(1) The document provides information about ICT skills including computer hardware, software, operating systems, basic computer functions, input and output devices, files and folders, shortcuts, and the importance of computer care and maintenance.
(2) It describes computer hardware like the keyboard, monitor, and CPU. It also discusses software like operating systems and applications. Basic functions when starting a computer like BIOS and logging in are explained.
(3) The document also covers input devices like the mouse, its functions of pointing, clicking, dragging and dropping. It discusses files, folders, shortcuts, and provides tips for regular computer maintenance.
1) The document provides an overview of basic computer concepts including hardware, software, operating systems, application software, input/output devices, and the user interface.
2) It describes how to start up and shut down a computer properly, log on and off, and type using a keyboard. Basic mouse functions are also covered.
3) The document discusses choosing the right software for different tasks like word processing, spreadsheets, presentations, and more. It also covers passwords, viruses, and the desktop interface.
The document provides information about the Windows 2000 operating system, including its features and how to boot and use Windows. It discusses how Windows 2000 supports over 4000 printers and other devices. It has features like IntelliMirror, smart cards, internet connection sharing, and plug and play capabilities. The document also explains how to set screen savers, change desktop wallpaper, create folders and shortcuts, and cut, copy and paste files and folders. It provides information on computer viruses, how they spread, and how to prevent virus damage.
The document provides an overview of the fundamentals of computers including basic hardware components like the monitor, keyboard, mouse, and printer. It explains what software is and common types like operating systems and applications. The document also describes the desktop interface and components like icons, the taskbar, and how to personalize the desktop.
The document provides information about computer hardware and software components. It discusses the internal components of a computer including the central processing unit (CPU), motherboard, computer fan, and external components such as the keyboard, mouse, and monitor. It also describes the different types of computers including microcomputers, minicomputers, mainframes, and supercomputers. The document summarizes the history of computers and how Charles Babbage developed early computer designs in the 1820s and 1830s.
This document provides an overview of computers and their basic components. It defines what a computer is and explains computer hardware such as the central processing unit, memory, storage, and input/output devices. It also discusses computer software, how information is input and output from a computer, and how the basic components work together. The document then gives examples of computer hardware, software, input devices, and output devices. It also provides instructions on how to create an email account and describes several job-oriented computer courses for graduates.
I hope You all like it. I hope It is very beneficial for you all. I really thought that you all get enough knowledge from this presentation. This presentation is about materials and their classifications. After you read this presentation you knowledge is not as before.
The document provides an overview of basic computer components, operations, and functions. It discusses hardware and software, the major operations computers perform, types of memory, input/output devices, operating systems, application software, and basic security concepts. The summary covers the key topics and components discussed in the document at a high level in 3 sentences:
Computer hardware and software work together, with hardware being the physical components and software being programs. The document defines the major components of a computer system and how they work together, including memory, processors, input/output devices, operating systems, and common software applications. It also provides a basic introduction to computer security concepts and threats.
This document discusses various cybersecurity risks and best practices. It describes how attackers can compromise computers through vulnerabilities in web browsers, applications, and weak user access rights. Common cyber attacks like viruses, worms, Trojans, and botnets are also explained. The document recommends implementing security measures like firewalls, antivirus software, and strong passwords to help defend against these threats. Regular software updates and awareness of social engineering tactics are also emphasized as important aspects of cybersecurity defense.
1) The document provides an overview of basic computer concepts including hardware, software, operating systems, application software, input/output devices, and the user interface.
2) It describes how to start up and shut down a computer properly, log on and off, and type using a keyboard. Basic mouse functions are also covered.
3) The document discusses choosing the right software for different tasks like word processing, spreadsheets, presentations, and more. It also covers passwords, viruses, and the desktop interface.
The document provides information about the Windows 2000 operating system, including its features and how to boot and use Windows. It discusses how Windows 2000 supports over 4000 printers and other devices. It has features like IntelliMirror, smart cards, internet connection sharing, and plug and play capabilities. The document also explains how to set screen savers, change desktop wallpaper, create folders and shortcuts, and cut, copy and paste files and folders. It provides information on computer viruses, how they spread, and how to prevent virus damage.
The document provides an overview of the fundamentals of computers including basic hardware components like the monitor, keyboard, mouse, and printer. It explains what software is and common types like operating systems and applications. The document also describes the desktop interface and components like icons, the taskbar, and how to personalize the desktop.
The document provides information about computer hardware and software components. It discusses the internal components of a computer including the central processing unit (CPU), motherboard, computer fan, and external components such as the keyboard, mouse, and monitor. It also describes the different types of computers including microcomputers, minicomputers, mainframes, and supercomputers. The document summarizes the history of computers and how Charles Babbage developed early computer designs in the 1820s and 1830s.
This document provides an overview of computers and their basic components. It defines what a computer is and explains computer hardware such as the central processing unit, memory, storage, and input/output devices. It also discusses computer software, how information is input and output from a computer, and how the basic components work together. The document then gives examples of computer hardware, software, input devices, and output devices. It also provides instructions on how to create an email account and describes several job-oriented computer courses for graduates.
I hope You all like it. I hope It is very beneficial for you all. I really thought that you all get enough knowledge from this presentation. This presentation is about materials and their classifications. After you read this presentation you knowledge is not as before.
The document provides an overview of basic computer components, operations, and functions. It discusses hardware and software, the major operations computers perform, types of memory, input/output devices, operating systems, application software, and basic security concepts. The summary covers the key topics and components discussed in the document at a high level in 3 sentences:
Computer hardware and software work together, with hardware being the physical components and software being programs. The document defines the major components of a computer system and how they work together, including memory, processors, input/output devices, operating systems, and common software applications. It also provides a basic introduction to computer security concepts and threats.
This document discusses various cybersecurity risks and best practices. It describes how attackers can compromise computers through vulnerabilities in web browsers, applications, and weak user access rights. Common cyber attacks like viruses, worms, Trojans, and botnets are also explained. The document recommends implementing security measures like firewalls, antivirus software, and strong passwords to help defend against these threats. Regular software updates and awareness of social engineering tactics are also emphasized as important aspects of cybersecurity defense.
The document defines hardware and software devices, providing examples of each. It also outlines steps for starting and shutting down a computer, as well as logging in and out. Computer maintenance tips are provided, such as cleaning regularly and avoiding overcharging to prevent issues and maximize the lifespan of devices.
The basics- getting started with computers-slide shareOutlearn Training
The Basics
Security — Passwords and Viruses
Software (Programs)
Windows, Icons and Buttons
Office Features and Shortcuts
Using Storage Devices Safely
Managing Files and Folders
Changing Settings
Minimising Physical Stress
Printing and Capturing Evidence
Outlearn Training
This document contains information about Pavan S. Singaraddi, a student of class X Omega at Kalpavruksha Model School. It discusses hardware and software devices, steps to start and shut down a computer, how to log in and log out, uses of a keyboard, mouse gestures, file types and extensions, and computer care and maintenance. The key points covered are the definition of hardware and software, examples of common hardware and software, steps to start up and shut down a computer, how to log in and log out of a user account, and basic computer care tips.
This document discusses how to protect personal computers from security threats. It notes that while computers are designed for ease of use, this comes at the cost of security. The internet poses risks like viruses, worms, hackers and identity theft. The document recommends using strong passwords, installing anti-virus software and updating it, using a firewall, and practicing safe internet habits to better secure home computers.
This document provides an overview of computer systems and their components. It identifies the main parts of a computer system as hardware, software, and liveware. Hardware is divided into internal components like the CPU, motherboard, RAM, and external components like keyboards, mice, and monitors. Software is classified as system software and application software. The document also defines proprietary and open source software, computer viruses, and types of malware like spyware. It describes how viruses and spyware can infect computers and the risks they pose like identity theft, fraud, and data loss.
The document provides an overview and introduction to using Windows 7 at Charles Sturt University. It discusses the different ways to access the university network, including via workstations, laptops, and thin client sessions. It describes how to power on computers and log into the university network by entering usernames and passwords. The document outlines good password practices and privacy policies. It provides a tour of the basic desktop interface including icons, the taskbar, and start button. It describes how to open programs and switch between windows. The document is intended as a beginner's guide for university staff and students.
The document discusses various topics related to operating systems and computer maintenance. It begins by defining operating systems and their main functions. It then describes different types of operating systems like Windows, Linux, and mobile operating systems. Next, it covers file concepts and file operations like creating, renaming, deleting files and folders. The document also discusses the importance of computer maintenance like cleaning components and software updates. It provides steps for scanning and removing viruses and temporary files. Lastly, it briefly introduces firewalls and cookies.
This document provides information about computers and their components. It discusses the basic parts of a computer system including hardware, software, the central processing unit, memory, input/output devices, and storage. It also explains common computer components like the processor, hard drive, random access memory, and cache. Additionally, it covers computer classification, windows operating system basics, and common computer tasks like creating folders, finding files, and saving documents.
BasicComputer Training in Ambala ! BATRA COMPUTER CENTREjatin batra
Are you in search of Basic computer Training in Ambala? Now your search ends here... BATRA COMPUTER CENTER provides best training in C, C++, HTML, PHP, S.E.O, Web Designing, Web Development and So much courses are available .
This document discusses network and internet security and types of cyber crimes. It notes that while computers can be used for good or bad, some people use them to carry out illegal activities known as computer crimes. It then describes different types of perpetrators of cyber crimes like hackers, crackers, script kiddies, corporate spies, unethical employees, cyberextortionists, and cyberterrorists. The document also provides details on different types of computer viruses like worms, Trojan horses, macros, and boot sector viruses. It explains concepts like logic bombs, time bombs, data diddling, data stealing, and software piracy.
A computer is a machine that can accept, process, store, and output data. It consists of hardware, software, and human components. Software includes application software like Microsoft Word for specific tasks, and system software like operating systems that control the computer's functions. Common computer components are the input devices like keyboards and mice, output devices like monitors and printers, memory, storage devices, and a processor. Documents can be produced electronically using word processors, which allows for easier formatting, copying, and sharing of documents compared to manual methods.
This document provides an introduction to basic computer hardware, software, and concepts for small businesses. It defines what a computer is and explains that computers have two main parts: hardware and software. Hardware refers to the physical parts like the monitor, keyboard, mouse, and printer. Software refers to programs that tell the computer what to do, like Microsoft Word. The document also covers input and output devices, how computers work, basic terms, and how the internet can help small businesses.
This document provides an overview of basic computer hardware, software, and concepts for small businesses. It defines a computer as a device that processes information and has two main parts: hardware and software. Hardware refers to the physical components like the monitor, keyboard, and printer. Software includes programs like Microsoft Word and Excel. The document also explains input and output devices, how computers work, basic terms, and quizzes readers with multiple choice questions.
This document discusses how computers are used in various contexts such as schools, banks, and airlines. It begins by stating that computers have become an essential part of our lives, especially for young people who have grown up with personal computers and mobile phones. In schools, computers are used by students to perform math operations and research, and by teachers for presentations and administrative tasks. Banks use computers to store customer information and enable financial transactions. Airline pilots and air traffic controllers use computers to manage flights and air traffic. The document provides examples of how different professions incorporate computer technologies in their work.
There are several types of computers including supercomputers, mainframes, and mini-computers which are used to process large amounts of information for things like weather prediction, satellite images, and military scenarios. Personal computers, also known as PCs, are smaller and less powerful and are used in homes, schools, and small businesses. There are desktop, portable, and hand-held personal computers. A network connects computers together using wires or wireless to share hardware and information. Computers have two basic parts - hardware which are the tangible parts like the case, CPU, monitor, and storage devices; and software which are the programs that tell the computer what to do like operating systems and applications.
There are several types of computers including supercomputers, mainframes, and mini-computers which are used to process large amounts of information for things like weather prediction, satellite images, and military scenarios. Personal computers, also known as PCs, are smaller and less powerful and are used in homes, schools, and small businesses. There are desktop, portable, and hand-held personal computers. A network connects computers together using wires or wireless to share hardware and information. Computers have two basic parts - hardware which are the tangible parts like the case, CPU, monitor, and storage devices; and software which are the programs that tell the computer what to do like operating systems and applications.
The document provides definitions and explanations of basic computer terms and components. It describes that a computer has hardware and software, with hardware being the physical parts like the monitor, keyboard, CPU, etc. and software being programs that tell the computer what to do. It also explains input and output devices, how the motherboard and memory work together, and gives definitions for common terms like files, folders, and hard drives.
This document provides an overview of basic computer hardware, software, input/output devices, and how a computer works. It defines what a computer is and its main components. It explains that computers have hardware, which are the physical parts like the monitor, keyboard, and CPU. It also has software, which are programs that tell the computer what to do like Microsoft Word. The document also includes a basic computer quiz and definitions of common computer terms.
This document provides instructions on how to set up and configure a home network including necessary components, installation steps, and basic troubleshooting. It discusses the needed network interface cards, cables, router, computers, printer, and switch. It then explains how to configure each computer with an IP address and change the computer name. Basic commands like Ping and IPConfig are demonstrated for checking network connectivity. Potential problems like viruses are addressed, along with solutions like system restore and using different antivirus software. The document aims to comprehensively guide a user through establishing a basic home network.
The document defines hardware and software devices, providing examples of each. It also outlines steps for starting and shutting down a computer, as well as logging in and out. Computer maintenance tips are provided, such as cleaning regularly and avoiding overcharging to prevent issues and maximize the lifespan of devices.
The basics- getting started with computers-slide shareOutlearn Training
The Basics
Security — Passwords and Viruses
Software (Programs)
Windows, Icons and Buttons
Office Features and Shortcuts
Using Storage Devices Safely
Managing Files and Folders
Changing Settings
Minimising Physical Stress
Printing and Capturing Evidence
Outlearn Training
This document contains information about Pavan S. Singaraddi, a student of class X Omega at Kalpavruksha Model School. It discusses hardware and software devices, steps to start and shut down a computer, how to log in and log out, uses of a keyboard, mouse gestures, file types and extensions, and computer care and maintenance. The key points covered are the definition of hardware and software, examples of common hardware and software, steps to start up and shut down a computer, how to log in and log out of a user account, and basic computer care tips.
This document discusses how to protect personal computers from security threats. It notes that while computers are designed for ease of use, this comes at the cost of security. The internet poses risks like viruses, worms, hackers and identity theft. The document recommends using strong passwords, installing anti-virus software and updating it, using a firewall, and practicing safe internet habits to better secure home computers.
This document provides an overview of computer systems and their components. It identifies the main parts of a computer system as hardware, software, and liveware. Hardware is divided into internal components like the CPU, motherboard, RAM, and external components like keyboards, mice, and monitors. Software is classified as system software and application software. The document also defines proprietary and open source software, computer viruses, and types of malware like spyware. It describes how viruses and spyware can infect computers and the risks they pose like identity theft, fraud, and data loss.
The document provides an overview and introduction to using Windows 7 at Charles Sturt University. It discusses the different ways to access the university network, including via workstations, laptops, and thin client sessions. It describes how to power on computers and log into the university network by entering usernames and passwords. The document outlines good password practices and privacy policies. It provides a tour of the basic desktop interface including icons, the taskbar, and start button. It describes how to open programs and switch between windows. The document is intended as a beginner's guide for university staff and students.
The document discusses various topics related to operating systems and computer maintenance. It begins by defining operating systems and their main functions. It then describes different types of operating systems like Windows, Linux, and mobile operating systems. Next, it covers file concepts and file operations like creating, renaming, deleting files and folders. The document also discusses the importance of computer maintenance like cleaning components and software updates. It provides steps for scanning and removing viruses and temporary files. Lastly, it briefly introduces firewalls and cookies.
This document provides information about computers and their components. It discusses the basic parts of a computer system including hardware, software, the central processing unit, memory, input/output devices, and storage. It also explains common computer components like the processor, hard drive, random access memory, and cache. Additionally, it covers computer classification, windows operating system basics, and common computer tasks like creating folders, finding files, and saving documents.
BasicComputer Training in Ambala ! BATRA COMPUTER CENTREjatin batra
Are you in search of Basic computer Training in Ambala? Now your search ends here... BATRA COMPUTER CENTER provides best training in C, C++, HTML, PHP, S.E.O, Web Designing, Web Development and So much courses are available .
This document discusses network and internet security and types of cyber crimes. It notes that while computers can be used for good or bad, some people use them to carry out illegal activities known as computer crimes. It then describes different types of perpetrators of cyber crimes like hackers, crackers, script kiddies, corporate spies, unethical employees, cyberextortionists, and cyberterrorists. The document also provides details on different types of computer viruses like worms, Trojan horses, macros, and boot sector viruses. It explains concepts like logic bombs, time bombs, data diddling, data stealing, and software piracy.
A computer is a machine that can accept, process, store, and output data. It consists of hardware, software, and human components. Software includes application software like Microsoft Word for specific tasks, and system software like operating systems that control the computer's functions. Common computer components are the input devices like keyboards and mice, output devices like monitors and printers, memory, storage devices, and a processor. Documents can be produced electronically using word processors, which allows for easier formatting, copying, and sharing of documents compared to manual methods.
This document provides an introduction to basic computer hardware, software, and concepts for small businesses. It defines what a computer is and explains that computers have two main parts: hardware and software. Hardware refers to the physical parts like the monitor, keyboard, mouse, and printer. Software refers to programs that tell the computer what to do, like Microsoft Word. The document also covers input and output devices, how computers work, basic terms, and how the internet can help small businesses.
This document provides an overview of basic computer hardware, software, and concepts for small businesses. It defines a computer as a device that processes information and has two main parts: hardware and software. Hardware refers to the physical components like the monitor, keyboard, and printer. Software includes programs like Microsoft Word and Excel. The document also explains input and output devices, how computers work, basic terms, and quizzes readers with multiple choice questions.
This document discusses how computers are used in various contexts such as schools, banks, and airlines. It begins by stating that computers have become an essential part of our lives, especially for young people who have grown up with personal computers and mobile phones. In schools, computers are used by students to perform math operations and research, and by teachers for presentations and administrative tasks. Banks use computers to store customer information and enable financial transactions. Airline pilots and air traffic controllers use computers to manage flights and air traffic. The document provides examples of how different professions incorporate computer technologies in their work.
There are several types of computers including supercomputers, mainframes, and mini-computers which are used to process large amounts of information for things like weather prediction, satellite images, and military scenarios. Personal computers, also known as PCs, are smaller and less powerful and are used in homes, schools, and small businesses. There are desktop, portable, and hand-held personal computers. A network connects computers together using wires or wireless to share hardware and information. Computers have two basic parts - hardware which are the tangible parts like the case, CPU, monitor, and storage devices; and software which are the programs that tell the computer what to do like operating systems and applications.
There are several types of computers including supercomputers, mainframes, and mini-computers which are used to process large amounts of information for things like weather prediction, satellite images, and military scenarios. Personal computers, also known as PCs, are smaller and less powerful and are used in homes, schools, and small businesses. There are desktop, portable, and hand-held personal computers. A network connects computers together using wires or wireless to share hardware and information. Computers have two basic parts - hardware which are the tangible parts like the case, CPU, monitor, and storage devices; and software which are the programs that tell the computer what to do like operating systems and applications.
The document provides definitions and explanations of basic computer terms and components. It describes that a computer has hardware and software, with hardware being the physical parts like the monitor, keyboard, CPU, etc. and software being programs that tell the computer what to do. It also explains input and output devices, how the motherboard and memory work together, and gives definitions for common terms like files, folders, and hard drives.
This document provides an overview of basic computer hardware, software, input/output devices, and how a computer works. It defines what a computer is and its main components. It explains that computers have hardware, which are the physical parts like the monitor, keyboard, and CPU. It also has software, which are programs that tell the computer what to do like Microsoft Word. The document also includes a basic computer quiz and definitions of common computer terms.
This document provides instructions on how to set up and configure a home network including necessary components, installation steps, and basic troubleshooting. It discusses the needed network interface cards, cables, router, computers, printer, and switch. It then explains how to configure each computer with an IP address and change the computer name. Basic commands like Ping and IPConfig are demonstrated for checking network connectivity. Potential problems like viruses are addressed, along with solutions like system restore and using different antivirus software. The document aims to comprehensively guide a user through establishing a basic home network.
Improving the viability of probiotics by encapsulation methods for developmen...Open Access Research Paper
The popularity of functional foods among scientists and common people has been increasing day by day. Awareness and modernization make the consumer think better regarding food and nutrition. Now a day’s individual knows very well about the relation between food consumption and disease prevalence. Humans have a diversity of microbes in the gut that together form the gut microflora. Probiotics are the health-promoting live microbial cells improve host health through gut and brain connection and fighting against harmful bacteria. Bifidobacterium and Lactobacillus are the two bacterial genera which are considered to be probiotic. These good bacteria are facing challenges of viability. There are so many factors such as sensitivity to heat, pH, acidity, osmotic effect, mechanical shear, chemical components, freezing and storage time as well which affects the viability of probiotics in the dairy food matrix as well as in the gut. Multiple efforts have been done in the past and ongoing in present for these beneficial microbial population stability until their destination in the gut. One of a useful technique known as microencapsulation makes the probiotic effective in the diversified conditions and maintain these microbe’s community to the optimum level for achieving targeted benefits. Dairy products are found to be an ideal vehicle for probiotic incorporation. It has been seen that the encapsulated microbial cells show higher viability than the free cells in different processing and storage conditions as well as against bile salts in the gut. They make the food functional when incorporated, without affecting the product sensory characteristics.
Evolving Lifecycles with High Resolution Site Characterization (HRSC) and 3-D...Joshua Orris
The incorporation of a 3DCSM and completion of HRSC provided a tool for enhanced, data-driven, decisions to support a change in remediation closure strategies. Currently, an approved pilot study has been obtained to shut-down the remediation systems (ISCO, P&T) and conduct a hydraulic study under non-pumping conditions. A separate micro-biological bench scale treatability study was competed that yielded positive results for an emerging innovative technology. As a result, a field pilot study has commenced with results expected in nine-twelve months. With the results of the hydraulic study, field pilot studies and an updated risk assessment leading site monitoring optimization cost lifecycle savings upwards of $15MM towards an alternatively evolved best available technology remediation closure strategy.
ENVIRONMENT~ Renewable Energy Sources and their future prospects.tiwarimanvi3129
This presentation is for us to know that how our Environment need Attention for protection of our natural resources which are depleted day by day that's why we need to take time and shift our attention to renewable energy sources instead of non-renewable sources which are better and Eco-friendly for our environment. these renewable energy sources are so helpful for our planet and for every living organism which depends on environment.
Climate Change All over the World .pptxsairaanwer024
Climate change refers to significant and lasting changes in the average weather patterns over periods ranging from decades to millions of years. It encompasses both global warming driven by human emissions of greenhouse gases and the resulting large-scale shifts in weather patterns. While climate change is a natural phenomenon, human activities, particularly since the Industrial Revolution, have accelerated its pace and intensity
Presented by The Global Peatlands Assessment: Mapping, Policy, and Action at GLF Peatlands 2024 - The Global Peatlands Assessment: Mapping, Policy, and Action
Microbial characterisation and identification, and potability of River Kuywa ...Open Access Research Paper
Water contamination is one of the major causes of water borne diseases worldwide. In Kenya, approximately 43% of people lack access to potable water due to human contamination. River Kuywa water is currently experiencing contamination due to human activities. Its water is widely used for domestic, agricultural, industrial and recreational purposes. This study aimed at characterizing bacteria and fungi in river Kuywa water. Water samples were randomly collected from four sites of the river: site A (Matisi), site B (Ngwelo), site C (Nzoia water pump) and site D (Chalicha), during the dry season (January-March 2018) and wet season (April-July 2018) and were transported to Maseno University Microbiology and plant pathology laboratory for analysis. The characterization and identification of bacteria and fungi were carried out using standard microbiological techniques. Nine bacterial genera and three fungi were identified from Kuywa river water. Clostridium spp., Staphylococcus spp., Enterobacter spp., Streptococcus spp., E. coli, Klebsiella spp., Shigella spp., Proteus spp. and Salmonella spp. Fungi were Fusarium oxysporum, Aspergillus flavus complex and Penicillium species. Wet season recorded highest bacterial and fungal counts (6.61-7.66 and 3.83-6.75cfu/ml) respectively. The results indicated that the river Kuywa water is polluted and therefore unsafe for human consumption before treatment. It is therefore recommended that the communities to ensure that they boil water especially for drinking.
Peatland Management in Indonesia, Science to Policy and Knowledge Education
kmf.pptx
1. Topic : ICT Skills
Subject: Information Technology
Presented by : Prajwal
Std : 10th
Roll no :20
2.
3. o ICT skills help us to communicate, run our business and
stay connected with our family and friends. Hence, every
person needs to acquire ICT skills and build them to stay
updated with the latest software and applications (apps).
Computer Hardware and Software :
4. Hardware- The physical parts that we can see and touch are called
hardware. It is the machinery of a computer. These are the keyboard,
monitor, CPU, etc.
Software: The part which cannot be seen but it
makes hardware to work. Example: Windows, MS
office etc.
Operating System (OS). This is the software that starts working as soon
as we switch on a computer. It displays the desktop on the monitor. Some of
the most commonly used operating systems for laptops and desktop
are Ubuntu, Microsoft Windows and Mac OS.
5. To start a computer, press the Power button on
the CPU. This will start the operating system and
display the desktop on the monitor.
Basic Functions performed when a
computer starts a computer automatically runs a
basic program called BIOS (Basic
Input/Output System) as soon as it is switched on or
the power button is pushed on. The BIOS first does
a self-test. If the self-test shows that the system is
fine, the BIOS will load the Operating System.
6. When you login to the computer with your
login-ID and password the computer knows that
you are an authorised person and allows you to
work on the applications in the computer.
Shutting Down a Computer :-
You can shut down the windows computer
clicking Star button at the bottom left corner and then
click Shut Down. When you click Shut down, the
Operating System will close all the applications
and turn off the computer.
7. A keyboard is an input device used to type text,
numbers and commands into the computer.
Function Keys :-
Keys labeled from F1 to F12 are function keys. You use
them to perform specific functions.
(a) Control keys : Keys, such as Control (CTRL), SHIFT,
SPACEBAR, ALT, CAPS LOCK and TAB, are special
control keys
8. (b) Enter key: The label on this key can be either ENTER or RETURN, depending on the
brand of computer that you are using. You use the ENTER or the RETURN key to move
the cursor to the beginning of a new line.
(c) Punctuation keys: Punctuation keys include keys for punctuation marks, such as
colon (:), semicolon (;), question mark (?), single quotation marks (‘ ’), and double
quotation marks (“ ”). (d)
(d) Navigation keys: Keys, such as the arrow keys, HOME, END, PAGE UP, and PAGE
DOWN are navigation keys.
(e) Command keys: Keys, such as INSERT (INS), DELETE (DEL), and BACKSPACE are
command
keys. When the INSERT key is turned ON, it helps you overwrite characters to the right of
the
cursor
(f) Windows key: Pressing this key opens the Start menu
9. a small device that you can use to
move, select and open items on your
computer screen
Roll Over or Hover:-
Some actions can be done by simply rolling over or
hovering over an item. When you bring the mouse over a
file in File Explorer, it will show the details of that file
Point and Click :-
As you move the mouse on your desk, a pointer
moves correspondingly on your screen.When you click
a particular file, it gets selected
10. Drag and Drop
To move an item, you need to click it, and then holding
the mouse button down, move the item to a new
location. After you move the item to the new location,
you release the mouse button. This is called drag and
drop.
Double-click
Double-clicking means to quickly click the left mouse
button twice. When we double-click on a file, it will open
the file.
11. Files and Folders
All information stored in a computer is kept in files.Each file is
given a file name and has a file name extension that identifies the file
type.Example: .txt, .jpg, .mp3.
A folder is a location where a group of files can be stored
Basic Shortcuts
CTRL+z — undo
CTRL+y — redo
CTRL+a — select all
CTRL+x — cut
CTRL+c — copy
CTRL+v — paste
CTRL+p — print
CTRL+s — save.
12. Importance of Care and Maintenance of
Computers
Taking care of electronic devices, such as
computer and mobiles helps them to work
properly.
(i) Keyboard: You can clean a keyboard with a soft brush
(ii) Screen: You can wipe the screen with a soft cloth to remove
any finger marks.
13. iii) Handle devices carefully: Handle and move your laptop carefully and
avoid dropping or banging it against a hard surface.
(v) Keep the computer cool: If a computer, laptop or mobile device gets
overheated, the internal parts can be damaged. The CPU has an internal fan to
keep it cool. We should make sure the fan is functioning.
(vi) Do not overcharge your battery: Sometimes we keep a device plugged in
for charging even after it is fully charged.This reduces the battery life. Always
unplug the device once it
is charged 100%.
(vii) Always plug in devices carefully: Any device being connected to a
laptop or computer such as a USB drive or headphones, should be done gently.
It should not be forced into the port.
viii) Do not run too many programs at a time: When too many programs are
running at the same time, the computer can become slow and even crash.
14. (a) Daily Maintenance
i. Clean up your e-mail inbox
ii. Download e-mail attachments and
save in proper folders
(b) Weekly Maintenance
i. Clean your keyboard
ii. Clean your monitor
iii. Dust CPU and printer
iv. Backup your data to an external
drive
(c) Monthly Maintenance
i. Transfer photographs to
computer and delete from drive
ii. Organise photos into folders or
albums
iii. Clean up ‘Download’ folder
iv. Uninstall unused programs and
apps
v. Run disk-cleaner software
vi. Run full system virus scan
(d) Yearly/Annual Maintenance
(i) Clean up contacts list on social media
accounts
(ii) Clean up e-mail contact list
(iii) Update your operating system
(iv) Check for expiry of anti-virus software
and renew
15. Backup Your Data
Backing up data means to save the information present on your computer on another
device, such as CD/DVD drives Data can recovered from here in case the computer
stops working completely. Computers can crash, humans can make mistakes and
natural disasters, such as floods can happen
Scanning and Cleaning Viruses
Sometimes computer viruses can enter a computer from such attacks we can install
anti-virus software. This will prevent any viruses from entering and will also clean any
viruses that may enter our system before they affect the data.
Increasing Computer Performance If we have been using a computer for a long time we
have a lot of unnecessary files and data, such as temporary files and images. When
they use too much hard-disk space, the performance of the computer goes down. It is
important that we keep cleaning by removing any extra files.
Removing SPAM from your Computer
Sometimes we get emails from companies who are advertising a product or trying to
attract you to their website. Such mails are called SPAM. We should never respond to
SPAM and delete it on a regular basis.
16. Threats to Computer
Threats are the ways in which personal information can be leaked from a computer
without our knowledge.
(a) Theft: Theft means stealing of information or hardware. These may be of three
types:
• Physical: Where a person may steal your desktop computer or laptop.
• Identity: Where a hacker steals your personal information and assumes your identity.
Using this false identity, the hacker can gain access to your account information or
perform illegal activity.
• Software Piracy: This is stealing of software and includes using or distributing
unlicensed and unauthorised copies of a computer program or software.
17. b) Virus: Viruses are computer programs that can damage the data and software
programs or steal the information stored on a computer. Major types of viruses are Worms
and Trojan Horse.
Worms: These are viruses that replicate themselves and spread to all files once they
Information and Communication Technology Skills 81 attack a computer. This makes it
very difficult to remove them.
Trojan Horse: A Trojan Horse disguises itself i.e., it appears to be a useful software
program but once it reaches a computer it starts behaving like a virus and destroying data.
• Online Predator: Online predators are people who trap you into inappropriate
relationships.
They may be older people posing to be your age, bullying you into doing illegal activities
online and sometimes face to face.
• Internet Scams: Sometimes you may receive very attractive offers saying you have won
huge money in a lottery and that you can claim the prize by depositing a certain amount of
money. When you deposit the money using credit card or online banking, you not only lose
the deposit money but your card/account information may be misused later.
18. (a) Use passwords to login to your computer: Use passwords that are difficult to
guess. Passwords are difficult to hack if they are a mix of small (For example ‘a b c d’)
and capital letters (For example, ‘H J E R’), numbers (For example ‘8 7 6 5’) and special
characters
(For example, ’% ^ # $’). This would prevent unauthorised people from using your
computer.
(b) Install Anti-virus and Firewall: Anti-viruses and Firewall monitor the data coming in
and out of a computer and prevent and viruses from entering. Anti-viruses can also
detect and clean viruses that may have entered a computer.
(c) Encrypt Data: This is usually done by banks and companies in which important
customer information is stored. They can encrypt their entire hard disk using the
encrypting feature in Windows (Bitlocker). This would force users to use a decryption
password (or key) before starting the computer thus preventing unauthorised usage.
(d) Secure sites: Give details of your credit card or bank account only on secure sites.
See in the address bar of the browser. If the site address starts with https://and a lock
symbol, then it is safe to give your credit card and bank details.