CHAPTER-3
Information and Communication
Technology Skills
Session 1: Basic Computer Operations
ICT refers to all the methods, tools, concepts related
to storing, recording and sending digital
information.
Computer Hardware and Software
Operating system and its types
Single user, GUI, Multi user, Multi tasking, Real time,
Multi threading, Distributed
Basic Functions performed when a computer starts
FUNCTIONS OF OS
Processor Management
Memory
Device
File
Security
Error Detection
Job Scheduling
Login and Logout
Shutting Down a Computer
Using the Keyboard
Function Keys
(a)Control keys:
(b)Enter key:
(c)Punctuation keys:
(d)Navigation keys:
(e)Command keys:
(f) Windows key:
(a)Control keys:Keys, such as Control (CTRL), SHIFT,
SPACEBAR, ALT, CAPS LOCK and TAB, are special control
keys that perform special functions depending on when
and where they are used.
(b)Enter key: You use the ENTER or the RETURN key to
move the cursor to the beginning of a new line. In some
programs, it is used to send commands and to confirm a
task on a computer.
(c)Punctuation keys:Punctuation keys include keys for
punctuation marks, such as colon (:), semicolon (;),
question mark (?), single quotation marks (‘ ’), and double
quotation marks (“ ”).
(a)Navigation keys: Keys, such as the arrow keys,
HOME, END, PAGE UP, and PAGE DOWN are
navigation keys.
(b)Command keys:Keys, such as INSERT (INS),
DELETE (DEL), and BACKSPACE are command keys.
(c) Windows key:Pressing this key opens the
Start menu
Using a Mouse
Roll Over or Hover
Point and Click
Drag and Drop
Double-click
Session 2: Performing Basic File Operations
Basic File Operations
Information on a computer is stored in electronic
files, which can be put into separate folders. It is
easier to manage the electronic files as they can
be simply copied, moved, renamed or even
deleted.
Files and Folders
All information stored in a computer is kept in
files. Each file is given a file name and has a file
name extension that identifies the file type.
A folder is a location where a group of files can be
stored.
Creating a File (Using a Text Editor in Ubuntu)
Creating a Folder (in Ubuntu)
To create a folder: (a) Choose a location where the
folder has to be created for example ‘Desktop’. (b)
Right-click and then choose the ‘New Folder’. (c)
Type the name of the folder as ‘Demo’.
Session 3: Computer Care and Maintenance
Importance of Care and Maintenance of Computers
A computer is a delicate machine with a
lot of moving electronic parts. We need
to protect it from dust and damage. If we
are careless, it will not work efficiently.
Basic Tips for Taking Care of Devices
Keeping a Device Clean
Keyboard:
Screen
Be careful with food and drinks:
Handle devices carefully
Keep the computer cool: Avoid leaving a
device in the sun or in a closed car.
Do not overcharge your battery
Always plug in devices carefully
Do not run too many programs at a time
Prepare a Maintenance Schedule
Daily Maintenance
i. Clean up your e-mail inbox
ii. Download e-mail attachments and save in
proper folders
Weekly Maintenance
i. Clean your keyboard
ii. Clean your monitor
iii. Dust CPU and printer
iv. Backup your data to an external drive
Monthly Maintenance
i. Transfer photographs to computer and delete from drive
ii. Organise photos into folders or albums
iii. Clean up ‘Download’ folder
iv. Uninstall unused programs and apps
v. Run disk-cleaner software
vi. Run full system virus scan
Yearly/Annual Maintenance
i. Clean up contacts list on social media accounts
ii. Clean up e-mail contact list
iii. Update your operating system
iv. Check for expiry of anti-virus software and renew
Backup Your Data
Scanning and Cleaning Viruses
Increasing Computer Performance :We can use
some disk cleaner software, which help us clean up
the unnecessary files
Removing SPAM from your Computer
Session 4: Computer Security and Privacy
Computer Security Deals with Protecting Computers
Computer security and privacy deals with the measures used
to prevent loss of data.
Reasons for Security Break
Security break is leakage of information stored in a computer.
Personal information can be lost or leaked in two ways:
1.We are not careful in giving out personal information over
the Internet. For example, we share our account details
and password on unsecure sites.
2.A person gets unauthorised access to our computer. This
can happen in the office if we leave our computer without
logging out.
Threats to Computer
(a) Theft: Theft means stealing of information or hardware.
These maybe of three types:
• Physical: Where a person may steal your desktop
computer or laptop.
• Identity: Where a hacker steals your personal information
and assumes your identity. Using this false identity, the
hacker can gain access to your account information or
perform illegal activity.
• Software Piracy: This is stealing of software and includes
using or distributing unlicensed and unauthorised copies
of a computer program or software.
b) Virus: Viruses are computer programs that can damage
the data and software programs or steal the information
stored on a computer. Major types of viruses are Worms and
Trojan Horse.
• Worms: These are viruses that themselves and spread to
all files once theyattack a computer. This makes it very
difficult to remove them.
• Trojan Horse: A Trojan Horse disguises itself i.e., it appears
to be a useful software program but once it reaches a
computer it starts behaving like a virus and destroying data.
• Online Predator: Online predators are people who trap
you into inappropriate relationships. They may be older
people posing to be your age, bullying you into doing
illegal activities online and sometimes face to face.
• Internet Scams: Sometimes you may receive very
attractive offers saying you have won a huge money in a
lottery and that you can claim the prize by depositing a
certain amount of money. When you deposit the money
using credit card or online banking, you not only lose the
deposit money but your card / account information may
be misused later
Protecting your Data
Use passwords to login to your computer: Use passwords
that are difficult to guess. Passwords are difficult to hack if
they are a mix of small (For example ‘a b c d’) and capital
letters (For example, ‘H J E R’), numbers (For example ‘8 7 6
5’) and special characters (For example, ’% ^ # $’). This
would prevent unauthorised people from using your
computer.
Install Anti-virus and Firewall: Anti-viruses and Firewall
monitor the data coming in and out of a computer and
prevent and viruses from entering. Anti-viruses can also
detect and clean viruses that may have entered a computer.
Encrypt Data: This is usually done by banks and companies
in which important customer information is stored. They
can encrypt their entire hard disk using encrypting feature
in Windows (Bitlocker). This would force users to use a
decryption password (or key) before starting the computer
thus preventing unauthorised usage.
Secure sites: Give details of your credit card or bank
account only on secure sites. See in the address bar of the
browser. If the site address starts with https://and a lock
symbol, then it is safe to give your credit card and bank
details.
TERMS TO UNDERSTAND
(a) Firewall A computer firewall could be a programmable
device or a software or a network security system that
monitors and controls incoming and outgoing network
traffic based on user-defined security rules.
(b) Cookies In computing, cookies are small files which are
stored on a user’s computer when you visit a website on
the internet. These files are designed to hold data
specific to a particular client and website.