0% found this document useful (0 votes)
14 views26 pages

Ict Skills

Good prestation

Uploaded by

MUHAMMED FUAD
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views26 pages

Ict Skills

Good prestation

Uploaded by

MUHAMMED FUAD
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 26

IC󰈜 󰈟K󰈾󰈴󰈳S

LE󰉝󰈤󰈯󰈽N󰉂 O󰉔J󰉋󰉑󰈙󰈽VE󰈠
✔ Learns about basic knowledge of computer and its maintenance
✔ Perform daily activities of computer easily
✔ Learns the importance of computer security
✔ Study how to keep your computer safe from threats
✔ Gives complete understanding of computer operations and its
maintenance
Session 1: Basic Computer Operations

Session 2: Performing Basic File Operations

Session 3: Computer Care and Maintenance

Session 4: Computer Security and Privacy


Ses󰈻󰈎󰈢󰈞 1: Bas󰈎󰇹 󰉑󰈢󰈛pu󰉃󰈩󰈹 Op󰇵󰈸a󰉄󰈎󰈢n󰈻

✔ ICT ski s help us to communicate, run our business


and stay connected with our family and friends.
Hence, every person needs to acquire ICT ski s and
build them to stay updated with the latest software
and applications (apps).
Com󰈥󰉉󰉄󰇵r Ha󰈸󰇶w󰈀󰈸󰇵 a󰈞d S󰈡󰈃󰉒󰇽󰈹e
✔ Hardware- The physical parts that we can see and touch are ca ed
hardware. It is the machinery of a computer. These are the
keyboard, monitor, CPU, etc.
✔ Software: The part which cannot be seen but it makes hardware to
work. Example: Windows, MS o ice etc.
✔ Operating System (OS). This is the software that starts working
as soon as we switch on a computer. It displays the desktop on the
monitor. Some of the most commonly used operating systems for
laptops and desktop are Ubuntu, Microsoft Windows and Mac OS.
Sta󰈸󰉄󰈎n󰈇 󰇽 Co󰈛p󰉉󰉃󰇵󰈹

✔ To start a computer, press the Power button on the CPU. This wi start the
operating system and display the desktop on the monitor.
✔ Basic Functions performed when a computer starts a computer
automatica y runs a basic program ca ed BIOS (Basic
Input/Output System) as soon as it is switched on or the power button is
pushed on. The BIOS rst does a self-test. If the self-test shows that the
system is ne, the BIOS wi load the Operating System.
Log󰈎󰈝 󰇽󰈞d Lo󰈇󰈡󰉊󰉄
✔ When you login to the computer with your login-ID and
password the computer knows that you are an
authorised person and a ows you to work on the
applications in the computer.
Shu󰉅󰈎󰈝󰈈 D󰈢w󰈝 a C󰈡󰈛p󰉊󰉃e󰈹
You can shut down the windows computer clicking Star
button at the bottom left corner and then click Shut Down.
When you click Shut down, the Operating System wi close
a the applications and turn o the computer.
Usi󰈝󰈈 t󰈊󰈩 K󰇵󰉙bo󰈀󰈸󰇶

✔ A keyboard is an input device used to type


text, numbers and commands into the
computer.
Fun󰇹󰉄󰈎󰈢n Ke󰉘󰈼
Keys labeled from F1 to F12 are function keys. You use them to perform speci c functions.
(a) Control keys: Keys, such as Control (CTRL), SHIFT, SPACEBAR, ALT, CAPS LOCK and TAB, are
special control keys
(b) Enter key: The label on this key can be either ENTER or RETURN, depending on the brand
of computer that you are using. You use the ENTER or the RETURN key to move the cursor to the
beginning of a new line.

(c) Punctuation keys: Punctuation keys include keys for punctuation marks, such as colon (:),
semicolon (;), question mark (?), single quotation marks (‘ ’), and double quotation marks (“ ”). (d)

(d) Navigation keys: Keys, such as the arrow keys, HOME, END, PAGE UP, and PAGE DOWN are
navigation keys.
(e) Command keys: Keys, such as INSERT (INS), DELETE (DEL), and BACKSPACE are command
keys. When the INSERT key is turned ON, it helps you overwrite characters to the right of the
cursor
Usi󰈝󰈈 󰈀 M󰈢us󰈩

✔ A sma device that you can use to move, select and


open items on your computer screen.
Ro Over or Hover
Some actions can be done by simply ro ing over or hovering over an item. When you bring
the mouse over a le in File Explorer, it wi show the details of that le

Point and Click


As you move the mouse on your desk, a pointer moves correspondingly on your
screen.When you click a particular le, it gets selected

Drag and Drop


To move an item, you need to click it, and then holding the mouse button down, move the
item to a new location. After you move the item to the new location, you release the
mouse button. This is ca ed drag and drop.
Double-click
Double-clicking means to quickly click the left mouse button twice. When we double-click
on a le, it wi open the le.
Ses󰈻󰈎󰈢󰈞 2:Per󰇾󰈡󰈹m󰈏󰈝󰈈 Bas󰈎󰇹 󰉇󰈏󰈘e Op󰈩󰈸󰇽󰉄i󰈡n󰈻
Files and Folders
✔ A information stored in a computer is kept in les.
✔ Each le is given a le name and has a le name extension that
identi es the le type.Example: .txt, .jpg, .mp3.
✔ A folder is a location where a group of les can be stored
Bas󰈎󰇹 󰈠󰈋󰈢r󰉃󰇸ut󰈻
✔ CTRL+z — undo
✔ CTRL+y — redo
✔ CTRL+a — select a
✔ CTRL+x — cut
✔ CTRL+c — copy
✔ CTRL+v — paste
✔ CTRL+p — print
✔ CTRL+s — save.
Ses󰈻󰈎󰈢󰈞 3:Com󰈥󰉉󰉄󰇵r Ca󰈸󰈩 󰇽󰈞d Ma󰈎󰈝󰉄󰇵na󰈝󰇸󰈩
✔ Importance of Care and Maintenance of Computers
Taking care of electronic devices, such as
computer and mobiles helps them to work
properly.
Bas󰈎󰇹 󰈜󰈏󰈦s 󰇾o󰈹 T󰈀k󰈏󰈝󰈈 Car󰈩 󰈢󰇾 De󰉐󰈎c󰇵󰈻
(i) Keyboard: You can clean a keyboard with a soft brush

(ii) Screen: You can wipe the screen with a soft cloth to remove any nger marks.

(iii) Handle devices carefu y: Handle and move your laptop carefu y and avoid dropping or banging it against a hard
surface.

(v) Keep the computer cool: If a computer, laptop or mobile device gets overheated, the internal parts can be
damaged. The CPU has an internal fan to keep it cool. We should make sure the fan is functioning.

(vi) Do not overcharge your battery: Sometimes we keep a device plugged in for charging even after it is fu y
charged.This reduces the battery life. Always unplug the device once it
is charged 100%.

(vii) Always plug in devices carefu y: Any device being connected to a laptop or computer such as a USB drive or
headphones, should be done gently. It should not be forced into the port.

(viii) Do not run too many programs at a time: When too many programs are running at the same time, the computer
can become slow and even crash.
Pre󰈥󰈀󰈹󰇵 a M󰈀󰈏n󰉃e󰈞󰈀n󰇹󰇵 S󰇸he󰇷󰉉󰈘󰇵
(a) Daily Maintenance
i. Clean up your e-mail inbox
ii. Download e-mail attachments and save in proper folders

(b) Weekly Maintenance


i. Clean your keyboard
ii. Clean your monitor
iii. Dust CPU and printer
iv. Backup your data to an external drive
Pre󰈥󰈀󰈹󰇵 a M󰈀󰈏n󰉃e󰈞󰈀n󰇹󰇵 S󰇸he󰇷󰉉󰈘󰇵
(c) Monthly Maintenance
i. Transfer photographs to computer and delete from drive
ii. Organise photos into folders or albums
iii. Clean up ‘Download’ folder
iv. Uninsta unused programs and apps
v. Run disk-cleaner software
vi. Run fu system virus scan
(d) Yearly/Annual Maintenance
(i) Clean up contacts list on social media accounts
(ii) Clean up e-mail contact list
(iii) Update your operating system
(iv) Check for expiry of anti-virus software and renew
Bac󰈔󰉉󰈦 Y󰈢ur 󰉍󰈀󰉃󰇽
✔ Backing up data means to save the information present on your
computer on another device, such as CD/DVD drives Data can
recovered from here in case the computer stops working
completely.
✔ Computers can crash, humans can make mistakes and natural
disasters, such as oods can happen
Sca󰈝󰈞󰈎n󰈇 󰇽󰈞d C󰈗e󰈀󰈞󰈏n󰈇 Vi󰈹󰉉s󰇵󰈻
✔ Sometimes computer viruses can enter a computer from such attacks we can
insta anti-virus software. This wi prevent any viruses from entering and wi
also clean any viruses that may enter our system before they a ect the data.
✔ Increasing Computer Performance If we have been using a computer for a long
time we have a lot of unnecessary les and data, such as temporary les and
images.
✔ When they use too much hard-disk space, the performance of the computer goes
down. It is important that we keep cleaning by removing any extra les.
Rem󰈡󰉏󰈏󰈞g S󰈪A󰈱 f󰈸o󰈛 y󰈡󰉊󰈸 Co󰈛p󰉉󰉃󰇵󰈹

✔ Sometimes we get emails from companies who are advertising a


product or trying to attract you to their website. Such mails are
ca ed SPAM. We should never respond to SPAM and delete it on a
regular basis.
Ses󰈻󰈎󰈢󰈞 4: Com󰈥󰉉󰉄󰇵r Se󰇹󰉉󰈹󰈏t󰉘 a󰈞d P󰈸󰈎󰉐󰇽c󰉘
Threats to Computer
✔ Threats are the ways in which personal information can be
leaked from a computer without our knowledge.
Th󰈸e󰈀󰉄s
(a) Theft: Theft means stealing of information or hardware. These may be of three
types:

• Physical: Where a person may steal your desktop computer or laptop.


• Identity: Where a hacker steals your personal information and assumes your
identity. Using this false identity, the hacker can gain access to your account
information or perform i egal activity.
• Software Piracy: This is stealing of software and includes using or distributing
unlicensed and unauthorised copies of a computer program or software.
Th󰈸e󰈀󰉄s
(b) Virus: Viruses are computer programs that can damage the data and software programs or steal the information stored
on a computer. Major types of viruses are Worms and Trojan Horse.

Worms: These are viruses that replicate themselves and spread to a les once they
Information and Communication Technology Ski s 81 attack a computer. This makes it very di icult to remove them.

Trojan Horse: A Trojan Horse disguises itself i.e., it appears to be a useful software program but once it reaches a computer
it starts behaving like a virus and destroying data.

• Online Predator: Online predators are people who trap you into inappropriate relationships.
They may be older people posing to be your age, bu ying you into doing i egal activities
online and sometimes face to face.

• Internet Scams: Sometimes you may receive very attractive o ers saying you have won huge money in a lottery and that
you can claim the prize by depositing a certain amount of money. When you deposit the money using credit card or online
banking, you not only lose the deposit money but your card/account information may be misused later.
Pro󰉃󰈩󰇸t󰈏󰈝󰈈 yo󰉉󰈸 D󰇽󰉄a

(a) Use passwords to login to your computer: Use passwords that are di icult to
guess. Passwords are di icult to hack if they are a mix of sma (For example ‘a b c d’)
and capital letters (For example, ‘H J E R’), numbers (For example ‘8 7 6 5’) and
special characters
(For example, ’% ^ # $’). This would prevent unauthorised people from using your
computer.

(b) Insta Anti-virus and Firewa : Anti-viruses and Firewa monitor the data coming
in and out of a computer and prevent and viruses from entering. Anti-viruses can also
detect and clean viruses that may have entered a computer.
Pro󰉃󰈩󰇸t󰈏󰈝󰈈 yo󰉉󰈸 D󰇽󰉄a
(c) Encrypt Data: This is usually done by banks and companies in which
important customer information is stored. They can encrypt their entire hard
disk using the encrypting feature in Windows (Bitlocker). This would force users
to use a decryption password (or key) before starting the computer thus
preventing unauthorised usage.

(d) Secure sites: Give details of your credit card or bank account only on
secure sites. See in the address bar of the browser. If the site address starts
with https://and a lock symbol, then it is safe to give your credit card and
bank details.

You might also like