CLASS: X – ARTIFICIAL INTELLIGENCE (417)
ICT SKILLS II
NOTES
ICT skills help us to communicate, run our business and stay connected with our family and
friends. Hence, every person needs to acquire ICT skills and build them to stay updated with
the latest software and applications (apps).
COMPUTER HARDWARE AND SOFTWARE
A computer system consists of two main parts. They are,
Hardware
The physical parts that we can see and touch are called hardware.
It is the machinery of a computer.
These are the keyboard, monitor, CPU, etc.
Software
Software is a collection of instructions, data, or computer programs that are used to
run machines and carry out particular activities.
The software is basically a set of instructions or commands that tell a computer what
to do.
The part which cannot be seen but it makes hardware to work.
Types of Software:
Prepared by: S. Ananthakumar, PGT (AI) Page [ 1 ]
OPERATING SYSTEM
An Operating System (OS) is an interface between a computer user and computer
hardware.
An operating system is a software which performs all the basic tasks like
o File Management,
o Memory Management,
o Process Management,
o Security Management
o Handling Input and Output, and
o Controlling Peripheral Devices such as Disk Drives and Printers.
Some popular operating systems are,
o DOS (Disk Operating System)
o Windows – It is an operating system developed by Microsoft.
o Linux – It is an operating system designed for personal computers. It is a free and
open- source software.
o Mobile operating Systems
Android
Symbian
Windows Phone
iOS
Some of the functions of Operating system are:
It supervises all the hardware on a computer and monitors each device’s status,
including whether it’s in use or not.
It also checks whether the device is functioning properly or not.
It also controls software resources of the computer.
It controls how much memory is used by the computer, keeping track of which memory
is free and which memory is being used by which software.
It controls how a computer system’s files and directories are organized.
It keeps track of the amount of disk space used by a specific file.
It allows you to create, copy, move and delete files.
Prepared by: S. Ananthakumar, PGT (AI) Page [ 2 ]
TYPES OF OPERATING SYSTEMS
The different types of operating systems are as follows:
Interactive (GUI-based) – A graphical user interface is a user-friendly operating system
in which commands can be entered by clicking/double-clicking/right-clicking a mouse.
Windows operating system is an example of an interactive operating system.
Single-user, Single-task Operating System – This kind of operating system only
permits one person to use the computer at a time for one job.
Single-user, Multi-task Operating System – This kind of operating system is used on
desktop and laptop computers, which allow one user to run multiple programs
simultaneously.
Examples of single-user multitask operating systems are Microsoft’s Windows and
Apple’s MacOS.
Multi-user – A multi-user operating system enables multiple users to work on the
same computer at different times or simultaneously.
Real Time – A computing environment that responds to input within a specific period of
time. It is known as a real-time operating system. It controls the computer’s resources so
that each operation is completed in exactly the same amount of time each time.
Real-time operating systems include Lynx OS and Windows CE.
Distributed – A distributed operating system runs on a set of computers that are
interconnected by a network. It combines the different computers in the network into a
single integrated computer and storage location. Windows, UNIX, and LINUX are
examples of distributed operating systems.
Prepared by: S. Ananthakumar, PGT (AI) Page [ 3 ]
WINDOWS 7 OPERATING SYSTEM
Windows 7 is an operating system developed by Microsoft and is used on personal
computers.
After loading Windows 7, the first screen that appears on the monitor is called desktop.
From the desktop, you can access different components of Windows 7.
By default, Windows 7 has a picture for the desktop background. This is called
wallpaper.
Small pictures on the desktop are called icons. These icons represent files, folders,
applications, etc.
At the bottom of the desktop is a long horizontal bar called the Taskbar.
To the left of the taskbar is the Start button, and Date/Time is located to the right of the
taskbar. On the Taskbar, you can also see icons for open programs and a few shortcuts
(icons).
Recycle Bin – The user’s deleted files and folders are kept in the Recycle Bin. You can
restore accidentally deleted files or folders from the recycle bin
Components of Windows 7 Desktop
CREATING AND MANAGING FILES AND FOLDERS
Files – Every single thing you keep on your computer is kept as a file. A file system is a method
for naming, storing, and retrieving files.
CREATING FILE
Prepared by: S. Ananthakumar, PGT (AI) Page [ 4 ]
1. Right-click anywhere in the blank area of the right-column.
2. In the Shortcut menu, click New and select the type of the file you want to create.
RENAMING FOLDERS AND FILES
1. Right-click the file or the folder.
2. From the shortcut menu, select Rename option.
3. Type the new name or edit the existing name and press the Enter key.
4. Or just select the file/folder and press Function key F2.
5. Right-click anywhere in the blank area of the right-column.
6. In the Shortcut menu, click New and select the type of the file you want to create.
FOLDER
Folders and directories are groups which contain single of multiple files.
There may be related files and/or subfolders in each directory and folder.
One or more files and other sub-folders may be located inside a sub-folder.
This makes files easily accessible.
CREATING FOLDER
1. Double-click the Computer icon.
2. Select the drive in which you want to create a new folder. Say, Local Disk D:
3. Window will open up showing files and folders in Local Disc D:
4. Click New Folder on the toolbar
5. A new folder is created with name New Folder highlighted.
6. Type a name for the folder Creating a file
RENAMING FOLDERS AND FILES
1. Right-click the file or the folder.
2. From the shortcut menu, select Rename option.
3. Type the new name or edit the existing name and press the Enter key.
4. Or Just select the file/folder and press Function key F2.
DELETING FILES OR FOLDERS
1. Click the file or the folder.
2. Press the Delete key.
3. Or Right-click and select Delete option from the Shortcut menu.
Prepared by: S. Ananthakumar, PGT (AI) Page [ 5 ]
BASIC SHORTCUTS
CTRL + z undo
CTRL + y redo
CTRL + a select all
CTRL + x cut
CTRL + c Copy
CTRL + v paste
CTRL + p print
CTRL + s save.
APPLY BASIC SKILLS FOR CARE AND MAINTENANCE OF COMPUTER
Computer systems require maintenance in order to function properly.
System failure may result from poor maintenance.
You may be able to keep it in good working order by giving it routine care and
maintenance.
Installing updates, security, creating backups, and scanning are all part of routine
system maintenance.
To keep the computer system’s maintained you should follow the following activity –
1. Keep the computer dust free.
2. Do not eat or drink while working on the computer. Food or drink may spill on the
system.
3. To keep the keyboard clean, make sure your hands are clean before using it.
4. CDs and DVDs should be handled carefully so that it does not get any scratches.
5. Keep keyboard covered when not in use.
CLEANING THE COMPUTER COMPONENTS
Computer components needs proper care to last longer. Preventive maintenance increases
the life of the components.
General precautions to be taken while cleaning the computer components are:
Always Power Off the computer system before cleaning.
Never spray cleaning fluid directly on the component of the computer. First spray
the liquid on the cloth and then wipe the component.
Prepared by: S. Ananthakumar, PGT (AI) Page [ 6 ]
Do not allow the cleaning liquid to drip near the circuit board.
Preferably use anti-static wrist band which helps to prevent building up of static
electricity near electronic device.
Computer Monitor
To clean the computer monitor, you can use a soft lint-free cloth, like cotton
and water or special cleaning liquid. You should not spray water or cleaning
liquid directly on the computer monitor as it may run through the seams.
Keyboard
The keyboard might be harmed by dirt and dust. If dirt gets inside the
keyboard’s keys, the keys could not work properly. Every now and then, move
the keyboard while holding it upside-down to clean it.
Optical Mouse
With a clean, lint-free cloth, you can clean the optical mouse’s bottom. Air or a
cotton swab can be used to clean the lens region.
Digital camera
Never touch the camera’s lens. You can use a soft lens brush or a soft, dry cloth
to remove the dust. You can use a special lens cleaning solution to remove
tenacious dust, but first you should apply it to a tissue before wiping the lens.
Never spray fluid over the lens directly.
CDs and DVDs
Keep CD/DVD in proper case to prevent damage. If there is some dirt on the
CD or DVD, it may not work at all. Finger prints and dirt can be removed by
lightly rubbing with a clean lint-free cotton cloth.
PREPARING MAINTENANCE SCHEDULE
Regular maintenance of the computer system is very important.
Some of the maintenance activities are:
1. Keep the components of the computer, like keyboard, mouse, monitor, etc. clean.
2. Replace hardware that is not functioning properly
3. Keep food items away from the computer
4. Cables and chords should not be messed up
Prepared by: S. Ananthakumar, PGT (AI) Page [ 7 ]
5. Removing unauthorized software from the computer
6. Take regular backup of the data
7. Ensure backups are working properly by periodically restoring or checking of
data. You should use external hard drive for backup of data on your
computer.
8. Run anti-virus periodically
9. Keep anti-virus software up to date
10. Do not overcharge the batteries
11. Do not block the vents
12. Always shut down the computer properly
PROTECTING COMPUTER AGAINST VIRUSES
An Illegal program known as a computer virus attaches to other programs and
modifies their behavior. A virus might or might not cause harm. Some viruses
damage computer programs or delete data.
“Vital Information Resource Under Seize” is referred to as VIRUS.
A computer can get infected with virus in any of the following ways:
Infected files
Infected pen drives
Infected CD-ROMs/DVD-ROMs
Through infected file attachment of e-mails
A computer virus cannot do the following:
It cannot infect files on CD or DVD, if they are closed for writing.
It cannot infect computer hardware like, keyboard, mouse, etc.
How do we know that our computer is infected with virus?
Computer runs very slow
There is change in the file size
Computer often stops responding
There is an increase in number of files (unusual)
Unusual error message appears on the screen
Computer restarts on its own
Prepared by: S. Ananthakumar, PGT (AI) Page [ 8 ]
Scanning and cleaning viruses and removing SPAM files, temporary files and folders
Install and use anti-virus software.
Keep anti-virus software updated.
Scan all the files that you download from the Internet
Do not open e-mails of an unknown person/sender
Don’t allow any untrustworthy person to use your system.
New use unknown pen drive/CD on your computer
Never click on the windows that pop-up when you are surfing the Internet.
Preparing computer against virus
For an anti-virus program to be work effective do the following:
It needs to run in the background at all times.
Keep the anti-virus software updated so that it can recognize new viruses.
Run full disk scans periodically.
REMOVING TEMPORARY FILES
When you use computer programs, temporary files are created automatically.
A TMP file is also known as Temporary file and it is created in the Microsoft Windows
and Windows apps.
Web browsers also create temporary files to store your browsing history.
The Steps are:
1. Double-click Computer icon on the desktop.
2. The Computer Window opens.
3. Right-click Local Disk C: and select Properties option from the Shortcut menu
4. The Properties window opens. Click Disk Cleanup.
5. The Disk Cleanup for C: window appears
6. Click the Check box next to Temporary Files, Temporary Internet files, etc. that
you want to delete.
7. Click OK.
8. A confirmation message will appear
9. Click Delete Files.
10. Windows will delete all the temporary files on the computer.
Prepared by: S. Ananthakumar, PGT (AI) Page [ 9 ]
REMOVING FILES OF TEMPORARY FOLDER
1. Press Windows button + R on the keyboard.
2. The Run dialog box appears.
3. Type %temp%
4. The Temp folder opens Click Ctrl + A to select all the files in the folder. Press
Delete key.
5. A message box appears. Click Yes to confirm.
FIREWALL
A computer firewall is a network security system, software, or programmable device that
monitors and regulates incoming and outgoing network traffic in accordance with user-
defined security rules.
Computers connected to a network, such as a LAN or the Internet, are more securely
protected by firewalls.
Typically, a firewall creates a wall between a trusted internal network and an unreliable
external network, like the Internet.
Each packet of data, whether it is coming in or going out, is examined by the firewall,
which then decides whether it should be permitted to pass or stopped.
COOKIES
When you visit an internet website, a user’s computer stores a little file known as a cookie
on it. These files are used to store information personal to a given client and website.
A cookie is sent by a website when you visit it and is saved on your computer in a file. A
cookie can only be read by the website that created it. This information cannot be
accessed by other servers.
BASIC TIPS FOR TAKING CARE OF DEVICES
(i) Keyboard: You can clean a keyboard with a soft brush
(ii) Screen: You can wipe the screen with a soft cloth to remove any finger marks.
(iii) Handle devices carefully: Handle and move your laptop carefully and avoid dropping or
banging it against a hard surface.
(iv) Keep the computer cool: If a computer, laptop or mobile device gets overheated, the internal
parts can be damaged. The CPU has an internal fan to keep it cool. We should make sure the fan
is functioning.
Prepared by: S. Ananthakumar, PGT (AI) Page [ 10 ]
(v) Do not overcharge your battery: Sometimes we keep a device plugged in for charging even
after it is fully charged. This reduces the battery life. Always unplug the device once it is charged
100%.
(vi) Always plug in devices carefully: Any device being connected to a laptop or computer
such as a USB drive or headphones, should be done gently. It should not be forced into the port.
(vii) Do not run too many programs at a time: When too many programs are running at the
same time, the computer can become slow and even crash.
PREPARE A MAINTENANCE SCHEDULE
(a) Daily Maintenance
• Clean up your e-mail inbox
• Download e-mail attachments and save in proper folders
(b) Weekly Maintenance
• Clean your keyboard
• Clean your monitor
• Dust CPU and printer
• Backup your data to an external drive
(c) Monthly Maintenance
• Transfer photographs to computer and delete from drive
• Organise photos into folders or albums
• Clean up ‘Download’ folder
• Uninstall unused programs and apps
• Run disk-cleaner software
• Run full system virus scan
(d) Yearly/Annual Maintenance
Clean up contacts list on social media accounts
Clean up e-mail contact list
Update your operating system
Check for expiry of anti-virus software and renew
BACKUP YOUR DATA
Backing up data means to save the information present on your computer on another device,
such as CD/DVD drives Data can recovered from here in case the computer stops working
completely.
Prepared by: S. Ananthakumar, PGT (AI) Page [ 11 ]
Computers can crash, humans can make mistakes and natural disasters, such as floods can
happen.
Scanning and Cleaning Viruses
Sometimes computer viruses can enter a computer from such attacks we can install
anti-virus software.
This will prevent any viruses from entering and will also clean any viruses that may
enter our system before they affect the data.
Increasing Computer Performance
If we have been using a computer for a long time we have a lot of unnecessary files
and data, such as temporary files and images.
When they use too much hard-disk space, the performance of the computer goes
down. It is important that we keep cleaning by removing any extra files.
Removing SPAM from your Computer
Sometimes we get emails from companies who are advertising a product or trying
to attract you to their website. Such mails are called SPAM. We should never respond to
SPAM and delete it on a regular basis.
THREATS TO COMPUTER
Threats are the ways in which personal information can be leaked from a computer without
our knowledge.
(a) Theft: Theft means stealing of information or hardware. These may be of three types:
• Physical: Where a person may steal your desktop computer or laptop.
• Identity: Where a hacker steals your personal information and assumes your
identity. Using this false identity, the hacker can gain access to your account
information or perform illegal activity.
• Software Piracy: This is stealing of software and includes using or distributing
unlicensed and unauthorized copies of a computer program or software.
(b) Virus: Viruses are computer programs that can damage the data and software programs
or steal the information stored on a computer. Major types of viruses are Worms and
Trojan horse.
• Worms: These are viruses that replicate themselves and spread to all files once them
Information and Communication Technology Skills attack a computer. This makes it
very difficult to remove them.
Prepared by: S. Ananthakumar, PGT (AI) Page [ 12 ]
• Trojan Horse: A Trojan Horse disguises itself i.e., it appears to be a useful software
program but once it reaches a computer it starts behaving like a virus and destroying
data.
• Online Predator: Online predators are people who trap you into inappropriate
relationships. They may be older people posing to be your age, bullying you into
doing illegal activities online and sometimes face to face.
• Internet Scams: Sometimes you may receive very attractive offers saying you have
won huge money in a lottery and that you can claim the prize by depositing a certain
amount of money. When you deposit the money using credit card or online banking,
you not only lose the deposit money but your card/account information may be
misused later.
PROTECTING YOUR DATA
(a) Use passwords to login to your computer: Use passwords that are difficult to guess.
Passwords are difficult to hack if they are a mix of small (For example ‘a b c d’) and capital
letters (For example, ‘H J E R’), numbers (For example ‘8 7 6 5’) and special characters
(For example, ’% ^ # $’). This would prevent unauthorized people from using your
computer.
(b) Install Anti-virus and Firewall: Anti-viruses and Firewall monitor the data coming in
and out of a computer and prevent and viruses from entering. Anti-viruses can also detect
and clean viruses that may have entered a computer.
(c) Encrypt Data: This is usually done by banks and companies in which important
customer information is stored. They can encrypt their entire hard disk using the encrypting
feature in Windows (Bitlocker). This would force users to use a decryption password (or
key) before starting the computer thus preventing unauthorized usage.
(d) Secure sites: Give details of your credit card or bank account only on secure sites. See
in the address bar of the browser. If the site address starts with https://and a lock symbol,
then it is safe to give your credit card and bank details.
Prepared by: S. Ananthakumar, PGT (AI) Page [ 13 ]