Job Recruitment Website - Ranking of immigration countries - What is a safe area?

What is a safe area?

What are the basic conditions of the safe area? What types are there?

Electrical safety

Section 1 Electrical Safety Overview

Electrical safety mainly includes personal safety and equipment safety. Personal safety refers to the safety of personnel engaged in work and the operation and use of electrical equipment; Equipment safety refers to the safety of electrical equipment and other related equipment and buildings.

First, the characteristics of electricity

(1) Electricity is invisible because of its special form. The electricity that people can feel every day is only the conversion of electric energy.

Such as light, heat, magnetism, etc.

(2) The transmission speed of electricity (300,000 km/s).

(3) The power network is strong, and many lines are connected into one. "Power generation, power supply and power consumption" are completed at the same time.

Local faults sometimes affect the whole power grid.

(4) The possibility and harmfulness of accidents are great. Electrical accidents, such as electric shock, fire, equipment damage, explosion, etc., will affect production and even paralyze the whole enterprise, with very serious consequences.

Second, current is harmful to human body.

(1) sense current

Under a certain probability, the minimum current that causes any sensation through the human body is called perceived current.

(2) get rid of the current

When the current passing through the human body exceeds the perceived current, the muscle contraction is enhanced, the tingling sensation is enhanced, and the sensation is partially expanded. When the current increases to a certain extent, the person who gets an electric shock will hold the charged body tightly because of muscle contraction and spasm, and cannot get rid of the electrode by himself. The maximum current that a person can get rid of the electrode by himself after getting an electric shock is called getting rid of the current.

(3) Minimum lethal current

A life-threatening current in a short time is called a fatal current. The cause of death by electric shock is very complicated. Tens of milliamperes of power frequency alternating current passing through the human body may cause ventricular fibrillation or cardiac arrest, and may also lead to respiratory arrest. However, it is very important to cause ventricular fibrillation because it appears much earlier than apnea. If the current through the human body is only 20 ~ 25mA, it cannot directly cause ventricular fibrillation or cardiac arrest.

(4) Electric shock and electric injury

Electric shock is the injury caused by the current passing through the human body and destroying the normal work of the heart, nervous system and lungs. Human contact with live wires, casing of leakage equipment or other live bodies, as well as lightning strike or capacitor discharge may lead to electric shock.

Electrical injury is a local injury to human body caused by thermal effect, chemical effect or mechanical effect of current, including arc burn, scald, electrocautery, skin metallization, electromechanical injury, electro-optic eye and other different forms of injury.

(5) Five factors of the harm degree of electricity to human body.

1, the current through the human body.

The power frequency 50 ~ 60 Hz AC current passing through human body should not exceed 0.0 1 amp, and the DC current should not exceed 0.05 amp, which is basically safe for human body. If the current is greater than the above value, people will feel paralysis or severe pain, have difficulty breathing, and even can't get rid of the power supply, which is life-threatening. When the current passing through human body, whether AC or DC, is greater than 0.l Ampere, people will suffocate, stop their heartbeat, lose consciousness and die in a short time.

The current passing through the human body depends on the applied voltage and the resistance of the human body. The human body resistance is different, generally 800 ~ 1000 ohm. Generally speaking, only the voltage below 36 volts is safe for human body.

2. Power-on duration

When an electric shock accident occurs, the longer the current lasts, the more the human body resistance drops, and the more likely it is to cause ventricular fibrillation, that is, the greater the risk of electric shock. This is because the longer the current lasts, the more energy is accumulated, and the current that causes ventricular fibrillation will decrease.

3, the way of electricity

When current passes through the heart, it will cause the heart to tremble or stop beating, and the blood circulation will be interrupted, leading to death. Electric current passing through the spinal cord will paralyze people's limbs. Therefore, it is the most dangerous for electric current to pass through the human body from hand to foot, followed by hand to hand and foot to foot.

4, through the current type

The frequency of current passing through human body, power frequency current is the most dangerous. The escape current value of 20 ~ 400 Hz AC current is the lowest (that is, more dangerous); Below or above this frequency band, the danger is relatively small, but high-frequency current is more likely to cause skin burns than power frequency current, so the safety of using high-frequency current can not be ignored; The danger of DC is relatively less than that of AC.

Third, the way the human body gets an electric shock

There are three types of electric shock in human body: single-phase electric shock, two-phase electric shock and step voltage electric shock.

(1) single-phase electric shock

Single-phase electric shock refers to the electric shock that occurs when people contact charged bodies or other grounding bodies on the ground.

(2) Two-phase electric shock

Two-phase electric shock refers to the electric shock when the human body touches two charged bodies at the same time.

(3) Step voltage shock

Step voltage electric shock refers to people. ......

What does the security of the dormitory area include?

First, the dormitory is the main place for study and rest. Dormitory staff should love dormitories, safeguard collective honor, respect each other, help each other, treat each other sincerely, and strive for civilized dormitories.

Second, personnel must stay in designated rooms and beds, and are not allowed to change rooms, occupy rooms and move without permission, and are not allowed to change beds and dormitory public facilities.

Third, take good care of public property and consciously save water and electricity. If there is any damage or loss, you should pay compensation or fine. The dormitory door lock is not allowed to be changed or removed without authorization, and you are not allowed to make keys without authorization.

4. All students who enter and leave the dormitory area with residence permit are strictly forbidden to enter and leave without a license, and are not allowed to enter the dormitory of the opposite sex.

5. Gambling, drinking, making noise, playing ball and fighting are strictly prohibited in the dormitory, and all activities that endanger physical and mental health are strictly prohibited. Offenders will be disciplined.

Six, abide by the system of work and rest, live on time every day, turn off the lights on time, keep the dormitory quiet, don't talk loudly and boo, don't turn on the tape recorder loudly, so as not to affect the rest of the people around you.

Seven, pay attention to the dormitory safety, indoor storage of flammable, explosive and toxic substances is prohibited. It is not allowed to connect wires and burn electric cups, electric stoves, coal stoves, alcohol lamps and other stoves without authorization. Once found, in addition to confiscation of illegal items, fines and disciplinary actions will be given depending on the circumstances.

Eight, the establishment of the dormitory management take turns on duty, the room director is responsible for the system, and the dormitory health duty record system. Always keep the indoor and outdoor environment clean, with a small sweep every day and a big sweep every Monday. No littering, no garbage, no water pouring out of the window. Don't dump debris in the bathroom sink and urinal to avoid blocking the sewer.

What aspects does system security include?

(1) Physical security. Physical security mainly includes environmental security, equipment security and media security. Effective technical precautions should be taken in the central computer room of the system dealing with classified information, and important systems should also be equipped with security personnel for regional protection.

(2) Safe operation. Operation safety mainly includes backup and recovery, virus detection and removal, electromagnetic compatibility, etc. Main equipment, software, data, power supply, etc. The confidential system should be backed up and have the ability to restore the system operation in a short time. Anti-virus software recognized by relevant national authorities should be used for timely anti-virus, including anti-virus of servers and clients.

(3) Information security. Ensuring the confidentiality, integrity, availability and non-repudiation of information is the central task of information security.

(4) Safety management. The security management of classified computer information system includes three aspects: management organization, management system and management technology. It is necessary to establish a complete security management organization, set up security management personnel, formulate a strict security management system, and use advanced security management technology to manage the entire classified computer information system.

What are the types of fire safety areas in fire test?

The fire safety zone includes outdoor safety evacuation zone, indoor evacuation walkway, indoor closed evacuation passageway and corresponding evacuation antechamber.

What does safety management include? 5 points

From the content of safety, construction site safety includes property safety and personal safety; From the management scope, it can be divided into three aspects: construction area security, office and living area security and third-party security.

(1) Property safety, including site materials, materials, equipment, dangerous goods, semi-finished products and finished products; Drawings, documents, secret materials, electronic data, money, personal belongings, etc. In the office and living area. Safety management includes theft prevention, fire prevention, waterproof, mildew prevention, loss prevention, leakage prevention and man-made damage prevention. At the same time, it also includes preventing damage to the property of third parties, such as damage to underground, underwater or overhead pipelines, and damage to adjacent property (such as damage to other people's buildings or property caused by vibration, settlement, water damage, blasting and fire).

(2) personal safety. Include the following items:

1) Occupational safety and health, such as fire prevention, electric leakage and electric shock prevention, dust prevention, freezing prevention, heatstroke prevention, sun protection, anti-skid, noise prevention, radiation prevention, virus prevention, suffocation prevention, drowning prevention, burn prevention, scald prevention, falling prevention, mechanical operation prevention, food poisoning prevention, infectious diseases and epidemics.

2) In terms of machinery and equipment, from various construction machinery, construction vehicles, ships and airplanes to general tools, the personal safety involved may be the operator himself, or others or a third person. The reason may be the equipment itself, improper operation or other people's reasons, such as cross-country traffic accidents on the construction site.

3) Temporary facilities, such as sheds, temporary offices, living facilities, construction cofferdams, pilot tunnels, construction roads, bridges, scaffolding, supports, construction platforms, etc. May pose a threat to life safety due to poor quality or improper use.

4) In construction engineering, the buildings and equipment under construction and completed pose a threat to personal safety due to quality or use problems. Quality problems may be caused by design, quality of equipment and components, construction or a combination of many factors. Improper use, including the completion of the project did not reach a certain strength, or exceeded the rated load, or did not test run according to the design requirements.

What are the basic knowledge of safety production management?

The basic knowledge of safe production is the basic knowledge necessary to ensure the safety in the production process.

Safety in production refers to related activities that take corresponding accident prevention and control measures to avoid accidents that cause personal injury and property loss, ensure the personal safety of employees and ensure the smooth progress of production and business activities.

Extended reading:

I. Basic concepts

1, safety generally refers to the state without danger, threat and accident. Safety in the production process refers to the situation that industrial accidents, occupational diseases, equipment and facilities or property losses do not occur. In other words, no one was injured and nothing was lost. In order to ensure safe production, efforts should be made to improve working conditions, overcome unsafe factors, put an end to illegal behaviors and prevent casualties.

2. Accidents refer to accidents that cause death, illness, injury and property losses. An accident is an unexpected event that is contrary to people's expectation and will in the relationship between people and energy system, that is to say, an accident is an unexpected change or disaster.

3. Casualty accidents refer to personal injuries and acute poisoning accidents of employees in the process of labor.

4. Danger refers to the source or state that may cause casualties, diseases, property losses and damage to the working environment.

5. Hazard identification refers to the process of identifying the existence of hazards and determining their nature.

6. Hazard source is the root of danger. Refers to the potential unsafe factors that may cause casualties or material losses. Hazard sources are generally divided into two categories. The first category refers to energy or dangerous substances that may be accidentally released in the production process. Such as electric energy, toxic chemicals, etc. The second type of hazard source refers to various factors that lead to the destruction or actual failure of energy or harmful substance restraint or restriction measures. It mainly includes material failure, human error and environmental damage factors.

7. Safety in production refers to all measures and activities taken to ensure that the labor process is carried out under the material conditions and working order that meet the safety requirements, to prevent casualty accidents, equipment accidents and various disasters, and to ensure the safety and health of workers and the normal production and operation process.

Second, the role of safety helmet and matters needing attention in use

1, the protective function of the helmet ① prevents objects from hitting and injuring ② prevents falling from a height and injuring the head ③ prevents mechanical injury ④ prevents pollution from injuring the hair.

2. Precautions for use ① There should be a jaw strap and a back hat hoop and fasten them to prevent the hat from slipping or falling off. (2) The thermoplastic safety helmet can be washed with clear water, not soaked in hot water, and cannot be baked on the radiator and the stove to prevent the cap body from deforming. (3) The helmet should be replaced even if there is no crack in the helmet body after being used for more than a specified time or being severely impacted. The service life of general plastic safety helmet is 3 years. (4) before wearing, check whether all kinds of accessories are damaged, whether the assembly is firm, whether the adjusting part of the cap lining is clamped tightly, whether the rope is fastened, etc. , before use.

Third, the meaning and use of safety color

1. Safety colors include red, yellow, blue and green. Red means prohibition and stop. Prohibited, stopped or dangerous devices, equipment or environment are marked in red. Yellow indicates caution and warning. Blue indicates instructions that must be followed. Green means traffic, safety and providing information.

2. The contrast color of safety color is black and white. The contrast color of yellow safety color is black. The contrast colors of red, blue and green safety colors are all white. Black is used for text, graphic symbols of safety signs, geometric figures of warning signs and public information signs. White is used as the background color of red, blue and green safety colors in safety signs, and can also be used for the characters and geometric figures of safety signs, safety passages, traffic markings and safety lines on railway platforms. Red and white stripes are more eye-catching than using safety colors alone, which means no passing and crossing. , used for fences and isolation piers in expressway traffic. The yellow and black stripes are more eye-catching than the single safety color, indicating special attention. Blue and white stripes are more eye-catching than using safety colors alone. They are used to indicate the direction, mostly traffic guide signs.

3. The white width of the safety line used to divide the safety area and the dangerous area shall not be less than 60 mm. ..

Four, the basic safety knowledge of the job site

1. What is illegal command? Illegal command refers to the command behavior that violates the national production safety guidelines, policies, laws, regulations, rules, standards and systems, as well as the rules and regulations of production and business units.

2, illegal command. ......

What are the common security areas of Huawei firewall?

Common distributed file systems include GFS, HDFS, Lustre, Ceph, GridFS, mogileFS, TFS, FastDFS, etc. They are suitable for different fields. They are not system-level distributed file systems, but application-level distributed file storage services. Google file system

What conditions should the building fire protection design safety zone meet? What types are there?

Safe area? That's outdoor. As long as the evacuation distance and width of the fire zone are met indoors, it can be specific. These are different according to the nature of the functional floors of the building. You can check the building code or high-rise code.

Which units are members of the district safety production Committee? Five points.

The purpose of the district safety production committee is to strengthen the unified leadership of the safety production work in the whole region, promote the stable improvement of the safety production situation, and protect the national property and people's lives. (referred to as the safety Committee).

Member units include

District Committee Office, District Government Office, Emergency Office, Political and Legal Committee, Propaganda Department, United Front Work Department, Finance Bureau, Economic and Information Committee, Education Committee, Urban and Rural Construction Committee, Communications Committee, Agriculture Committee, Commercial Nail, Public Security Bureau, Supervision Bureau, Civil Affairs Bureau, Human Resources and Social Security Bureau, Guotufangguan Bureau, Environmental Protection Bureau, Planning Bureau, Municipal Gardens Bureau, Water Affairs Bureau, Wenguang New Bureau, Health Bureau, Safety Supervision Bureau, Forestry Bureau and so on. Economic Development Zone Environmental Protection Bureau, Wangu Industrial Park, Longshui Industrial Park, Stone Carving Research Institute, Supply and Marketing Cooperative, Federation of Trade Unions, Reservoir Resettlement Center, Industrial and Commercial Branch, Quality Supervision Bureau, US Food and Drug Administration, Meteorological Bureau, Economic Development Zone Public Security Bureau

What aspects does enterprise information security include?

Information security mainly involves three aspects: information transmission security, information storage security and network transmission information content audit.

distinguish

Authentication is the process of verifying the subject in the network, and there are usually three ways to verify the identity of the subject. One is secrets that only the subject knows, such as passwords and keys; Second, the items carried by the subject, such as smart cards and token cards; Third, only the subject has unique features or abilities, such as fingerprints, voices, retinas or signatures.

Password mechanism: Password is a code agreed by both parties, assuming that only users and systems know it. Passwords are sometimes selected by users and sometimes assigned by the system. Usually, users first enter some logo information, such as user name and ID number, and then the system will ask the user to enter a password. If the password matches the password in the user file, the user can enter the access. There are many kinds of passwords, such as one-time passwords. The system generates a one-time password list. You must use X the first time, Y the second time, Z the third time, and so on. There are also time-based passwords, that is, the correct password for access changes with time, and this change is based on time and a secret user key. So the password changes every minute, and it's harder to guess.

Smart card: Access requires not only a password, but also a physical smart card. Check whether you are allowed to touch the system before you are allowed to enter the system. A smart card is the size of a credit card and usually consists of a microprocessor, a memory and input/output devices. The microprocessor can calculate the unique number (ID) of the card and the encrypted form of other data. The ID ensures the authenticity of the card and the cardholder can access the system. In order to prevent smart cards from being lost or stolen, many systems need smart cards and PIN. If you only have a card and don't know the PIN code, you can't get into the system. Smart card is superior to the traditional password method for authentication, but it is inconvenient to carry and the cost of opening an account is high.

Subject feature identification: The method of personal feature identification has high security. At present, the existing equipment includes: retina scanner, voice verification equipment and hand recognizer.

Data transmission security system

The purpose of data transmission encryption technology is to encrypt the data stream in transmission to prevent eavesdropping, leakage, tampering and destruction on communication lines. If the communication levels of encryption are distinguished, encryption can be realized at three different communication levels, namely link encryption (encryption below OSI network layer), node encryption and end-to-end encryption (file encryption before transmission and encryption above OSI network layer).

Commonly used are link encryption and end-to-end encryption. Link encryption focuses on communication links, regardless of source and destination, and provides security protection for confidential information by using different encryption keys in each link. Link encryption is node-oriented, transparent to network high-level subjects, and encrypts high-level protocol information (address, error detection, frame header and frame tail), so data is ciphertext in transmission, but it must be decrypted at the central node to get routing information. End-to-end encryption means that information is automatically encrypted by the sender, encapsulated in TCP/IP packets, and then passed through the Internet as unreadable and unrecognizable data. Once the information reaches its destination, it will be automatically reassembled and decrypted into readable data. End-to-end encryption is an advanced subject facing the network. It does not encrypt the information of the lower protocol, and the protocol information is transmitted in plain text, so the user data does not need to be decrypted at the central node.

Data integrity authentication technology At present, for dynamically transmitted information, many protocols mostly ensure the integrity of information by receiving and retransmitting errors and discarding subsequent data packets. However, hacker attacks can change the internal contents of data packets, so effective measures should be taken to control the integrity.

Message authentication: Similar to CRC control in the data link layer, the message name field (or domain) is combined into a constraint value through certain operations, which is called the message integrity check vector ICV(Integrated Check Vector). Then it is encapsulated with the data for encryption. In the transmission process, because the intruder cannot decrypt the message, it is impossible to modify the data and calculate the new ICV at the same time. In this way, the receiver decrypts and calculates the ICV after receiving the data. If it is different from the ICV in plaintext, the message is considered invalid.

Checksum: One of the simplest and easiest integrity control methods is to use checksums to calculate the checksum value of this file and compare it with the last calculated value. If they are equal, the document has not changed; If they are not equal, it means that the document may have been changed by unconscious behavior. The checksum method can be checked wrong, but it cannot. ......