Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Itc Skills Ii: The Importance of Acquiring and Building ICT Skills"

Download as pdf or txt
Download as pdf or txt
You are on page 1of 9

PRASHANT KIRAD

ITC SKILLS II

The Importance of Acquiring and Building ICT Skills"


Acquiring and developing ICT skills are essential for effective
communication, business operations, and maintaining connections with
family and friends. Therefore, it is crucial for individuals to continually
enhance their ICT skills to keep pace with the latest software and
applications available.

A computer system is comprised of two main components:


Hardware - These are the physical parts of the computer that can be

10
seen and touched, such as the keyboard, monitor, and CPU.
Software - This refers to the intangible components that enable the
hardware to function. Examples include Windows and MS Office.

AN OPERATING SYSTEM &


SERVES AS AN INTERFACE BETWEEN USERS AND COMPUTERS, DIRECTING
9
PROGRAM PROCESSING AND CONTROLLING COMPUTER OPERATIONS. IT
PERFORMS SEVERAL KEY FUNCTIONS:
1. Supervising hardware by monitoring each device's status and usage.
B

2. Ensuring proper functionality of hardware devices.


U

3. Managing software resources.


4. Regulating memory usage by tracking available and utilized memory for
PH

each software.
5. Organizing files and directories within the computer system.
6. Monitoring disk space utilization for specific files.
7. Enabling file management operations like creation, copying, moving, and
EX

deletion.

Types of Operating Systems


The different types of operating systems are as follows:

Different types of operating systems serve specific purposes:


Single-user, single-task OS: Allows only one user to utilize the computer for
a single task at a time.
Single-user, multi-task OS: Found in desktops and laptops, it enables one
user to run multiple programs simultaneously, such as Windows and Apple
MacOS.
Multi-user OS: Permits multiple users to work on the same computer either
at different times or concurrently.
PRASHANT KIRAD

Real-time OS: Responds to input within specific time constraints,


ensuring consistent completion times for operations. Examples include
Lynx OS and Windows CE.
Distributed OS: Operates across interconnected computers in a
network, integrating them into a unified computing and storage
environment. Examples include Windows, UNIX, and LINUX.
Interactive (GUI-based) OS: Features a user-friendly graphical interface
allowing input through mouse actions like clicking, double-clicking, or
right-clicking. Windows exemplifies this type of operating system.

Understanding Desktop Components in Windows:

10
Taskbar: Positioned along the bottom of the screen, the taskbar is a lengthy
horizontal bar that provides essential functionality. To the left, you'll find the
Start button, while the Date/Time is located to the right. Additionally, the
&
taskbar displays icons representing open programs and several shortcuts.
Start Button: Situated on the left side of the taskbar, the Start button serves
9
as a gateway to the Start menu, offering access to various programs and
features upon clicking.
B

Recycle Bin: Housing deleted files and folders, the Recycle Bin allows users
to restore accidentally removed items. It serves as a temporary storage
U

space for items before permanent deletion.


PH

CREATING AND MANAGING FILES AND FOLDERS


Files – Every single thing you keep on your computer is kept as a file. A file
system is a method for naming, storing, and retrieving files.
EX

Creating Files:
1. Right-click on any empty space within the right column.
2. From the shortcut menu, choose "New" and then select the desired file
type you wish to create.
Renaming Folders and Files:
1. Right-click on the file or folder.
2. Select the "Rename" option from the shortcut menu.
3. Input the new name or modify the existing one, then press the Enter
key.
4. Alternatively, simply select the file/folder and press the function key
F2.
5. Right-click on any empty space within the right column.
6. From the shortcut menu, choose "New" and then select the desired file
type you wish to create.
PRASHANT KIRAD

Folder: Folders and directories serve as containers for single or multiple


files. Within each directory or folder, you may find related files and/or
subfolders. Sub-folders can contain one or more files and additional sub-
folders, allowing for easy organization and accessibility of files.
Creating a Folder:
1. Double-click the Computer icon.
2. Select the drive where you wish to create the folder, such as Local Disk D:.
3. A window will open, displaying the files and folders on Local Disk D:.
4. Click on "New Folder" in the toolbar.
5. A new folder named "New Folder" will be created, with the name
highlighted.

10
6. Enter a desired name for the folder.
Renaming Folders and Files:
1. Right-click on the file or folder.
&
2. From the shortcut menu, choose the "Rename" option.
3. Type the new name or edit the existing one, then press Enter.
4. Alternatively, select the file/folder and press the Function key F2.
9
Deleting Files or Folders:
1. Click on the file or folder.
B

2. Press the Delete key.


3. Alternatively, right-click and select the "Delete" option from the shortcut
U

menu.
PH

BASIC SHORTCUTS
CTRL+ z — undo
CTRL+ y — redo
EX

CTRL+ a — select all


CTRL+ x — cut
CTRL+ c — copy
CTRL+ v — paste
CTRL+ p — print
CTRL+ s — save.

APPLY BASIC SKILLS FOR CARE AND MAINTENANCE OF COMPUTER

Computer systems require maintenance in order to function properly.


System failure may result from poor maintenance. You may be able to
keep it in good working order by giving it routine care and
maintenance. Installing updates, security, creating backups, and
scanning are all part of routine system maintenance.
PRASHANT KIRAD

Maintaining Computer System:


1. Ensure the computer is free from dust by regular cleaning.
2. Avoid consuming food or beverages while using the computer to
prevent spills.
3. Keep hands clean before using the keyboard to maintain its
cleanliness.
4. Handle CDs and DVDs with care to prevent scratches.
5. Cover the keyboard when not in use to protect it from dust and
debris.
Maintaining Computer Components
Proper care of computer components is essential for longevity.
Implementing preventive maintenance measures can significantly extend

10
the lifespan of these components.

General Precautions for Cleaning Computer Components:

&
Always ensure the computer system is powered off before beginning
the cleaning process.
9
Avoid spraying cleaning fluid directly onto computer components.
Instead, apply the liquid onto a cloth and then use it to wipe the
components.
B

Take care not to allow any cleaning liquid to drip near the circuit
U

board.
It's recommended to use an anti-static wristband to prevent the
PH

accumulation of static electricity near electronic devices.

Cleaning Computer Components:


Computer Monitor: To clean the computer monitor, use a soft lint-
EX

free cloth such as cotton, along with water or a specialized cleaning


liquid. Avoid spraying water or cleaning liquid directly onto the
monitor to prevent it from seeping through the seams.
Keyboard: Dirt and dust can harm the keyboard, potentially causing
keys to malfunction. Periodically, turn the keyboard upside-down and
gently shake it to remove dirt and debris.
Optical Mouse: Use a clean, lint-free cloth to wipe the bottom of the
optical mouse. Air or a cotton swab can be used to clean the lens area.
Digital Camera: Avoid touching the camera's lens directly.
Use a soft lens brush or a dry cloth to remove dust from the lens.
For stubborn dust, apply a special lens cleaning solution to a tissue
before wiping the lens.
PRASHANT KIRAD

CDs and DVDs: Store CDs and DVDs in their proper cases to prevent
damage. Clean any dirt or fingerprints from CDs and DVDs by lightly
rubbing them with a clean, lint-free cotton cloth.

PREPARING MAINTENANCE SCHEDULE


regular computer system maintenance is crucial for optimal
performance and longevity.

Some of the maintenance activities are:


Maintain cleanliness of computer components like keyboard, mouse, and

10
monitor.
Replace malfunctioning hardware promptly.
Avoid food near the computer to prevent damage.
Organize cables and cords to prevent tangling.
&
Remove unauthorized software from the system.
Back up data regularly for safety.
9
Periodically verify backup integrity through restoration checks.
Use an external hard drive for data backups.
B

Run antivirus scans routinely and keep software updated.


Avoid overcharging device batteries.
U

Ensure vents are clear to prevent overheating.


Always shut down the computer properly.
PH

Safeguarding Computer Systems from Viruses:


A computer virus, an unauthorized program, attaches itself to other
EX

programs, altering their functionality. While some viruses may not


cause harm, others can inflict damage by corrupting programs or
deleting data. VIRUS, standing for Vital Information Resource Under
Seize, is a term used to describe these malicious programs.

Ways a Computer Can Get Infected with a Virus:


Through infected files.
Via infected pen drives.
From infected CD-ROMs/DVD-ROMs.
Through infected file attachments in emails.
Things a Computer Virus Cannot Do:
It cannot infect files on CD or DVD if they are closed for writing.
It cannot infect computer hardware such as keyboards, mice, etc.
PRASHANT KIRAD

Detecting Signs of Computer Virus Infection:


Sluggish computer performance.
Changes in file sizes.
Frequent system freezes or crashes.
Unusual increase in the number of files.
Unexpected error messages on the screen.
Automatic computer restarts.
Scanning and Cleaning for Viruses, SPAM Files, Temporary Files, and
Folders:
Install and utilize reliable anti-virus software.
Ensure the anti-virus software is regularly updated.
Scan all downloaded files from the Internet.
Avoid opening emails from unknown senders.

10
Do not permit unauthorized individuals to use your system.
Exercise caution with unknown pen drives or CDs.
Refrain from clicking on pop-up windows while browsing the Internet.
Preparing Computer Against Viruses: &
Maintain active background operation of the anti-virus program.
9
Keep the anti-virus software updated to detect new viruses.
Perform full disk scans periodically.
Removing Temporary Files:
B

1. Double-click on the Computer icon located on the desktop.


U

2. Open the Computer window.


3. Right-click on Local Disk C: and select Properties from the Shortcut
PH

menu.
4. The Properties window opens. Click on Disk Cleanup.
5. The Disk Cleanup for C: window will appear.
6. Click the Check box next to Temporary Files, Temporary Internet files,
EX

etc. that you want to delete.


7. Click OK.
8. A confirmation message will appear
9. Click Delete Files.
10. Windows will delete all the temporary files on the computer.

Removing Files from the Temporary Folder


Press the Windows button + R on the keyboard.
The Run dialog box will appear.
Type %temp% and press Enter.
The Temp folder will open. Press Ctrl + A to select all the files in
the folder.
PRASHANT KIRAD

Press the Delete key.


A message box will appear. Click Yes to confirm the deletion

Firewall:
A computer firewall functions as a network security system, either
through software or a programmable device, overseeing and controlling
incoming and outgoing network traffic based on user-defined security
parameters. Firewalls enhance the security of computers connected to
networks such as LANs or the Internet. Generally, a firewall establishes a
barrier between a trusted internal network and an untrusted external
network, such as the Internet. It scrutinizes each data packet, assessing
whether it should be allowed to pass or halted, regardless of whether it

10
is incoming or outgoing traffic.

Cookies:
When a user visits an internet website, a small file called a cookie is stored
&
on their computer. These files are utilized to retain personalized
information specific to a particular client and website. A cookie is
9
transmitted by a website upon your visit and is stored on your computer
in a file. Only the website that generated the cookie can read it, and this
B

information remains inaccessible to other servers.


U

Basic Tips for Device Care:


(i) Keyboard: Clean the keyboard using a soft brush.
PH

(ii) Screen: Wipe the screen with a soft cloth to remove fingerprints.
(iii) Handle Devices Carefully: Handle and move your laptop carefully to
avoid dropping or banging it against hard surfaces.
(iv) Keep the Computer Cool: Overheating can damage internal parts.
EX

Ensure the CPU fan is functioning to maintain optimal temperature.


(v) Avoid Overcharging the Battery: Unplug the device once it reaches
full charge to prolong battery life.
(vi) Plug in Devices Carefully: Connect USB drives or headphones gently
without forcing them into the port.
(vii) Limit Running Programs: Avoid running too many programs
simultaneously to prevent computer slowdown or crashes.

Maintenance Schedule:
(a) Daily Maintenance:
i. Clean up your email inbox.
ii. Download email attachments and save them in proper folders.
(b) Weekly Maintenance:
i. Clean your keyboard.
ii. Clean your monitor.
PRASHANT KIRAD

iii. Dust CPU and printer.


iv. Backup your data to an external drive.
(c) Monthly Maintenance:
i. Transfer photographs to computer and delete from drive.
ii. Organize photos into folders or albums.
iii. Clean up 'Download' folder.
iv. Uninstall unused programs and apps.
v. Run disk cleaner software.
vi. Run full system virus scan.
(d) Yearly/Annual Maintenance:
i. Clean up contacts list on social media accounts.
ii. Clean up email contact list.

10
iii. Update your operating system.
iv. Check for expiry of antivirus software and renew.

BACKING UP YOUR DATA:


&
Backing up data involves saving information from your computer
onto another device such as CD/DVD drives. This ensures data
9
recovery in case of computer failure due to crashes, human errors,
or natural disasters like floods.
B

Scanning and Cleaning Viruses: Install antivirus software to


prevent and clean viruses from entering your system,
U

safeguarding your data against potential threats.


Increasing Computer Performance: Regularly clean unnecessary
PH

files and data such as temporary files and images to free up hard
disk space, improving computer performance.
Removing SPAM from your Computer: Sometimes we get emails from
EX

companies who are advertising a product or trying to attract you to their


website. Such mails are called SPAM. We should never respond to SPAM
and delete it on a regular basis.
THREATS TO COMPUTER
Threats are the ways in which personal information can be leaked from a
computer without our knowledge.
(a) Theft: Theft means stealing of information or hardware. These may be
of three types:
• Physical: Where a person may steal your desktop computer or laptop.
• Identity: Where a hacker steals your personal information and assumes
your identity. Using this false identity, the hacker can gain access to your
account information or perform illegal activity.
• Software Piracy: This is stealing of software and includes using or
distributing unlicensed and unauthorised copies of a computer program
or software.
PRASHANT KIRAD

(b) Virus: Viruses are computer programs that can damage the data and
software programs or steal the information stored on a computer. Major
types of viruses are Worms and Trojan Horse.
Worms: These are viruses that replicate themselves and spread to all
files once they Information and Communication Technology Skills 81
attack a computer. This makes it very difficult to remove them.
Trojan Horse: A Trojan Horse disguises itself i.e., it appears to be a useful
software program but once it reaches a computer it starts behaving like
a virus and destroying data.
• Online Predator: Online predators are people who trap you into
inappropriate relationships. They may be older people posing to be your

10
age, bullying you into doing illegal activities online and sometimes face
to face.
• Internet Scams: Sometimes you may receive very attractive offers
saying you have won huge money in a lottery and that you can claim the
&
prize by depositing a certain amount of money. When you deposit the
money using credit card or online banking, you not only lose the deposit
9
money but your card/account information may be misused later. rewrite
everything with same points and format
B
U

PROTECTING YOUR DATA:


(a) Use Strong Passwords: Utilize complex passwords that are difficult to
PH

guess, incorporating a mix of lowercase and uppercase letters, numbers,


and special characters. This enhances security and prevents
unauthorized access to your computer.
(b) Install Anti-virus and Firewall: Implement anti-virus software and a
EX

firewall to monitor incoming and outgoing data, preventing viruses from


infiltrating your computer. Anti-virus programs also detect and eliminate
viruses that may have already infected your computer.

(c) Encrypt Data: Encrypt sensitive data stored on your computer,


especially important for banks and companies storing customer
information. Utilize encryption features like Bitlocker in Windows to
encrypt the entire hard disk, requiring a decryption password or key to
access the data, thereby preventing unauthorized usage.
(d) Use Secure Sites: Only provide credit card or bank account details on
secure sites. Look for "https://" and a lock symbol in the browser's
address bar to ensure the site is secure before entering sensitive
information.

You might also like