Subject : INFORMATION TECHNOLOGY Assignment No : 1
Topic : ICT SKILLS Class : X
Session 1: Basic Computer Operations
1. What is ICT?
Answer – Information and Communication Technology (ICT) is an acronym for information and
communication technology.ICT helps in the proper sharing, receiving, and processing of information,
and an ICT device is a device that is used for processing, storing, and delivering information to others.
Examples of ICT devices are – Laptop, Desktop, Tablets and Smartphones.
2. Objectives of Information and communication technology? Advantages and disadvantages of ICT.
Answer – Full form of ICT is Information and communication technology. The goal of ICT is to bridge
the gap between parents, educators, and students by encouraging sustainable, cooperative, and
transparent communication methods.
Advantages of ICT
a. Enhanced the modes of communication
b. Independent learning platforms Cost – efficient
c. Enhanced data and information security
d. Paperless – Eliminate the usage of paper
e. Better teaching and learning methods
f. Web – based LMS tools
Disadvantages of ICT
a. Traditional books and handwritten methods are at risk.
b. Managing courses online is difficult
c. Teachers require experience to handle ICT
d. Risk of cyber attacks and hacks
e. Misuse of technology
3. Difference between Hardware and Software?
Answer – A computer system consists of two main parts – Hardware and Software
a. Hardware – Hardware is a physical part of a computer system. We can feel and touch the hardware
devices. example – CPU, Mother Board, Hard Disk, Keyboard, Mouse, Printer etc.
b. Software – Software related to the programs which perform different types of tasks on the computer
system. Program is a collection of Instructions. It also helps the computer to perform the specific task.
Example – Open Office Base, Spreadsheet, Presentation etc.
4. What is BIOS?
Answer – BIOS stands for Basic Input/ Output System, It helps the computer system to identify (Self-
test) the paraperaphal devices which are connected to the computer system and helps computers to
load Operating System properly.
5. What are the different types of keys in Keyboard?
Answer –
a. Function keys – F1 to F12 are function keys in the keyboard, function keys are used for specific
purposes.
b. Control keys – SHIFT, CONTROL (CTRL),ALT, SPACEBAR, TAB AND CAPS LOCK are known as
a control key, these keys are used as per the demand.
c. Enter key – ENTER or RETURN keys are known as Enter key, depending on the brand of computer
that you are using.
d. Punctuation keys – It includes keys for punctuation marks, such as colon (:), semicolon (;),
question mark (?), single quotation marks („ ‟), and double quotation marks (“ ”).
e. Navigation keys – END, HOME, PAGE DOWN, PAGE UP and Arrow keys are known as navigation
keys, these keys are used to move up, down, left or right in the document.
f. Command keys – BACKSPACE, INSERT (INS) and DELETE(DEL) are known as command keys.
INSERT key allows you to overwrite characters to the right side.
The DELETE command key and BACKSPACE key are used to remove typed text, character, or any
other objects from the right and left side of the cursor.
g. Windows key – Windows key is used to open the Start menu.
6. What is the purpose of Mouse?
Answer – The purpose of the mouse is –
a. Roll Over or Hover – Whenever we bring the mouse over the files, it shows the details of the file.
b. Click or Double Click – Mouse allows you to select, open or delete files and folders from the
computer system.
c. Drag and Drop – Click on the file and drag and drop your file where you want.
Session 2: Performing Basic File Operations
7. What are files and folders in a computer system?
Answer –
a. File – File is a collection of information different types of files store different types of information.
Every file has a file name and extension that identifies the type of file.
b. Folder – Folder is a collection of files or a group of files.
Session 3: Computer Care and Maintenance
8. How to maintain a computer system?
Answer – Some simple ways to take care of computer system are –
a. Keeping a Device Clean – Always keep a device clean, such as the keyboard, the screen, and the
mouse. Handle your gadget with care, keep it cool, and don‟t overload your battery.
b. Prepare a Maintenance Schedule – Make a schedule for computer maintenance.
Daily Maintenance
a. Clean up your email inbox
b. Save Important attachments and save in folder
Weekly Maintenance
a. Clean your Keyboard, monitor, CPU and printer
b. Backup your data
Monthly Maintenance
a. Clean unused photographs
b. Clean up Download folder
c. Uninstall unused programs
d. Run full system virus scan
e. Run disk – cleaner software
Yearly / Annual Maintenance
a. Clean up social media accounts
b. Clean up e-mail contact list
c. Update your operating System
9. How to increase Computer performance?
Answer – We frequently install a large number of applications, which slows down the computer. Always
attempt to uninstall unnecessary applications, temporary files, and antivirus software updates.
Session 4: Computer Security and Privacy
10. What is a Security Break?
Answer – Security break is leakage of information stored in a computer.
Your personal information can be lost or leaked in two ways –
We are not cautious when it comes to disclosing personal information via the internet. We share our
account information and passwords on unsafe websites.
A person gets unauthorized access to our computer. This can happen at work if we don‟t log out before
leaving the computer.
11. What are the threats?
Answer – Threats are ways in which personal information from a computer can be released without our
knowledge.
a. Theft – Theft means stealing of information or hardware. These maybe of three types:
i. Physical – Where a person may steal your desktop computer or laptop.
ii. Identity – A hacker gets your personal information and uses it to impersonate you. The hacker
can use this fake identity to get access to your account information or engage in illegal activity.
b. Software Piracy – This is stealing of software and includes using or distributing unlicensed and
unauthorized copies of a computer program or software.
i. Virus – Viruses are computer programmes that can corrupt data and software applications, as
well as steal data from computers. Worms and Trojan Horses are two major forms of viruses.
ii. Worms – Worms are viruses that replicate and spread to all files on a computer once they attack
a computer. This makes it very difficult to remove them.A Trojan Horse appears to be a useful software
programme, but once it reaches a computer, it begins to behave like a virus and destroys the data.
iii. Online Predator – Online predators are persons who use the internet to trap you into unhealthy
relationships. They could be older people appearing as your age who harass you into doing unlawful
things online.
iv. Internet Scams – You may occasionally receive highly appealing offers claiming that you have
won a large sum of money in a lottery and that you can claim your win by depositing a specific amount
of money. When you deposit money with a credit card or through online banking, you not only lose the
deposit money but your card / account information may be misused later.
12. How can we protect our data?
Answer – To protect our data from theft and viruses we can take the following measures –
a. Use Strong password in your account – Make your passwords difficult to guess. When creating a
new password, attempt to use a combination of
Small Character
Capital Character
Special Character
Numbers
b. Install Antivirus and Firewall –Anti-virus software and a firewall protect your data from virus and from
hackers.
c. Encrypt your data – Keep your information in an encrypted format to keep it safe from unauthorized
sers.
d. Open only secure site – Before visiting a website, make sure the address begins with https://. A
website that begins with https:// is a secure website.