ICT Skills II Notes
ICT Skills II Notes
1. Paper
2. Typewriter
1. Hardware
2. Software
Hardware – These are the Physical Parts that we can see and touch.
Software –
It is physically invisible, but makes the hardware work the way we want.
Operating System (OS) is the most important software, it starts working as soon
as we switch on a computer.
Examples of OS Desktop Devices – Ubantu, macos, Windows
Examples of OS Mobile Devices – iOs, Android
Computer applications like browsers, games, & office tools are software that perform
specific functions.
Starting a Computer
We can shut down the computer in any Operating System by clicking Systems
Button and then Click ‘Shut Down’.
Using the Keyboard
A keyboard is an Input device used to type text, numbers and commands into
the computer.
It has 12 function keys that perform specific functions, which different from
program to program.
Control Keys
Punctuation Keys
Navigation Keys
These are used to move up & down, right & left in a document.
Command Keys
When the INSERT key is ON, it overwrites characters to the right of the cursor.
The DELETE and BACKSPACE keys remove text.
Window Keys
A mouse is a small input device used to move, select, and open items on a
computer screen.
o Roll over or Hovering – Details of File
o Point and Click – Select
o Drag and Drop – Move
Performing Basic File Operations
All information in a computer is stored in files, with various file types storing
different kinds of information.
Each file is given a file name and has a file name extension. – Example file (.txt,
.jpg/png, .mp3, .mp4)
A folder is a location where a group of files can be stored.
Creating a Folder
1. Taking care of electronic device helps them to work properly for long term.
2. We must protect them from dust and damage to keep them working efficiently.
3. Regular care allows us to use devices longer and save money by reducing the
need for new purchases.
Basic Tips for Taking Care of Devices
Personal Information
Theft:
These are programs that can damage data and software, or steal computer info.
i. Worms – These viruses replicate and spread to all files once they attack a
computer. This makes it very difficult to remove them.
ii. Trojan Horse – It appears to be a useful software program, but once it reaches a
computer, it behaves like a virus and destroys data
iii. Online Predators – These people trap you in a inappropriate relationships and
involves you into illegal activities online.
iv. Internet Scams – Depositing money online or by credit card risks losing money
and misuse of your account information.
Protecting your Data
To protect data from theft & viruses we can take following measures:
Give details of your credit card or bank account only on secure sites.