VM-LEARNING /class.x ·track.ai ·ch-a3 session: 2026_27
$cd ..

~/Information & Communication Technology Skills – II

root@vm-learning ~ $ open ch-a3
PART A ▪ UNIT 3
03
Information & Communication Technology Skills – II
Operating Systems · Files · Care · Security
ICT stands for Information and Communication Technology. It refers to all the methods, tools and concepts related to storing, recording and sending digital information. When information is stored electronically, it takes on a "digital" form. Common ICT devices include tablets, smartphones, laptops and desktop computers.
ICT skills help us communicate, run a business and stay connected with family and friends. Every person needs to acquire and update ICT skills regularly to stay current with the latest software and applications.

Refresher — Hardware & Software

A computer system has two main parts:

🖥️ Hardware

The physical parts you can see and touch — the machinery of the computer. Examples: keyboard, mouse, monitor, CPU, printer.

💿 Software

The invisible programs that make the hardware work. Software instructs hardware to display text, images, videos and respond to input. Without software, hardware cannot function.

Learning Outcome 1: Distinguish between different operating systems

1.1 What is an Operating System?

The Operating System (OS) is the most important software in any computer. It starts working as soon as we switch on the machine, displays the desktop on the monitor and acts as a bridge between the user, the applications and the hardware.
🔹 Main Functions of an Operating System

1.2 Classes of Operating Systems

Operating systems are classified based on how many users they support, how many tasks they can run simultaneously, and the device type.

1. Single-User, Single-TaskingOne user can run only one task at a time. Example: MS-DOS.
2. Single-User, Multi-TaskingOne user, many tasks at once (browser + music + Word). Example: Windows 10/11, Ubuntu, macOS.
3. Multi-UserSeveral users work on the same machine at the same time. Example: UNIX, Linux servers.
4. Real-Time OS (RTOS)Used where instant response is critical — industrial control, medical devices, traffic signals. Example: VxWorks, QNX.
5. Distributed OSManages a group of computers that work together as one system — e.g., server farms and cloud. Example: Windows Server, LOCUS.
6. Mobile OSDesigned for smartphones and tablets — touch-friendly, low power. Example: Android, iOS.
🔹 Popular Operating Systems at a Glance
OSDeviceKey features
Ubuntu / LinuxDesktop / laptop / serverFree & open-source, strong security, used in schools and servers worldwide.
Microsoft WindowsDesktop / laptopMost widely used home OS; easy GUI, large software library.
macOSApple Mac desktop / laptopStable, secure, designed for Apple hardware.
AndroidSmartphone / tabletOpen source, developed by Google, dominates mobile market.
Apple iOSiPhone / iPadClosed-source, known for security, runs only on Apple devices.
Chrome OSChromebookLightweight, cloud-first, mostly a browser OS.

1.3 The Desktop — Menu, Icons & Taskbar

The desktop is the main screen you see after logging in. It is your computer's "workbench" and shows icons, menus and the taskbar.
🔹 Parts of the Desktop
🖼️ IconsSmall pictures that represent files, folders, apps or shortcuts. Double-click to open.
📋 MenuA list of commands. The Start Menu (Windows) or Activities (Ubuntu) gives access to all applications.
📏 TaskbarThe strip at the bottom (Windows) or top (Ubuntu / Mac) showing open apps, system tray, clock and start button.
🖱️ Mouse PointerThe small arrow that moves when you move the mouse.
🔲 WindowsRectangular frames in which applications run — can be resized, minimised or closed.
🗑️ Recycle Bin / TrashHolds deleted files until permanently removed.

1.4 Starting & Shutting Down a Computer

⚡ 1. Starting the Computer

  1. Press the Power button on the CPU / laptop.
  2. The BIOS (Basic Input/Output System) runs a Power-On Self-Test (POST) to check the hardware.
  3. If the self-test is fine, BIOS loads the Operating System.
  4. The login screen appears.
  5. Enter your username and password.
  6. The desktop appears and the computer is ready.

🔐 2. Login & Logout

Just like a cupboard is locked at home, we keep our computer locked with a login-ID and password. The password is the "key" — only an authorised person can use the system. When you finish working, log out or sign out so that no one else can see your work.

⏻ 3. Shutting Down

  1. Close all open applications.
  2. Click Start → Shut Down (Windows) or the Systems icon → Shut Down (Ubuntu).
  3. The OS closes all background programs and turns off the computer.
Never shut down a computer by directly pulling the plug or long-pressing the power button — this can corrupt data and damage the hard disk.

1.5 Using the Keyboard

The keyboard is an input device used to type text, numbers and commands. It has over 100 keys grouped by function.
🔹 Groups of Keys
Key groupExamplesUse
Function KeysF1 – F12Perform program-specific actions. F1 usually opens Help.
Control KeysCtrl, Shift, Alt, Caps Lock, Tab, SpacebarModify the behaviour of other keys — e.g., Ctrl+C = Copy.
Enter / ReturnEnter, ReturnMoves cursor to a new line; confirms a command.
Punctuation Keys: ; ? ' " . ,Insert punctuation marks.
Navigation Keys↑ ↓ ← →, Home, End, Page Up, Page DownMove the cursor around text. Home/End jump to line start/end; Page Up/Down scroll one page.
Command KeysInsert, Delete, BackspaceDelete = remove char to right; Backspace = remove char to left; Insert = toggle overwrite mode.
Windows KeyOpens the Start menu in Windows.

1.6 Using the Mouse

A mouse is a small pointing device used to move, select and open items on the screen. It has a left button, a right button and usually a scroll wheel.

Mouse ActionHow to do itEffect
Hover / Roll-overMove pointer over an item without clicking.Shows a tool-tip with the item's details.
Point & ClickSingle left-click.Selects the item.
Right-ClickSingle right-click.Opens a context menu with options (copy, delete, rename, etc.).
Double-ClickTwo quick left-clicks.Opens the file / runs the program.
Drag & DropHold left button, move pointer, release at new location.Moves the item to a new position.
ScrollRotate the wheel.Scrolls the page up or down.

1.7 Files, Folders & the File System

A file is an electronic container in which information is stored on a computer. A folder (also called a directory) is a location where a group of files can be stored. Folders can also contain sub-folders.
🔹 File Names & Extensions

Every file has a name and an extension separated by a dot (.) — the extension tells the computer what type of file it is.

ExtensionFile TypeOpens with
.txtPlain textNotepad, gedit, Text Editor
.doc / .docxWord documentMS Word, LibreOffice Writer
.xls / .xlsxSpreadsheetMS Excel, LibreOffice Calc
.ppt / .pptxPresentationMS PowerPoint, LibreOffice Impress
.jpg / .pngImagePhoto viewer, paint apps
.mp3 / .wavAudioMedia player
.mp4 / .aviVideoMedia player, VLC
.pdfPortable documentAdobe Reader, web browsers
.exeExecutable program (Windows)Runs when double-clicked
.zipCompressed archiveWinZip, 7-Zip, Archive Manager
🔹 File Operations
📄 CreateMake a new file or folder.
💾 SaveStore the file on disk.
📂 OpenAccess existing content.
✏️ RenameChange the file name.
📋 CopyDuplicate in another location.
✂️ Cut / MoveRelocate to another place.
📥 PastePlace the copied/cut item.
🗑️ DeleteSend to recycle bin / trash.
♻️ RestoreRecover a deleted item from Recycle Bin.

1.8 File Organisation & Directory Structure

File organisation means arranging files in a logical way so you can find them easily. Computers use a hierarchical (tree) directory structure — folders within folders — to keep information organised.
🔹 Tree Structure Example
📁 TYPICAL DIRECTORY TREE
C: (Root drive)
├── Users
│   └── Vivek
│       ├── Documents
│       │   ├── School
│       │   │   ├── English.docx
│       │   │   └── Maths.docx
│       │   └── Projects
│       ├── Pictures
│       └── Music
├── Program Files
└── Windows
🔹 Key Concepts of a File System
TermMeaning
Root DirectoryTop-most folder (e.g., C:\ on Windows, / on Linux).
PathThe full address of a file, e.g., C:\Users\Vivek\Documents\English.docx.
Sub-folderA folder inside another folder.
DriveA storage unit — C: (hard disk), D: (DVD), E: (USB), etc.
ShortcutA link that points to a file or folder stored elsewhere.
File-system typeThe way the OS arranges files on disk — NTFS / FAT32 / exFAT (Windows), ext4 (Linux), APFS (macOS).

1.9 Creating & Managing Files and Folders

📝 1. Creating a New File (Example: Text File)

  1. Open a text editor — gedit in Ubuntu or Notepad in Windows.
  2. Type the content — e.g., "Neha Tiwari, Shakti Nagar, New Delhi, 7856453451".
  3. Click File → Save (or press Ctrl+S).
  4. Choose the location (e.g., Desktop), type a name (e.g., Neha) and click Save.

📁 2. Creating a New Folder

  1. Open File Explorer (Windows) or Files (Ubuntu).
  2. Go to the location (e.g., Desktop).
  3. Right-click in an empty area → New Folder.
  4. Type the folder name (e.g., Demo) and press Enter.

✏️ 3. Renaming a File or Folder

Right-click on the item → Rename → type the new name → press Enter. Shortcut: select the item and press F2.

🗑️ 4. Deleting & Restoring

📦 5. Copying vs Moving

📋 Copy

Keeps the original and creates a duplicate in a new location.
Shortcut: Ctrl+C → paste with Ctrl+V.

✂️ Move

Removes from current location and places in a new location.
Shortcut: Ctrl+X → paste with Ctrl+V.

🔹 Common Keyboard Shortcuts
ShortcutActionShortcutAction
Ctrl + CCopyCtrl + SSave
Ctrl + XCutCtrl + PPrint
Ctrl + VPasteCtrl + ASelect All
Ctrl + ZUndoCtrl + FFind
Ctrl + YRedoAlt + TabSwitch window
Ctrl + NNew file / folderF2Rename
Learning Outcome 2: Apply basic skills for care and maintenance of computer

2.1 Why Care & Maintenance Matter

Taking care of computers (and mobile phones) helps them work properly and last longer. A computer is a delicate machine with many moving electronic parts — it must be protected from dust, heat, moisture and damage. Regular care saves money because you don't need to buy new devices frequently.

Just as we take care of our body by bathing, brushing teeth and eating healthy food every day, our machines need daily care too.

2.2 Cleaning Computer Components

⌨️ 1. Keyboard

🖥️ 2. Screen / Monitor

🍔 3. Be Careful with Food & Drinks

Avoid eating or keeping glasses of water / cups of coffee near the computer. Any liquid spilt can spoil an electronic device beyond repair.

💼 4. Handle Devices Carefully

🌡️ 5. Keep the Computer Cool

🔋 6. Do Not Overcharge the Battery

Leaving a device plugged in for a long time after it is fully charged can overheat the battery and reduce its life. Always unplug at 100%.

🔌 7. Plug in Devices Carefully

Any device — USB drive, headphones, charger — should be plugged in gently. Don't force a cable into a port. If it doesn't fit, change the direction.

⏳ 8. Don't Run Too Many Programs at Once

When too many programs run simultaneously, the computer slows down and may even crash. Close apps you are not using.

2.3 Preparing a Maintenance Schedule

A maintenance schedule keeps the computer running in perfect condition for a long time. Break tasks into daily, weekly, monthly and yearly:

📅 Daily Maintenance
  • Clean up e-mail inbox
  • Download e-mail attachments, save in proper folders
📆 Weekly Maintenance
  • Clean keyboard, monitor, CPU & printer
  • Back up data to external drive
🗓️ Monthly Maintenance
  • Transfer photos to computer, organise into folders
  • Clean up Downloads folder
  • Uninstall unused programs & apps
  • Run disk-cleaner software
  • Run full system virus scan
📋 Yearly / Annual Maintenance
  • Clean up social-media contacts list
  • Clean up e-mail contact list
  • Update operating system
  • Check anti-virus expiry, renew

2.4 Backing Up Your Data

Backing up means saving the information on your computer to another device — CD/DVD, external hard disk, USB drive, or cloud storage — so data can be recovered if the computer crashes.
Computers can crash, humans make mistakes, and natural disasters like floods can happen. Companies, hospitals and banks must back up regularly so their business and customers are not affected.
🔹 Common Backup Devices

2.5 Protecting the Computer Against Viruses

A virus is a malicious computer program that can damage data, steal information or slow down the system. Viruses can enter a computer through infected files, email attachments, USB drives, or unsafe websites.
🔹 Major Types of Viruses & Threats
🪱 WormsSelf-replicate and spread to all files once they attack a computer — very hard to remove.
🐴 Trojan HorseDisguises itself as a useful program but once inside starts behaving like a virus and destroys data.
⚠️ Online PredatorsPeople who trap you into inappropriate relationships online. May pose as your age to bully or blackmail.
💸 Internet ScamsFake "you won a lottery" emails that ask you to pay money to claim a prize. Deposits are lost and card details misused.

2.6 Scanning & Cleaning Viruses

🛡️ 1. Install Anti-virus & Firewall

Anti-virus software monitors data entering and leaving the computer, prevents viruses from getting in and can detect and clean viruses that have already entered. Examples: Windows Defender, Avast, AVG, Kaspersky, Norton, Quick Heal.

🔍 2. Run Regular Virus Scans

🚫 3. Safe Browsing Habits

2.7 Increasing Computer Performance — Cleaning Junk

Over time, the computer accumulates unnecessary files — temporary files, old images, duplicate downloads. These use up hard-disk space and slow the machine down.

🔹 What to Clean
🗂️ Temporary FilesLeft over from apps and browsers. Use Disk Cleanup (Windows) or tmpreaper (Linux).
🖼️ Duplicate FilesUse a duplicate-finder tool to delete repeated photos and documents.
📥 Downloads FolderDelete installers and files you no longer need.
🌐 Browser Cache & CookiesClear via browser settings every few weeks.
🗑️ Recycle Bin / TrashEmpty regularly — deleted files still take space until emptied.
💼 Unused ProgramsUninstall apps and games you no longer use.

2.8 Removing SPAM

SPAM means unwanted mails sent by companies advertising a product or trying to attract you to their website. They clutter your inbox and may carry links to malicious sites.
🔹 How to Deal with SPAM

2.9 Computer Security & Privacy

Computer security & privacy deals with measures used to prevent loss of data and protect information from unauthorised access.
🔹 Why Security Matters

We store a lot of information on our computers — photos, personal details, financial records, medical records. If this information is leaked or lost, it can cause serious harm — financial loss, identity theft, reputational damage.

🔹 Types of Threats

🕵️ 1. Theft

Stealing information or hardware — of three kinds:

🦠 2. Virus

As covered in 2.5 — programs that damage or steal data (worms, Trojans, malware).

2.10 Measures to Protect Data

🔐 1. Strong Passwords

Use passwords that are difficult to guess — a mix of:

Weak password: password123 — easy to guess.
Strong password: H8jeR#2mKq$ — mix of letters, numbers and symbols.

🛡️ 2. Install Anti-virus & Firewall

These monitor data coming in and going out of the computer and block viruses. Firewall also prevents unauthorised network access.

🔒 3. Encrypt Data

Banks and companies encrypt important data. A decryption password (or key) is needed before the data can be read. Windows has the BitLocker feature for whole-disk encryption.

🌐 4. Use Secure Sites Only

Give credit card or bank details only on secure sites. Check the address bar — it should begin with https:// and show a padlock icon.

🧑‍💻 5. Other Safe Habits

Quick Revision — Key Points to Remember

  • ICT = Information and Communication Technology — digital tools for storing, recording, sending information.
  • Computer = Hardware + Software. Hardware is physical; software makes hardware work.
  • Operating System (OS) = most important software; boots, manages hardware/files, runs apps, provides UI, enforces security.
  • 6 Classes of OS: Single-user single-task, Single-user multi-task, Multi-user, Real-time, Distributed, Mobile.
  • Desktop parts: Icons · Menu · Taskbar · Mouse pointer · Windows · Recycle Bin.
  • Starting a computer: Power → BIOS/POST → OS loads → Login → Desktop.
  • Keyboard groups: Function, Control, Enter, Punctuation, Navigation, Command, Windows keys.
  • Mouse actions: Hover · Click · Right-click · Double-click · Drag-drop · Scroll.
  • File = electronic container; Folder = group of files; extension tells file type.
  • Common extensions: .txt, .docx, .xlsx, .pptx, .jpg, .png, .mp3, .mp4, .pdf, .exe, .zip.
  • File system = tree/hierarchical — root directory → folders → sub-folders. Path shows full address.
  • File operations: Create, Save, Open, Rename, Copy, Cut, Paste, Delete, Restore.
  • Shortcuts: Ctrl+C copy, Ctrl+X cut, Ctrl+V paste, Ctrl+Z undo, Ctrl+Y redo, Ctrl+S save, Ctrl+A select all, Ctrl+P print, F2 rename, Alt+Tab switch.
  • Care tips: keep clean, handle gently, no food/drinks, keep cool, don't overcharge, plug gently, don't run too many programs.
  • Maintenance schedule: Daily · Weekly · Monthly · Yearly tasks.
  • Backup = save copy to another device (HDD / USB / CD / cloud).
  • Virus types: Worms, Trojan Horse. Threats also include Online Predators and Internet Scams.
  • Protection: strong passwords, antivirus + firewall, encryption, https sites, lock computer, update OS, backup.
  • SPAM = unwanted promotional mail — delete, set filters, never respond.
🧠Practice Quiz — test yourself on this chapter