ICTSkills
ICTSkills
SUBJECT IT LESSON NO 3
LESSON NAME ICT Skills WORKSHEET
TOPIC Notes
Hardware- The physical parts that we can see and touch are called hardware. It is the
machinery of a computer. These are the keyboard, monitor, CPU, etc.
Software: The part which cannot be seen but it makes hardware to work. Example: Windows,
MS office etc.
Operating System (OS). This is the software that starts working as soon as we switch on a computer.
It displays the desktop on the monitor. Some of the most commonly used operating systems for laptops
and desktop are Ubuntu, Microsoft Windows and Mac OS.
Starting a Computer
To start a computer, press the Power button on the CPU. This will start the operating system
and display the desktop on the monitor.
Basic Functions performed when a computer starts a computer automatically runs a basic
program called BIOS (Basic Input/Output System) as soon as it is switched on or the power
button is pushed on. The BIOS first does a self-test. If the self-test shows that the system is
fine, the BIOS will load the Operating System.
Login and Logout
When you login to the computer with your login-ID and password (as shown in Figure 3.5), the
computer knows that you are an authorised person and allows you to work on the applications
in the computer.
Shutting Down a Computer
You can shut down the windows computer clicking Star button at the bottom left corner and
then click Shut Down. When you click Shut down, the Operating System will close all the
applications and turn off the computer.
(c) Punctuation keys: Punctuation keys include keys for punctuation marks, such as colon (:),
semicolon (;), question mark (?), single quotation marks (‘ ’), and double quotation marks (“ ”).
(d) Navigation keys: Keys, such as the arrow keys, HOME, END, PAGE UP, and PAGE
DOWN are navigation keys.
(e) Command keys: Keys, such as INSERT (INS), DELETE (DEL), and BACKSPACE are
command
keys. When the INSERT key is turned ON, it helps you overwrite characters to the right of the
cursor
(f) Windows key: Pressing this key opens the Start menu
Using a Mouse
a small device that you can use to move, select and open items on your computer screen.
Double-click
Double-clicking means to quickly click the left mouse button twice. When we double-click on a
file, it will open the file.
All information stored in a computer is kept in files.Each file is given a file name and has
a file name extension that identifies the file type.Example: .txt, .jpg, .mp3.
A folder is a location where a group of files can be stored
Basic Shortcuts
CTRL+z — undo
CTRL+y — redo
CTRL+a — select all
CTRL+x — cut
CTRL+c — copy
CTRL+v — paste
CTRL+p — print
CTRL+s — save.
Taking care of electronic devices, such as computer and mobiles helps them to work properly.
(ii) Screen: You can wipe the screen with a soft cloth to remove any finger marks.
(iii) Handle devices carefully: Handle and move your laptop carefully and avoid dropping
or banging it against a hard surface.
(v) Keep the computer cool: If a computer, laptop or mobile device gets overheated, the
internal parts can be damaged. The CPU has an internal fan to keep it cool. We should make
sure the fan is functioning.
(vi) Do not overcharge your battery: Sometimes we keep a device plugged in for charging
even after it is fully charged.This reduces the battery life. Always unplug the device once it
is charged 100%.
(vii) Always plug in devices carefully: Any device being connected to a laptop or computer
such as a USB drive or headphones, should be done gently. It should not be forced into the
port.
(viii) Do not run too many programs at a time: When too many programs are running at the
same time, the computer can become slow and even crash.
Increasing Computer Performance If we have been using a computer for a long time we
have a lot of unnecessary files and data, such as temporary files and images. When they use
too much hard-disk space, the performance of the computer goes down. It is important that we
keep cleaning by removing any extra files.
Threats to Computer
Threats are the ways in which personal information can be leaked from a computer without our
knowledge.
(a) Theft: Theft means stealing of information or hardware. These may be of three types:
• Identity: Where a hacker steals your personal information and assumes your identity. Using
this false identity, the hacker can gain access to your account information or perform illegal
activity.
• Software Piracy: This is stealing of software and includes using or distributing unlicensed
and unauthorised copies of a computer program or software.
(b) Virus: Viruses are computer programs that can damage the data and software programs or
steal the information stored on a computer. Major types of viruses are Worms and Trojan
Horse.
Worms: These are viruses that replicate themselves and spread to all files once they
Information and Communication Technology Skills 81 attack a computer. This makes it very
difficult to remove them.
Trojan Horse: A Trojan Horse disguises itself i.e., it appears to be a useful software program
but once it reaches a computer it starts behaving like a virus and destroying data.
• Online Predator: Online predators are people who trap you into inappropriate relationships.
They may be older people posing to be your age, bullying you into doing illegal activities
online and sometimes face to face.
• Internet Scams: Sometimes you may receive very attractive offers saying you have won
huge money in a lottery and that you can claim the prize by depositing a certain amount of
money. When you deposit the money using credit card or online banking, you not only lose the
deposit money but your card/account information may be misused later.
(a) Use passwords to login to your computer: Use passwords that are difficult to guess.
Passwords are difficult to hack if they are a mix of small (For example ‘a b c d’) and capital
letters (For example, ‘H J E R’), numbers (For example ‘8 7 6 5’) and special characters
(For example, ’% ^ # $’). This would prevent unauthorised people from using your computer.
(b) Install Anti-virus and Firewall: Anti-viruses and Firewall monitor the data coming in and
out of a computer and prevent and viruses from entering. Anti-viruses can also detect and
clean viruses that may have entered a computer.
(c) Encrypt Data: This is usually done by banks and companies in which important customer
information is stored. They can encrypt their entire hard disk using the encrypting feature in
Windows (Bitlocker). This would force users to use a decryption password (or key) before
starting the computer thus preventing unauthorised usage.
(d) Secure sites: Give details of your credit card or bank account only on secure sites. See in
the address bar of the browser. If the site address starts with https://and a lock symbol, then it
is safe to give your credit card and bank details.