Session 1: Basic Computer Operations: Computer Hardware and Software
Session 1: Basic Computer Operations: Computer Hardware and Software
ICT skills help us to communicate, run our business and stay connected
with our family and friends. Hence, every person needs to acquire ICT skills
and build them to stay updated with the latest software and applications
(apps).
Hardware- The physical parts that we can see and touch are called
hardware. It is the machinery of a computer. These are the keyboard,
monitor, CPU, etc
Software: The part which cannot be seen but it makes hardware to work.
Example: Windows, MS office etc.
Operating System (OS). This is the software that starts working as soon
as we switch on a computer. It displays the desktop on the monitor. Some
of the most commonly used operating systems for laptops and desktop
are Ubuntu, Microsoft Windows and Mac OS.
Starting a Computer
To start a computer, press the Power button on the CPU. This will start the
operating system and display the desktop on the monitor.
When you login to the computer with your login-ID and password (as
shown in Figure 3.5), the computer knows that you are an authorised
person and allows you to work on the applications in the computer.
Shutting Down a Computer
You can shut down the windows computer clicking Star button at the
bottom left corner and then click Shut Down. When you click Shut
down, the Operating System will close all the applications and turn off the
computer.
Function Keys
Keys labeled from F1 to F12 are function keys. You use them to perform
specific functions.
(b) Enter key: The label on this key can be either ENTER or RETURN,
depending on the brand of computer that you are using. You use the
ENTER or the RETURN key to move the cursor to the beginning of a new
line.
(d) Navigation keys: Keys, such as the arrow keys, HOME, END, PAGE
UP, and PAGE DOWN are navigation keys.
(e) Command keys: Keys, such as INSERT (INS), DELETE (DEL), and
BACKSPACE are command
keys. When the INSERT key is turned ON, it helps you overwrite
characters to the right of the
cursor
(f) Windows key: Pressing this key opens the Start menu
Using a Mouse
a small device that you can use to move, select and open items on your
computer screen.
Double-click
Double-clicking means to quickly click the left mouse button twice. When
we double-click on a file, it will open the file.
Basic Shortcuts
CTRL+z — undo
CTRL+y — redo
CTRL+a — select all
CTRL+x — cut
CTRL+c — copy
CTRL+v — paste
CTRL+p — print
CTRL+s — save.
(ii) Screen: You can wipe the screen with a soft cloth to remove any finger
marks.
(iii) Handle devices carefully: Handle and move your laptop carefully and
avoid dropping or banging it against a hard surface.
(v) Keep the computer cool: If a computer, laptop or mobile device gets
overheated, the internal parts can be damaged. The CPU has an internal
fan to keep it cool. We should make sure the fan is functioning.
(viii) Do not run too many programs at a time: When too many
programs are running at the same time, the computer can become slow
and even crash.
(b) Virus: Viruses are computer programs that can damage the data and
software programs or steal the information stored on a computer. Major
types of viruses are Worms and Trojan Horse.
Worms: These are viruses that replicate themselves and spread to all files
once they
Information and Communication Technology Skills 81 attack a computer.
This makes it very difficult to remove them.
Trojan Horse: A Trojan Horse disguises itself i.e., it appears to be a useful
software program but once it reaches a computer it starts behaving like a
virus and destroying data.
• Online Predator: Online predators are people who trap you into
inappropriate relationships.
They may be older people posing to be your age, bullying you into doing
illegal activities
online and sometimes face to face.
• Internet Scams: Sometimes you may receive very attractive offers saying
you have won huge money in a lottery and that you can claim the prize by
depositing a certain amount of money. When you deposit the money using
credit card or online banking, you not only lose the deposit money but your
card/account information may be misused later.
(a) Use passwords to login to your computer: Use passwords that are
difficult to guess. Passwords are difficult to hack if they are a mix of small
(For example ‘a b c d’) and capital letters (For example, ‘H J E R’),
numbers (For example ‘8 7 6 5’) and special characters
(For example, ’% ^ # $’). This would prevent unauthorised people from
using your computer.
(b) Install Anti-virus and Firewall: Anti-viruses and Firewall monitor the
data coming in and out of a computer and prevent and viruses from
entering. Anti-viruses can also detect and clean viruses that may have
entered a computer.
(c) Encrypt Data: This is usually done by banks and companies in which
important customer information is stored. They can encrypt their entire hard
disk using the encrypting feature in Windows (Bitlocker). This would force
users to use a decryption password (or key) before starting the computer
thus preventing unauthorised usage.
(d) Secure sites: Give details of your credit card or bank account only on
secure sites. See in the address bar of the browser. If the site address
starts with https://and a lock symbol, then it is safe to give your credit card
and bank details.