Part B - Unit 3 - Ict Skills - Summary
Part B - Unit 3 - Ict Skills - Summary
Keyboard is an input device used to type text, numbers and commands into the computer.
Function keys(12), Control Keys Enter Key, Punctuation Keys, Navigation Keys, Command Keys,
Windows Keys.
Mouse - Different functions are Roll Over or Hover, Point and Click, Drag and Drop, Right Click,
Double Click. (Refer NCERT text)
Functions of OS
Some of the functions of Operating system are:
1
• It manages all the devices of a computer and keeps track of the status of the device, whether it is
busy or not.
• It also checks whether the device is functioning properly or not.
• It also controls software resources of the computer.
• It manages the computer memory and keeps track of which memory space is in use by which
program and which space is free.
• It manages the structure of the files and directories on a computer system.
• It keeps track of the amount of disk space used by a specific file.
• It allows you to create, copy, move and delete files.
Types of OS
Based on the interface (The way in which users communicate with the computer is called an
Interface), OS is divided into 2:
1. Command Line Interface( CLI)
2. Interactive Operating System Interfaces
3. Single-user , single-task operating system - This type of operating system allows only one user to
do a task on the computer and one thing at a time. Eg: DOS
4. Single-user, multi-task operating system - This type of operating system is used on Desktop
computers, laptops, where a single user can operate on several programs at the same time. For
example, Windows, Apple MacOS are examples of single-user, multi-tasking operating systems.
5. Multi-user OS - A multi-user operating system enables multiple users to work on the same
computer at different times or simultaneously. Eg: Windows XP, Windows NT
6. Real Time OS - A real-time operating system is a computing environment that reacts to input
within a specific period of time. It manages the resources of the computer so that any particular
operation is executed in the same amount of time every time it is executed. It is used to control
2
machinery, scientific instruments, like robots, in complex animations and computer controlled
automated machines, airline traffic control systems etc. Eg: Windows CE and Linux OS.
Commonly used OS
1. Linux - It is free, opensource ( anyone can freely download, use it, modify it and redistribute
it)
2. Windows - Latest version is Windows 11.
3. BOSS Linux - Bharat Operating System Solutions Linux - It is an Indian distribution of
GNU/Linux. It supports most of the Indian languages.
4. Solaris - It is a free Unix-based OS by Sun Microsystems.
5. Mobile Operating System - Google Android, Apple iOS, Windows Phone, Symbian(
outdated) etc.
Windows 7
*Recycle Bin : Files and folders deleted by the user are stored in the Recycle Bin. From Recycle Bin,
you can retrieve files or folders deleted by mistake.
*Computer Icon : It displays all the storage areas of the computer. Through the Computer icon, you
can access all drives, files, and folders on the computer.
3
Files and Folders
File - It is a common storage unit in a computer. It is a collection of information. It can store any
type of data like image, presentation, database, documents, audio, video etc. Files that contain text
are often called documents. A file has a name and an extension (.txt, .jpg, .mp3 etc).
Folder( Directories) - It is a location where a group of files can be stored. A folder stored inside
another folder is called Subfolder. The hierarchy of folders is called Directory Structure.The first
level of directory is called Root directory or Parent directory. The subfolder inside each root
directory is called Sub directory or Child directory.
(Refer skills combined book : pg 27- How to create files and folder, rename ( shortcut key - F2),
deleting )
Copying/Moving files and folders( difference between copying and moving - The cut command
removes the selected data from its original position, while the copy command creates a duplicate; in both
cases the selected data is kept in temporary storage (the clipboard)). Copy/Move files can be done in 3
ways -Using shortcut menu, Drag and drop, Using keyboard shortcut keys are Ctrl + C to copy,
Ctrl + X to cut, Ctrl + V to paste.
(Refer skills combined book : pg 30)
Clipboard - Temporary storage area provided by the OS to store data for short-term. When the user copies
the selected content, it's stored in the clipboard until it's pasted.
Restoring Deleted files and folders - Deleted files/folders can be recovered using the Restore
option.
Permanently Deleting files and folders - These can’t be restored. A file deleted from pendrive will
be permanently deleted, it doesn't go to the recycle bin.
Selecting Files and folders - To select all items press ctrl + A, To select multiple contiguous items
-hold down Shift key and select, To select multiple non-contiguous items - hold down Ctrl Key and
select.
Maintenance schedule
1. Preparing maintenance schedule - Daily, Weekly, Monthly, Yearly
2. Backup your data
3. Scanning and Cleaning Viruses
4. Increase computer performances
5. Remove the SPAM from your computer
6. Keep food items away from the computer
7. Cables and cords should not be messed up
8. Replace hardware that is not functioning properly
9. Do not overcharge the batteries
10. Do not block the vents
11. Always shut down the computer properly
12. Keep the devices clean
13. Follow the general guidelines
● Trojan horses appear harmless like a useful software( like text editors or a utility program) .
But once it reaches a computer it starts behaving like a virus and performs malicious
functions such as deleting or damaging files.
● Online predators are people who trap you into inappropriate relationships. They will hide
their identity and bully you to do illegal activities.
● Internet Scams are tricks used to cheat people. For eg - You may receive a message saying
that you have won a lottery, so claim the prize by depositing a certain amount.
3. Removing Temporary Files : Temporary files (.tmp file) are created to temporarily store
information like browser history , in order to free memory for other purposes.
(Refer text - how to remove temporary files and folders)
6
4. Disk Defragmentation
A regular disk defragmentation ( technique used for rearranging files stored on a disk to
occupy contiguous storage locations) should be done to remove all unnecessary information
that slows down the computer.
5. Fire wall
Firewall monitors the incoming and outgoing network traffic based on user-defined security
rules (data coming in and out of a computer) and prevents viruses from entering.
6. Cookies
Cookies are small files which are stored on a user’s computer when you visit a website
on the internet. These files typically contain information about your visit to the webpage or
record your login information.
7. Encrypt Data: Usually Banks and other companies encrypt their entire hard disk using an
encryption feature( Window Bitlocker).This would force users to use a decryption password
(or key) before starting the computer thus preventing unauthorized usage.
8. Secure sites: If the site address starts with https://and a lock symbol, then it is safe to give
your credit card and bank details.
~~~~~~~~~~~~~~