0% found this document useful (0 votes)
19 views17 pages

ICT Skills: Types of Operating Systems An Operating System (OS)

The document provides an overview of operating systems, their types, and functions, including memory and file management. It specifically discusses Windows 7, its desktop components, and basic file operations such as creating, copying, moving, and deleting files. Additionally, it emphasizes the importance of computer maintenance and security measures, along with a set of questions to test understanding of the material.

Uploaded by

Epic Gamerzz
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views17 pages

ICT Skills: Types of Operating Systems An Operating System (OS)

The document provides an overview of operating systems, their types, and functions, including memory and file management. It specifically discusses Windows 7, its desktop components, and basic file operations such as creating, copying, moving, and deleting files. Additionally, it emphasizes the importance of computer maintenance and security measures, along with a set of questions to test understanding of the material.

Uploaded by

Epic Gamerzz
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 17

ICT

SKILLS

TYPES OF OPERATING SYSTEMS


An Operating System (OS) is an interface between a computer user and computer
hardware. An operating system is a software which performs all the basic tasks like file
management, memory management, process management, handling input and output,
and controlling peripheral devices such as disk drives and printers. Some popular
operating systems are,

• DOS (Disk Operating System) • Windows It is an operating system developed by


Microsoft.
• Linux It is an operating system designed for personal computers. It is a free and open-
source software
• Mobile operating Systems
✓ Android
✓ Symbian
✓ Windows Phone
✓ iOS

Following are some of important functions of an operating System.

• Memory Management
• Processor Management
• Device Management
• File Management
• Security
• Control over system performance
• Job accounting
• Error detecting aids
• Coordination between other software and users

1
The different types of operating systems are as follows:
Interactive (GUI-based) A graphical user interface is a user-friendly operating system in
which commands can be entered by clicking/double-clicking/right-clicking a mouse.
Windows operating system is an example of an interactive operating system.

Single-user, single-task operating system: This type of operating system allows only
one user to do a task on the computer and one thing at a time.
Single-user, multi-task operating system: This type of operating system is used on
Desktop computers, laptops, where a single user can operate on several programs at the
same time. For example, Windows, Apple MacOS are examples of single-user multi task
operating system.

Multi-user A multi-user operating system enables multiple users to work on the same
computer at different times or simultaneously.

Real Time A real time operating system is used to control machinery, scientific
instruments, like robots, in complex animations and computer controlled automated
machines. A real-time operating system is a computing environment that reacts to input
within a specific period of time. It manages the resources of the computer so that any
particular operation is executed in the same amount of time every time it is executed.
Windows CE and Lynx OS are examples of real-time operating systems.

Distributed A distributed operating system runs on a set of computers that are


interconnected by a network. It combines the different computers in the network into a
single integrated computer and storage location. Windows, UNIX, and LINUX are
examples of distributed operating systems.
Windows 7 operating system
Windows 7 is an operating system developed by Microsoft and is used on personal
computers.
After loading Windows 7, the first screen that appears on the monitor is called desktop.
From the desktop, you can access different components of Windows 7.
By default, Windows 7 has a picture for the desktop background. This is called
wallpaper.
2
Small pictures on the desktop are called icons. These icons represent files, folders,
applications, etc. At the bottom of the desktop is a long bar called the Taskbar. To the left
of the taskbar is the Start button.

Components of Windows 7 Desktop


The components of Windows 7 Desktop are shown in figure 1.

Figure 1

3
Computer :
It displays all the storage areas of the computer . Through the Computer icon, you can access all
drives, files, and folders on the computer. When you double-click Computer icon, a window shown
below in Figure 2 appears on the screen.

Fig 2 Computer Window


Taskbar

Taskbar is the long horizontal bar present at the bottom of the screen. To left of the Taskbar is the
Start button and to the right appears Date/Time. You can also see icons of active applications and
some shortcuts on the Taskbar

The main components of Taskbar are shown in the following figure 3:

Fig 3 Taskbar
Start button it is located on the left of the taskbar. Clicking the Start button (Figure 4) opens the
Start menu and provides access to programs and features, like:
Shut Down: - allows the user to turn off the computer
All Programs: - Provides access to all the installed programs and applications. To start an
application, just click it.
Search Box: - This allows the user to search a file or a folder or run executable files. Control

4
panel: - This allows the user to change various settings.
Recycle Bin Files and folders deleted by the user are stored in the Recycle Bin. From Recycle
Bin, you can retrieve files or folders deleted by mistake.

Fig 4 Start button

File Concept, File Operations, File Organization, Directory Structures And File-
System Structures
Everything you store on your computer is stored in the form of a file. There are specific naming
conventions for naming files or folders, like characters that can be used, maximum number of
characters, etc. Files can be separately placed into groups, called folders/directories. Each
directory/folder can contain related files and/or sub-folders

The steps to create a new folder are:

1. Double-click the Computer icon.

2. Select the drive in which you want to create a new folder. Say, Local Disk D:.
5
3. Window will open up showing files and folders in Local Disc D: Click New Folder on the toolbar.

4. A new folder is created with name New Folder highlighted

5. Type a name for the folder

To create a new file:

1. Right-click anywhere in the blank area of the right-column.

2. In the Shortcut menu, click New and select the type of the file you want to create.

To rename a file or a folder:

1. Right-click the file or the folder.

2. From the shortcut menu, select Rename option

3. Type the new name or edit the existing name and press the Enter key.

Or Just select the file/folder and press Function key F2.

To copy a folder or directory

You can copy a file or a folder in any one of the following ways:

1. Shortcut menu:

a. Right-click the file or the folder you want to copy.

b. Select Copy option from the Shortcut menu.

c. Select the drive or the folder where you want to make a copy of the selected file or folder.

d. Right-click and select Paste option from the Shortcut menu.

2. Drag and Drop method:

To copy a file or a folder, hold down the Ctrl key while dragging it to the new location.

3. Using Keyboard:

a. Select the file or the folder.

b. Press Ctrl + C to copy the file or the folder.

c. Open the destination folder.

d. Press Ctrl + V to paste the copied file.

To Move Files and folders

You can move a file or a folder in any one of the following ways:

1. Shortcut menu:

a. Right-click the file or the folder you want to copy.


6
b. Select Cut option from the Shortcut menu.

c. Select the drive or the folder where you want to move the selected file or folder.

d. Right-click and select Paste option from the Shortcut menu.

2. Drag and Drop method: To copy a file or a folder, select the file and drag it to a new location.

3. Using Keyboard:

a. Select the file or the folder.

b. Press Ctrl + X to cut the file or the folder.

c. Open the destination folder.

d. Press Ctrl + V to paste the copied file.

To permanently delete Files

You can permanently delete the contents of the Recycle Bin in any one of the following ways:

Right-click the Recycle Bin icon and then click Empty Recycle Bin

OR

1. Double-click the Recycle Bin icon.

2. The Recycle Bin window appears.

3. Click Empty the Recycle Bin.

To restore the files and folders

To recover a file from the Recycle Bin, right-click the file, and then click Restore.

Or

Select the file and click Restore this item

CARE AND MAINTENANCE OF COMPUTER

Regular maintenance of the computer system is very important.

Some of the maintenance activities are:

• Keep the components of the computer, like keyboard, mouse, monitor, etc. clean.

• Replace hardware that is not functioning properly

• Keep food items away from the computer

• Cables and chords should not be messed up

• Removing unauthorized software from the computer

• Take regular backup of the data

• Ensure backups are working properly by periodically restoring or checking of data. You should
7
use external hard drive for backup of data on your computer.

• Run anti-virus periodically

• Keep anti-virus software up to date

• Do not overcharge the batteries

• Do not block the vents

• Always shut down the computer properly

How to take

Measures to protect Computer

Regular scans should be done to check for viruses, malware, etc.

An effective antivirus software should be installed in your computer.

Always keep your anti-virus software updated so that it can detect new viruses. Full system scan
should be done to periodically, preferably weekly to scan for viruses.

A regular disk defragmentation should be done to remove all unnecessary information that slows
down the computer.

Disk defragmentation done at regular intervals helps the disc space to be used at an optimal level.

Take regular backup of the data on your computer. In case the data is lost due to any reason,
system failure, virus attack, etc., you can easily retrieve your data using backup files till your last
update.

System should be upgraded with new updates that were not there at the time of purchase, like,
increasing RAM, to improve the performance. Also storage space should also be increased for
storage of more information.

If you are getting some disc errors, then make sure that temporary internet files are deleted from
time to time.

Software’s should be updated regularly so that it works with maximum efficiency.

8
QUESTIONS-1 MARK
1 Here are the steps that take place when starting a computer. Rearrange the steps 1
in the correct order. i) Desktop appears after login ii) Login screen appears iii) Power
on Self-Test (POST) starts iv) Operating system starts v) Welcome screen appears
a) i) -> ii) -> iii) -> iv) -> v)
b) ii) -> iv) -> iii) -> v) -> i)
c) iii) -> iv) -> v) -> ii) -> i)
d) iii) -> v) -> iv) -> ii) -> i)
2 Which one of the following is an example of Operating System? 1
a) Microsoft Word
b) Microsoft Windows
c) Microsoft Excel
d) Microsoft Access
3 Given below are the steps to make a copy of folder ‘D:\Myfolder’ in ‘C:\Documents’. 1
Rearrange the steps in the correct order.
(i) Right click anywhere in the folder and select Paste option from the
shortcut menu or use Ctrl+V keyboard keys.
(ii) Select the C: drive and locate Documents folder.
(iii) Right click on Myfolder and select Paste option from the shortcut menu or
use Ctrl+C keyboard keys.
(iv) (iv) Select the D: drive and locate Myfolder.
(a) (iii) -> (i) -> (ii) -> (iv)
(b) (iv) -> (ii) -> (iii) -> (i)
(c) (iv) -> (iii) -> (ii) -> (i)
(d) (i) -> (ii) -> (iii) -> (iv)
4 Which of the following is not an example of Antivirus software? 1
(i) McAfee (ii) Norton (iii) Disk Clean-up (iv) Kaspersky
5 Given below are the components of the taskbar in Windows 7. Rearrange the icons 1
from left to right of the taskbar. (a)Date/Time (b) Start Button (c) Notification Area
(d) File Explorer
(i) (c) -> (a) -> (b) -> (d) (ii) (b) -> (d) -> (c) -> (a) (iii) (d) -> (c) -> (b) -> (a) (iv) (a) ->
(b) -> (c) -> (d)
6 Which of the following is not a symptom of a computer affected with virus? 1
(i) Computer stops responding (ii) Computer restarts on its own (iii) Computer can’t
open a permanently deleted file (iv) Computer runs very slowly

9
7 The cleaning of software installed in the computer cannot be achieved by 1
.
a) Disk clean-up b) backup c) Cleaning CPU cabinet d) Installing antivirus software
8 Which of the following will you opt for saving a file? 1
(a) save button on standard toolbar
(b) save option from file menu
(c) pressing Ctrl+S
(d) any of the above
9 is leakage of information stored in a computer. 1

Ans. Security break


10 Picture for the desktop background is called …………… 1
Ans: wall paper
11 ICT Stands for . 1
a. Inform and Communicate technology
b. Information and Communication technology
c. Inform and Communication technology
d. Information and Communicate technology
12 ICT Skills help us to , run our business and stay connected 1
with our family and friends.
a. Communicate
b. Entertainment
c. Both a) and b)
d. None of the above
13 The most important software in any computer is the . 1
a. Operating System
b. Antivirus
c. Office Package
d. Photo Editing Software
14 Mobile devices also have an operating system like . 1
a. Apple iOS
b. Android
c. Both a) and b)
d. None of the above
15 helps the computer to close all the applications, Operating system 1
and turn off the computer.
a. Sleep
b. Shut down
c. Hibernate
d. None of the above

10
16 Which one of the following shortcut keys is used to paste a file? 1
a. Ctrl + c
b. Ctrl + p
c. Ctrl + v
d. Ctrl + x
17 What are the best options for caring for computer devices? 1
a. Keeping a Device Clean
b. Prepare a Maintenance Schedule
c. Do not overcharge your battery
d. All of the above

18 To clean the computer from the virus we required . 1


a. Antivirus
b. Office Package
c. Photoshop
d. Operating System

19 If we are using a computer for a long time we have to unnecessary 1


files and data from the computer.
a. Delete
b. Save
c. Backup
d. None of the above

20 Sometimes we get mails from companies who are advertising a product or trying to 1
attract you to their website. Such mails are called .
a. Trash
b. Inbox
c. Spam
d. None of the above

21 What happens if you keep a device plugged in after it has been fully charged? 1
a. It can break.
b. It can overheat.
c. It can stop functioning.
d. Data can get corrupt.

22 What role does antivirus play in protecting your device? 1


a. It can increase its performance.
b. It can protect it from overheating.
c. It can prevent data from getting corrupt.
d. It can backup data.

23 Which option does not need to be enabled in order to keep a device cool? 1
a. Make sure the computer’s CPU fan is working.
b. Keep the device unplugged when in use.
c. Do not cover a laptop with a blanket.
d. Avoid leaving the device in the sun.

11
24 Which of the following is required for keyboard maintenance? 1
a. Use a very dilute combination of soap and water applied with a non-abrasive
cloth to remove stains from the keycaps.
b. Turn the keyboard upside down and shake it to remove foreign material.
c. Blow dust and other particles with the help of a blower.
d. All of the above.

25 What do you mean by Threats . 1


a. Theft
b. Virus
c. Both a) and b)
d. None of the above

26 If someone steals your desktop computer or laptop, it is referred to as 1


theft.
a. Physical
b. Identity
c. Software Piracy
d. None of the above

27 When a hacker takes your personal information and assumes your identity, this is 1
referred to as theft.
a. Physical
b. Identity
c. Software Piracy
d. None of the above

28 are persons who try to attract you into inappropriate relationships. 1


a. Trojan House
b. Online Predator
c. Theft
d. None of the above

29 Sometimes you may receive very attractive offers saying you have won a huge 1
amount of money in a lottery and that you can claim the prize by depositing a
certain amount of money known as .
a. Trojan House
b. Online Predator
c. Theft
d. Internet Scams

30 We can check secure websites using . 1


a. http://
b. https://
c. Www
d. None of the above

DESCRIPTIVE QUESTIONS

12
1 What do you mean by Operating System? 1

Ans. Operating System: It is a software that acts as an interface between the user
and the computer.
2 Give two examples of mobile operating system. 2

Ans. Two examples of mobile operating system :


a. Apple iOS
b. Google Android
3 Name two operating systems for laptops or desktop. 2

Ans. Two operating systems for laptops or desktop are:


a. Ubuntu
b. Microsoft Windows
4 Identify me 5

a. I am a physical part of computer.


b. I am a collection of instruction doing specific task.
c. I am the software that starts working as soon as we switch on a computer.
d. I am an input device used to type text, numbers etc
e. I am a small device that you can use to move, select and open items on your
computer screen.
Ans.
a. Hardware
b. Software
c. Operating System
d. Keyboard
e. Mouse
5 Differentiate between files and folder. 2

Ans.

File Folder

A location where a group of


A place where information is stored in
files can
computer.
be stored.

It has a name and extension both It has only name.

6 Write the extension for the following. 3

a. A Notepad file

b. A Sound File

c. An image file

Ans. Extensions are


a. .txt

13
b. .mp3
c. .jpg
7 Write the steps to create folder on desktop? 1

Ans. The steps to create folder on desktop are:


1. Right-click on desktop and then choose the ‘New Folder’.
2. Type the name of the folder.
8 Write the shortcut command for the following. 3

a. Cut

b. Copy

c. Paste

Ans. Shortcut commands are:


a. Cut ———– Ctrl + X
b. Copy ———– Ctrl + C
c. Paste ———– Ctrl + V

9 What do you mean by Data Backup? 1

Ans. Backing up data means to save the information present on your computer on
another device, such as CD/DVD drives or hard disk.

10 What do you mean by Spam? 1

Ans. We get mails from companies who are advertising a product or trying to
attract you to their website. Such mails are called Spam.

11 How can you increase the performance of a computer? 2

Ans. We can increase the performance of a computer by


a. Using an updated Antivirus Software
b. Removing unnecessary files and data, such as temporary files and images.

12 What do you mean by Virus? 1

Ans. Viruses are computer programs that can damage the data and software
programs or steal the information stored on a computer.
13 Name two types of Virus. 2

Ans. Worms and Trojan Horse


14 Write few tips to protect your data from online theft and viruses. 2

Ans. Few tips to protect our data from online theft and viruses are:
a. Use passwords to login to your computer:
b. Install Anti-virus and Firewall:
c. Use Data Encryption
14
d. Give details of your credit card or bank account only on secure sites
15 What do you mean by threats to Computer? 1

Ans. Threats are the ways in which personal information can be leaked from a
computer without our knowing.
16 List the various threats to a computer and its data. 2

Ans. The various threats to a computer and its data are:

1 Virus
2. Phishing
3. Online theft
4. Cyber crime
17 What is ‘s’ in “https”? 1

Ans. ‘s’ stands for secure.

Answers(Objective questions – 1 mark)


1 c) iii) -> iv) -> v) -> ii) -> i)
2 b) Microsoft Windows
3 (c) (iv) -> (iii) -> (ii) -> (i)
4 (iii) Disk Cleanup
5 (ii) (b) -> (d) -> (c) -> (a)
6 (iii) Computer can’t open a permanently deleted file
7 c) Cleaning CPU cabinet
8 (d) any of the above
9 Security break
10 wall paper
11 b. Information and Communication technology
12 a. Communicate
13 a. Operating System
14 c. Both a) and b)
15 b. Shut down
16 c. Ctrl + v
17 d. All of the above

18 a. Antivirus

15
19 a. Delete

20 c. Spam

21 b. It can overheat.

22 c. It can prevent data from getting corrupt.

23 b. Keep the device unplugged when in use.

24 d. All of the above.

25 c. Both a) and b)

26 a. Physical

27 b. Identity

28 b. Online Predator

29 d. Internet Scams

30 b. https://

16

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy