What is ICT?
ICT stands for Information and Communication Technology.
ICT is a diverse set of technological tools and resources used to communicate,
create, disseminate, store, and manage information.
Name some ICT tools that you use in Home and in office.
What is Software & Hardware?
Hardware: Physical part of Computer System that we can touch and see by
naked eyes, are Hardware.
Software: Set of programs written to perform a particular task is called
Software.
Software
Application
System Software Software (Made for
(Made for Users)
System/computers)
Name some commonly used OS for Computers and for Mobile.
Explain the process of starting a computer.
After we push on Power Button, computer automatically runs a basic program
called BIOS (Basic Input/Output System)
The BIOS first does a self-test. (POST Power On Self-Test)
If the self-test shows that the system is fine, the BIOS will load the Operating
System.
This is how machine starts.
Explain the various types of keyboard keys.
Control keys: Control (CTRL), SHIFT, SPACEBAR, ALT, CAPS LOCK and
TAB
Enter Keys:
Punctuation Keys: colon (:), semicolon (;), question mark (?), single quotation
marks (‘ ’), and double quotation marks (“ ”) etc.
Navigation Keys: such as the arrow keys, HOME, END, PAGE UP, and PAGE
DOWN
Command Keys: Keys such as INSERT (INS), DELETE (DEL), and
BACKSPACE , INSERT, DELETE
Windows Key:
What are different types of mouse actions.
Roll Over or Hover
Point and Click
Drag & Drop
Double Click
What is the function of the ENTER key?
We use the ENTER or the RETURN key to move the cursor to the beginning of
a new line.
In some programs, it is used to send commands and to confirm a task on a
computer.
How will you prevent others from using your computer?
Describe what computer files and folders are?
Files
Collection of information stored digitally is called as file.
File is made in some or other application.
Each application attaches its stamp to the name of a file in to form of extension.
File name is composed of name of the file followed by dot followed by
extension name.
Folders
Folders are the location where file is stored.
Find out these extension name belongs to which application.
.txt, .jpg, .gif, .mp3, .mp4, .pptx, .py, .java, .html, .bmp, .docx,
.xlsx
What is the importance of taking care of computers.
Computers and mobiles are very expensive. When we take good care of them on
a regular basis, we can use them for a longer time. This will help us save money
as we do not need to buy new devices too often.
What are the basic tips for taking care of devices?
Keeping a Device Clean
Cleaning a device
Keep the screen, keyboard and mouse clean
Be careful with food and drinks
Handle devices carefully
Keep the computer cool
Do not overcharge your battery
Always plug in devices carefully
Do not run too many programs at a time
Prepare a Maintenance Schedule
Prepare Daily Maintenance, Weekly Maintenance, Monthly Maintenance,
Yearly/Annual Maintenance
Backup-up your data
Scan and clean Virus
Increase Computer performance by deleting unnecessary files, temporary files.
Remove SPAM from your computer
Explain how to clean a computer on a daily basis.
How can you increase the performance of a computer?
What do you mean by Computer security and privacy?
Personal information can be lost or leaked in two ways:
1. We are not careful in giving out personal information over the Internet. For
example, we share our account details and password on unsecure sites.
2. A person gets unauthorised access to our computer. This can happen in the
office if we leave are computer without logging out.
Computer security and privacy is about measures we can take to restrict access
to personal data stored in a computer.
Identify the threats to computers.
Threats to Computer Threats are the ways in which personal information can be
leaked from a computer without our knowing.
(a) Theft: Theft means stealing of information or hardware.
Physical: Where a person may steal your desktop computer or
laptop.
Identity: Where a hacker steals your personal information and
assumes your identity. Using this false identity, the hacker can gain
access to your account information or perform illegal activity.
Software Piracy: This is stealing of software and includes using or
distributing unlicensed and unauthorised copies of a computer
program or software
(b) Virus: Viruses are computer programs that can damage the data and
software programs or steal the information stored on a computer. Major
types of viruses are Worms and Trojan Horse.
Worms: These are viruses that replicate
Worm virus themselves and spread to all files once they attack a
computer. This makes it very difficult to remove them.
Trojan Horse: A Trojan Horse disguises itself i.e., it appears to be a
useful software program but once it reaches a computer it starts
behaving like a virus and destroying data.
Online Predator: Online predators are people who trap you into
inappropriate relationships. They may be older people posing to be
your age, bullying you into doing illegal activities online and
sometimes face to face.
Internet Scams: Sometimes you may receive very attractive offers
saying you have won a huge money in a lottery and that you can claim
the prize by depositing a certain amount of money. When you deposit
the money using credit card or online banking, you not only lose the
deposit money but your card / account information may be misused
later.
List the various ways to protect data.
To protect our data from theft and viruses we can take the following measures:
Use passwords to login to your computer: Use passwords that are
difficult to guess.
Install Anti-virus and Firewall
Encrypt Data: This is usually done by banks and companies in which
important customer information is stored.
Secure sites:
Name 3 browsers.
Name 3 Search Engines.