Basic ICT Skills Class 10 Notes

Notes

Introduction to ICT Skills

1. Introduction to ICT Skills

ICT (Information and Communication Technology) skills help us to:

  • Communicate effectively
  • Run businesses
  • Stay connected with family and friends

In today’s digital world, every individual must acquire ICT skills to:

  • Stay updated with the latest software
  • Use applications (apps)
  • Work efficiently in education, business, and daily life
Computer Hardware and Software

2. Computer Hardware and Software

A computer system consists of two main parts:

  • (A) Hardware
  • (B) Software

(A) Hardware

Hardware refers to the physical components of a computer that we can see and touch.

Examples:

  • Keyboard
  • Mouse
  • Monitor
  • CPU
  • Printer

πŸ‘‰ Hardware is the machinery of a computer.

(B) Software

Software is the non-physical part of a computer.

  • It cannot be seen
  • It controls hardware
  • It tells hardware what to do

Examples:

  • Windows
  • MS Word
  • MS Excel

πŸ‘‰ Hardware without software is useless.

Operating System

3. Operating System (OS)

An Operating System (OS) is an interface between the user and the computer.

Functions of an Operating System

  • Controls all hardware devices
  • Checks whether devices are working properly
  • Manages software resources
  • Manages memory usage
  • Organizes files and folders
  • Keeps track of disk space
  • Allows creating, copying, moving, and deleting files
Types of Operating Systems

4. Types of Operating Systems

1. Single-user, Single-task Operating System

  • One user
  • One task at a time

2. Single-user, Multi-task Operating System

  • One user
  • Multiple programs at the same time

Examples:

  • Windows
  • macOS

3. Multi-user Operating System

  • Multiple users
  • Can work simultaneously or at different times

4. Real-Time Operating System

  • Responds within a fixed time
  • Used in critical systems

Examples:

  • Lynx OS
  • Windows CE

5. Distributed Operating System

  • Works on multiple interconnected computers
  • Appears as one system

Examples:

  • Windows
  • UNIX
  • LINUX

6. Interactive (GUI-based) Operating System

  • User-friendly
  • Uses icons, mouse, and windows

Example:

  • Windows
Desktop Components (Windows)

5. Desktop Components (Windows)

Taskbar

  • Horizontal bar at the bottom of the screen
  • Contains Start button
  • Shows Date and Time
  • Displays open programs

Start Button

  • Opens the Start Menu
  • Provides access to programs
  • Allows access to system settings

Recycle Bin

  • Stores deleted files temporarily
  • Deleted files can be restored if needed

πŸ‘‰ Files are not permanently deleted until the Recycle Bin is emptied.

Files and Folders

6. Files and Folders

Files

  • Everything stored in a computer is called a file
  • File system manages naming, storing, and retrieving files

Creating a File

  • Right-click in a blank area
  • Click New
  • Select the file type

Renaming Files / Folders

  • Right-click β†’ Rename
  • OR
  • Select the file or folder β†’ Press F2

Deleting Files / Folders

  • Select the file or folder β†’ Press Delete
  • OR
  • Right-click β†’ Delete

Folder

  • A folder stores files and subfolders
  • Helps in organizing data

Creating a Folder

  • Open Computer
  • Select a drive
  • Click New Folder
  • Type the folder name
Basic Keyboard Shortcuts

7. Basic Keyboard Shortcuts

Shortcut Function
Ctrl + Z Undo
Ctrl + Y Redo
Ctrl + A Select all
Ctrl + X Cut
Ctrl + C Copy
Ctrl + V Paste
Ctrl + P Print
Ctrl + S Save
Computer Care and Maintenance

8. Computer Care and Maintenance

Proper maintenance of a computer system:

  • Increases the lifespan of the computer
  • Prevents system failure

Basic Care Rules

  • Keep the system dust-free
  • Do not eat near the computer
  • Keep the keyboard clean
  • Handle CDs/DVDs carefully
  • Cover the keyboard when not in use

πŸ‘‰ Proper care ensures smooth and long-lasting computer performance.

Cleaning Computer Components

9. Cleaning Computer Components

General Precautions

  • Power off the computer before cleaning
  • Do not spray liquid directly on any component
  • Avoid liquid near circuits and electronic parts
  • Use an anti-static wrist band while cleaning

Cleaning Devices

Monitor

  • Use a soft, clean cloth
  • Never spray liquid directly on the screen

Keyboard

  • Turn the keyboard upside down
  • Shake gently to remove dust and debris

Mouse

  • Clean the bottom surface
  • Clean the lens carefully

Digital Camera

  • Never touch the lens with fingers
  • Use a special lens cloth for cleaning

CDs / DVDs

  • Store discs in their protective case
  • Clean using a soft cloth

πŸ‘‰ Proper cleaning ensures safety and extends the life of computer components.

Maintenance Schedule

10. Maintenance Schedule

Daily

  • Clean email inbox
  • Save attachments properly

Weekly

  • Clean keyboard
  • Clean monitor
  • Dust CPU
  • Backup important data

Monthly

  • Organize photos
  • Delete unused files
  • Run disk cleanup
  • Perform virus scan

Yearly

  • Update operating system
  • Renew antivirus software
  • Clean contact lists
Protecting Computer from Viruses

11. Protecting Computer from Viruses

What is a Virus?

A computer virus is an illegal program that:

  • Attaches to other programs
  • Modifies their behavior
  • Can damage data

VIRUS = Vital Information Resource Under Seize

Sources of Virus

  • Infected files
  • Pen drives
  • CDs / DVDs
  • Email attachments

Signs of Virus Infection

  • Slow computer performance
  • Unexpected file size changes
  • System crashes
  • Unusual error messages
  • Automatic system restart
Antivirus Protection

12. Antivirus Protection

  • Install antivirus software on the computer
  • Keep the antivirus software updated
  • Scan all downloaded files before opening
  • Avoid opening emails from unknown senders
  • Avoid clicking on pop-up windows

πŸ‘‰ Proper antivirus protection helps keep the computer safe from viruses and malware.

Removing Temporary Files

13. Removing Temporary Files

Using Disk Cleanup

  • Open Computer
  • Right-click on C Drive
  • Click Properties β†’ Disk Cleanup
  • Select Temporary Files
  • Click Delete

Using %temp%

  • Press Windows + R
  • Type %temp%
  • Press Enter
  • Select and delete unnecessary files
Firewall

14. Firewall

A Firewall is a security system that:

  • Monitors incoming and outgoing data
  • Protects the system from unauthorized access
  • Acts as a security wall between the computer and external threats

πŸ‘‰ Firewall helps keep your computer safe from hackers and malware.

Cookies

15. Cookies

Cookies are:

  • Small files stored by websites on your computer
  • Used to store user information
  • Readable only by the website that created them

πŸ‘‰ Cookies help websites remember user preferences and login details.

Device Care Tips

16. Device Care Tips

  • Clean keyboard and screen regularly
  • Handle devices carefully
  • Avoid overheating of devices
  • Do not overcharge the battery
  • Plug devices gently into sockets
  • Do not run too many programs at the same time

πŸ‘‰ Proper device care ensures better performance and longer lifespan.

Backup of Data

17. Backup of Data

Backup means:

  • Storing data on external devices such as pen drives, external hard disks, or cloud storage
  • Protecting data against system crashes, hardware failure, or natural disasters

πŸ‘‰ Regular backups ensure that important data is safe and can be restored when needed.

Threats to Computer

18. Threats to Computer

Theft

  • Physical theft of computer devices
  • Identity theft

Software Piracy

  • Illegal copying or distribution of software

Malware Threats

  • Viruses
  • Worms (self-replicating programs)
  • Trojan Horse (disguised malicious software)

Online Predators

  • Fake identities
  • Cyber bullying

Internet Scams

  • Fake lottery offers
  • Financial fraud

πŸ‘‰ Awareness of these threats helps in protecting computers and personal information.

Protecting Your Data

19. Protecting Your Data

  • Use strong and secure passwords
  • Install and regularly update antivirus and firewall
  • Encrypt data using tools like BitLocker
  • Use secure websites with https and a lock icon in the address bar

πŸ‘‰ Following these practices helps safeguard personal and sensitive information.

Leave a Reply

Your email address will not be published. Required fields are marked *

sign up!

We’ll send you the hottest deals straight to your inbox so you’re always in on the best-kept software secrets.