0% found this document useful (0 votes)
40 views7 pages

Part B - Unit 3 - Ict Skills - Summary

Uploaded by

rosetom0907
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
40 views7 pages

Part B - Unit 3 - Ict Skills - Summary

Uploaded by

rosetom0907
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

MAR THOMA PUBLIC SCHOOL,KOCHI-30

INFORMATION TECHNOLOGY(IT) - 402


PART B -EMPLOYABILITY SKILLS
UNIT 3 - BASIC ICT SKILLS (SUMMARY)
CLASS: X DIV:
NAME:
_____________________________________________________________________

ICT ( Information and Communication Technology)


ICT refers to all the methods, tools, concepts related to storing, recording and sending digital
information. ICT skills help us to communicate, run our business and stay connected with our
family and friends.

Hardware and Software


The physical parts that we can see and touch are called hardware.
Eg: Monitor, Keyboard, Mouse etc
Software is a set of instructions that tell a computer what to do. We cannot see it,but it makes the
hardware work the way we want.
Eg: Operating System, Computer Applications like Office tools, Games etc

Keyboard is an input device used to type text, numbers and commands into the computer.
Function keys(12), Control Keys Enter Key, Punctuation Keys, Navigation Keys, Command Keys,
Windows Keys.
Mouse - Different functions are Roll Over or Hover, Point and Click, Drag and Drop, Right Click,
Double Click. (Refer NCERT text)

Basic Functions performed when a computer starts- A computer automatically


runs a basic program called BIOS (Basic Input/Output System) as soon as it is switched on. If this
self-test is fine, then the BIOS will load the Operating System (OS).

What is an Operating System?


An Operating System (OS) is a software that acts as an interface between computer hardware
components and the user. Every computer system must have at least one operating system to run
other programs.

Functions of OS
Some of the functions of Operating system are:
1
• It manages all the devices of a computer and keeps track of the status of the device, whether it is
busy or not.
• It also checks whether the device is functioning properly or not.
• It also controls software resources of the computer.
• It manages the computer memory and keeps track of which memory space is in use by which
program and which space is free.
• It manages the structure of the files and directories on a computer system.
• It keeps track of the amount of disk space used by a specific file.
• It allows you to create, copy, move and delete files.

Types of OS
Based on the interface (The way in which users communicate with the computer is called an
Interface), OS is divided into 2:
1. Command Line Interface( CLI)
2. Interactive Operating System Interfaces

1.Command Line Interface( CLI)


It is an older style OS, where users type commands using a keyboard. Computer displays a prompt
on the screen where users can type the desired commands.
Eg: DOS ( Disk Operating System), Unix, Linux etc

2.Interactive Operating System Interfaces [ Graphical User Interface (GUI)]


A graphical user interface is a user-friendly operating system in which
commands can be entered by clicking/double-clicking/right-clicking a mouse.
Eg: Windows, MAC, Ubuntu

3. Single-user , single-task operating system - This type of operating system allows only one user to
do a task on the computer and one thing at a time. Eg: DOS

4. Single-user, multi-task operating system - This type of operating system is used on Desktop
computers, laptops, where a single user can operate on several programs at the same time. For
example, Windows, Apple MacOS are examples of single-user, multi-tasking operating systems.

5. Multi-user OS - A multi-user operating system enables multiple users to work on the same
computer at different times or simultaneously. Eg: Windows XP, Windows NT

6. Real Time OS - A real-time operating system is a computing environment that reacts to input
within a specific period of time. It manages the resources of the computer so that any particular
operation is executed in the same amount of time every time it is executed. It is used to control
2
machinery, scientific instruments, like robots, in complex animations and computer controlled
automated machines, airline traffic control systems etc. Eg: Windows CE and Linux OS.

7. Distributed OS - A distributed operating system runs on a set of computers that are


interconnected by a network. It combines the different computers in the network into a single
integrated computer and storage location. Windows server 2008, Ubuntu, and LINUX are examples
of distributed operating systems.

Commonly used OS
1. Linux - It is free, opensource ( anyone can freely download, use it, modify it and redistribute
it)
2. Windows - Latest version is Windows 11.
3. BOSS Linux - Bharat Operating System Solutions Linux - It is an Indian distribution of
GNU/Linux. It supports most of the Indian languages.
4. Solaris - It is a free Unix-based OS by Sun Microsystems.
5. Mobile Operating System - Google Android, Apple iOS, Windows Phone, Symbian(
outdated) etc.

Windows 7

Windows 7 is an operating system developed by Microsoft.


Different components of windows 7 are
*Desktop : The first screen that appears on the monitor.
*Wallpaper: A picture for the desktop background.
*Icons : Small pictures on the desktop are called icons. These icons represent files, folders,
applications, etc.
*Taskbar : Taskbar is the long horizontal bar present at the bottom of the screen. The main
components of Taskbar are the start button, active application, notification area, date/time icon.
*Start button : To the left of the taskbar is the Start button and to the right appears Date/Time.
It will provide access to
● Shut Down:- allows the user to turn off the computer
● All Programs: - Provides access to all the installed programs and applications.
● Search Box: - This allows the user to search a file or a folder or run executable files.
● Control panel: - This allows the user to change various settings.

*Recycle Bin : Files and folders deleted by the user are stored in the Recycle Bin. From Recycle Bin,
you can retrieve files or folders deleted by mistake.
*Computer Icon : It displays all the storage areas of the computer. Through the Computer icon, you
can access all drives, files, and folders on the computer.
3
Files and Folders
File - It is a common storage unit in a computer. It is a collection of information. It can store any
type of data like image, presentation, database, documents, audio, video etc. Files that contain text
are often called documents. A file has a name and an extension (.txt, .jpg, .mp3 etc).

Folder( Directories) - It is a location where a group of files can be stored. A folder stored inside
another folder is called Subfolder. The hierarchy of folders is called Directory Structure.The first
level of directory is called Root directory or Parent directory. The subfolder inside each root
directory is called Sub directory or Child directory.
(Refer skills combined book : pg 27- How to create files and folder, rename ( shortcut key - F2),
deleting )

Copying/Moving files and folders( difference between copying and moving - The cut command
removes the selected data from its original position, while the copy command creates a duplicate; in both
cases the selected data is kept in temporary storage (the clipboard)). Copy/Move files can be done in 3
ways -Using shortcut menu, Drag and drop, Using keyboard shortcut keys are Ctrl + C to copy,
Ctrl + X to cut, Ctrl + V to paste.
(Refer skills combined book : pg 30)

Clipboard - Temporary storage area provided by the OS to store data for short-term. When the user copies
the selected content, it's stored in the clipboard until it's pasted.

Restoring Deleted files and folders - Deleted files/folders can be recovered using the Restore
option.

Permanently Deleting files and folders - These can’t be restored. A file deleted from pendrive will
be permanently deleted, it doesn't go to the recycle bin.

Selecting Files and folders - To select all items press ctrl + A, To select multiple contiguous items
-hold down Shift key and select, To select multiple non-contiguous items - hold down Ctrl Key and
select.

What is computer maintenance?


Computer maintenance refers to the actions carried out so as to keep a computer system in good
state of working. Computer systems require maintenance so that the system works efficiently. Poor
maintenance may lead to system failure.
Computer maintenance includes:
1. External Cleaning
2. Internal Cleaning
4
3. Keeping backup and updating the software and programs.

Basic Tips for taking care of computer


1. Keyboard: Clean the keyboard with a soft brush.
2. Screen : Wipe the screen with a soft brush to remove any finger marks.
3. Be careful with food or drinks : Don't eat or drink near the computer.
4. Handle devices carefully: Avoid dropping or banding it against a hard surface.
5. Keep the computer cool: If a computer/laptop gets overheated, the internal parts can be
damaged. The CPU has an internal fan to keep it cool. Make sure the fan is functioning.
6. Do not overcharge your battery: Always unplug the device once it is charged 100%.
7. Always plug in devices carefully: If you find it difficult to plug in a device, change the
direction and try, instead of trying to force it in.
8. Do not run too many programs at a time: If too many programs are running at the same
time then the computer can become slow and even crash.

Maintenance schedule
1. Preparing maintenance schedule - Daily, Weekly, Monthly, Yearly
2. Backup your data
3. Scanning and Cleaning Viruses
4. Increase computer performances
5. Remove the SPAM from your computer
6. Keep food items away from the computer
7. Cables and cords should not be messed up
8. Replace hardware that is not functioning properly
9. Do not overcharge the batteries
10. Do not block the vents
11. Always shut down the computer properly
12. Keep the devices clean
13. Follow the general guidelines

Cleaning the computer components - (Refer skills combined book : pg 33)

COMPUTER SECURITY and PRIVACY


It deals with the computer security and privacy deals with the measures used to prevent loss of
data.
Reasons for Security break - It is the leakage of information stored in a computer. Personal
information can be lost or leaked in 2 ways
1. If we give our personal information on unsecure sites.
2. If we don't log out properly, a person gets unauthorized access to our computer.
5
Threats to Computers - Threats are the ways in which personal information can be leaked from a
computer without our knowing. (refer text pg 80)

Theft - Stealing of information or hardware.


● Physical - Stealing hardware
● Misusing Identity - Hacker steals your personal information and assumes your identity and
performs illegal activity.
● Software piracy - Stealing software, distributing or using unlicensed softwares.
Computer viruses are malicious codes/programs that cause damage to data and files on a system. It
can attack any part of the computer software.
● Worms are viruses that replicate themselves and spread to all files once they attack a
computer. These self-replicating programs eat up the entire disk space or memory.

● Trojan horses appear harmless like a useful software( like text editors or a utility program) .
But once it reaches a computer it starts behaving like a virus and performs malicious
functions such as deleting or damaging files.
● Online predators are people who trap you into inappropriate relationships. They will hide
their identity and bully you to do illegal activities.
● Internet Scams are tricks used to cheat people. For eg - You may receive a message saying
that you have won a lottery, so claim the prize by depositing a certain amount.

Damage caused by Viruses


1. Damage or delete files 2. Slow down your computer 3. Invade your email program

Protecting your Data


1. Use passwords to login to your computer : Combination of capital letters, small letters,
special characters, numbers.
2. Install Anti-virus and Firewall:
A good anti-virus will clean troublesome items like Computer Viruses, Worms, Malware(
posting unwanted Ads), Spamfiles, Junk files- general name for temporary files.
Different Antiviruses - Windows Defender, Norton Antivirus, QuickHeal Security, KasperSky
Antivirus.

3. Removing Temporary Files : Temporary files (.tmp file) are created to temporarily store
information like browser history , in order to free memory for other purposes.
(Refer text - how to remove temporary files and folders)

6
4. Disk Defragmentation
A regular disk defragmentation ( technique used for rearranging files stored on a disk to
occupy contiguous storage locations) should be done to remove all unnecessary information
that slows down the computer.

5. Fire wall
Firewall monitors the incoming and outgoing network traffic based on user-defined security
rules (data coming in and out of a computer) and prevents viruses from entering.

6. Cookies
Cookies are small files which are stored on a user’s computer when you visit a website
on the internet. These files typically contain information about your visit to the webpage or
record your login information.

7. Encrypt Data: Usually Banks and other companies encrypt their entire hard disk using an
encryption feature( Window Bitlocker).This would force users to use a decryption password
(or key) before starting the computer thus preventing unauthorized usage.

8. Secure sites: If the site address starts with https://and a lock symbol, then it is safe to give
your credit card and bank details.
~~~~~~~~~~~~~~

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy