ICT SKILLS
Basic Computer Operations ICT stands for Information and Communication Technology. ICT
refers to all the methods, tools, concepts related to storing, recording and sending digital
information
Commonly used peripheral Devices
Difference between Files and Folders
All information stored in a computer is kept in files. Different types of files store
different types of information. Each file is given a file name and has a file name
extension that identifies the file type. The file name and file name extension are
separated by a period or a ‘dot’. For example, a document (e.g., Neha) created
using Notepad (a type of computer application to create simple text files) will have
the extension .txt. There are other types like .doc, .xls, etc. An image file usually
has an extension .jpg while a sound file usually has .mp3. A folder is a location
where a group of files can be stored.
Shortcut Commands
Importance of Care and Maintenance of Computers
Basic Tips for Taking Care of Devices Here are some simple ways that you can
follow to take care of your computer.
Be careful with food and drinks
Handle devices carefully:
Keep the computer cool:
Do not overcharge your battery:
Do not run too many programs at a time:
Operating System
It is a system software that acts as an interface between the user and the
hardware: Some commonly used OS are Windows , DOS, Unix etc
Types of Operating System
Single-User/Single-Tasking OS
An operating system that allows a single user to perform only one task at a time is called a Single-User Single-Tasking Operating
System. Functions like printing a document, downloading images, etc., can be performed only one at a time. Examples include
MS-DOS, Palm OS, etc.
Multi-user operating system is a computer operating system(OS) that allows multiple users on different computers or terminals to
access a single system with one OS on it. Examples of multi-user operating system are : Linux, Ubuntu, Unix, Mac OS X, Windows
10
A distributed operating system is system software over a collection of independent software, networked, communicating, and
physically separate computational nodes. They handle jobs which are serviced by multiple CPUs. Each individual node holds a
specific software subset of the global aggregate operating system.eg High traffic web and mobile applications
Real Time Operating System re designed to handle multiple processes at one time, ensuring that these processes respond to
events within a predictable time limit. Common examples of real-time systems include air traffic control systems, process control
systems, and autonomous driving systems.
Different ways to increase the performance of a computer system
install anti-virus software.
use some disk cleaner software, which help us clean up the unnecessary files or
to remove the files of temporary folder, we type %temp% in Run dialog box after
pressing “Windows button + R” on the keyboard.
We should never respond to SPAM and delete it on a regular basis.
Backing up data means to save the information present on your computer on
another device, such as CD/DVD drives or hard disk
Threats to Computer
Threats are the ways in which personal information can be leaked from a computer
without our knowing.
(a) Theft: Theft means stealing of information or hardware. These maybe of three types:
• Physical: Where a person may steal your desktop computer or laptop. • Identity: Where
a hacker steals your personal information and assumes your identity. Using this false
identity, the hacker can gain access to your account information or perform illegal activity.
• Software Piracy: This is stealing of software and includes using or distributing
unlicensed and unauthorised copies of a computer program or software.
(b) Virus: Viruses are computer programs that can damage the data and software programs or steal the information
stored on a computer. Major types of viruses are Worms and Trojan Horse.
Worms: These are viruses that replicate worm virus themselves and spread to all files once they attack a computer.
This makes it very difficult to remove them.
Trojan Horse: A Trojan Horse disguises itself i.e., it appears to be a useful software program but once it reaches a
computer it starts behaving like a virus and destroying data.
Online Predator: Online predators are people who trap you into inappropriate relationships. They may be older people
posing to be your age, bullying you into doing illegal activities online and sometimes face to face.
• Internet Scams: Sometimes you may receive very attractive offers saying you have won a huge money in a lottery
and that you can claim the prize by depositing a certain amount of money. When you deposit the money using credit
card or online banking, you not only lose the deposit money but your card / account information may be misused later
Protecting your Data
To protect our data from theft and viruses we can take the following measures:
(a) Use passwords to login to your computer: Use passwords that are difficult to guess. Passwords are difficult to hack
if they are a mix of small (For example ‘a b c d’) and capital letters (For example, ‘H J E R’), numbers (For example ‘8
7 6 5’) and special characters (For example, ’% ^ # $’). This would prevent unauthorised people from using your
computer.
(b) Install Anti-virus and Firewall: Anti-viruses and Firewall monitor the data coming in and out of a computer and
prevent and viruses from entering. Anti-viruses can also detect and clean viruses that may have entered a computer.
(c) Encrypt Data: This is usually done by banks and companies in which important customer information is stored.
They can encrypt their entire hard disk using encrypting feature in Windows (Bitlocker)
(d) Secure sites: Give details of your credit card or bank account only on secure sites. See in the address bar of the
browser. If the site address starts with https://and a lock symbol, then it is safe to give your credit card and bank
details.