Ai Class 10
Ai Class 10
3. Feedback — The receiver conveys their understanding of the message to the sender in the
form of feedback to complete the communication cycle.
REKHA BAITHA
Session 2: Verbal Communication
Verbal communication includes sounds, words, language, and speech. Speaking is one of the
most effective and commonly used ways of communicating. It helps in expressing our
emotions in words.
Written Communication: This form of communication involves writing words. It can be letters,
circulars, reports, manuals, SMS, social media chats, etc. It can be between two or more
people.
Small Group Communication: This type of communication takes place when there are more
than two people involved. Each participant can interact and converse with the rest.
Public Communication: This type of communication takes place when one individual
addresses a large gathering.
REKHA BAITHA
Session 3: Non-verbal Communication
Non-verbal communication is the expression or exchange of information or messages without
using any spoken or written word.
Types of Feedback
• Positive Feedback
• Negative Feedback
• No Feedback
• Timely: Being prompt is the key, since feedback loses its impact if delayed for too long.
• Polite: While it is important to share feedback, the recipient should not feel offended by the
language of the feedback.
Importance of Feedback
• It validates effective listening: The person providing the feedback knows they have been
understood (or received) and that their feedback
provides some value.
• It motivates: Feedback can motivate people to build better work relationships and continue
the good work that is being appreciated.
REKHA BAITHA
• It is always there: Every time you speak to a person, we communicate feedback so it is
impossible not to provide one.
• It boosts learning: Feedback is important to remain focussed on goals, plan better and
develop improved products and services.
• It improves performance: Feedback can help to form better decisions to improve and
increase performance.
Linguistic Barriers
The inability to communicate using a language is known as language barrier to
communication. Language barriers are the most common communication barriers, which
cause misunderstandings misinterpretations between people
Interpersonal Barriers
Barriers to interpersonal communication occur when the sender’s message is received
differently from how it was intended.
Organisational Barriers
Organisations are designed on the basis of formal hierarchical structures that follow
performance standards, rules and regulations, procedures, policies, behavioural norms, etc.
All these affect the free flow
of communication in organisations
Cultural Barriers
Cultural barriers is when people of different cultures are unable to understand each other’s
customs, resulting in inconveniences and difficulties.People sometimes make stereotypical
assumptions about others based on their cultural background
REKHA BAITHA
7 C's of Communication
Capitalisation Rules
Punctuation : Full stop, Comma, Question mark, Exclamation mark
REKHA BAITHA
Unit2: Self Management Skills
Self Management Skills are those skills that help a person to control his thoughts, wants,
feelings and actions. It allows you to maximize your productivity and performance in various
fields of your career. When we talk about employability, Self-management skills help you to
manage a good career path. It helps you to overcome in many bad situations. Here in this
article, we will discuss Stress and Stress Management Techniques and also we will discuss
how to work independently.
Following are some of the skills you must master
to succeed in life:
• Self-awareness: Ask for honest feedback. Gather insights on your personality and work-
specific proficiencies. Think about your daily interactions and how you handled situations well
or could have handled them differently.
• Responsibility: Taking responsibility for your tasks is very important. Taking ownership
is the step towards self-development. For example, if you have been assigned a task by a
teacher; ensure you take complete ownership. Even if you are unable to complete the task on
time, you must report it and then correct it.
• Time Management: Prioritise the things you have to do. Remove waste and redundancy
from work. Make a time table and follow it diligently.
• Adaptability: Stay current with best practices and read up on new information always.
Prepare yourself for new changes, so that you can transition seamlessly.
For example,
• you are too close to the exams but feel unprepared.
• you are experiencing a loss of someone close in the family.
• you are worried about what people would think of you if you don’t dress well or cannot
speak confidently.
Stress Management
Managing stress is about making a plan to be able to cope effectively with daily pressures. The
ultimate goal is to strike a balance between life, work, relationships, relaxation, and fun. By
doing this, you are able to deal with daily stress triggers and meet these challenges head-on.
Always keep in mind the ABC of stress management
A: Adversity or the stressful event
B: Beliefs or the way you respond to the event
C: Consequences or actions and outcomes of the event
REKHA BAITHA
Management Techniques
Here are a few simple stress management techniques.
• Time management: Proper time management is one of the most effective stress-
relieving techniques.
• Physical exercise and fresh air: A healthy lifestyle is essential for students. Stress is
generally lower in people who maintain a healthy routine. Doing yoga, meditation and deep
breathing exercises help in proper blood circulation and relaxes the body. Even taking a walk
or playing in the park will help you get a lot of fresh oxygen, which will help you become
more active.
• Healthy diet: Having a healthy diet will also help you reduce stress. Eating a balanced
diet, such as Dal, Roti, vegetables and fruits will give you the strength to do your daily work
efficiently.
• Positivity: Focussing on negative aspects of life will add more stress. Instead, learn to
look at the good things and stay positive. For example, instead of feeling upset over a
scoring less in a test, try to maintain a positive attitude and look at ways to improve the next
time.
• Sleep: We should get a good night’s sleep for at least 7 hours so that your brain and body
gets recharged to function better the next day.
• Holidays with family and friends: Going to a relative’s place, such as your grandparents’
house or a new place during your summer vacations can help you break from the normal
routine and come back afresh.
REKHA BAITHA
Ability to Work Independently
If you can become a calm and relaxed person, you will
have the ability to work independently, which means.
1. becoming self-aware, self-monitoring, and self-
correcting.
2. knowing what you need to do.
3. taking the initiative rather than being told what to do.
4. recognising your mistakes and not blaming others.
5. having the ability and the will to learn continuously.
Emotional Intelligence
Emotional intelligence is the ability to identify and manage one’s own
emotions, as well as the emotions of others.
• Emotional awareness : the ability to identify and name one’s own
emotions.
REKHA BAITHA
Session 2: Self-awareness — Strength and Weakness Analysis
Finding Weaknesses
Point out the areas where you struggle and the things you find difficult to do.
Look at the feedback others usually give you.
Be open to feedback and accept your weaknesses without feeling low about it. Take it as an area of
improvement.
Ability
1. An acquired or natural capacity
2. nable you to perform a particular job or task with considerable proficiency.
Session 3: Self-motivation
Self-motivation is simply the force within you that drives you to do
things. Self-motivation is what pushes us to achieve our goals, feel
happy and improve our quality of life. In other words, it is our
ability to do the things that need to be done without someone or
something influencing us.
Qualities of Self-motivated People
1. Know what they want from life
2. Are focussed
3. Know what is important
4. Are dedicated to fulfill their dreams
Building Self-motivation
Find out your strengths
Set and focus on your goals
Develop a plan
to achieve your goals
Stay loyal to your goals
REKHA BAITHA
Session 4: Self-regulation — Goal Setting
Goals : They are a set of dreams with a deadline to get them, for
example, saving pocket money to buy a favourite mobile phone by
a particular date.
Goal setting : It is all about finding and listing your goals and
then planning on how to achieve them.
How to Set Goals?
We can use SMART method to set goals. SMART stands for:
Achievable : Breaking down big goals into smaller parts will make the goal
achievable. Bigger Goal: “I want to become a teacher in my school.”
Realistic : A realistic goal would be something that we want to achieve and can
work towards.
Example of unrealistic goal: “I will read my entire year’s syllabus in one day and
get good
marks.”
Realistic goal: “I spend 3 hours every day of the year after school to revise my
subjects to get
good marks in the exams.”
REKHA BAITHA
• Time bound : A SMART goal should have a timeframe by when the goal needs to
be achieved.
This encourages us to take actions to completely fulfill the goals.
REKHA BAITHA
Session 1: Basic Computer Operations
ICT skills help us to communicate, run our business and stay connected with our
family and friends. Hence, every person needs to acquire ICT skills and build them to
stay updated with the latest software and applications (apps).
Hardware- The physical parts that we can see and touch are called hardware. It is
the machinery of a computer. These are the keyboard, monitor, CPU, etc.
Software: The part which cannot be seen but it makes hardware to work. Example:
Windows, MS office etc.
Operating System (OS). This is the software that starts working as soon as we
switch on a computer. It displays the desktop on the monitor. Some of the most
commonly used operating systems for laptops and desktop are Ubuntu, Microsoft
Windows and Mac OS.
Starting a Computer
To start a computer, press the Power button on the CPU. This will start the operating
system and display the desktop on the monitor.
When you login to the computer with your login-ID and password (as shown in
Figure 3.5), the computer knows that you are an authorised person and allows you to
work on the applications in the computer.
You can shut down the windows computer clicking Star button at the bottom left
corner and then click Shut Down. When you click Shut down, the Operating System
will close all the applications and turn off the computer.
A keyboard is an input device used to type text, numbers and commands into the
computer.
REKHA BAITHA
Function Keys
Keys labeled from F1 to F12 are function keys. You use them to perform specific
functions.
(a) Control keys: Keys, such as Control (CTRL), SHIFT, SPACEBAR, ALT, CAPS
LOCK and TAB, are special control keys
(b) Enter key: The label on this key can be either ENTER or RETURN, depending
on the brand of computer that you are using. You use the ENTER or the RETURN
key to move the cursor to the beginning of a new line.
(c) Punctuation keys: Punctuation keys include keys for punctuation marks, such
as colon (:), semicolon (;), question mark (?), single quotation marks (‘ ’), and double
quotation marks (“ ”). (d)
(d) Navigation keys: Keys, such as the arrow keys, HOME, END, PAGE UP, and
PAGE DOWN are navigation keys.
(e) Command keys: Keys, such as INSERT (INS), DELETE (DEL), and
BACKSPACE are command
keys. When the INSERT key is turned ON, it helps you overwrite characters to the
right of the
cursor
(f) Windows key: Pressing this key opens the Start menu
Using a Mouse
a small device that you can use to move, select and open items on your computer
screen.
REKHA BAITHA
Session 2: Performing Basic File Operations
Files and Folders
All information stored in a computer is kept in files.Each file is given a file name
and has a file name extension that identifies the file type.Example: .txt, .jpg, .mp3.
Basic Shortcuts
CTRL+z — undo
CTRL+y — redo
CTRL+a — select all
CTRL+x — cut
CTRL+c — copy
CTRL+v — paste
CTRL+p — print
CTRL+s — save.
Taking care of electronic devices, such as computer and mobiles helps them to work
properly.
(ii) Screen: You can wipe the screen with a soft cloth to remove any finger marks.
(iii) Handle devices carefully: Handle and move your laptop carefully and avoid
dropping or banging it against a hard surface.
(v) Keep the computer cool: If a computer, laptop or mobile device gets overheated,
the internal parts can be damaged. The CPU has an internal fan to keep it cool. We
should make sure the fan is functioning.
(vi) Do not overcharge your battery: Sometimes we keep a device plugged in for
charging even after it is fully charged.This reduces the battery life. Always unplug the
device once it
is charged 100%.
(vii) Always plug in devices carefully: Any device being connected to a laptop or
computer such as a USB drive or headphones, should be done gently. It should not
be forced into the port.
(viii) Do not run too many programs at a time: When too many programs are running
at the same time, the computer can become slow and even crash.
REKHA BAITHA
Prepare a Maintenance Schedule
Increasing Computer Performance If we have been using a computer for a long time
we
have a lot of unnecessary files and data, such as temporary files and images. When
they use too much hard-disk space, the performance of the computer goes down. It
is important that we keep cleaning by removing any extra files.
REKHA BAITHA
Session 4: Computer Security and Privacy
Threats to Computer
Threats are the ways in which personal information can be leaked from a computer
without our knowledge.
(a) Theft: Theft means stealing of information or hardware. These may be of three
types:
• Identity: Where a hacker steals your personal information and assumes your
identity. Using this false identity, the hacker can gain access to your account
information or perform illegal activity.
(b) Virus: Viruses are computer programs that can damage the data and software
programs or steal the information stored on a computer. Major types of viruses are
Worms and Trojan Horse.
Worms: These are viruses that replicate themselves and spread to all files once they
Information and Communication Technology Skills 81 attack a computer. This makes
it very difficult to remove them.
Trojan Horse: A Trojan Horse disguises itself i.e., it appears to be a useful software
program but once it reaches a computer it starts behaving like a virus and destroying
data.
• Online Predator: Online predators are people who trap you into inappropriate
relationships.
They may be older people posing to be your age, bullying you into doing illegal
activities
online and sometimes face to face.
• Internet Scams: Sometimes you may receive very attractive offers saying you have
won huge money in a lottery and that you can claim the prize by depositing a certain
amount of money. When you deposit the money using credit card or online banking,
you not only lose the deposit money but your card/account information may be
misused later.
(a) Use passwords to login to your computer: Use passwords that are difficult to
guess. Passwords are difficult to hack if they are a mix of small (For example ‘a b c
d’) and capital letters (For example, ‘H J E R’), numbers (For example ‘8 7 6 5’) and
special characters
(For example, ’% ^ # $’). This would prevent unauthorised people from using your
computer.
REKHA BAITHA
(b) Install Anti-virus and Firewall: Anti-viruses and Firewall monitor the data coming
in and out of a computer and prevent and viruses from entering. Anti-viruses can
also detect and clean viruses that may have entered a computer.
(c) Encrypt Data: This is usually done by banks and companies in which important
customer information is stored. They can encrypt their entire hard disk using the
encrypting feature in Windows (Bitlocker). This would force users to use a decryption
password (or key) before starting the computer thus preventing unauthorised usage.
(d) Secure sites: Give details of your credit card or bank account only on secure
sites. See in the address bar of the browser. If the site address starts with https://and
a lock symbol, then it is safe to give your credit card and bank details.
REKHA BAITHA