0% found this document useful (0 votes)
54 views25 pages

Essential ICT Skills for Beginners

The document covers essential Information and Communication Technology (ICT) skills, including basic computer operations, file management, maintenance, and security. It explains the functions of operating systems, keyboard and mouse usage, and the importance of computer care. Additionally, it discusses threats to computer security and methods to protect personal data, such as using strong passwords and installing antivirus software.

Uploaded by

aafiaazad
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
54 views25 pages

Essential ICT Skills for Beginners

The document covers essential Information and Communication Technology (ICT) skills, including basic computer operations, file management, maintenance, and security. It explains the functions of operating systems, keyboard and mouse usage, and the importance of computer care. Additionally, it discusses threats to computer security and methods to protect personal data, such as using strong passwords and installing antivirus software.

Uploaded by

aafiaazad
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd

CHAPTER-3

Information and Communication


Technology Skills
Session 1: Basic Computer Operations
ICT refers to all the methods, tools, concepts related
to storing, recording and sending digital
information.
 Computer Hardware and Software
 Operating system and its types
Single user, GUI, Multi user, Multi tasking, Real time,
Multi threading, Distributed
 Basic Functions performed when a computer starts
FUNCTIONS OF OS
Processor Management
Memory
Device
File
Security
 Error Detection
 Job Scheduling
 Login and Logout
 Shutting Down a Computer
 Using the Keyboard
 Function Keys
(a)Control keys:
(b)Enter key:
(c)Punctuation keys:
(d)Navigation keys:
(e)Command keys:
(f) Windows key:
(a)Control keys:Keys, such as Control (CTRL), SHIFT,
SPACEBAR, ALT, CAPS LOCK and TAB, are special control
keys that perform special functions depending on when
and where they are used.
(b)Enter key: You use the ENTER or the RETURN key to
move the cursor to the beginning of a new line. In some
programs, it is used to send commands and to confirm a
task on a computer.
(c)Punctuation keys:Punctuation keys include keys for
punctuation marks, such as colon (:), semicolon (;),
question mark (?), single quotation marks (‘ ’), and double
quotation marks (“ ”).
(a)Navigation keys: Keys, such as the arrow keys,
HOME, END, PAGE UP, and PAGE DOWN are
navigation keys.
(b)Command keys:Keys, such as INSERT (INS),
DELETE (DEL), and BACKSPACE are command keys.
(c) Windows key:Pressing this key opens the
Start menu
Using a Mouse
Roll Over or Hover
Point and Click
Drag and Drop
Double-click
Session 2: Performing Basic File Operations
Basic File Operations
Information on a computer is stored in electronic
files, which can be put into separate folders. It is
easier to manage the electronic files as they can
be simply copied, moved, renamed or even
deleted.
Files and Folders
All information stored in a computer is kept in
files. Each file is given a file name and has a file
name extension that identifies the file type.
A folder is a location where a group of files can be
stored.
Creating a File (Using a Text Editor in Ubuntu)
Creating a Folder (in Ubuntu)
To create a folder: (a) Choose a location where the
folder has to be created for example ‘Desktop’. (b)
Right-click and then choose the ‘New Folder’. (c)
Type the name of the folder as ‘Demo’.
Session 3: Computer Care and Maintenance
Importance of Care and Maintenance of Computers

A computer is a delicate machine with a


lot of moving electronic parts. We need
to protect it from dust and damage. If we
are careless, it will not work efficiently.
Basic Tips for Taking Care of Devices

Keeping a Device Clean

 Keyboard:
 Screen
 Be careful with food and drinks:
 Handle devices carefully
 Keep the computer cool: Avoid leaving a
device in the sun or in a closed car.
 Do not overcharge your battery
 Always plug in devices carefully
 Do not run too many programs at a time
Prepare a Maintenance Schedule
 Daily Maintenance
i. Clean up your e-mail inbox
ii. Download e-mail attachments and save in
proper folders
 Weekly Maintenance
i. Clean your keyboard
ii. Clean your monitor
iii. Dust CPU and printer
iv. Backup your data to an external drive
 Monthly Maintenance
i. Transfer photographs to computer and delete from drive
ii. Organise photos into folders or albums
iii. Clean up ‘Download’ folder
iv. Uninstall unused programs and apps
v. Run disk-cleaner software
vi. Run full system virus scan
 Yearly/Annual Maintenance
i. Clean up contacts list on social media accounts
ii. Clean up e-mail contact list
iii. Update your operating system
iv. Check for expiry of anti-virus software and renew
 Backup Your Data
 Scanning and Cleaning Viruses
 Increasing Computer Performance :We can use
some disk cleaner software, which help us clean up
the unnecessary files
 Removing SPAM from your Computer
Session 4: Computer Security and Privacy

Computer Security Deals with Protecting Computers


Computer security and privacy deals with the measures used
to prevent loss of data.
Reasons for Security Break
Security break is leakage of information stored in a computer.
Personal information can be lost or leaked in two ways:
1.We are not careful in giving out personal information over
the Internet. For example, we share our account details
and password on unsecure sites.
2.A person gets unauthorised access to our computer. This
can happen in the office if we leave our computer without
logging out.
Threats to Computer
(a) Theft: Theft means stealing of information or hardware.
These maybe of three types:
• Physical: Where a person may steal your desktop
computer or laptop.
• Identity: Where a hacker steals your personal information
and assumes your identity. Using this false identity, the
hacker can gain access to your account information or
perform illegal activity.
• Software Piracy: This is stealing of software and includes
using or distributing unlicensed and unauthorised copies
of a computer program or software.
b) Virus: Viruses are computer programs that can damage
the data and software programs or steal the information
stored on a computer. Major types of viruses are Worms and
Trojan Horse.
• Worms: These are viruses that themselves and spread to
all files once theyattack a computer. This makes it very
difficult to remove them.
• Trojan Horse: A Trojan Horse disguises itself i.e., it appears
to be a useful software program but once it reaches a
computer it starts behaving like a virus and destroying data.
• Online Predator: Online predators are people who trap
you into inappropriate relationships. They may be older
people posing to be your age, bullying you into doing
illegal activities online and sometimes face to face.
• Internet Scams: Sometimes you may receive very
attractive offers saying you have won a huge money in a
lottery and that you can claim the prize by depositing a
certain amount of money. When you deposit the money
using credit card or online banking, you not only lose the
deposit money but your card / account information may
be misused later
Protecting your Data
Use passwords to login to your computer: Use passwords
that are difficult to guess. Passwords are difficult to hack if
they are a mix of small (For example ‘a b c d’) and capital
letters (For example, ‘H J E R’), numbers (For example ‘8 7 6
5’) and special characters (For example, ’% ^ # $’). This
would prevent unauthorised people from using your
computer.
Install Anti-virus and Firewall: Anti-viruses and Firewall
monitor the data coming in and out of a computer and
prevent and viruses from entering. Anti-viruses can also
detect and clean viruses that may have entered a computer.
 Encrypt Data: This is usually done by banks and companies
in which important customer information is stored. They
can encrypt their entire hard disk using encrypting feature
in Windows (Bitlocker). This would force users to use a
decryption password (or key) before starting the computer
thus preventing unauthorised usage.
 Secure sites: Give details of your credit card or bank
account only on secure sites. See in the address bar of the
browser. If the site address starts with https://and a lock
symbol, then it is safe to give your credit card and bank
details.
TERMS TO UNDERSTAND
(a) Firewall A computer firewall could be a programmable
device or a software or a network security system that
monitors and controls incoming and outgoing network
traffic based on user-defined security rules.
(b) Cookies In computing, cookies are small files which are
stored on a user’s computer when you visit a website on
the internet. These files are designed to hold data
specific to a particular client and website.

You might also like