Care and Maintainance
Care and Maintainance
(a) .jpg
(b) .doc
(c) .text
(d) .txt
3. What keys do you use to copy something?
(a) Ctrl+x
(b) Ctrl+c
(c) Ctrl+z
(d) Ctrl+y
B. Subjective questions
1.
system in a school?
2.
Ubuntu?
(iii) Be careful with food and drinks: Avoid eating Figure 3.22: Avoid keeping food
and keeping glasses of water or cups of coffee near a computer
near a computer as shown in Figure 3.22. Any
liquid spilt over an electronic device can spoil it
beyond repair.
(iv) Handle devices carefully: Handle and move your
laptop carefully and avoid dropping or banging
it against a hard surface. Even a short fall can
damage the screen or the hard disk and make the
Figure 3.23: Avoid dropping
device useless. Using a cover for your mobile and bag containing laptop
a padded case for moving your laptop as shown
in Figure 3.23 protects the device from damage.
(v) Keep the computer cool: If a computer, laptop
or mobile device gets overheated, the internal
parts can be damaged. The CPU has an internal
fan to keep it cool. We should make sure the fan
is functioning. You can also use an external fan
as shown in Figure 3.24. Avoid leaving a device in Figure 3.24: Keep device cool
the sun or in a closed car. We should be careful
when using a laptop while sitting in bed and
make sure that the fan in not covered.
(vi) Do not overcharge your battery: Sometimes
we keep a device plugged in for charging even
after it is fully charged. If we leave the device
plugged in for a long time as shown in Figure
Figure 3.25: Do not over
3.25, it can overheat the battery. This reduces charge your battery
This will prevent any viruses from entering and will also
clean any viruses that may enter our system before they
affect the data.
Practical Exercise
Activity 1
Making a Chart
Material required
Pen, notebook, chart paper, pictures.
Procedure
Form groups and make a chart to list down all the
ways in which a device can be damaged and how it can
be prevented.
Make sure all students in the group get a chance
to participate.
B. Subjective questions
logging out.
Figure 3.30: Security Breach Computer security and privacy is about
measures we can take to restrict access to
personal data stored in a computer.
Threats to Computer
Threats are the ways in which personal
information can be leaked from a computer
without our knowing.
(a) Theft: Theft means stealing of
information or hardware. These maybe
of three types:
Figure 3.31: Physical stealing
Physical: Where a person may
steal your desktop computer or
laptop.
Identity: Where a hacker steals
your personal information and
assumes your identity. Using this
false identity, the hacker can gain
access to your account information
or perform illegal activity.
Software Piracy: This is stealing
of software and includes using
Figure 3.32: Online stealing
or distributing unlicensed and
unauthorised copies of a computer
program or software.
(b) Virus:
damage the data and software programs or steal
the information stored on a computer. Major
types of viruses are Worms and Trojan Horse.
Worms: These are viruses that replicate
Figure 3.33: Worm virus
Practical Exercise
The teacher will facilitate these activities by showing you the
e-learning lesson athttp://www.psscive.ac.in/stud_text_book.
html. This will include videos and e-content for the above topics
as well as detailed instructions for some activities below.
Initial Thinking Activity
After watching the initial video write down the type of risk present
to the data available in different places, for example in a school,
hospital, bank, etc.
Activity 1
Group Chart Making
Material required
Pen, notebook, computer, Chart paper, colours
Procedure
Form groups depending on the number of students
available. Make a chart to show all the different threats
faced by a computer and how you can protect a computer
from such treats.
B. Subjective questions