Itc Skills Ii: The Importance of Acquiring and Building ICT Skills"
Itc Skills Ii: The Importance of Acquiring and Building ICT Skills"
Itc Skills Ii: The Importance of Acquiring and Building ICT Skills"
ITC SKILLS II
10
seen and touched, such as the keyboard, monitor, and CPU.
Software - This refers to the intangible components that enable the
hardware to function. Examples include Windows and MS Office.
each software.
5. Organizing files and directories within the computer system.
6. Monitoring disk space utilization for specific files.
7. Enabling file management operations like creation, copying, moving, and
EX
deletion.
10
Taskbar: Positioned along the bottom of the screen, the taskbar is a lengthy
horizontal bar that provides essential functionality. To the left, you'll find the
Start button, while the Date/Time is located to the right. Additionally, the
&
taskbar displays icons representing open programs and several shortcuts.
Start Button: Situated on the left side of the taskbar, the Start button serves
9
as a gateway to the Start menu, offering access to various programs and
features upon clicking.
B
Recycle Bin: Housing deleted files and folders, the Recycle Bin allows users
to restore accidentally removed items. It serves as a temporary storage
U
Creating Files:
1. Right-click on any empty space within the right column.
2. From the shortcut menu, choose "New" and then select the desired file
type you wish to create.
Renaming Folders and Files:
1. Right-click on the file or folder.
2. Select the "Rename" option from the shortcut menu.
3. Input the new name or modify the existing one, then press the Enter
key.
4. Alternatively, simply select the file/folder and press the function key
F2.
5. Right-click on any empty space within the right column.
6. From the shortcut menu, choose "New" and then select the desired file
type you wish to create.
PRASHANT KIRAD
10
6. Enter a desired name for the folder.
Renaming Folders and Files:
1. Right-click on the file or folder.
&
2. From the shortcut menu, choose the "Rename" option.
3. Type the new name or edit the existing one, then press Enter.
4. Alternatively, select the file/folder and press the Function key F2.
9
Deleting Files or Folders:
1. Click on the file or folder.
B
menu.
PH
BASIC SHORTCUTS
CTRL+ z — undo
CTRL+ y — redo
EX
10
the lifespan of these components.
&
Always ensure the computer system is powered off before beginning
the cleaning process.
9
Avoid spraying cleaning fluid directly onto computer components.
Instead, apply the liquid onto a cloth and then use it to wipe the
components.
B
Take care not to allow any cleaning liquid to drip near the circuit
U
board.
It's recommended to use an anti-static wristband to prevent the
PH
CDs and DVDs: Store CDs and DVDs in their proper cases to prevent
damage. Clean any dirt or fingerprints from CDs and DVDs by lightly
rubbing them with a clean, lint-free cotton cloth.
10
monitor.
Replace malfunctioning hardware promptly.
Avoid food near the computer to prevent damage.
Organize cables and cords to prevent tangling.
&
Remove unauthorized software from the system.
Back up data regularly for safety.
9
Periodically verify backup integrity through restoration checks.
Use an external hard drive for data backups.
B
10
Do not permit unauthorized individuals to use your system.
Exercise caution with unknown pen drives or CDs.
Refrain from clicking on pop-up windows while browsing the Internet.
Preparing Computer Against Viruses: &
Maintain active background operation of the anti-virus program.
9
Keep the anti-virus software updated to detect new viruses.
Perform full disk scans periodically.
Removing Temporary Files:
B
menu.
4. The Properties window opens. Click on Disk Cleanup.
5. The Disk Cleanup for C: window will appear.
6. Click the Check box next to Temporary Files, Temporary Internet files,
EX
Firewall:
A computer firewall functions as a network security system, either
through software or a programmable device, overseeing and controlling
incoming and outgoing network traffic based on user-defined security
parameters. Firewalls enhance the security of computers connected to
networks such as LANs or the Internet. Generally, a firewall establishes a
barrier between a trusted internal network and an untrusted external
network, such as the Internet. It scrutinizes each data packet, assessing
whether it should be allowed to pass or halted, regardless of whether it
10
is incoming or outgoing traffic.
Cookies:
When a user visits an internet website, a small file called a cookie is stored
&
on their computer. These files are utilized to retain personalized
information specific to a particular client and website. A cookie is
9
transmitted by a website upon your visit and is stored on your computer
in a file. Only the website that generated the cookie can read it, and this
B
(ii) Screen: Wipe the screen with a soft cloth to remove fingerprints.
(iii) Handle Devices Carefully: Handle and move your laptop carefully to
avoid dropping or banging it against hard surfaces.
(iv) Keep the Computer Cool: Overheating can damage internal parts.
EX
Maintenance Schedule:
(a) Daily Maintenance:
i. Clean up your email inbox.
ii. Download email attachments and save them in proper folders.
(b) Weekly Maintenance:
i. Clean your keyboard.
ii. Clean your monitor.
PRASHANT KIRAD
10
iii. Update your operating system.
iv. Check for expiry of antivirus software and renew.
files and data such as temporary files and images to free up hard
disk space, improving computer performance.
Removing SPAM from your Computer: Sometimes we get emails from
EX
(b) Virus: Viruses are computer programs that can damage the data and
software programs or steal the information stored on a computer. Major
types of viruses are Worms and Trojan Horse.
Worms: These are viruses that replicate themselves and spread to all
files once they Information and Communication Technology Skills 81
attack a computer. This makes it very difficult to remove them.
Trojan Horse: A Trojan Horse disguises itself i.e., it appears to be a useful
software program but once it reaches a computer it starts behaving like
a virus and destroying data.
• Online Predator: Online predators are people who trap you into
inappropriate relationships. They may be older people posing to be your
10
age, bullying you into doing illegal activities online and sometimes face
to face.
• Internet Scams: Sometimes you may receive very attractive offers
saying you have won huge money in a lottery and that you can claim the
&
prize by depositing a certain amount of money. When you deposit the
money using credit card or online banking, you not only lose the deposit
9
money but your card/account information may be misused later. rewrite
everything with same points and format
B
U