02 Ict Skills II Notes Merged
02 Ict Skills II Notes Merged
Introduction
ICT skills help us to communicate, run our business and stay connected with our family and friends.
Hence, every person needs to acquire ICT skills and build them to stay updated with the latest
software and applications (apps).
OPERATING SYSTEM
An operating interface between user and computer which directs the processing of programmes and
controls the operation of computer.
Some of the functions of Operating system are:
• It supervises all the hardware on a computer and monitors each device’s status, including
whether it’s in use or not.
• It also checks whether the device is functioning properly or not.
• It also controls software resources of the computer.
• It controls how much memory is used by the computer, keeping track of which memory is free
and which memory is being used by which software.
• It controls how a computer system’s files and directories are organized.
• It keeps track of the amount of disk space used by a specific file.
• It allows you to create, copy, move and delete files.
Files – Every single thing you keep on your computer is kept as a file. A file system is a method for
naming, storing, and retrieving files.
Creating File
1. Right-click anywhere in the blank area of the right-column.
2. In the Shortcut menu, click New and select the type of the file you want to create.
Folder – Folders and directories are groups which contain single of multiple files. There may be
related files and/or subfolders in each directory and folder. One or more files and other sub-folders
may be located inside a sub-folder. This makes files easily accessible.
Creating Folder
1. Double-click the Computer icon.
2. Select the drive in which you want to create a new folder. Say, Local Disk D:.
3. Window will open up showing files and folders in Local Disc D:
4. Click New Folder on the toolbar
5. A new folder is created with name New Folder highlighted.
6. Type a name for the folderCreating a file
Renaming folders and files
1. Right-click the file or the folder.
2. From the shortcut menu, select Rename option.
3. Type the new name or edit the existing name and press the Enter key.
4. Or Just select the file/folder and press Function key F2.
Deleting files or folders
1. Click the file or the folder.
2. Press the Delete key.
3. Or Right-click and select Delete option from the Shortcut menu.
BASIC SHORTCUTS
CTRL+ z — undo
CTRL+ y — redo
CTRL+ a — select all
CTRL+ x — cut
CTRL+ c — copy
CTRL+ v — paste
CTRL+ p — print
CTRL+ s — save.
FIREWALL
A computer firewall is a network security system, software, or programmable device that monitors
and regulates incoming and outgoing network traffic in accordance with user-defined security rules.
Computers connected to a network, such as a LAN or the Internet, are more securely protected by
firewalls. Typically, a firewall creates a wall between a trusted internal network and an unreliable
external network, like the Internet. Each packet of data, whether it is coming in or going out, is
examined by the firewall, which then decides whether it should be permitted to pass or stopped.
COOKIES
When you visit an internet website, a user’s computer stores a little file known as a cookie on it.
These files are used to store information personal to a given client and website.
A cookie is sent by a website when you visit it and is saved on your computer in a file. A cookie can
only be read by the website that created it. This information cannot be accessed by other servers.
THREATS TO COMPUTER
Threats are the ways in which personal information can be leaked from a computer without our
knowledge.
(a) Theft: Theft means stealing of information or hardware. These may be of three types:
• Identity: Where a hacker steals your personal information and assumes your identity. Using this
false identity, the hacker can gain access to your account information or perform illegal activity.
• Software Piracy: This is stealing of software and includes using or distributing unlicensed and
unauthorised copies of a computer program or software.
(b) Virus: Viruses are computer programs that can damage the data and software programs or steal
the information stored on a computer. Major types of viruses are Worms and Trojan Horse.
Worms: These are viruses that replicate themselves and spread to all files once they
Information and Communication Technology Skills 81 attack a computer. This makes it very difficult
to remove them.
Trojan Horse: A Trojan Horse disguises itself i.e., it appears to be a useful software program but
once it reaches a computer it starts behaving like a virus and destroying data.
• Online Predator: Online predators are people who trap you into inappropriate relationships.
They may be older people posing to be your age, bullying you into doing illegal activities
online and sometimes face to face.
• Internet Scams: Sometimes you may receive very attractive offers saying you have won huge
money in a lottery and that you can claim the prize by depositing a certain amount of money. When
you deposit the money using credit card or online banking, you not only lose the deposit money but
your card/account information may be misused later.
(a) Use passwords to login to your computer: Use passwords that are difficult to guess. Passwords
are difficult to hack if they are a mix of small (For example ‘a b c d’) and capital letters (For example,
‘H J E R’), numbers (For example ‘8 7 6 5’) and special characters
(For example, ’% ^ # $’). This would prevent unauthorised people from using your computer.
(b) Install Anti-virus and Firewall: Anti-viruses and Firewall monitor the data coming in and out of
a computer and prevent and viruses from entering. Anti-viruses can also detect and clean viruses that
may have entered a computer.
(c) Encrypt Data: This is usually done by banks and companies in which important customer
information is stored. They can encrypt their entire hard disk using the encrypting feature in Windows
(Bitlocker). This would force users to use a decryption password (or key) before starting the computer
thus preventing unauthorised usage.
(d) Secure sites: Give details of your credit card or bank account only on secure sites. See in the
address bar of the browser. If the site address starts with https://and a lock symbol, then it is safe to
give your credit card and bank details.
ICT SKILLS II
OBJECTIVE QUESTIONS
1. An _ is a software that serves as an interface between the user and the computer.
a. operating system
b. application software
c. anti-virus software
d. microsoft word
Answer: a. operating system
2. Which software manages all the devices of a computer and keeps track of the status
of the device, whether it is busy or not?
a. operating system
b. application software
c. anti-virus software
d. microsoft word
Answer: a. operating system
5. An manages the computer memory and keeps track of which memory space
is in use by which program and which space is free.
a. operating system
b. application software
c. anti-virus software
d. microsoft word
Answer: a. operating system
6. An manages the computer memory and keeps track of which memory space
is in use by which program and which space is free.
a. operating system
b. application software
c. anti-virus software
d. disk defragmentor
Answer: a. operating
system
9. Which software allows you to create, copy, move and delete files?
a. operating system
b. application software
c. anti-virus software
d. disk defragmentor
Answer: a. operating
system
19. Which operating system allows only one user to do a task on the computer and
one thing at a time?
(a) Single-user, multi-task operating system
(b) Single-user , single-task operating system
(c) Multi-user
(d) None of the above
Answer: (b) Single-user, single-task operating system
20. Which Operating System is used to control machineries like robots in complex
animations and computer-controlled automated machines
(a) Real Time
(b) Multi-user
(c) Single-user, multi-task operating system
(d) Distributed
Answer: (a) Real
Time
24. Which Operating System enables single user to operate on several programs at the
same time.
(a) Single-user, multi-task operating system
(b) Multi-user
(c) Single-user , single-task operating system
(d) Real Time
Answer: (a) Single-user, multi-task operating system
28. The first screen that appears on monitor after loading OS is called _ _
(a) Icons
(b) Desktop
(c) Wall paper
(d) None of the
above Answer: (b)
Desktop
29. Small pictures on the desktop are called _ _
(a) Desktop
(b) Symbols
(c) Icons
(d) Pictures
Answer: (c)
Icons
34. Which icons allows user to access all drives, files, and folders on the computer.
(a) Recycle Bin
(b) Computer
(c) Application
(d) Start button
Answer: (b)
Computer
38. _ is a way in which you give name to a file, store it and retrieve it.
(a) Operating System
(b) Formatting System
(c) File System
(d) None of the
above Answer: (c)
File
40. A _ may contain one or more files and sub-folders within. This allows easy
accessibility of files.
(a) Folder
(b) Directory
(c) Sub-folder
(d) None of the
above Answer: (c)
Sub-folder
42. A _ _ menu is appearing, when you right-click in a blank area of the desktop.
(a) Shortcut Menu
(b) Context Menu
(c) Both (a) and (b)
(d) None of these
Answer: (c) Both (a) and (b)
47. To change the name of the folder, right-click and select option from the
Shortcut menu.
(a) Change Name
(b) Modify Name
(c) Rename
(d) None of these
Answer: (c)
Rename
48. To create a file, in the shortcut menu, click New and select the _ _ of the file
you want to create.
(a) type
(b) name
(c) new
(d) None of
these Answer:
(a) type
49. What is the term used when you press and hold the left mouse key and move the
mouse around?
(a) Highlighting
(b) Dragging
(c) Selecting
(d) Moving
Answer: (b) Dragging
50. Which of the following ways you can use to copy / move files and folders?
(a) Shortcut Menu
(b) Drag and Drop
(c) Using Keyboard (Shortcut keys)
(d) All of the above
Answer: (d) All of the above
51. To copy a file/folder, right-click and select option from the Shortcut menu.
(a) Copy
(b) Duplicate
(c) Move
(d) Cut
Answer: (a) Copy
52. To paste a file/folder, right-click and select option from the Shortcut menu.
(a) Stick
(b) Glue
(c) Paste
(d) Cream
Answer: (c)
Paste
53. To copy a file/folder using Drag and Drop method, hold down the _ key while
dragging it to the new location.
(a) Alt
(b) Shift
(c) Ctrl
(d) Alt + Ctrl
Answer: (c)
Ctrl
56. When you _ _ a file or a folder, a duplicate of the original file or folder is
created at the new location, and the original remains as it is.
(a) Copy
(b) Cut
(c) Rename
(d) Delete
Answer: (a)
Copy
57. When you _ _ a file or a folder, the original file or folder is moved to the new
location?
(a) move
(b) cut
(c) copy
(d) Either (a) or (b)
Answer: (d) Either (a) or (b)
58. You can permanently delete the contents of the Recycle Bin. Right-click the
Recycle Bin icon and then click .
(a) Empty
(b) Delete
(c) Empty Recycle Bin
(d) Delete Recycle Bin
Answer: (c) Empty Recycle Bin
59. To recover a file from the Recycle Bin, right-click the file, and then click .
(a) Recover
(b) Restore
(c) Move
(d) Undelete
Answer: (b)
Restore
60. To restore a file from the Recycle Bin, select the file, and click _ _.
(a) Recover this item
(b) Restore this item
(c) Move this item
(d) Undelete this item
Answer: (b) Restore this
item
1. What is ICT?
disadvantages of ICT.
Answer – Full form of ICT is Information and communication technology. The goal
of ICT is to bridge the gap between parents, educators, and students by encouraging
sustainable, cooperative, and transparent communication methods.
Advantages of ICT
a. Enhanced the modes of communication
Disadvantages of ICT
a. Traditional books and handwritten methods are at risk.
e. Misuse of technology
Answer – A computer system consists of two main parts – Hardware and Software
a. Hardware – Hardware is a physical part of a computer system. We can feel and
touch the hardware devices. example – CPU, Mother Board, Hard Disk, Keyboard,
Mouse, Printer etc.
b. Software – Software related to the programs which perform different types of
Answer – BIOS stands for Basic Input/ Output System, It helps the computer system
to identify (Self-test) the peripheral devices which are connected to the computer
system and helps computers to load Operating System properly.
Answer –
a. Function keys – F1 to F12 are function keys in the keyboard, function keys are
CAPS LOCK are known as a control key, these keys are used as per the demand.
c. Enter key – ENTER or RETURN keys are known as Enter key, depending on
semicolon (;), question mark (?), single quotation marks (‘ ’), and double quotation
marks (“ ”).
e. Navigation keys – END, HOME, PAGE DOWN, PAGE UP and Arrow keys
are known as navigation keys, these keys are used to move up, down, left or right in
the document.
f. Command keys – BACKSPACE, INSERT (INS) and DELETE(DEL) are known
as command keys. INSERT key allows you to overwrite characters to the right side.
The DELETE command key and BACKSPACE key are used to remove typed text,
character, or any other objects from the right and left side of the cursor.
g. Windows key – Windows key is used to open the Start menu.
Answer –
a. File – File is a collection of information different types of files store different
types of information. Every file has a file name and extension that identifies the type
of file.
b. Folder – Folder is a collection of files or a group of files.
Daily Maintenance
a. Clean up your email inbox
b. Save Important attachments and save in folder
Weekly Maintenance
a. Clean your Keyboard, monitor, CPU and printer
b. Backup your data
Monthly Maintenance
a. Clean unused photographs
b. Clean up Download folder
c. Uninstall unused programs
d. Run full system virus scan
e. Run disk – cleaner software
Q6. Identify me
a. I am a physical part of computer.
b. I am a collection of instruction doing specific task.
c. I am the software that starts working as soon as we switch on a computer.
d. I am an input device used to type text, numbers etc
e. I am a small device that you can use to move, select and open items on your
computer screen. Ans. a. Hardware b. Software c. Operating System d. Keyboard
e. Mouse
Q12. The file name and file name extension are separated by a
Ans. dot ( . )
Q24. Write few tips to protect your data from online theft
and viruses. Ans. Few tips to protect our data from online
theft and viruses are:
a. Use passwords to login to your computer:
b. Install Anti-virus and Firewall:
c. Use Data Encryption
d. Give details of your credit card or bank account only on secure sites
Q32. Name two keys available on keyboard which are used to remove typed text or
characters. Ans. Delete and Backspace