Table of contents |
|
Session 1: Basic Computer Operations |
|
Session 2: Performing Basic File Operations |
|
Session 3: Computer Care and Maintenance |
|
Session 5: Computer Security and Privacy |
|
Ans – Information and Communication Technology (ICT) is an acronym for information and communication technology. ICT helps in the proper sharing, receiving, and processing of information, and an ICT device is a device that is used for processing, storing, and delivering information to others.
Examples of ICT devices are – Laptop, Desktop, Tablets and Smartphones.
Ans – Full form of ICT is Information and communication technology. The goal of ICT is to bridge the gap between parents, educators, and students by encouraging sustainable, cooperative, and transparent communication methods.
Advantages of ICT
Disadvantages of ICT
Ans – A computer system consists of two main parts – Hardware and Software
Ans – BIOS stands for Basic Input/ Output System, It helps the computer system to identify (Self-test) the paraperaphal devices which are connected to the computer system and helps computers to load Operating System properly.
Ans – The different types of key in keyboard are –
Ans – The purpose of the mouse is –
Ans – Files and folders are –
Ans – Some simple ways to take care of computer system are –
Daily Maintenance
Weekly Maintenance
Monthly Maintenance
Yearly / Annual Maintenance
Ans – We frequently install a large number of applications, which slows down the computer. Always attempt to uninstall unnecessary applications, temporary files, and antivirus software updates.
Ans – Security break is leakage of information stored in a computer.
Your personal information can be lost or leaked in two ways –
Ans – Threats are ways in which personal information from a computer can be released without our knowledge.
a. Theft – Theft means stealing of information or hardware. These maybe of three types:
b. Software Piracy – This is stealing of software and includes using or distributing unlicensed and unauthorized copies of a computer program or software.
iii. Online Predator – Online predators are persons who use the internet to trap you into unhealthy relationships. They could be older people appearing as your age who harass you into doing unlawful things online.
iv. Internet Scams – You may occasionally receive highly appealing offers claiming that you have won a large sum of money in a lottery and that you can claim your win by depositing a specific amount of money. When you deposit money with a credit card or through online banking, you not only lose the deposit money, but your card / account information may be misused later.
Ans – To protect our data from theft and viruses we can take the following measures –
22 videos|68 docs|7 tests
|
1. What are the basic operations that one can perform on a computer? | ![]() |
2. How can I perform basic file operations, and what are they? | ![]() |
3. What are some essential tips for computer care and maintenance? | ![]() |
4. What measures can be taken to ensure computer security and privacy? | ![]() |
5. Why is it important to understand basic ICT skills at the class 10 level? | ![]() |