0% found this document useful (0 votes)
30 views4 pages

ICT Skills 10

The document provides an overview of basic computer operations, including hardware and software components, starting and shutting down a computer, and using input devices like keyboards and mice. It also covers file management, maintenance tips, data backup, and protecting against computer threats such as viruses and identity theft. Additionally, it emphasizes the importance of regular maintenance and security measures to enhance computer performance and safeguard personal information.

Uploaded by

Tessiana
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
30 views4 pages

ICT Skills 10

The document provides an overview of basic computer operations, including hardware and software components, starting and shutting down a computer, and using input devices like keyboards and mice. It also covers file management, maintenance tips, data backup, and protecting against computer threats such as viruses and identity theft. Additionally, it emphasizes the importance of regular maintenance and security measures to enhance computer performance and safeguard personal information.

Uploaded by

Tessiana
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Subject: Class 10, Information Technology

Prepared by: Ms. Anjali Nair


Basic Computer Operations
Computer Hardware and Software
A computer system consists of two main parts—
Hardware- The physical parts that we can see and touch are called hardware. It is
the machinery of a computer. These are the keyboard, monitor, CPU, etc.

Software: The part which cannot be seen but it makes hardware to work. Example:
Windows, MS office etc.
Operating System (OS): This is the software that starts working as soon as we
switch on a computer. It displays the desktop on the monitor. Some of the most
commonly used operating systems for laptops and desktop are Ubuntu, Microsoft
Windows and Mac OS.

Starting a Computer
To start a computer, press the Power button on the CPU. Basic Functions
performed when a computer starts a computer automatically runs a basic program
called BIOS (Basic Input/output System) as soon as it is switched on or the power
button is pushed on.
The BIOS first does a self-test. If the self-test shows that the system is fine, the
BIOS will load the Operating System.
Login and Logout
When you login to the computer with your login-ID and password the
computer knows that you are an authorized person and allows you to work on the
applications in the computer.
Shutting Down a Computer
You can shut down the windows computer clicking Start button at the bottom left
corner and then click Shut Down.
Using the Keyboard
A keyboard is an input device used to type text, numbers and commands into the
computer.
Function Keys
Keys labeled from F1 to F12 are function keys. You use them to perform specific
functions.
(a) Control keys: Keys, such as Control (CTRL), SHIFT, SPACEBAR, ALT, CAPS
LOCK and TAB, are special control keys

All Rights Reserved @ Bharatiya Vidya Bhavan, Middle East


(b) Enter key: The label on this key can be either ENTER or RETURN, depending on
the brand of computer that you are using. You use the ENTER or the RETURN key
to move the cursor to the beginning of a new line.
(c) Punctuation keys: Punctuation keys include keys for punctuation marks, such
as colon (:), semicolon (;), question mark (?), single quotation marks (‘ ’), and double
quotation marks (“ ”). (d)
(d) Navigation keys: Keys, such as the arrow keys, HOME, END, PAGE UP, and
PAGE DOWN are navigation keys.
(e) Command keys: Keys, such as INSERT (INS), DELETE (DEL), and BACKSPACE
are command Keys. When the INSERT key is turned ON, it helps you overwrite
characters to the right of the cursor
(f) Windows key: Pressing this key opens the Start menu

Using a Mouse
A small device that you can use to move, select and open items on your computer
screen.
Roll Over or Hover
Some actions can be done by simply rolling over or hovering over an item. When
you bring the mouse over a file in File Explorer, it will show the details of that file.
Point and Click
As you move the mouse on your desk, a pointer moves correspondingly on your
screen. When you click a particular file, it gets selected
Drag and Drop
To move an item, you need to click it, and then holding the mouse button down,
move the item to a new location. After you move the item to the new location, you
release the mouse button. This is called drag and drop.
Double-click
Double-clicking means to quickly click the left mouse button twice. When we
double-click on a file, it will open the file.
Performing Basic File Operations
Files and Folders
All information stored in a computer is kept in files. Each file is given a file name
and has a file name extension that identifies the file type. Example: .txt, .jpg, .mp3.
A folder is a location where a group of files can be stored
Basic Shortcuts
CTRL+Z — undo
CTRL+Y — redo
CTRL+A — select all
CTRL+X — cut
CTRL+C — copy
CTRL+V — paste
CTRL+P — print
CTRL+S — save.
Importance of Care and Maintenance of Computers
Taking care of electronic devices, such as computer and mobiles helps them to work
properly.
All Rights Reserved @ Bharatiya Vidya Bhavan, Middle East
Basic Tips for Taking Care of Devices
(i) Keyboard: You can clean a keyboard with a soft brush
(ii) Screen: You can wipe the screen with a soft cloth to remove any finger marks.
(iii) Handle devices carefully: Handle and move your laptop carefully and avoid
dropping or banging it against a hard surface.
(v) Keep the computer cool: If a computer, laptop or mobile device gets
overheated, the internal parts can be damaged. The CPU has an internal fan to keep
it cool. We should make sure the fan is functioning.
(vi) Do not overcharge your battery: Sometimes we keep a device plugged in for
charging even after it is fully charged. This reduces the battery life. Always unplug
the device once it is charged 100%.
(vii) Always plug in devices carefully: Any device being connected to a laptop or
computer such as a USB drive or headphones, should be done gently.
(viii) Do not run too many programs at a time: When too many programs are
running at the same time, the computer can become slow and even crash.

Prepare a Maintenance Schedule


(a) Daily Maintenance
i. Clean up your e-mail inbox
ii. Download e-mail attachments and save in proper folders
(b) Weekly Maintenance
i. Clean your keyboard
ii. Clean your monitor
iii. Dust CPU and printer
iv. Backup your data to an external drive
(c) Monthly Maintenance
i. Transfer photographs to computer and delete from drive
ii. Organize photos into folders or albums
iii. Clean up ‘Download’ folder
iv. Uninstall unused programs and apps
v. Run disk-cleaner software
vi. Run full system virus scan
(d) Yearly/Annual Maintenance
(i) Clean up contacts list on social media accounts
(ii) Clean up e-mail contact list
(iii) Update your operating system
(iv) Check for expiry of anti-virus software and renew
Backup your Data
Backing up data means to save the information present on your computer on
another device, such as CD/DVD drives Data can recovered from here in case the
computer stops working completely. Computers can crash, humans can make
mistakes and natural disasters, such as floods can happen
Scanning and Cleaning Viruses
Sometimes computer viruses can enter a computer from such attacks we can install
anti-virus software. This will prevent any viruses from entering and will also clean
any viruses that may enter our system before they affect the data.
All Rights Reserved @ Bharatiya Vidya Bhavan, Middle East
Increasing Computer Performance
If we have been using a computer for a long time we have a lot of unnecessary files
and data, such as temporary files and images. When they use too much hard-disk
space, the performance of the computer goes down. It is important that we keep
cleaning by removing any extra files.
Removing SPAM from your Computer
Sometimes we get emails from companies who are advertising a product or trying to
attract you to their website. Such mails are called SPAM. We should never respond
to SPAM and delete it on a regular basis.

Threats to Computer
Threats are the ways in which personal information can be leaked from a computer
without our knowledge.
(a) Theft: Theft means stealing of information or hardware.
• Physical: Where a person may steal your desktop computer or laptop.
• Identity: Where a hacker steals your personal information and assumes your
identity. Using this false identity, the hacker can gain access to your account
information or perform illegal activity.
• Software Piracy: This is stealing of software and includes using or distributing
unlicensed and unauthorized copies of a computer program or software.
(b) Virus: Viruses are computer programs that can damage the data and software
programs or steal the information stored on a computer. Major types of viruses are
Worms and Trojan horse.
Worms: These are viruses that replicate themselves and spread to all files.
Trojan Horse: A Trojan Horse disguises itself i.e., it appears to be a useful software
program but once it reaches a computer it starts behaving like a virus and
destroying data.
• Online Predator: Online predators are people who trap you into inappropriate
relationships.
• Internet Scams: Sometimes you may receive very attractive offers saying you have
won huge money in a lottery and that you can claim the prize by depositing a
certain amount of money.
Protecting your Data
(a) Use passwords to login to your computer
(b) Install Anti-virus and Firewall: Anti-viruses and Firewall monitor the data
coming in and out of a computer and prevent and viruses from entering. Anti-
viruses can also detect and clean viruses that may have entered a computer.
(c) Encrypt Data: This is usually done by banks and companies in which important
customer information is stored. They can encrypt their entire hard disk using the
encrypting feature in Windows (Bit locker). This would force users to use a
decryption password (or key) before starting the computer thus preventing
unauthorized usage.
(d) Secure sites: Give details of your credit card or bank account only on secure
sites. See in the address bar of the browser. If the site address starts with
https://and a lock symbol, then it is safe to give your credit card and bank details.

All Rights Reserved @ Bharatiya Vidya Bhavan, Middle East

You might also like