ICT 9th
ICT 9th
• Complex topics can be easily explained to the students with the help of pictures,
videos, presentations, etc.
• Images and videos used for teaching improves the retention memory of the
students.
• Presentations can make the lessons interesting.
• Practical demonstration can be given to the students.
Application Software
Application software is a computer program that is designed to perform a certain
type of work.
Utility Program
A utility program is used to perform maintenance work on a system or on the
components of the computer.
1.Antivirus software.
2.File management tool
3.Compression.
4.Disk Management Tools:-
Disk Cleaner,Disk Defragmenter,Backup
PRIMARY AND SECONDARY MEMORY
The primary storage is also called the primary memory. It is directly accessible by the
CPU. It can be:
• RAM (Random Access Memory)
• ROM (Read Only Memory)
Functions of primary memory are:
• Here data is fed and held until it is ready to be accessed.
• It is used to hold the data being processed and the intermediate results of
processing.
• It holds the result of the processing.
• It holds the processing instructions.
Memory Units
Units of computer memory are:- Bit (Binary Digit), Byte (Kilobyte, Megabyte,
GigaByte, TeraByte,PetaByte, ExaByte, ZettaByte, YottaByte)
The elementary unit of memory is a bit. A group of 4 bits is called a nibble and a
group of 8 bits iscalled a byte.
One byte is the minimum space required to store one character.
Input devices are used for entering data or instructions into the computer.
Output Devices
The output unit comprises of devices such as Monitor, Printer, speaker, etc. to
display information to the user.
Storage Devices
All computers have a hard disk drive installed in them. It is used to store files of
Operating system, softwares and other files.
VARIOUS PERIPHERAL DEVICES AND THEIR USES
Output Devices
Computer Monitor
Printer
The computer must be started correctly, and it must be shut down correctly when
you are done with it. The operating system and the files may become corrupted if the
computer’s power is turned off while you haven’t closed any open documents.
Operating Systems
DOS ,Windows,Linux
Mobile operating Systems
WWW (World Wide Web) – WWW stands for world wide web is a network of world
wide computers.
Protocol – Protocol is a set of rules to be followed while communicating or
transferring data on internet.
HTTP (Hyper Text Transfer Protocol) – This protocol defines the rules to be
followed while transferring the
information. The information may be in the form of text, images, videos, etc.
URL (Uniform Resource Locator) – Each web page has a unique address which
identifies its location on the network. This unique address is called the URL.
The URL has two parts:
• Protocol identifier: It identifies the name of the protocol used.
• Resource name: It specifies the complete address to the resource on the Internet.
APPLICATIONS OF INTERNET
Web site
A web site is a collection of two or more related web pages. Web pages of a web site
are linked together through hyperlinks.
Web page
An individual page of a web site is called a web page. It is written in a special
computer language
called HTML (Hyper text markup Language).
There are two types of web pages:
• Static web pages
• Dynamic web pages
EMAIL APPLICATIONS
EMAIL ACCOUNTS
To send or receive email messages, you first need to open your email account and
have your email address.
Email address
An email address has two main parts:
• User name
• Host name
These two parts are separated by @ symbol.
For example, consider the following email address: [email protected]
In the above email address, myemail is the user name and gmail.com is the host
name.
SENDING AND RECEIVING EMAIL
CYBER CRIME
Introduction to Cyber Crime
Cyber crime refers to any crime done using computer or any electronic device with
internet connection. Some of the cyber crimes are:
Cyber Bullying ,Cyber Stalking .,Hacking , Phishing , Spamming ,Cyber Bullying,
Cyber Addiction