SlideShare a Scribd company logo
1 of 32
Download to read offline
INFORMATION,
COMMUNICATION &
TECHNOLOGY
ICT includes all the tools used for information and
communications.
Information refers to processed data or output that is
generated by computing devices.
Communication refers to transfer of knowledge and
information.
Software's , hardware's
Websites , web pages, web servers,
The operating system performs
basic tasks, such as booting the
system, recognizing input, sending
output, keeping track of location of
files and directories on the disk,
controlling peripheral devices such
as disk drives, printers, etc.
OS (OPERATING SYSTEM)
Functions of Operating System
• Process Management (manage working of processer)
• Memory Management (sharing of memory to apps)
• Device Management (manage I/O devices)
• File Management (track of info regarding files)
• Security ( authentication)
• Error Detection (external treat, software security)
• Job Scheduling (determine which programs run first)
C Language for windows
SWIFT for
IOS
CLASSIFICATION OF OPERATING
SYSTEM
GUI and CUI
• In CUI Os , the user sends
commands and instructions
to the computer in
character form, i.e., by
typing commands at the
command prompt. The
display on the screen does
not contain any graphics.
• CUI OS is not as interactive
and user friendy as GUI OS.
• Examples are MS-DOS and
UNIX
• In GUI OS, the interface
is graphical, i.e., the
user interacts with the
computer using figures
and graphics on the
screen. It is basically
menu driven.
• GUI OS is user friendly
and interactive.
• Examples are windows
and Linux
On the basis of Interface
Mobile operating system
Single User: a single-user operating system
provides access to a single user at a time. For
example MS-DOS.
Multi User: some OS allow access to two or more
users to run the same programs at the same time
on a network. Some OS permits hundreds or even
thousands of concurrent users. For example:
Linux, Unix, etc.
On the basis of Users
• Uni processing: this type of OS allow single
processing on a single processor. i.e. only
one program at a time.
• Multi Processing: this type of operating
system supports simultaneous processing of
more than one program.
On the basis of Processing
LIST of OS
• MICROSOFT WINDOW
• APPLE MAC OS
• GOOGLE ANDROID OS
• LINUX OPERATING SYSTEM
Parts of Application window
FILE SYSTEM
• File system is referred as the basic
structure and concise format to
arrange the set of information with
their names.
• All information is stored and
recognized in the computer in
different types of file format.
File(type) Extension
music .mp3, wav
Picture/Image .png, .jpg, .jpeg, .gif
Portable document format .pdf
Microsoft word
Ms Powerpoint
Ms Excel
.docx,
.ppt
.xlsx
html .htm, .html
video .mov, .avi, wmv, .MP4
Files can be named, stored ad retrieved.
It also facilities grouping of files in the form of
directories or folders for their access and
protection.
The arrangement of these files in the folders is
known as ‘File Management’.
FILE MANAGEMENT:
How to manage files…..
• Open a file
• Save a file
• Save as a file
• Rename a file
• Delete a file
• Restore a file
• Sort the files
• Select all the file
• Select only the chosen one
• Create a Folder
• Check the Disk Management (right click on my
computer -> Manage
Checking the
properties of File
DEVICE DRIVER
• A device driver is a form of software
that enables a hardware device to be
compatible with the computer.
COMPUTER CARE
Cleaning hardware parts of a computer:
• Monitor: spray water or cleaning liquid on a soft lint free cloth
such as cotton and gently wipe the monitor.
• Keyboard: blow air in between the keys to remove dust using
compressed air.
• Optical Mouse: Clean the keyboard by holding it upside down
and shaking it.
• Digital Camera: Never touch the lens of the camera.
• Optical disk (Cd, DVD, Blu-ray Disc) : Put the drop of fluid on a
cotton cloth and gently rub it on the disk to remove dust.
• Preparing Maintenance Schedule; Maintenance can be done on
daily basis, on weekly basis , on monthly basis or on yearly basis.
• MALWARE: Malware refers to infectious programs that
hamper the functioning of a computer system. It is an
unwanted software which is designed to damage a
computer system. Some common types of malware are
virus, Trojan horse, spyware, etc.
• VIRUS: A computer virus is a type of unwanted
computer program which is developed by miscreants
with an intention to infect the files of a computer,
corrupt a database or hamper the functioning of a
computer system.
• Boot Sector Virus: booting is the process of loading
operating system in the primary memory from the boot
sector.
• Program File virus: A program file infecting
virus is a type of malware that infects the
executable files of a program with the intention
of causing permanent damage or making the
program useless. A file infecting virus overwrites
the code or inserts infected code into the source
of an executable or the program file.
• Worms: Worms replicate inside the system and
thus occupy a huge memory space in the
storage device. Worms spread more commonly
in computers that are connected to a network.
• Trojan Horse: Trojan are infectious programs
which silently infect the computer and corrupt
the files of a host computer.
• Spyware : it is a program which infects and
collects information of the computer without
the owner’s knowledge or consent.
• Spam: Spam refers to an unwanted and sun
solicited message which is received in the inbox
of a person’s email account or newsgroup.
SYMPTOMS OF COMPUTER VIRUS:
There are certain hints that a computer has been
infected by virus like:
• slowdown of computer system
• Pop Up Messages
• Crash
• Running out of Storage space
• Loss of file
• Unusual activity of messages or programs
• Unusual network activity
WAYS TO PREVENT A VIRUS:
• Download information from trusted websites: the web
address of such website start with https://
• Installation of antivirus and firewall : Avast, Quick heal,
McAfee, Norton, Kaspersky, AVG
• Scanning and cleaning of Hard Disk.
• Update the Antivirus everyday
• Use passwords to login to your computer
• Encrypt data
• Removing temporary files
• Removing files of temporary folder: type %temp% in
search area.
ICT Skills.pdf
ICT Skills.pdf
ICT Skills.pdf

More Related Content

What's hot

information technology
information technology information technology
information technology rukhsarqazi1
 
Presentation on computer
Presentation on computerPresentation on computer
Presentation on computerNausad Ahamed
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security PresentationPraphullaShrestha1
 
Computer introduction
Computer introduction Computer introduction
Computer introduction mariasukhera
 
Computer virus and anti virus presentation
Computer virus and anti virus presentationComputer virus and anti virus presentation
Computer virus and anti virus presentationSardar Kaukaz
 
Computer Fundamental
Computer FundamentalComputer Fundamental
Computer Fundamentalactanimation
 
Class 9 part b unit 1 it&ites ppt
Class 9 part b unit 1 it&ites pptClass 9 part b unit 1 it&ites ppt
Class 9 part b unit 1 it&ites pptthanushreevk
 
information technology
information technologyinformation technology
information technologykrithikha2001
 
Networking Devices
Networking DevicesNetworking Devices
Networking DevicesNitin16498
 
information and communication technology
information and communication technologyinformation and communication technology
information and communication technologyAmudha Mony
 
Internet and Networking
Internet and NetworkingInternet and Networking
Internet and Networkingnhumar
 
Computer Science & Information Systems
Computer Science & Information SystemsComputer Science & Information Systems
Computer Science & Information SystemsLuis Borges Gouveia
 

What's hot (20)

information technology
information technology information technology
information technology
 
Presentation on computer
Presentation on computerPresentation on computer
Presentation on computer
 
Computer network ppt
Computer network pptComputer network ppt
Computer network ppt
 
Computer security
Computer securityComputer security
Computer security
 
3. advantages and disadvantages of using computers
3. advantages and disadvantages of using computers3. advantages and disadvantages of using computers
3. advantages and disadvantages of using computers
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
Computer introduction
Computer introduction Computer introduction
Computer introduction
 
Computer virus and anti virus presentation
Computer virus and anti virus presentationComputer virus and anti virus presentation
Computer virus and anti virus presentation
 
Computer Fundamental
Computer FundamentalComputer Fundamental
Computer Fundamental
 
Class 9 part b unit 1 it&ites ppt
Class 9 part b unit 1 it&ites pptClass 9 part b unit 1 it&ites ppt
Class 9 part b unit 1 it&ites ppt
 
information technology
information technologyinformation technology
information technology
 
COMPUTER SYSTEM
COMPUTER SYSTEMCOMPUTER SYSTEM
COMPUTER SYSTEM
 
ICT in Education
ICT in EducationICT in Education
ICT in Education
 
Networking Devices
Networking DevicesNetworking Devices
Networking Devices
 
Computer Network
Computer NetworkComputer Network
Computer Network
 
information and communication technology
information and communication technologyinformation and communication technology
information and communication technology
 
ICTs
ICTsICTs
ICTs
 
Internet and Networking
Internet and NetworkingInternet and Networking
Internet and Networking
 
Computer Science & Information Systems
Computer Science & Information SystemsComputer Science & Information Systems
Computer Science & Information Systems
 
Networking devices
Networking devicesNetworking devices
Networking devices
 

Similar to ICT Skills.pdf

Introduction to computer lec (4)
Introduction to computer lec  (4)Introduction to computer lec  (4)
Introduction to computer lec (4)Samiullah Khan
 
ICT Presentation operating system and types.pptx
ICT Presentation operating system and types.pptxICT Presentation operating system and types.pptx
ICT Presentation operating system and types.pptxShehlafaiz1
 
Operating System and Virus (Introduction).pptx
Operating System and Virus (Introduction).pptxOperating System and Virus (Introduction).pptx
Operating System and Virus (Introduction).pptxDondonGoles
 
Virus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti VirusVirus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti VirusAdeel Rasheed
 
Computer power point presentation
Computer power point presentationComputer power point presentation
Computer power point presentationPranjal Mishra
 
Application'sand security
Application'sand securityApplication'sand security
Application'sand securityarun nalam
 
CAT Grade 12 leeson 10.pptx
CAT Grade 12 leeson 10.pptxCAT Grade 12 leeson 10.pptx
CAT Grade 12 leeson 10.pptxMotsatsi Malatja
 
basicitknowledge-101119022655-phpapp02.ppt
basicitknowledge-101119022655-phpapp02.pptbasicitknowledge-101119022655-phpapp02.ppt
basicitknowledge-101119022655-phpapp02.pptPawachMetharattanara
 
Basic IT knowledge
Basic IT knowledgeBasic IT knowledge
Basic IT knowledgeTechsailor
 

Similar to ICT Skills.pdf (20)

B) Computer Basics
B) Computer BasicsB) Computer Basics
B) Computer Basics
 
Introduction to computer lec (4)
Introduction to computer lec  (4)Introduction to computer lec  (4)
Introduction to computer lec (4)
 
ICT Presentation operating system and types.pptx
ICT Presentation operating system and types.pptxICT Presentation operating system and types.pptx
ICT Presentation operating system and types.pptx
 
system Security
system Security system Security
system Security
 
Operating System and Virus (Introduction).pptx
Operating System and Virus (Introduction).pptxOperating System and Virus (Introduction).pptx
Operating System and Virus (Introduction).pptx
 
what is Operating system
what is Operating systemwhat is Operating system
what is Operating system
 
Virus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti VirusVirus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti Virus
 
Virussss.pdf
Virussss.pdfVirussss.pdf
Virussss.pdf
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computer power point presentation
Computer power point presentationComputer power point presentation
Computer power point presentation
 
Application'sand security
Application'sand securityApplication'sand security
Application'sand security
 
K04 software
K04 softwareK04 software
K04 software
 
CAT Grade 12 leeson 10.pptx
CAT Grade 12 leeson 10.pptxCAT Grade 12 leeson 10.pptx
CAT Grade 12 leeson 10.pptx
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
basicitknowledge-101119022655-phpapp02.ppt
basicitknowledge-101119022655-phpapp02.pptbasicitknowledge-101119022655-phpapp02.ppt
basicitknowledge-101119022655-phpapp02.ppt
 
Basic IT knowledge
Basic IT knowledgeBasic IT knowledge
Basic IT knowledge
 
Open Source Software
Open Source SoftwareOpen Source Software
Open Source Software
 
System Software
System SoftwareSystem Software
System Software
 
Viruses andthreats@dharmesh
Viruses andthreats@dharmeshViruses andthreats@dharmesh
Viruses andthreats@dharmesh
 

More from TENZING LHADON

NETWORK FUNDAMENTALS, CLASS X, 402 , CBSE
NETWORK FUNDAMENTALS, CLASS X, 402 , CBSENETWORK FUNDAMENTALS, CLASS X, 402 , CBSE
NETWORK FUNDAMENTALS, CLASS X, 402 , CBSETENZING LHADON
 
Entrepreneurship Skill, Class X, CBSE 402
Entrepreneurship Skill, Class X, CBSE 402Entrepreneurship Skill, Class X, CBSE 402
Entrepreneurship Skill, Class X, CBSE 402TENZING LHADON
 
ONLINE TRANSACTION & Blogging.pdf
ONLINE TRANSACTION & Blogging.pdfONLINE TRANSACTION & Blogging.pdf
ONLINE TRANSACTION & Blogging.pdfTENZING LHADON
 
Data Base Management System.pdf
Data Base Management System.pdfData Base Management System.pdf
Data Base Management System.pdfTENZING LHADON
 
COMMUNICATION SKILLS.pptx
COMMUNICATION SKILLS.pptxCOMMUNICATION SKILLS.pptx
COMMUNICATION SKILLS.pptxTENZING LHADON
 
Cyber ethics(CBSE Class X), Computer Application
Cyber ethics(CBSE Class X), Computer ApplicationCyber ethics(CBSE Class X), Computer Application
Cyber ethics(CBSE Class X), Computer ApplicationTENZING LHADON
 
Communication channels
Communication channelsCommunication channels
Communication channelsTENZING LHADON
 
Components of computer
Components of computerComponents of computer
Components of computerTENZING LHADON
 

More from TENZING LHADON (15)

NETWORK FUNDAMENTALS, CLASS X, 402 , CBSE
NETWORK FUNDAMENTALS, CLASS X, 402 , CBSENETWORK FUNDAMENTALS, CLASS X, 402 , CBSE
NETWORK FUNDAMENTALS, CLASS X, 402 , CBSE
 
Entrepreneurship Skill, Class X, CBSE 402
Entrepreneurship Skill, Class X, CBSE 402Entrepreneurship Skill, Class X, CBSE 402
Entrepreneurship Skill, Class X, CBSE 402
 
WEB SECURITY.pdf
WEB SECURITY.pdfWEB SECURITY.pdf
WEB SECURITY.pdf
 
ONLINE TRANSACTION & Blogging.pdf
ONLINE TRANSACTION & Blogging.pdfONLINE TRANSACTION & Blogging.pdf
ONLINE TRANSACTION & Blogging.pdf
 
Data Base Management System.pdf
Data Base Management System.pdfData Base Management System.pdf
Data Base Management System.pdf
 
Entrepreneurship.pdf
Entrepreneurship.pdfEntrepreneurship.pdf
Entrepreneurship.pdf
 
EXcel_Hyperlink.pdf
EXcel_Hyperlink.pdfEXcel_Hyperlink.pdf
EXcel_Hyperlink.pdf
 
GREEN SKILLS.pptx
GREEN SKILLS.pptxGREEN SKILLS.pptx
GREEN SKILLS.pptx
 
self management.pptx
self management.pptxself management.pptx
self management.pptx
 
COMMUNICATION SKILLS.pptx
COMMUNICATION SKILLS.pptxCOMMUNICATION SKILLS.pptx
COMMUNICATION SKILLS.pptx
 
Cyber ethics(CBSE Class X), Computer Application
Cyber ethics(CBSE Class X), Computer ApplicationCyber ethics(CBSE Class X), Computer Application
Cyber ethics(CBSE Class X), Computer Application
 
Devices
DevicesDevices
Devices
 
Network
NetworkNetwork
Network
 
Communication channels
Communication channelsCommunication channels
Communication channels
 
Components of computer
Components of computerComponents of computer
Components of computer
 

Recently uploaded

microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 

Recently uploaded (20)

microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 

ICT Skills.pdf

  • 2. ICT includes all the tools used for information and communications. Information refers to processed data or output that is generated by computing devices. Communication refers to transfer of knowledge and information. Software's , hardware's Websites , web pages, web servers,
  • 3. The operating system performs basic tasks, such as booting the system, recognizing input, sending output, keeping track of location of files and directories on the disk, controlling peripheral devices such as disk drives, printers, etc. OS (OPERATING SYSTEM)
  • 4. Functions of Operating System • Process Management (manage working of processer) • Memory Management (sharing of memory to apps) • Device Management (manage I/O devices) • File Management (track of info regarding files) • Security ( authentication) • Error Detection (external treat, software security) • Job Scheduling (determine which programs run first)
  • 5.
  • 6. C Language for windows
  • 9. GUI and CUI • In CUI Os , the user sends commands and instructions to the computer in character form, i.e., by typing commands at the command prompt. The display on the screen does not contain any graphics. • CUI OS is not as interactive and user friendy as GUI OS. • Examples are MS-DOS and UNIX • In GUI OS, the interface is graphical, i.e., the user interacts with the computer using figures and graphics on the screen. It is basically menu driven. • GUI OS is user friendly and interactive. • Examples are windows and Linux On the basis of Interface
  • 10.
  • 12.
  • 13. Single User: a single-user operating system provides access to a single user at a time. For example MS-DOS. Multi User: some OS allow access to two or more users to run the same programs at the same time on a network. Some OS permits hundreds or even thousands of concurrent users. For example: Linux, Unix, etc. On the basis of Users
  • 14. • Uni processing: this type of OS allow single processing on a single processor. i.e. only one program at a time. • Multi Processing: this type of operating system supports simultaneous processing of more than one program. On the basis of Processing
  • 15. LIST of OS • MICROSOFT WINDOW • APPLE MAC OS • GOOGLE ANDROID OS • LINUX OPERATING SYSTEM
  • 16.
  • 18. FILE SYSTEM • File system is referred as the basic structure and concise format to arrange the set of information with their names. • All information is stored and recognized in the computer in different types of file format.
  • 19. File(type) Extension music .mp3, wav Picture/Image .png, .jpg, .jpeg, .gif Portable document format .pdf Microsoft word Ms Powerpoint Ms Excel .docx, .ppt .xlsx html .htm, .html video .mov, .avi, wmv, .MP4
  • 20. Files can be named, stored ad retrieved. It also facilities grouping of files in the form of directories or folders for their access and protection. The arrangement of these files in the folders is known as ‘File Management’. FILE MANAGEMENT:
  • 21. How to manage files….. • Open a file • Save a file • Save as a file • Rename a file • Delete a file • Restore a file • Sort the files • Select all the file • Select only the chosen one • Create a Folder • Check the Disk Management (right click on my computer -> Manage Checking the properties of File
  • 22. DEVICE DRIVER • A device driver is a form of software that enables a hardware device to be compatible with the computer.
  • 23. COMPUTER CARE Cleaning hardware parts of a computer: • Monitor: spray water or cleaning liquid on a soft lint free cloth such as cotton and gently wipe the monitor. • Keyboard: blow air in between the keys to remove dust using compressed air. • Optical Mouse: Clean the keyboard by holding it upside down and shaking it. • Digital Camera: Never touch the lens of the camera. • Optical disk (Cd, DVD, Blu-ray Disc) : Put the drop of fluid on a cotton cloth and gently rub it on the disk to remove dust. • Preparing Maintenance Schedule; Maintenance can be done on daily basis, on weekly basis , on monthly basis or on yearly basis.
  • 24.
  • 25. • MALWARE: Malware refers to infectious programs that hamper the functioning of a computer system. It is an unwanted software which is designed to damage a computer system. Some common types of malware are virus, Trojan horse, spyware, etc. • VIRUS: A computer virus is a type of unwanted computer program which is developed by miscreants with an intention to infect the files of a computer, corrupt a database or hamper the functioning of a computer system. • Boot Sector Virus: booting is the process of loading operating system in the primary memory from the boot sector.
  • 26. • Program File virus: A program file infecting virus is a type of malware that infects the executable files of a program with the intention of causing permanent damage or making the program useless. A file infecting virus overwrites the code or inserts infected code into the source of an executable or the program file. • Worms: Worms replicate inside the system and thus occupy a huge memory space in the storage device. Worms spread more commonly in computers that are connected to a network.
  • 27. • Trojan Horse: Trojan are infectious programs which silently infect the computer and corrupt the files of a host computer. • Spyware : it is a program which infects and collects information of the computer without the owner’s knowledge or consent. • Spam: Spam refers to an unwanted and sun solicited message which is received in the inbox of a person’s email account or newsgroup.
  • 28. SYMPTOMS OF COMPUTER VIRUS: There are certain hints that a computer has been infected by virus like: • slowdown of computer system • Pop Up Messages • Crash • Running out of Storage space • Loss of file • Unusual activity of messages or programs • Unusual network activity
  • 29. WAYS TO PREVENT A VIRUS: • Download information from trusted websites: the web address of such website start with https:// • Installation of antivirus and firewall : Avast, Quick heal, McAfee, Norton, Kaspersky, AVG • Scanning and cleaning of Hard Disk. • Update the Antivirus everyday • Use passwords to login to your computer • Encrypt data • Removing temporary files • Removing files of temporary folder: type %temp% in search area.