Install And Optimize Operating System Software PDF
Document Details
Uploaded by Deleted User
Tags
Summary
This document details the functions and purpose of operating systems. It covers topics like single-user, single-task, and multi-tasking operating systems. Furthermore, the document provides information on obtaining operating systems.
Full Transcript
**Install and optimise operating system software** **1. Determine function of operating systems.** **1.1 Identify and demonstrate understanding of the purposes of the operating system:** Operating system: the software that supports a computer's basic functions, such as scheduling tasks, executing...
**Install and optimise operating system software** **1. Determine function of operating systems.** **1.1 Identify and demonstrate understanding of the purposes of the operating system:** Operating system: the software that supports a computer's basic functions, such as scheduling tasks, executing applications and controlling peripherals.\ - the first program loaded into the computer by a boot program and remains in the memory at all times.\ - manages all other programs including the allocation and usage of hardware resources, including:\ - memory\ - central processing unit (CPU) time\ - access and security\ - hard disk space\ - peripheral devices\ - foundation on which other applications/programs depend \- Single-user, single-task operating system: deals with 1 person, runs 1 application at time.\ - found on mobile phone\ - Single-user, multi-tasking operating system: used by 1 person, but can run many applications.\ - found on personal computers\ - Multi-user, multi-tasking operating system: used by multiple users at the same time, and each person uses more than one program at a time.\ - needs to manage:\ - each user, and their workspace\ - allocate resources to each job\ - maintain security\ - work out the most efficient use of processing cycle\ - keep logs of the resources used\ - Network operating system: deals with computers on a network\ - deals with users logging on\ - maintains the network connection\ - expand file system to view folders on other computers\ - provide security to separate users from each other [Open-source and commercial]:\ - Open source operating system:\ - source code is available, and can be modified\ - redistribute the modifications and improvements\ - use the software in any way\ - Commercial operating system:\ - many commercial applications available\ - better customer support **1.2 Distinguish between batch, real-time, multitasking system:** \- Batch system: processes large amounts of data as a 'batch', when the computer is not processing other tasks.\ - Benefit: can be left running without human interaction, and can process large amounts of data.\ - Limitations: can't be stopped once it's started.\ - Real-time system: reacts immediately to input and handles events as they occur.\ - Benefits: prioritizes tasks, and immediately updated\ - Limitations: must always be online, predictable outputs\ - Multi-tasking system:\ - Benefits: use multiple applications at once, saves time,\ - Limitations: needs a high CPU **1.3 Identify and demonstrate understanding of the basic functions of an operating system:** File system: records where files and directories are located on the disc Memory management: allocates portions of the memory to each program to perform each task Process scheduling: removes the running process and selects the next process for the CPU **1.4 Identify and demonstrate management of virtual memory:** Virtual memory: storage on a hard drive used with the RAM. The computer treats it like RAM, and uses it if there is not enough RAM to execute all the tasks. **2. Obtain an operating system.** **2.1 Contact operating system vendors to obtain technical specifications and requirements:** [Information for vendor products and services]:\ - consultants\ - suppliers\ - personal contacts\ - industry/trade publications and magazines\ - trade shows\ - internet Technical specifications: specifications that defines the characteristics required of a product. System requirements: the bare minimum requirements a system needs to run a piece of software or hardware Minimum system requirements: the very basic system requirements that are need to be able to run the software. Recommended system requirements: the requirements needed to run the software at the most ideal level. Interoperability: the ability of a system or product to work with other systems or products without special effort on the part of the consumer. It is the ability of content or systems to work together through the use of agreed standards and specifications (agreed file formats and protocols). [Select an operating system based on]:\ - functionality\ - benefits\ - security\ - growth\ - delivery time\ - software and hardware\ - support\ - risks **2.2 Document adjustment recommendations and provide to appropriate person:** [People that need to be notified]:\ - supervisor/team leader\ - management\ - system administrator\ - ICT support staff\ - trainer\ - client **2.3 Determine and apply knowledge of licensing, hardware and security requirements:** End User License Agreement (EULA): legal contract between manufacturer and the user of the application. It says the:\ - rights of the user\ - how the software can't be used\ - restrictions\ - protects both parties from liability if software is misused\ - may allow one copy to made as a backup [Licenses]:\ - Single-user license: allows only one copy of the software to be installed.\ - Network license: allows a limited number of people use the application from a central server\ - Site license: allows everyone in a company to use the application. Intellectual property: ownership of an idea or design by the person who came up with it. Copyright issues:\ - file sharing sites makes copyright hard to protect\ - only lasts for 70 years after the death of the creator\ - hard to police User authorisation and system security: granting certain users access to files, based on their identity.\ - first step: authentication -- ensuring the user is who they say they are\ - second step: authorisation -- allows the user to access various resources **3. Install, configure and optimise operating system.** **3.1 Install, configure, and test the operating system software:** Operating system software: software that controls the overall functions of a computer, and controls the hardware.\ Application software: programs loaded on top of the operating system, to perform a specific task. \- Configure: setting up the components that make the computer, both hardware and software.\ - Optimise: improves the performance of the system.\ - Support: will run\ - Install: set up of a program on the computer system so it can be executed.\ - Uninstall: remove an application from a computer.\ - Upgrade: adds new features to an operating system, and maintains compatibility.\ - Compatibility: the ability of a piece of software/hardware, to work with another. [Installation options]:\ - full: the entire operating system is installed -- overwrites the existing.\ - typical: only pre-selected settings are installed, for the average user\ - portable: for laptop computers -- designed for smaller memory\ - custom: user chooses which applications and setting they want installed Installation files:\ Installation directory: where the application stores its program files Default settings: the settings automatically assigned to an application **3.2 Optimise the system to meet organisational requirements.** *Organisational requirements*:\ - availability od system to be optimised.\ - level of complexity of technical manuals\ - in-house or vendor\ - client support documentation\ - IT policy and procedures relating to service levels and installation **3.3 Document the system according to organisational requirements.** **3.4 Install the operating system with minimal disruption to client or users:** Implementation plan: detailed plan on how a new system will be install, setup, and changed from the old system. Includes:\ - timing\ - tasks involved\ - allocation of tasks\ - resources required\ - schedule\ - acceptance procedures\ - other issues specific to the company/organisation **4. Provide instruction to meet new software requirements.** **4.1 Provide one-to-one instruction about changes to the client or user as required:** [Manage new technology by]:\ - overcoming resistance to technology\ - ensuring user competency\ - monitoring efficient use and rectifying and problems\ - monitoring performance of technology Questioning techniques: method of asking questions to gather the appropriate information\ - open: be more general\ - closed: yes or no answers\ - reflective: how ever the answerer choses to answer **4.2 Obtain client evaluation about new system to ensure requirements are met:** [Obtaining client feedback]:\ - questionnaire:\ - paper\ - electronic\ - interview\ - focus group [When designing feedback]:\ - use of language\ - targeted to client\ - plain English\ - minimal technical jargon\ - questioning technique\ - open, closed, reflective\ - avoid bias\ - opportunity for 'free-response': state opinion, and supported with facts, examples [Methods]:\ - written\ - mails\ - emails\ - internet/intranet\ - fax\ - verbal\ - telephone\ - one-on-one\ - meeting [Types of feedback]:\ - positive: good\ - negative: bad\ - constructive: improvements [Report feedback to]:\ - supervisor/team leader\ - management\ - vendor\ - supplier\ - trainer\ - colleagues\ - client [Contents ] +-----------------------------------+-----------------------------------+ | 1. | **Page Number** | | | =============== | | **Title of the Competency Tas | | | k** | | | ============================= | | | === | | +===================================+===================================+ | 1\. Overview and basic | Pages 3 -- 4 | | understanding of the relevant | ------------ | | OH&S legislation for the ICT | | | industry | | +-----------------------------------+-----------------------------------+ | 2\. Employer's and Employee's | Page 5 | | responsibilities under the OH&S | | | Acts | | +-----------------------------------+-----------------------------------+ | 3\. Hazards | Pages 6 -- 7 | +-----------------------------------+-----------------------------------+ | 4\. Flow Chart for Steps in Risk | Page 8 | | Management | | +-----------------------------------+-----------------------------------+ | 5\. Workplace Accident Form | Page 9 | +-----------------------------------+-----------------------------------+ | 6\. Safe Work Practices | Pages 10 -- 11 | | | -------------- | +-----------------------------------+-----------------------------------+ | 7\. Ergonomics | Pages 12 -- 13 | +-----------------------------------+-----------------------------------+ | 8\. Manual Handling | Pages 14 -- 16 | +-----------------------------------+-----------------------------------+ | 9\. Emergency Situation | Pages 17 -- 20 | | Procedures | | +-----------------------------------+-----------------------------------+ | 10\. Workplace Health and Safety | Page 21 | | Sense Certificate | | +-----------------------------------+-----------------------------------+ | Bibliography | Page 22 | | ------------ | | +-----------------------------------+-----------------------------------+ [1. Overview and basic understanding of the relevant OH&S legislation for the ICT industry] +-----------------------------------+-----------------------------------+ | 1. ### | ### [Brief Outline of Act or Regu | | | lation] | | ### [Website Address]{.underl | | | ine} | | +===================================+===================================+ | [Occupational Health and Safety | - - - - - - - | | Act 2000 (NSW)] | | | | | | http://www.workcover.nsw.gov.au/L | | | awAndPolicy/Acts/Pages/ohsact.asp | | | x | | +-----------------------------------+-----------------------------------+ | [Occupational Health and Safety | - | | Regulations 2001 | | | (NSW)] | | | | | | http://www.bees.unsw.edu.au/ohs/O | - | | HSRegulation2001withMarginNotes.p | | | df | | | | | | | - | | | | | | | | | | | | - | | | | | | | | | | | | - | | | | | | | | | | | | - | | | | | | | | | | | | - | | | | | | | | | | | | - | | | | | | | | | | | | - | | | | | | | | | | | | - | | | | | | | | | | | | - | +-----------------------------------+-----------------------------------+ | [Workers Compensation Act 1987 | - | | (NSW)] | | | | | | http://www.workcover.nsw.gov.au/L | | | awAndPolicy/Acts/Pages/workers\_c | - - - | | ompensation\_act.aspx | | | | | | | | | | - | | | | | | | | | | | | - - | +-----------------------------------+-----------------------------------+ | [Workplace Injury Management and | - | | Workers Compensation Act 1998 | | | (NSW)] | | | | | | http://www.legislation.nsw.gov.au | - | | /fullhtml/inforce/act+86+1998+FIR | | | ST+0+N?\#ch.1-sec.3 | | | | | | | - - - | | | | | | | | | | | | - - - - | +-----------------------------------+-----------------------------------+ [2. Employer's and Employee's responsibilities under the OH&S Acts] +-----------------------------------------------------------------------+ | 2. ###### | | | | ###### [Employer's Responsibilities] | | | | #### | | | | Employers are required to ensure, as far as is reasonably | | practicable, that all employees are safe from injury and risks to | | health in the workplace. In particular they must: | | | | 1. 2. | | | | | | | | a. b. c. d. | | | | | | | | 3. 4. | | | | | | | | a. b. c. | | | | | | | | 5. 6. 7. 8. | | | | A safe system of work refers to the total set of methods used to | | carry out tasks and operations. It includes rules written under the | | policy and those developed through the process of hazard management. | +=======================================================================+ | ###### [Employee's Responsibilities] | | | | All employees must take reasonable care to protect their own health | | and safety and that of others who may be affected by their actions at | | work. Employees should work with the employer towards a safe | | workplace. Their responsibilities are to: | | | | 1. 2. 3. 4. | +-----------------------------------------------------------------------+ [3. Hazards] Hazard -- means anything (including work practices or procedures) that has the potential to harm the health or safety of a person. Can occur in a formal and informal way. ### [List of Potential Workplace Hazards for those working at the regional IT office] - - - - - - - - - - 5. ### [Potential Hazards associated with the range of hardware in the ICT workplace] - - - - - - 6. ### [Risk Assessment Process] Once hazards have been identified a risk assessment is conducted. There are 3 key steps in the risk assessment process: 1\. The probability or likelihood of an incident is occurring is evaluated. Likelihood is defined as the potential that the accident will happen that may cause injury or harm to a person. 2\. The severity of the potential consequences is calculated or estimated. Severity is a measure of an injury, illness or disease occurring. 3\. The risks are assigned priority for risk control through the use of a risk rating. [Cable Clutter] - - - 4. [Advice on how to manage the risks] ----------------------------------------------- - Use chairs that can be adjustable and are comfortable, and tables that can be at different heights so that they are not touching the thighs and there is enough room to move. ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------- - - - 7. ### [Risk Control] On the basis of the risk assessment, risks are to be eliminated or, if this is not reasonably practical, minimised in accordance with the hierarchy of control. The aim is to remove the risk at its source. 5. [4. Flow Chart for Steps in Risk Management] -------------------------------------------------------- [5. Workplace Accident Form ] To be filled out by the employee as soon as possible after an accident. +-----------------------------------+-----------------------------------+ | Surname | | +===================================+===================================+ | Given Name | | +-----------------------------------+-----------------------------------+ | Street Address | | +-----------------------------------+-----------------------------------+ | Suburb & Postcode | | +-----------------------------------+-----------------------------------+ | Home telephone number: | | +-----------------------------------+-----------------------------------+ | Date of Birth | | +-----------------------------------+-----------------------------------+ | Employer's Name | | +-----------------------------------+-----------------------------------+ | Employer's Address | | +-----------------------------------+-----------------------------------+ | Job Title | | +-----------------------------------+-----------------------------------+ | Functional Unit or Department: | | +-----------------------------------+-----------------------------------+ | Main duties: | | +-----------------------------------+-----------------------------------+ | When did the accident occur? | | | (d/m/y) | | +-----------------------------------+-----------------------------------+ | What time did the accident | | | occur\...\...a.m./p.m. | | +-----------------------------------+-----------------------------------+ | Where did the accident happen? | | | Draw a map (and attach the map) | | | showing location of equipment | | +-----------------------------------+-----------------------------------+ | What injury did you sustain? | | +-----------------------------------+-----------------------------------+ | How exactly was the injury or | | | dangerous incident caused? (E.g. | | | escape of steam burned arm; fell | | | 3 metres from scaffolding.) | | +-----------------------------------+-----------------------------------+ | Name of person in authority to | | | whom you reported the injury: | | +-----------------------------------+-----------------------------------+ | Did you consult a doctor? | | | | | | Yes/No | | | | | | If Yes, give name and address of | | | doctor: | | +-----------------------------------+-----------------------------------+ | Were there any witnesses to the | | | injury? Yes/No | | | | | | If Yes, give name and daytime | | | telephone number of witness(es): | | +-----------------------------------+-----------------------------------+ | Signature of person making claim: | | +-----------------------------------+-----------------------------------+ | Date: | | +-----------------------------------+-----------------------------------+ [6. Safe Work Practices] ------------------------------------ OOS -- Occupational Overuse Syndrome (OOS) is the term given to a range of conditions characterised by discomfort or persistent pain in muscles, tendons and other soft tissues. These conditions are usually caused or aggravated by poor work processes and unsuitable working conditions that involve repetitive or forceful movements or the maintenance of constrained or awkward postures. OOS is also known as Repetitive Strain Injury (RSI). [Carpal Tunnel Syndrome] Symptoms -- Pressure on the median nerve in the wrist, which causes numbness and tingling in the fingers and hand. CTS often first appears as painful tingling in one or both hands during the night. The sufferer may have problems with activities that require the wrist to be bent and stationary, such as driving or reading a book. The fingers may feel weak and swollen; even when there is little or no swelling apparent. As symptoms increase, tingling may develop during the day. A decreased ability and power to squeeze things may follow. In advanced cases, sustained, persistent numbness in the hand can lead to muscle deterioration. Cause -- Any condition that lessens the amount of space in the carpal tunnel can compress the median nerve in the tunnel. These include: - - - - - The following can increase the chance of developing carpal tunnel syndrome: - - Obesity, which can increase pressure on the nerves in the wrist --------------------------------------------------------------- Treatment -- Proper treatment can control or cure CTS and prevent permanent disability. Depending on the severity of CTS, conventional treatment may involve some or all of the following measures. The type of treatment will depend on how severe the symptoms are. They include: - - - - - - - - - In addition, the doctor may recommend specific exercises to stretch and strengthen the wrist and associated parts. If conventional treatments fail, surgery may be considered. Avoid -- - - - - - - 8. ### [Tenosynovitis] Symptoms -- Tenosynovitis is the inflammation of the fluid-filled sheath (called the synovium) that surrounds a tendon. Symptoms of tenosynovitis include pain, swelling, and difficulty moving the particular joint where the inflammation occurs. When the condition causes the finger to \"stick\" in a flexed position, this is called \"stenosing\" tenosynovitis, which is commonly called \"Trigger Finger.\" It usually occurs with tendinitis and it is related to stenosing tenosynovitis. Cause -- Causes of tenosynovitis are unknown. Repeated use of hand tools can precede the condition, as well as arthritis or injury. Tenosynovitis sometimes runs in families, and is generally seen more often in males than in females. The causes for children are even less known and have a recurrence rate of less than 1-5% after treatment. Tenosynovitis is also linked to infectious arthritis caused by bacteria such as Neisseria gonorrhoae. Treatment -- Using cool ice on the wrist will boost the blood stream to the muscles and tissues, in addition decrease the swelling. Other possible treatments for tenosynovitis include cortisone injections (then a course of paracetamol and ibuprofen for pain) and an outpatient surgery to enlarge the synovium. The hand is splinted for a week or so. Avoid -- Avoiding repetitive movements and overuse of tendons may help prevent tenosynovitis.![](media/image1.png)![](media/image4.png) [7. Ergonomics] Ergonomics -- Ergonomics is the science of adapting the job and/or the equipment and the human to each other for optimal safety and productivity. [Adjustment of Desk, Chair and Computer] - - - - - 9. ### [Workstation Design and Layout] - - - ![](media/image3.png) **[Adjustment of Desk, Chair and Computer]** **[Workstation Design and Layout]** [8. Manual Handling] Manual handling means lifting, lowering, pushing, pulling, carrying, moving, holding or restraining any object, animal or person. Manual handling means more than just lifting or carrying an object. Manual handling can include a wide range of activities such as pulling a lever, restraining an animal or holding and operating a power tool. The standard requires employers to identify, assess and control all the risks arising from manual handling. In particular, it requires employers to control the risk of manual handling injuries through good design of all plant, equipment, containers, work practices and the working environment. Employers are required to involve the workers and their health and safety representatives in this process through consultation. The code of practice gives advice on the best way for employers to achieve the requirements of the standard. 1. **[Step 1: Identify risks]** Employers in consultation with employees and their health and safety representatives should identify manual handling tasks likely to be a risk to workers' health. There are a number of ways to do this: **Check workplace injury records** Workplace injury records should be checked for problem tasks or work areas. **Talk to employees and their health and safety representatives** The people actually doing the job will be aware of many of the risks and will often have good suggestions. **Look at the workplace** A simple walk through the workplace is a good way to identify risks. A checklist, such as the one at the end of this booklet, may be useful and will help you to identify problem areas that can be eliminated or reduced to make the task safer. 1. **[Step 2: Assess risks]** Once the risky tasks or workplaces have been identified, they should be assessed in detail to try to find what is causing the problem. To do this it is helpful to look at the following aspects of the job: **Actions and movements** The worker should not have to make any sudden, jerky or hard to control movements, or do anything which causes them discomfort or pain or to be in an awkward position. **Workplace and workstation layout** The work area should be arranged so that manual handling tasks can be either eliminated or done at waist level, without too much bending, reaching or twisting. **Working posture and position** Work activities should be varied so that the worker does not spend a long time holding the same posture or position. The worker should not have to bend down a lot or twist around to do their job. **Duration and frequency of manual handling** The risk of injury increases as the task is done more often, faster or over a longer period of time. **Where the load is and how far it has to be moved** There is an increased risk whenever the load is below midthigh height or above shoulder level. There is also an increased risk if a load has to be placed very accurately or carried over a long distance. **Weight** Usually the heavier the object the greater the risk of injury during manual handling. However, weight should not be considered separately from the other factors listed here. For example, a person is more at risk of injury from carrying a bulky object which can\'t be carried close to the body than from carrying a smaller object of the same weight. They will also be at a greater risk of injury from moving an object from an awkward position, such as a high shelf, than from moving an object of the same weight located in an easy to reach position. **Force** Many tasks in industry require the use of force to push, pull, hold or restrain an object and the greater the force the higher the risk of injury. It is important to realise that sometimes a large amount of force is needed to produce little or no movement, such as when restraining an animal, holding up a video camera or pulling a stiff lever. **Characteristics of loads and equipment** There are more risks involved in handling some loads. For example, a bulky parcel may be too wide and long to be held close to the body. Badly designed equipment for manual handling may also increase risks. For example, a four-wheel trolley with wheels out of alignment may force the worker to make awkward push and pull movements. **Work organisation** Staff shortages, unrealistic deadlines and not enough rest breaks increase the risk of injury. **Work environment** Poor lighting, extremes of climate, not enough room to move and rough or slippery ground or floor surfaces will increase the risk of injury. **Skills and experience** Inexperienced, untrained and unskilled workers will be at greater risk of injury. **Age** In general, workers under 18 years are at greater risk because they are still developing physically. **Clothing** Some types of clothing increase risks. For example, loose sleeves may get caught on objects or a person wearing \'good\' clothes without an apron or dustcoat may be unwilling to grasp objects properly, close to the body. 2. **Special needs** For example, employees returning from a long time away from work or illness may need time to build up their skills and abilities. It may be necessary to make changes to the job or equipment for someone with an injury or disability. 2. **[Step 3: Control risks]** The best way to make manual handling safer is to redesign the task or workplace. There are a number of ways to do this: **Modify the object** For example, change the shape of bulky objects so that they are easier to hold, or pack products in smaller cartons. **Modify workplace and workstation layout** For example, use an adjustable platform to reduce stooping and reaching, and provide work surfaces at the correct height. **Change the way things are moved** Eliminate unnecessary handling. Ensure that all heavy objects are at waist level where they can be handled comfortably. **Use different actions, movements and forces** Reducing body movements and forces, such as bending, lifting, twisting, reaching and holding, reduces risk. **Modify the task** Modify the task by using tools such as levers, hooks or crowbars or by using team lifting. If none of these options can be used, then mechanical handling equipment like forklifts, cranes and hoists may be needed. **Ongoing evaluation** Ongoing evaluation is an important part of the risk control process. Risk control measures should be checked for effectiveness and changed where necessary. **Training** Employers must provide adequate training in safe manual handling to employees. Supervisors and managers, health and safety representatives and staff responsible for work organisation and job and task design should also receive training. The training should encourage understanding of ways to avoid the risks in manual handling. Adequate training should also be provided in the use of mechanical aids, team lifting and personal protective equipment such as gloves and aprons. **The Law** In Australia the States and Territories have primary responsibility for occupational health and safety (OHS) legislation. Check with your local OHS authority for details of the relevant regulations and code of practice for your State or Territory. Commonwealth employees should contact COMCARE Australia. [9. Emergency Situation Procedures] 3. [Fire] Rescue -- If you are involved in or close to a major incident and there is immediate danger to: ----------------------------------------------------------------------------------------------- - - Alarm -- If you are involved in or close to a major incident contact Security on their emergency phone number. Report the: - - - of the emergency. Also give your name and designation. If possible, locate a Building warden and inform him/her of the incident. If an immediate building evacuation is necessary, such as in a major fire, and the alarm has not triggered automatically, raise the alarm by activating the fire alarm console. Contain -- If possible, and safe to do so, secure the area. Switch off fume cupboards, close windows and leave the room/laboratory closed if you are the last to leave. Do not stop to collect personal belongings. Evacuate / Extinguish -- - - Building Wardens will co-ordinate evacuation ensuring that all areas of the building have been evacuated and will inform Security about the evacuation. ------------------------------------------------------------------------------------------------------------------------------------------------------- 17. [Bomb Threat] ------------------------- Written Threat -- If a bomb threat is received in writing it should be kept including any envelope or other container. Unnecessary handling must be avoided and every possible effort must be made to retain possible evidence such as fingerprints, handwriting, paper and postmarks. Telephone Threat -- The person receiving the call should not disconnect the caller and should try to find out the information required on the Bomb Threat Check List (Copy at rear of manual). If not possible to fill out checklist as soon after threat as possible whilst incident details are still fresh in memory. Bomb threat Check Lists should be held by telephonists and other persons who regularly accept incoming phone calls. Report details immediately to Security and Emergency Services. Sound Fire Bell and evacuate Building immediately. [Bomb Threat Check List -- Important Information required by Emergency Personnel] +-----------------------------------+-----------------------------------+ | BOMB THREAT CHECK LIST\ | 1. THREAT LANGUAGE | | QUESTIONS TO ASK | | | | Well spoken:\ | | 1\. When is the Bomb going to | Incoherent:\ | | explode? | Irrational:\ | | | Taped:\ | | 2\. Where did you put the Bomb? | Message read by caller:\ | | | Abusive:\ | | 3\. When did you put it there? | Other: | | | | | 4\. What does the Bomb look | BACKGROUND NOISES | | like? | | | | Street noises: House noises:\ | | 5\. What Kind of Bomb is it? | Aircraft:\ | | | Voices: Local call:\ | | 6\. What will make the Bomb | Music: Long distance:\ | | explode? | Machinery: STD:\ | | | Other: | | 7\. Did you place the Bomb? | | | | OTHER | | 8\. Why did you place the Bomb? | | | | Sex of caller:\ | | 9\. What is your name? | Estimated age: | | | | | 10\. Where are you? | CALL TAKEN | | | | | 11\. What is your address? | Date:...../....../........ | | | Time:\ | | EXACT WORDING OF THREAT: | Duration of call:\ | | | Number called: | | ACTION | | | | RECIPIENT | | Report call immediately to: | | | | Name (print):\ | | Phone number: | Telephone number:\ | | | Signature: | | CALLER'S VOICE | | | | REMEMBER KEEP CALM - DON'T HANG | | Accent (specify):\ | UP | | Any impediment (specify):\ | | | Voice (loud, soft, etc.):\ | | | Speech (fast, slow, etc.):\ | | | Diction (clear, muffled):\ | | | Manner (calm, emotional, etc.):\ | | | Did you recognise the voice?\ | | | If so, who do you think it was?\ | | | Was the caller familiar with the | | | area? | | +-----------------------------------+-----------------------------------+ ### [Robbery] Purpose -- The purpose of this section is to define and describe acceptable staff procedures for preventing or responding to a robbery, to avoid confusion and to assign responsibility for the performance of necessary tasks.\ \ Policy -- It is the institution\'s policy that all employees will take extraordinary measures to ensure their own safety and the safety of other persons who may become involved in a robbery event, including: - - - - - - Staff employees are responsible for taking preventive measures to reduce the likelihood of a robbery, including: - - - - - - - - - - - - - - - - - Staff employees are responsible for taking appropriate measures to protect themselves and to assist a law enforcement agency during a robbery, including: - - - - - - - - - - - - - - - - Staff employees are responsible for continuing to take appropriate and timely measures to protect themselves and to assist a law enforcement agency after a robbery, including: - - - - - - **CHAPTER FOUR AND FIVE** ========================= **Backup types** ================ - - - - - **Why should we back up?** ========================== - - - - - - **Causes of lost data** ======================= - - - - - - - - **Back up logs** - - - **Restore log** - - - - **Viruses** **Infection phase -- triggered by:** - - - - **Attack phase:** - - - - - - **Common signs** - - - - - - - - - - - **Types of viruses** - - - - - - - - - - **Licences** - - - - - - **Software exceptions** ======================= - - - - **Software audit** ================== - - - - - - - - **Software maintenance log** ============================ - - - - - - - - - - 20. [Bibliography] -------------------------- http://www.workcover.nsw.gov.au/LawAndPolicy/Acts/Pages/ohsact.aspx http://www.bees.unsw.edu.au/ohs/OHSRegulation2001withMarginNotes.pdf http://www.workcover.nsw.gov.au/LawAndPolicy/Acts/Pages/workers\_compensation\_act.aspx http://www.legislation.nsw.gov.au/fullhtml/inforce/act+86+1998+FIRST+0+N?\#ch.1-sec.3 http://www.legislation.nsw.gov.au/fullhtml/inforce/act+40+2000+FIRST+0+N\#pt.2-div.1-sec.8 http://www.legislation.nsw.gov.au/fullhtml/inforce/act+40+2000+FIRST+0+N\#pt.2-div.3-sec.20 http://www.sellen.org.au/wp-content/uploads/25-officeenvironments.pdf http://online.nmit.vic.edu.au/police/hardware/4\_19.htm http://www.wikihow.com/Organize-the-Cables-in-Your-Office http://www.safework.sa.gov.au/contentPages/EducationAndTraining/ActivitiesAndTests/VirtualOffice/vofficeframe.htm http://www.workershealth.com.au/facts044.html http://www.ehealthmd.com/library/carpaltunnel/CT\_causes.html http://www.ehealthmd.com/library/carpaltunnel/CT\_treatment.html http://www.ehow.com/how\_4491\_avoid-carpal-tunnel.html http://en.wikipedia.org/wiki/Tenosynovitis http://www.articlesbase.com/health-articles/how-to-prevent-tenosynovitis-368735.html http://www.umm.edu/ency/article/001242prv.htm http://exercise.about.com/cs/exerciseworkouts/l/blofficeworkout.htm http://www.answers.com/topic/ergonomics http://www.ascc.gov.au/NR/rdonlyres/A11DF9CB-3AFC-4998-B19D-A26BF8D6AC80/0/ManualHandlingInformationBooklet.pdf http://www.uow.edu.au/content/groups/public/\@web/\@sci/\@chem/documents/doc/uow016878.pdf http://www.ee.usyd.edu.au/guides/procedures/bomb.htm http://www.bankersonline.com/security/procedures.html