Session 1: Basic Computer Operations: Computer Hardware and Software
Session 1: Basic Computer Operations: Computer Hardware and Software
10, you will learn about some basic knowledge of computer and its maintenance. These
skills will help you to perform daily activities of computer easily. Here, you will get to
know hardware and software information. Computer security is also a very important
thing to learn. in this chapter, you will also study how to keep your computer safe from
threats. Employability Skills class 10 unit 3: Basic ICT Skills gives you a complete
understanding of computer operations and its maintenance.
ICT skills help us to communicate, run our business and stay connected with our family
and friends. Hence, every person needs to acquire ICT skills and build them to stay
updated with the latest software and applications (apps).
Hardware- The physical parts that we can see and touch are called hardware. It is the
machinery of a computer. These are the keyboard, monitor, CPU, etc.
Software: The part which cannot be seen but it makes hardware to work. Example:
Windows, MS office etc.
Operating System (OS). This is the software that starts working as soon as we switch
on a computer. It displays the desktop on the monitor. Some of the most
commonly used operating systems for laptops and desktop are Ubuntu, Microsoft
Windows and Mac OS.
Starting a Computer
To start a computer, press the Power button on the CPU. This will start the operating
system and display the desktop on the monitor.
When you login to the computer with your login-ID and password (as shown in Figure
3.5), the computer knows that you are an authorised person and allows you to work on
the applications in the computer.
You can shut down the windows computer clicking Star button at the bottom left corner
and then click Shut Down. When you click Shut down, the Operating System will close
all the applications and turn off the computer.
A keyboard is an input device used to type text, numbers and commands into the
computer.
Function Keys
Keys labeled from F1 to F12 are function keys. You use them to perform specific
functions.
(a) Control keys: Keys, such as Control (CTRL), SHIFT, SPACEBAR, ALT, CAPS
LOCK and TAB, are special control keys
(b) Enter key: The label on this key can be either ENTER or RETURN, depending on
the brand of computer that you are using. You use the ENTER or the RETURN key to
move the cursor to the beginning of a new line.
(c) Punctuation keys: Punctuation keys include keys for punctuation marks, such as
colon (:), semicolon (;), question mark (?), single quotation marks (‘ ’), and double
quotation marks (“ ”). (d)
(d) Navigation keys: Keys, such as the arrow keys, HOME, END, PAGE UP, and
PAGE DOWN are navigation keys.
(e) Command keys: Keys, such as INSERT (INS), DELETE (DEL), and BACKSPACE
are command
keys. When the INSERT key is turned ON, it helps you overwrite characters to the right
of the
cursor
(f) Windows key: Pressing this key opens the Start menu
Using a Mouse
a small device that you can use to move, select and open items on your computer
screen.
Double-click
Double-clicking means to quickly click the left mouse button twice. When we double-
click on a file, it will open the file.
Basic Shortcuts
CTRL+z — undo
CTRL+y — redo
CTRL+a — select all
CTRL+x — cut
CTRL+c — copy
CTRL+v — paste
CTRL+p — print
CTRL+s — save.
Taking care of electronic devices, such as computer and mobiles helps them to work
properly.
(ii) Screen: You can wipe the screen with a soft cloth to remove any finger marks.
(iii) Handle devices carefully: Handle and move your laptop carefully and avoid
dropping or banging it against a hard surface.
(v) Keep the computer cool: If a computer, laptop or mobile device gets overheated,
the internal parts can be damaged. The CPU has an internal fan to keep it cool. We
should make sure the fan is functioning.
(vi) Do not overcharge your battery: Sometimes we keep a device plugged in for
charging even after it is fully charged.This reduces the battery life. Always unplug the
device once it
is charged 100%.
(vii) Always plug in devices carefully: Any device being connected to a laptop or
computer such as a USB drive or headphones, should be done gently. It should not be
forced into the port.
(viii) Do not run too many programs at a time: When too many programs are running
at the same time, the computer can become slow and even crash.
Increasing Computer Performance If we have been using a computer for a long time we
have a lot of unnecessary files and data, such as temporary files and images. When
they use too much hard-disk space, the performance of the computer goes down. It is
important that we keep cleaning by removing any extra files.
(a) Theft: Theft means stealing of information or hardware. These may be of three
types:
• Identity: Where a hacker steals your personal information and assumes your identity.
Using this false identity, the hacker can gain access to your account information or
perform illegal activity.
(b) Virus: Viruses are computer programs that can damage the data and software
programs or steal the information stored on a computer. Major types of viruses are
Worms and Trojan Horse.
Worms: These are viruses that replicate themselves and spread to all files once they
Information and Communication Technology Skills 81 attack a computer. This makes it
very difficult to remove them.
Trojan Horse: A Trojan Horse disguises itself i.e., it appears to be a useful software
program but once it reaches a computer it starts behaving like a virus and destroying
data.
• Online Predator: Online predators are people who trap you into inappropriate
relationships.
They may be older people posing to be your age, bullying you into doing illegal activities
online and sometimes face to face.
• Internet Scams: Sometimes you may receive very attractive offers saying you have
won huge money in a lottery and that you can claim the prize by depositing a certain
amount of money. When you deposit the money using credit card or online banking, you
not only lose the deposit money but your card/account information may be misused
later.
(a) Use passwords to login to your computer: Use passwords that are difficult to
guess. Passwords are difficult to hack if they are a mix of small (For example ‘a b c d’)
and capital letters (For example, ‘H J E R’), numbers (For example ‘8 7 6 5’) and special
characters
(For example, ’% ^ # $’). This would prevent unauthorised people from using your
computer.
(b) Install Anti-virus and Firewall: Anti-viruses and Firewall monitor the data coming
in and out of a computer and prevent and viruses from entering. Anti-viruses can also
detect and clean viruses that may have entered a computer.
(c) Encrypt Data: This is usually done by banks and companies in which important
customer information is stored. They can encrypt their entire hard disk using the
encrypting feature in Windows (Bitlocker). This would force users to use a decryption
password (or key) before starting the computer thus preventing unauthorised usage.
(d) Secure sites: Give details of your credit card or bank account only on secure sites.
See in the address bar of the browser. If the site address starts with https://and a lock
symbol, then it is safe to give your credit card and bank details.