)

RAM (Random Access Memory): stores data and program code needed by the CPU temporarily. The contents of RAM change rapidly and often. The data inside the RAM is lost when the computer is turned off. Therefore it is said to be volatile.

Figure 9. RAM RAM (Random Access Memory) It is a temporary storage element It is volatile i.e. if the power goes off the information stored on the RAM will be lost It is both read and write

ROM (Read Only Memory): ROM is a special type of memory in which data is stored permanently and cannot be altered by the programmer. The data stored in a ROM chip can only be read and used they cant be changed. This is the reason why it is called read-only-memory (ROM). Since ROM chips are non volatile, the data stored inside a ROM are not lost when the power supply is switched off.

ROM (Read Only Memory): It is permanent storage element It is non volatile i.e. if the power of computer goes off the information stored in the ROM will not be lost. The data stored in the ROM is read-only

NOTE: the ROM portion of main memory is needed for storing an initial program called a boot strap loader. The boot strap loader is a program whose function is to start the computer soft ware operating when power is turned on. Secondary Memory (Secondary Storage Devices) BY TEWODROS BOGALE 4

Secondary storage devices, also known as secondary memory or auxiliary memories, are permanent storage elements. They include the magnetic disks and the optical disks. The magnetic disks include: Floppy disks Hard disks The optical disks include the CDs (Compact disks) The auxiliary memories such as floppy disks and CDs are used for back up purpose. The kind of secondary memory, a computer uses, affects the amount of data that can be stored and the time it takes to save files to and retrieve from storage media. The characteristics are expressed as storage capacity, access time and data transfer time. 1.5 Identifying Hardware connectivity devices 1.5.1 Ports The various connectors and ports on the computer allow it to communicate with the many different devices and peripherals attached. Because there are so many cables and cords attached to the back of the computer, and so many different types of connectors, it often seems a little intimidating to the newer user. Although there are some devices which may use the same connector or port, the individual devices and their cords can only physically attach to one certain type of connector; so don't feel nervous about hooking your system together. There's really no way you can do any harm to your computer just by hooking it up, as long as you follow a few common sense rules:

The first thing to know is the difference between a male and female connector. The male connector fits inside the female connector. If the connector has pins protruding from it, its a male connector. If the connector has holes for the pins to fit into, then its a female connector. When you hook something up to your computer, the male and female connectors are hooked together. The connectors on the back of your computer are called input/output ports (i/o ports) or communication ports.

BY TEWODROS BOGALE 5

The second thing you should remember is that when you join a connector to a port, they must have the same shape and the same number of pins or holes. In other words, a square peg won't fit into a round hole, and its not wise to try to jam fifteen pins into nine holes (part of the 'common sense' thing I was talking about).Which brings us to another very important point, never force anything. Here's one that's hard to do. Always make sure the computer is off before attaching connectors or cables to any of the ports. This can cause little power gliches (another technical word) that could corrupt an open file or cause a program to freeze. It can even cause a small short that could damage or ruin components inside your computer. I know, you've done it a hundred times and never had a problem. Well, that's good. If you want to continue to practice risk management, that's your perogitive, but be aware of the possibilities and don't be surprised when you finally get burned. USB ports are the only ports that should be considered hot-swappable (this means they can be plugged in or unplugged while the machine is on). Only one more thing to remember. There are small hexagonal nuts on either side of many of the ports on your computer. These allow you to screw the connectors in so they don't accidentally fall out or loosen. They just have to be screwed down, they do not have to be tightened. These nuts are actually the heads of small bolts that pass through the back plate on your computer and are attached with a small nut on the other side. If you tighten the screws too much, then when they're undone, they may take the bolt with them and the small nut may fall off inside the computer (onto the motherboard or an expansion card). Not a good thing. Standard Serial and Parallel Ports Traditionally, the most basic communications ports in any PC system have been the serial and parallel ports, and these ports continue to be important. Serial ports (also known as communication or COM ports) originally were used for devices that had to communicate bidirectional with the system. Such devices include modems, mice, and scanners. Newer parallel port standards now allow the parallel port to perform high-speed bidirectional communications. Serial Ports The asynchronous serial interface was designed as a system-to-system communications port. Bit-by-bit communication Each bit lines up in a series to be sent. built-in serial ports are controlled by a Super I/O chip The interface is a DB-9 or DB-25 male connector Parallel Ports

normally used for connecting printers to a PC. Parallel ports are so named because they have eight lines for sending all the bits that comprise 1 byte of data simultaneously across eight wires. The only problem with parallel ports is that their cables cant be extended for any great length. Interface is DB-25 female Universal Serial Bus (USB)

Uses serial communication. Why Serial, why not parallel? Increasing the clock speed of a serial connection is much easier than increasing that of a parallel connection. Parallel connections in general suffer from several problems, the biggest being signal skew and jitter. skew and jitter are data corruptions due to long distance and high speed propagation. With a serial bus, the data is sent 1 bit at a time (no worry about when each bit will arrive, the clocking rate can be increased dramatically). parallel cabling is more expensive than serial cabling. USB Brings Plug and Play (PnP) capability for attaching peripherals externally to the PC. saves important system resources such as interrupts (IRQs) BY TEWODROS BOGALE 6

Regardless of the number of devices attached to a systems USB ports, only one IRQ is required. allows up to 127 devices to run simultaneously on a single bus Has two versions USB 1.1 and USB 2.0 (Hi-Speed USB) USB Technical Details

USB 1.1 runs at 12Mbps (1.5MBps) over a simple four-wire connection. Note that although the standard allows up to 127 devices to be attached, they all must share the 1.5MBps bandwidth, meaning that for every active device you add, the bus will slow down some. USB devices are considered either hubs or functions, or both. Functions are the individual devices that attach to the USB, such as a keyboard, mouse, camera, printer, telephone, and so on. Hubs provide additional attachment points to the USB, enabling the attachment of more hubs or functions. USB 2.0 USB 2.0 is a backward-compatible extension of the USB 1.1 uses the same cables, connectors, and software interfaces, but it runs 40 times faster than the original 1.1 version. The higher speed enables higher-performance peripherals, such as higher-resolution Web/videoconferencing cameras, scanners, and faster printers. All existing USB 1.1 devices work in a USB 2.0

Martin Owens over at DoctorMos blog designed an impressive set of visuals detailing a wide range of computer ports. Any self-respecting geek should know these, they do come in handy from time to time:

Serial Port: A serial communication physical interface through which information transfers in or out one bit at a time PS/2 Connector: Is used for connecting some keyboards and mice to a PC compatible computer system. Its name comes from the IBM Personal System/2 series of personal computers Parallel Port: Sends several data signals simultaneously over several parallel channels (as opposed to the Serial Port) Games Port: The traditional connector for video game input devices on x86-based PCs All these ports have been replaced by USB

BY TEWODROS BOGALE 7

Ethernet/RJ45: Martins illustration calls this RJ45, however according to Wikipedia, this is incorrect and should be called 8P8C (8 Position 8 Contact.) They are usedtypically used to terminate twisted pair cable Modem/RJ11: a physical interface often used for terminating telephone wires

VGA Port: Acronym for Video Graphic Array. Use this for external monitors S-Video: Separate Video (not Super Video) carries the video data as two separate signals, lumen (luminance) and chroma (color) HDMI: High Definition Multimedia Interface is a compact audio/video interface for transmitting uncompressed digital data DVI: Digital Video Interface is a video interface standard designed to provide very high visual quality on digital display devices such as flat panel LCD computer displays and digital projectors Mini-DVI: This connector is used on Apple computers as a digital alternative to the Mini-VGA connector Micro-DVI: This port is a video connection port used by some Apple MacBook Air laptop computers produced between January-October 2008

BY TEWODROS BOGALE 8

Audio Mini-Jacks Sockets are self-explainable, you can find more comprehensive description of this interface here S/PDIF: Or Sony/Phillips Digital Interconnect Format

Firewire 400MB/s: Can transfer data between devices at 100, 200, or 400 Mbit/s half-duplex data rates Firewire 800Mb/s: Can transfer data at a rate of 786.432 Mbit/s full-duplex

C5 / C6: Cloverleaf or Mickey Mouse power connectors can be seen on the majority of laptop power supplies and portable projectors C7 / C8: C7 is also sometimes called Shotgun. These connectors can be found on cassette recorders, battery/mains operated radios, some full size AV equipment, laptop computer power supplies, video game consoles C13/C14: C14 is used as an inlet to attach the power cord to the power supply, as do many monitors, printers and other peripherals. While many older computers also provide a panel-mounting C13 outlet for powering the monitor

BY TEWODROS BOGALE 9

USB-A: This kind of plug is most frequently seen on cables that are permanently attached to a device, such as one on a cable that connects a keyboard or mouse to the computer USB-B: Typically plugs into an upstream receptacle on a device that uses a removable cable, e.g. a printer Mini-A & Mini-B: Mini-A is now deprecated, but both these plugs are plugs are approximately 3 by 7 mm. These are used in PDAs, mobile phone, and cameras Micro-B: Micro plugs have a similar width as the Minis but approximately half the thickness. These enable integration into thinner portable devices. Micro-AB: This receptacle is capable of accepting either a Micro-A plug or a Micro-B plug

eSata: External Serial Advanced Technology Attachment, standardized in 2004, provides a variant of SATA meant for external connectivity DisplayPort: Is a digital display interface standard put forth by the Video Electronics Standards Association (VESA) since 2006 MiniDP: A miniaturized version of the DisplayPort used by Apple PCMCIA: Personal Computer Memory Card International Association is used in a wide range of products such as WiFi, networking and memory

1.5.2 Terminals A terminals is a visual display unit and a keyboard.it is connected to a separate computer. A mainframe computer usually has a number of terminals connected to it. The simplest of the computer terminals is called a dumb terminal. This can be something as basic as a monitor and keyboard plugged directly into a network router, or it can be a computer with an actual tower unit that is networked in an office. The reason the terminal is considered dumb is because it has close to no processing power of its own and instead just sends and receives signals from a larger central computer that performs all the processing. Dumb terminals are both inexpensive and secure because they are unable to save information to a local hard drive and must route all information and requests through the main computer system. Above dumb terminals are intelligent computer terminals. These are actual functioning computers or laptop systems that do have the basic components of a standard personal computer, including a hard drive, memory and peripheral ports. These terminals are networked to a central computer system and can work in one of two ways. They can run custom client software to interface with the mainframe, or they can use terminal emulation software to mimic a dumb terminal in a dedicated window. An intelligent computer terminal has the advantage of allowing some processing tasks to be performed by the local processor instead of relying solely on the mainframe for all actions. Handheld computer terminals are often employed in industries that require employees to move around a lot or to be in different locations over the course of a day. These terminals can either resemble small computers with miniature keyboards and monochrome displays, or can be customized to input specific types of data more efficiently. Different types of handheld computer terminals are widely used in surveying, manufacturing, financial trading and inventorycontrol companies. Other types of computer terminals can include computerized cash registers that are really just dumb terminals that have been customized to allow for faster input of specific information. Networked terminals are similar to intelligent computer terminals except all the software run on them is drawn from the mainframe, though the local computer BY TEWODROS BOGALE 10

actually runs the programs once retrieved. Finally, there are transaction terminals that perform functions such as reading credit cards or allowing access to a bank account; an automated teller machine (ATM) is one such example. 1.5.2 Connectors In hardware , used to join cables of to join a cable to a device .most connecter type are available in one of two genders male or female. A male connecter is characterized by one or more exposed pins,a female connecter is characterized by one or more receptaclesocets or jacks-designed to accept the pins on the male connecters. RJ Connectors The RJ connector is used for communication devices. If you live in North America and have a jack on your wall that your phone connects to, that's an RJ-11 connector. Now, the RJ-11 connector or port doesn't have 11 pins or 11 holes. As a matter of fact, it only connects 4 or 6 wires. You may have an RJ-11 connector on the back of your computer if you have an internal modem. This is to hook a phone line up allowing communication with other computers and access to the Internet and the World Wide Web. If you see two RJ-11 connectors side by side, it means that you can hook the phone line to your computer using the one jack, and then an extension phone can be plugged into the other jack. A lot of modems today allow for fax and voice capabilities. This means that you can fax from your computer, it can double as an answering machine that records messages and voice mail, and, if you have speakers and a microphone, you can even use it as a speakerphone. An RJ-45 connector looks much like the RJ-11, only larger. It connects 8 wires and is used for network ethernet connections. If you see and RJ-45 connector or port on the back of your computer then there's two possibilities; Your computer is hooked up to a network or intranet, or, you have cable hookup to the Internet and the World Wide Web. The latter uses an RJ-45 connection between the cable modem and the network interface adapter (which is the same adapter you would be using for a network connection).

As you can see, the RJ connector is designated as RJ-x. But the 'x' doesn't tell you the number of connectors that the port has like other ports. At one time, I thought it might designate the size of the jack. The RJ-45 is larger than the RJ-11, but the RJ-12 is smaller (this is the connector between your phone and the handset), so I guess that doesn't hold water either. At this point, I become disinterested... If you know the answer, let me know and I might change this paragraph. But mainly what you need to know is, the RJ-11 connects 4 or 6 wires, is used on modems and telephones, and is smaller than the RJ-45 which is used for ethernet connections to network interface cards. DIN Connector The DIN connector is a small round connector, usually with a keyed slot for proper orientation. Again, it's designated as DIN-x, with 'x' representing the number of holes or pins on the connector. It comes in a couple of different sizes and it's been used on computers about as long as the DB connector has. It's a fairly popular connector because of its small size and solid connection. The most common DIN connector would have to be the DIN-5 keyboard connector. Its the largest of the DIN connectors that you're going to find on your computer and its been around for a long time. If you own a newer computer, then the DIN-5 has probably been replaced with a DIN-6 (mini-DIN or PS/2) connector.

The PS/2, or DIN-6 connector, was mainly used by Macintosh computers for the longest time (Macintosh also used a DIN-8 connector for their printer). You may hear them referred to as a mini DIN-6 connector. They're smaller and more compact than the typical DIN-5 connector and have become the standard for both the keyboard and the mouse on newer PCs. If this is the case on your computer, then the two DIN-6 female ports on the back of your computer are going to look an awful lot alike, and you need to distinguish between the mouse port and the keyboard port before hooking them up. They may be color coded or they BY TEWODROS BOGALE 11

may have a little icon beside them representing their use. Whatever the case, you're not going to do any harm if you accidentally get these two devices switched. Your mouse won't work, or you'll get a keyboard error at boot up. Your first course of action for troubleshooting this type of problem should be to check the connection anyway. Another port you could find on the back of an older computer is the DIN-9. It would be another mini DIN port with 9 sockets. A bus mouse or a hand-held scanner may use this type of port, but it's unlikely that you're going to find one on a newer computer. PRINTER CABLE - This is a 25-pin "D" shaped connector that connect printers to the parallel port on a computer. (Newer printers may connect with a USB plug.)

USB CABLE - Most PC's now have these fast and versatile ports on the front and back. They can be used for portable storage devices, digital cameras, scanners, video cameras, printers, keyboards and mice - just about everything!

POWER CORD - This is a standard "kettle cord" that connects the computer to the AC outlet on the wall. This MUST be unplugged if you are ever doing any maintenance work inside the computer.

MONITOR CABLE - This cable is usually permanently connected to a monitor. Small screws hold the cable in place.

1.6 Informing safety rules and tools to work with, in hardware connectivity OHS legislation is designed so that employers prove a save work environments and employees minimise the risk of accidents and injuries. Employess must take setps to avoid industrial accidents and illnesses. Employees have the right to safe and health work place and compensation payment in the event of injury sickness resulting from employment.

Safety signs and hazards Safety signs and symbols (for examples , posters, labels, tags and signed ) are display to alert staff and members of the public to dangers. The productivity of staff can be adversely affected by physical hazards such as noise, vibration, air quality and ventilation, the design of office furniture and equality, and lighting. Employers have an OHs obligation to ensure that attention paid to these issues. OH&S Acts Under the OH&S acts of the common wealth all employers are required to provide and maintain so far as is practicable for employees a working environments that is safe without risks of health. Employers are also obliged to provide such information, instruction, training and supervision to employees to perform their work in a manner that is safe and without risk of health. BY TEWODROS BOGALE 12

Safety Instruction Signs Used where there is a need for general instruction and suggestion relatively to safety measures. Colors are white, green and black.

Accident prevention tags Tags are for temporary use any, to specify precautions and safety needs. Accident prevention tags are a temporary method of warning of a hazardous condition, defective equipment, radiation hazards, etc. However, accident prevention tags will not be used as a substitute for accident prevention signs. The designs of accident prevention tags will be the same as accident prevention signs. The messages on these tags will be removed or covered when the hazard no longer exists. Accident prevention tags will contain a signal word or emblem (such as Danger, Caution, or Biohazard) and a major message. The signal word will be readable from a distance of at least five feet and will be understandable to all employees. The major message will indicate the particular hazard involved or instructions to the exposed person. Accident prevention tags will be located and secured as close as possible to the hazard.

In general we can identify different kinds of safety color code as follows Color Codes Red is recommended for identifying fire protection equipment, danger, and emergency stops on machines. Yellow because of its high visibility is the standard color for marking hazards that may result in accidents from slipping, falling, striking against, etc. Green in combination with white, such as the green cross on a white background, designates the location of first aid and safety equipment. Black and White and combinations of the two in stripes or checks are used for housekeeping and traffic markings. Orange is the standard color to highlight hazardous parts of machines or electrical equipment, such as exposed edges of cutting devices, the inside of removed guards, and the doors and covers of switch boxes. Orange is also used for biological and similar types of hazards. Reddish-Purple (magenta) identifies radiation hazards, such as radioactive materials in rooms and containers. Accident Prevention Signs Accident prevention signs are not considered the final step to be taken against hazards. Whenever possible, the hazards are to be eliminated. The designs of accident prevention signs will be uniform throughout. These signs must be visible at all times when work is being performed. The messages on these signs will be removed or covered when the hazard no longer exists. Each accident prevention sign will include a major message that indicates the risk level of the hazard present. Danger signs will be red, black and white. They will be used when an immediate hazard exists or when special precautions are necessary. These signs will be conspicuously posted. Caution signs will have a black upper panel and yellow letters. The lower panel will have a yellow background and black letters. These signs will be used to warn of possible hazards or against unsafe practices. Safety instruction signs will be white with a green upper panel and white letters. Any additional wording on the sign will be black letters on a white background. These signs will be used where general instructions or guidelines for safety are required such as Fasten Seat Belts, Look Before Backing, etc. Slow moving vehicle emblems will be a yellow-orange triangle with a dark red reflective border. These signs will be used on any vehicle or equipment traveling at a speed of 25 miles per hour or less. BY TEWODROS BOGALE 13

Biological hazard signs will be florescent orange-red with lettering or symbols in a contrasting color. These signs will be used to inform employees of the actual or possible presence of biological hazards. Radiation hazard signs will contain the conventional radiation caution colors (magenta or purple on yellow background) and the standard radiation symbol. Directional signs, other than automotive traffic signs, must be white with a black panel and white directional symbol. Any additional wording on the sign shall be black letters on the white background. Exit signs, when required, must be lettered in legible red letters not less than 6 inches high on a white field and the principal stroke of the letters must be at least three-fourths of an inch wide. Traffic signs shall be posted in construction areas with legible traffic signs at points of hazard. All traffic control signs or devices used for protection of State employees and the public shall conform to the latest version of the manual on Uniform Traffic Control Devices.

1.7 Identifying procedures involved in hardware peripherals connection In order to connects the computer hardware we have to identify different kinds procedure in order to protect hardware from damages. 1.8 Understanding hardware peripheral device connection instruction We have to identify different kinds of instruction in order to connect the computer hardware peripheral to satisfy the clients. 1.9 Identifying client peripherals and confirming after comparing with organizational standards One of the keys to successful business change is communication. Any service provider must have a clear and positive approach to first ensuring that they understand their client's needs and second that they can confidently provide services and ideas that will help their client to grow and evolve. This is also essential if cost, quality and timelines are to be planned accurately. So here the support group must be identifying the user/client peripherals and confirming according to organizational standards. Some organisations have a policy of using preferred suppliers for computer hardware purchases. This ensures the quality and consistency of computer hardware devices is maintained throughout an organisation. A standard operating environment is a specification for computer hardware and software which organisations develop to maintain consistency and reduce support costs. Many organisations such as universities, publish their standard operating environment policies on the internet LO2 Obtaining required peripherals

2.1 Obtaining peripherals using instruction from appropriate person


We have to identify the With respect to an instruction, the registered owner of an uncertificated security that help to obtaining peripherals. An instruction originated by an appropriate person is:

(a) a writing signed by an appropriate person; or (b) a communication to the issuer in any form agreed upon in a writing signed by the issuer and an appropriate person.

2.2 Entering peripherals into equipment inventory according to organizational standards


Computer Equipment Inventory Below are the basic instructions for adding, moving, or disposing of computer equipment within the School of Pharmacy. Organization ' involvement may vary by department but changes to the inventory must be communicated to keep the inventory system accurate. Adding Equipment to Our Inventory 1. Inform Organization via e-mail when new equipment is ready for setup. A work ticket will be created. BY TEWODROS BOGALE 14

2. When Organization picks up your new equipment, the department must have both an asset tag and an inventory sheet with the asterisked items completed. Speak to your departmental contact (see sidebar on right) concerning asset tags. 3. Organization will tag the equipment, complete the remaining fields in the inventory sheet, enter an inventory record, and install the equipment at its location. Moving Inventoried Equipment If you are moving this equipment without Organization assistance, you must complete an equipment transfer notification. If Organization is helping you move this equipment, we will update the inventory record for you. Disposing of Inventoried Equipment 1. Submit an inventory disposal request to Organization. A work ticket will be created. 2. If the equipment has a hard drive that needs to be erased, Organization will pick up the equipment, erase it, and file a Excess Property Declaration for you. No further action is needed. 3. Otherwise, you will need to submit an Excess Property Declaration yourself. The campus will pick up the equipment directly. Disposing of Non-Inventoried Equipment Submit an Excess Property Declaration to have the campus pick up the equipment. 2.3 Checking the contents of delivered components You have to check the contents of delivered components in the following way. Matching the packing list and resolve if there is mismatch. Packing lists provide a wealth of information to a variety of people. They provide important information to company officials, employees, and customers. Information related to the customer, product, and return information will typically is found on a packing list. So if there is a mismatch you have to adjust according to organizational instruction. Reading and understanding vendors manuls. Vendors are a company which supplies parts or services to another company. Also called supplier. Or we can define as a retail salesperson without an established place of business, such as a street vendor. The vendor selection process can be a very complicated and emotional undertaking if you don't know how to approach it from the very start. Here are five steps to help you select or understanding the right vendor for your business. This guide will show you how to analyze your business requirements, search for prospective vendors, lead the team in selecting the winning vendor and provide you with insight on contract negotiations and avoiding negotiation mistakes. Those five way to understand or select vendors are 1. 2. 3. 4. 5. Assemble an Evaluation Team Define the Product, Material or Service Define the Technical and Business Requirements Define the Vendor Requirements Publish a Requirements Document for Approval So now you can identify the correct vendors to your hardware peripherals. Selecting storage place for peripherals on the instruction on the manuals. LO3 Connecting hardware peripherals

3.1 Verifying timeframe (allocating time) schedule with client


BY TEWODROS BOGALE 15

Learning to schedule both your daily, weekly and monthly time slots is probably one of the most important business tasks youll ever need to do. Its yet another skill you have to learn as you go along in day-to-day business. Mishandling this can cause late projects, late payments, no personal lifeand the worst of allangry clients. At this time we have to allocating or have timeframe with our clients. So Time management in the workplace can mean the difference between success and failure. This makes time management in the workplace important for you, your family, and your business. There are many strategies that you can use to take control of your time management in the workplace! Here I provide six strategies that my clients have found useful. 1. 2. 3. 4. 5. 6. 7. Know your job role and how your manager is measuring your performance. Focus on your important and urgent activities Reduce and manage interruptions in the workplace Organize yourself and your workspace Get specific about your next action Too much to do and not enough time: Delegation could be the key? Do it now: Overcoming procrastination

3.2 Using Operating health and safety Employers have a responsibility to provide a safe and healthy workplace for all employees. It also requires all workers to be aware that they have a duty to follow safe work practices to prevent injuries to themselves or other workers. Organisations will develop procedures for safe working practices as a tool for implementing their OH&S policies and training staff. In order to connect the client peripheral you have to indentify the following Removing old peripherals or replacing Minimizing interruption of client while removing and replacing How can you get your work done if you have constant interruptions? You can't...and it's very frustrating. You have to practice self-defense when it comes to interruptions. If you don't take steps to minimize them, your time will be wasted and your productivity will suffer. Studies show that the average worker is interrupted every eight minutes. The same studies reveal that 15% of the interruptions are important, while the remaining 85% are a waste of time. Telephone calls and e-mail are major culprits, but even worse are the two-legged interrupters: your co-workers. Here are five tips to minimize those two-legged interruptions and keep you in the productivity fast lane: 1. Stand up when someone enters your workspace....or when they've over-stayed their welcome. When you stand, you send a message that the meeting will either be brief or that it has ended. This works every time. You start moving, they start moving...end of interruption. 2. Never ask "How are you?" when someone stops by your office. This is an open invitation to chat. Do you really want to hear about their gallbladder surgery? Instead, ask "What can I do for you?" This will get you right to the point of the interruption. 3. A bit of creative workspace re-organization goes a long way. If your desk faces the door, turn it so you don't look right into the hallway at everyone who passes. Once they make eye contact, they always stop to chat. Can you remove your chairs? If not, stack some files on them so the office pest (IE time waster) can't take root for a half hour of blah blah blah. Last, NEVER have a bowl of candy on your desk. Who can resist a handful of BY TEWODROS BOGALE 16

M&M's...and a little conversation to go along with them? 4. If you're asked to answer a 'quick question or someone wants 'just a minute' of your time, beware! Your first question should be, "How much time do you need?" If you have the time available, go for it and hold them to the deadline. If you don't have a spare fifteen minutes, schedule an appointment with them later. Rehearse a few lines like: "I'm sorry but I need to finish this deposition summary in the next hour. Can we talk later?" or "Attorney X is waiting for this research. I can spend some time with you at 2:00 this afternoon." If you use lines like these, you've turned the tables and you're now meeting on your own terms. 5. Urge co-workers to accumulate their questions. They should save all but urgent issues to discuss with you in one chunk of time. It's much more productive to spend twenty minutes discussing five client matters than it is to talk about one client matter for ten minutes every hour. BONUS TIP: Don't interrupt yourself! Determine the time of day you are most productive (early morning? mid-afternoon?) and make yourself unavailable to the world during that time every day. Shut your door. Turn off anything that might be noisy or distracting. Stock your desk with all the supplies you need to eliminate unnecessary trips to the supply room. Practice what you preach: gather your questions and assignments and interrupt your co-workers only once. Your challenge: Make a short list of the interruptions you will allow. For all the rest, decide which of today's tips you can implement to minimize them. Once that decision is made, take the necessary steps to curb those interruptions and you'll find yourself on your way to a more productive day Resolving conflicts in information with stakeholders Here's where managing stakeholder conflict becomes tricky, because we actually have to deal with two concurrent issues. The first is the substantive issue of project estimation and various time, cost, scope (and don't forget quality) tradeoffs. This is a multiparameter problem that gut feel won't solve. Software project tradeoffs are nonlinear -simple changes in one dimension result in geometric effects in another. (An example of this is the dramatic rise in defects as schedule is compressed.) Last time I checked, I couldn't solve these types of complex problems in my head. You need a reliable estimation model to predict these scenarios. Yet nearly 50% of respondents in a recent Cutter survey replied that the predominant method of estimation is by gut feel -- they do it in their heads, or at least they attempt to. The second issue is that of conflict management and negotiation itself. It's one thing to haggle over something like the price of a car in a basic two-party negotiation. Many people find even that difficult. But resolving differences is entirely another matter with multiple stakeholders (management, users, developers, marketing), especially when those stakeholders are groups of people. These kinds of conflicts are more akin to consensus building in the UN. When you throw in the issue of time pressure, it becomes even more difficult. People do strange things when under time pressure. Solution is for organizations to get innovative by employing better practices in these two disciplines -software project estimation and multiparty negotiation. These are not areas in which most folks have had much formal training, but when skillful techniques are thoughtfully applied, frequent failure can be turned into certain success. Configuring the computer to make it accept the new peripherals Preparation / Warnings:

If you are performing the initial connections to the PC while in the middle of a new PC assembly, you will probably not have some of the peripherals in the machine yet that I refer to here. In particular, the modem and sound card may not be installed yet. Don't over-tighten connections that use screws or you may have problems when disconnecting peripherals. Don't force connectors such as those on keyboards or mice into their sockets or you may damage the motherboard that the socket is attached to. You should be using some sort of power protection device. Make sure it is plugged into the wall.

BY TEWODROS BOGALE 17

Operation sheet 1
Unit of Competency: CONNECTING HARDWARE PERIPHERALS OPERATION TITLE: Installing Your Keyboard or Mouse PURPOSE: to connect the computer hardware pheripherals. CONDITIONS OR SITUATION FOOR THE OPERATION: A personal computer with necessary peripherals(mouse, keyboard e.t.c) , Ms Office 2007. EQUIPMENT, TOOLS AND MATERIALS: a personal computer with mouse, keyboard, VGA display . PROCEDURE: To install your keyboard or mouse To install your keyboard or mouse: 1. Exit Windows and turn off your computer. 2. Unplug the power cord and modem and network cables. 3. Disconnect the old keyboard or mouse. 4. If you are installing a USB mouse, connect the mouse to a USB port computer. on the back of your

- OR If you are installing a Personal System/2 (PS/2) mouse, connect the mouse to the PS/2 mouse port on the back of your computer.

5. If you are installing a USB keyboard, connect the keyboard to a USB port computer.

on the back of your

BY TEWODROS BOGALE 18

- OR If you are installing a PS/2 keyboard, connect the keyboard to the PS/2 keyboard port of your computer.

on the back

6. Connect the power cord and modem and network cables. 7. Turn on your computer.

Operation sheet 2
Unit of Competency: CONNECTING HARDWARE PERIPHERALS OPERATION TITLE: Installing Your Printers PURPOSE: to connect the computer hardware pheripherals. CONDITIONS OR SITUATION FOOR THE OPERATION: A personal computer with necessary peripherals(mouse, keyboard e.t.c) , Ms Office 2007. EQUIPMENT, TOOLS AND MATERIALS: a personal computer with mouse, keyboard, VGA display printers, scanners, modem PROCEDURE: To installing printers Instructions to connect printers Things You'll Need

Printers Computers IEEE 1284-compatible, bidirectional printer cables

1. Position your printer. If you have a laser printer, allow a few inches of space on all sides for ventilation. Ink-jet printers don't require ventilation. BY TEWODROS BOGALE 19

2. Buy a bidirectional, IEEE 1284-compliant parallel printer cable. (Printers rarely come with cables. See "How to Buy a Printer Cable," under Related eHows, for more information.) 3. Shut down the computer, but leave it plugged into the surge suppressor. 4. Compare the connectors at the opposite ends of the cable. 5. Attach the 25-pin end of the cable to the parallel, or printer, port on the computer. (The plug will go in only one way.) 6. Tighten the hand screws securely. 7. Connect the other end of the cable into the printer's socket. 8. Latch the retaining clips (on most printer ports). 9. Plug the power cord into the printer and into the surge suppressor. 10. Turn on the printer. 11. Install cartridges according to the printer manufacturer's instructions. 12. Turn on the computer. 13. Install printer driver software according to the manufacturer's instructions. 14. Add the printer to the list of printers your computer recognizes (see "How to Add a Printer," under Related eHows). On a Macintosh, just select the new printer in the Chooser. Or we can use 1. To add a printer, first follow your printer's instruction manual to assemble your printer and connect it to your computer.When you are ready to install the software, have your printer's CD-ROM or floppy disk handy. 2. Open the Start menu and choose Settings, then Printers. 3. Double-click on Add Printers. 4. Follow the instructions provided by the Print wizard. If you're adding a network printer, be sure to find out its name or network path. To make sure you're using the most recent printer driver, insert your printer CD-ROM or floppy disk when asked. You can also choose a preinstalled driver that matches the printer make and model you're trying to add, but it might be older than a driver that came with the printer. (If you're installing a networked printer, ask your system administrator if there are newer drivers available on the network.) 5. When prompted, indicate whether you want to use this printer as the default. If you have only one printer, you will say yes. If you have two, you must choose which one is to be the default. 6. When asked if you want to print a test page, it is a good idea to say yes. 7. When satisfied, click Finish to complete the installation process

Operation sheet 3
Unit of Competency: CONNECTING HARDWARE PERIPHERALS OPERATION TITLE: Installing Your scanner PURPOSE: to connect the computer hardware pheripherals. CONDITIONS OR SITUATION FOOR THE OPERATION: A personal computer with necessary peripherals(mouse, keyboard e.t.c) , Ms Office 2007. EQUIPMENT, TOOLS AND MATERIALS: a personal computer with mouse, keyboard, VGA display printers, scanners, modem PROCEDURE: To installing scanner Instructions to connect scanner

BY TEWODROS BOGALE 20

Things You'll Need


Scanner Personal computer

1. Read the manufacturer's instructions included with the scanner. Become familiar with the scanner's connections, functions and wires. 2. Note the connection that the scanner uses for the computer by consulting the manufacturer's manual. Does the scanner use a parallel port, USB port or SCSI port? Make sure the computer has the appropriate port available to connect the scanner. 3. Turn off the computer. Locate the proper port in the back of the computer. 4. Connect the cord into the proper port and the other end into the back of the scanner. Connect the power cord from the computer into the wall. 5. Turn on the computer. The computer will detect new hardware and indicate this in the start tray. 6. Insert the scanner software into a drive on the computer. Follow the instructions for installing the scanner software. 7. Place a start-up icon on the computer desktop to make it easy to locate and use the scanner. Identifying procedures , instruction involved in hardware peripherals connection This procedure provides basic instructions for connecting the PC's external peripherals to the system case. Procedure Steps: 1. Connect Power to Monitor: Attach the power cord to the back of the monitor and connect it to your power protection device. 2. Connect Monitor to Case: Attach the video cable to the monitor and to the system case. On modern systems the cable will have a male connector on both ends, each of which has 15 pins. Note that on some monitors, the data cable is integrated into the monitor itself instead of there being a detached cable. Some newer high-end monitors also may use five round BNC connectors to attach to the monitor instead of a D-shell 15-pin connector. 3. Connect Power to Case: Attach the power cord to the back of the PC and plug it into your power protection device. 4. Connect Keyboard: Attach the keyboard to the back of the system case using the round connector. Depending on your system you will have either a large-diameter five-pin connector or a smaller six-pin connector. The connector is keyed and can only be inserted one way. On ATX systems, make sure you use the correct connector, because the keyboard and mouse connectors are the same size and shape. 5. Connect Mouse: Attach the mouse to the back of the system case. Depending on your mouse you will have either a D-shaped 9-pin connector (serial mouse) or a small, round, six-pin connector (PS/2 mouse). If using a PS/2 mouse, make sure you use the correct case connector, because the keyboard and mouse connectors are the same size and shape. 6. Connect Phone Line to Modem (if applicable): If your system has an internal modem in it, connect the phone cord to the appropriate jack. Most modems have two jacks; one is to connect the modem to the wall and the other is a "pass-through" for you to attach a phone to. You want to attach to the one that is normally labeled "Line" or "Wall" and connect the other end to your phone jack on the wall. 7. Connect Sound Devices to Sound Card (if applicable): If you have a sound card in your system, you will want to attach either your home stereo or your computer speakers to it, depending on which you are using. You may also wish to connect a microphone. The sound card should have several round ports--all of which naturally are the exact same size and shape :^)--so choose the correct one. There are often two different outputs, one labeled "Speaker out" and the other "Line out". The first one is usually better for speakers and the other for a home stereo. The microphone jack is often labeled "Mic In". Some systems of course have integrated speakers and/or microphone, which simplifies this step considerably. 8. Connect Printer (if applicable): If you have a printer, connect the printer cable to it and then the other end to the parallel port on the back of the PC. This connector is D-shaped and will only go in one way. 9. Connect Other Peripherals (if applicable): Depending on your system you may have other peripherals you will want to hook up as well. Testing and hardware peripherals after configuration How to Check Or Testing Computer Components BY TEWODROS BOGALE 21

Computer components can usually work in many different kinds of computers. Often you can pull a component from one computer and put it on the shelf and then use it again later. Doing this, though, often leads to piles of computer components that you don't know if or how well they work. If you have just one component that you want to test, or if you have a whole shelf full, there is really only one way to go about testing the components, and that's to test them manually. Instructions 1. Put the computer component inside a working computer with no known problems. Make sure the component is fully installed without any loose connections. You may want to leave the computer case open as you do this, because you will probably be pulling the component out again soon. 2. Run hardware diagnostic tests. You can use diagnostic software (see Resources below) to test if the hardware is working. These resources may have to be run from a CD at the boot-up of your computer and can sometimes take an hour or more. 3. Try the components out by using your computer at maximum ability. Use your computer in the way that utilizes the component and pushes the component to perform at or near its limits. If you are testing a video card, then maximize screen resolution and try playing a game or running a program that has high video demands.

LO4 Connect workstation to the internet Connecting workstations to the computer having internet connection The internet is a global connection of computer. Those computers are connected via hug network of telecommunication link. The internet allows you to access to a whole resource of data and information stored at different sites(called host or serves) and locating all around the world. Hardware and software requirement to access the internet Hardware requirement - Complete computer system - ISP (internet service providers) Telephone line modem

Software requirements Operating system Browsers such as Microsoft internet explorer e.tc An internet account with any Isp

Operation sheet 4
Unit of Competency: CONNECTING HARDWARE PERIPHERALS OPERATION TITLE: Sharing the internet connection PURPOSE: to connect the computer hardware peripherals. CONDITIONS OR SITUATION FOOR THE OPERATION: A personal computer with necessary peripherals(mouse, keyboard e.t.c) , Ms Office 2007. EQUIPMENT, TOOLS AND MATERIALS: a personal computer with mouse, keyboard, VGA display printers, scanners, modem BY TEWODROS BOGALE 22

PROCEDURE: Sharing the internet connection Sharing the internet connection On the host computer On the host computer, follow these steps to share the Internet connection: 1. Log on to the host computer as Administrator or as Owner. 2. Click Start, and then click Control Panel. 3. Click Network and Internet Connections. 4. Click Network Connections. 5. Right-click the connection that you use to connect to the Internet. For example, if you connect to the Internet by using a modem, right-click the connection that you want under Dial-up. 6. Click Properties. 7. Click the Advanced tab. 8. Under Internet Connection Sharing, select the Allow other network users to connect through this computer's Internet connection check box. 9. If you are sharing a dial-up Internet connection, select the Establish a dial-up connection whenever a computer on my network attempts to access the Internet check box if you want to permit your computer to automatically connect to the Internet. 10.Click OK. You receive the following message: When Internet Connection Sharing is enabled, your LAN adapter will be set to use IP address 192.168.0.1. Your computer may lose connectivity with other computers on your network. If these other computers have static IP addresses, it is a good idea to set them to obtain their IP addresses automatically. Are you sure you want to enable Internet Connection Sharing? 11.Click Yes. The connection to the Internet is shared to other computers on the local area network (LAN). The network adapter that is connected to the LAN is configured with a static IP address of 192.168.0.1 and a subnet mask of 255.255.255.0 On the client computer To connect to the Internet by using the shared connection, you must confirm the LAN adapter IP configuration, and then configure the client computer. To confirm the LAN adapter IP configuration, follow these steps: 1. Log on to the client computer as Administrator or as Owner. 2. Click Start, and then click Control Panel. 3. Click Network and Internet Connections. 4. Click Network Connections. 5. Right-click Local Area Connection, and then click Properties. 6. Click the General tab, click Internet Protocol (TCP/IP) in the This connection uses the following items list, and then click Properties. 7. In the Internet Protocol (TCP/IP) Properties dialog box, click Obtain an IP address automatically (if it is not already selected), and then click OK. Note You can also assign a unique static IP address in the range of 192.168.0.2 to 192.168.0.254. For example, you can assign the following static IP address, subnet mask, and default gateway: IP Address 192.168.0.2 Subnet mask 255.255.255.0 Default gateway 192.168.0.1 8. In the Local Area Connection Properties dialog box, click OK. 9. Quit Control Panel. Troubleshooting When you turn on Internet Connection Sharing on the host computer, the host computer's LAN adapter is automatically assigned the IP address of 192.168.0.1. Therefore, one of the following situations may occur: IP address conflict Each computer on the LAN must have a unique IP address. If more than one computer has the same IP address, an IP conflict occurs, and one of the network adapters turns off until the conflict is resolved. To resolve this conflict, configure the client computer to automatically obtain an IP address, or assign it a unique IP address. BY TEWODROS BOGALE 23

Loss of network connectivity

If your network is configured with a different IP address range than Internet Connection Sharing uses, you will lose network connectivity with the host computer. To resolve this issue, configure the client computers to automatically obtain an IP address, or assign each client computer a unique IP address in the range of 192.168.0.2 to 192.168.0.254. Using internet browser software and launching Introduction When you first open the web browser it will automatically load a "homepage" - usually that of the browser's manufacturer. E.g. Internet Explorer will load the MSN homepage. Most people find this irritating and change the default homepage setting to something they are more interested in like weather reports, stock exchange info or their favourite search engine. To change your homepage to your preferred page, browse to the page you want as your homepage. Then go "View", "Internet Options", select the "Use Current" button. As a page "loads" into your browser you will see the text come in, the pictures arrive - all the basic elements of a web page. You will notice that some text is underlined and in different colours - this is hypertext, if you click on it, you will jump to another web page. When you move your mouse arrow over a link the mouse's pointer will change to a hand. This indicates there is a hypertext link associated with that text. The same applies to pictures, that is, if you move your mouse over a picture and your mouse arrow turns from an arrow to a hand, you know there is a link there. The process of clicking hypertext links, loading one page after another, is called "browsing" or "surfing the web". Web - Browser Types Internet Explorer Internet Explorer (IE) is a product from software giant Microsoft. This is the most commonly used browser in the universe. This was introduced in 1995 along with Windows 95 launch and it has passed Netscape popularity in 1998. Netscape Netscape is one of the original Web browsers. This is what Microsoft designed Internet Explorer to compete against. Netscape and IE comprise the major portion of the browser market. Netscape was introduced in 1994. Mozilla Mozilla is an open-source Web browser, designed for standards compliance, performance and portability. The development and testing of the browser is coordinated by providing discussion forums, software engineering tools, releases and bug tracking. Browsers based on Mozilla code is the second largest browser family on the Internet today, representing about 30% of the Internet community. Konqueror Konqueror is an Open Source web browser with HTML 4.01 compliance, supporting Java applets, JavaScript, CSS 1, CSS 2.1, as well as Netscape plugins. This works as a file manager as wellIt supports basic file management on local UNIX filesystems, from simple cut/copy and paste operations to advanced remote and local network file browsing. Firefox Firefox is a new browser derived from Mozilla. It was released in 2004 and has grown to be the second most popular browser on the Internet. You can download a latest version of this browser from Download Firefox BY TEWODROS BOGALE 24

Safari Safari is a web browser developed by Apple Inc. and included in Mac OS X. It was first released as a public beta in January 2003. Safari has very good support for latest technologies like XHTML, CSS2 etc. Opera Opera is smaller and faster than most other browsers, yet it is full- featured. Fast, user-friendly, with keyboard interface, multiple windows, zoom functions, and more. Java and non Java-enabled versions available. Ideal for newcomers to the Internet, school children, handicap and as a front-end for CD-Rom and kiosks. Lynx Lynx is a fully-featured World Wide Web browser for users on Unix, VMS, and other platforms running cursor-addressable, character-cell terminals or emulators Getting around the Web - your browser's tool bar The Internet Explorer tool bar looks like the one below. The tool bar is essential for navigation and frequently performed functions.

IE Toolbar

Back - returns you to the previous page Forward - goes forward again, after your have gone back a few pages Stop - stops loading a page you have selected (useful for files that are very large) Refresh - reloads the page you requested, ignores contents of your local cache (to ignore higher levels of cache, Ctrl + Refresh button) Home - returns you to the homepage Search - links you to a search engine (more about searching later) Favourites - list sites you have been to and bookmarked because you thought you may like to return History - records where you have been by day, week and month for fast return

The Address Bar The address or URL of the current page you are on appears in the "Address" Bar below the tool bar. You can click in here at any time and overwrite this address with another if you know the address off the top of your head. Leave the "http://" as it is required at the start of the URL, it indicates that the browser is to use hypertext transfer protocol to request the web page. URL stands for "uniform resource locator". In non-technical terms you can think of it as simply the address of a web page.

Address panel When a page is loading you may see some unusual things - the wavy window (top right) waves and a green status bar (bottom right) moves from left to right. The wavy window is simply saying that your browser is looking for the page you requested, while the status bar shows you how much of the web page has loaded. Bottom left, in the gray frame you will see words flashing backwards and forwards. These are the names of all the files that will make up the web page you have requested. Safety Safe working procedures and OHS regulations BY TEWODROS BOGALE 25

The new OHS legislation is made up of the Occupational Health and Safety Act 2000 and the Occupational Health and Safety Regulation 2001. Both the Act and Regulation came into effect on 1 September 2001. Acts An Act is legislation made by Parliament. Acts often have regulation-making powers allowing regulations to be made under them. The objects of the Occupational Health and Safety Act 2000 are to:

secure and promote the health, safety and welfare of people at work protect people against workplace health and safety risks provide for consultation and cooperation between employers and workers in achieving the objects of the Act ensure that risks are identified, assessed and eliminated or controlled, develop and promote community awareness of occupational health and safety issues provide a legislative framework that allows for progressively higher standards of occupational health and safety to take account of new technologies and work practices protect people against risks arising from the use of plant (ie. machinery, equipment or appliances)

Other Acts you should also be familiar with:


Workers Compensation Act 1987 Workplace Injury Management and Workers Compensation Act 1998

Regulations A regulation is law and, as such, employers, workers, insurers, designers, manufacturers, suppliers and others must meet their obligations under both the legislation and the regulations. Regulations support the general requirements of the legislation and provide more detail. The WorkCover website provides further information on Occupational Health and Safety Regulation 2001. Codes of Practice Industry codes of practice provide practical guidance and advice on how to achieve the standard required by the Act and Regulation. Codes of practice are developed through consultation with representatives from industry, workers and employers, special interest groups and government agencies. A code of practice is not law, but it should be followed unless there is an alternative course of action that achieves the same or better standards. Evidence of failure to observe an industry code of practice may be used as evidence in proceedings for an offence under the Act. However, a person is not liable simply because of a failure to observe the code. Standards Australian Standards set out the safety requirements and provide guidance for persons working in specific areas or who deal with particular equipment. These Standards only become legally binding when they are incorporated into legislation. Under Ethiopia law, a variety of systems, equipment, products and materials must meet Ethiopia Standards. Standards are established to ensure that certain requirements are addressed. They outline requirements such as: quality performance construction design endurance time specificity systems or processes certain hazards and controls BY TEWODROS BOGALE 26

Standards are also developed as a result of:


commonly adopted practices in certain industries agreement between management and workers recommendations from advisory bodies

Use of personal Protective Equipment(PPE) Personal protective equipment (PPE) refers to protective clothing, helmets, goggles, or other garment or equipment designed to protect the wearer's body from injury by blunt impacts, electrical hazards, heat, chemicals, and infection, for job-related occupational safety and health purposes, and in sports, martial arts, combat, etc. Personal armor is combat-specialized protective gear. In British legislation the term PPE does not cover items such as armour. The terms "protective gear" and "protective clothing" are in many cases interchangeable; "protective clothing" is applied to traditional categories of clothing, and "gear" is a more general term and preferably means uniquely protective categories, such as pads, guards, shields, masks, etc. Items such as fire extinguishers, first aid kits are equipment to support the personal protection of the subject. Police use handcuffs, tasers, batons and handguns as PPE. The use of personal protective equipment is to reduce employee exposure to hazards when engineering and administrative controls are not feasible or effective to reduce these risks to acceptable levels. Handling materials safely Manual material handling operations are carried out in most industrial plants. Each handling task poses unique demands on the worker. However, workplaces can help workers to perform these tasks safely and easily by implementing and upholding proper policies and procedures.

BY TEWODROS BOGALE 27

1. http://WWW.eHow.com 2. http://www.teachers.ash.org.au/ozmused/itconnectact.htm# 3. http://technet.microsoft.com/en-us/ms376608.aspx 4. http://www.karbosguide.com/books/winxpsuperuser/chapter00.htm 5. A+ computer hardware and software 6. http://hsc.csu.edu.au

BY TEWODROS BOGALE 28

S-ar putea să vă placă și