Refresher — Hardware & Software
A computer system has two main parts:
🖥️ Hardware
The physical parts you can see and touch — the machinery of the computer. Examples: keyboard, mouse, monitor, CPU, printer.
💿 Software
The invisible programs that make the hardware work. Software instructs hardware to display text, images, videos and respond to input. Without software, hardware cannot function.
1.1 What is an Operating System?
🔹 Main Functions of an Operating System
- Boot and load the system when the computer is switched on.
- Manage hardware — CPU, memory, disk, printer, keyboard, mouse.
- Manage files — creating, naming, saving, copying, deleting.
- Run applications — browsers, games, office tools, media players.
- Provide a user interface — menus, icons, windows, taskbar.
- Enforce security — login IDs, passwords, permissions.
1.2 Classes of Operating Systems
Operating systems are classified based on how many users they support, how many tasks they can run simultaneously, and the device type.
🔹 Popular Operating Systems at a Glance
| OS | Device | Key features |
|---|---|---|
| Ubuntu / Linux | Desktop / laptop / server | Free & open-source, strong security, used in schools and servers worldwide. |
| Microsoft Windows | Desktop / laptop | Most widely used home OS; easy GUI, large software library. |
| macOS | Apple Mac desktop / laptop | Stable, secure, designed for Apple hardware. |
| Android | Smartphone / tablet | Open source, developed by Google, dominates mobile market. |
| Apple iOS | iPhone / iPad | Closed-source, known for security, runs only on Apple devices. |
| Chrome OS | Chromebook | Lightweight, cloud-first, mostly a browser OS. |
1.3 The Desktop — Menu, Icons & Taskbar
🔹 Parts of the Desktop
1.4 Starting & Shutting Down a Computer
⚡ 1. Starting the Computer
- Press the Power button on the CPU / laptop.
- The BIOS (Basic Input/Output System) runs a Power-On Self-Test (POST) to check the hardware.
- If the self-test is fine, BIOS loads the Operating System.
- The login screen appears.
- Enter your username and password.
- The desktop appears and the computer is ready.
🔐 2. Login & Logout
Just like a cupboard is locked at home, we keep our computer locked with a login-ID and password. The password is the "key" — only an authorised person can use the system. When you finish working, log out or sign out so that no one else can see your work.
⏻ 3. Shutting Down
- Close all open applications.
- Click Start → Shut Down (Windows) or the Systems icon → Shut Down (Ubuntu).
- The OS closes all background programs and turns off the computer.
1.5 Using the Keyboard
🔹 Groups of Keys
| Key group | Examples | Use |
|---|---|---|
| Function Keys | F1 – F12 | Perform program-specific actions. F1 usually opens Help. |
| Control Keys | Ctrl, Shift, Alt, Caps Lock, Tab, Spacebar | Modify the behaviour of other keys — e.g., Ctrl+C = Copy. |
| Enter / Return | Enter, Return | Moves cursor to a new line; confirms a command. |
| Punctuation Keys | : ; ? ' " . , | Insert punctuation marks. |
| Navigation Keys | ↑ ↓ ← →, Home, End, Page Up, Page Down | Move the cursor around text. Home/End jump to line start/end; Page Up/Down scroll one page. |
| Command Keys | Insert, Delete, Backspace | Delete = remove char to right; Backspace = remove char to left; Insert = toggle overwrite mode. |
| Windows Key | ⊞ | Opens the Start menu in Windows. |
1.6 Using the Mouse
A mouse is a small pointing device used to move, select and open items on the screen. It has a left button, a right button and usually a scroll wheel.
| Mouse Action | How to do it | Effect |
|---|---|---|
| Hover / Roll-over | Move pointer over an item without clicking. | Shows a tool-tip with the item's details. |
| Point & Click | Single left-click. | Selects the item. |
| Right-Click | Single right-click. | Opens a context menu with options (copy, delete, rename, etc.). |
| Double-Click | Two quick left-clicks. | Opens the file / runs the program. |
| Drag & Drop | Hold left button, move pointer, release at new location. | Moves the item to a new position. |
| Scroll | Rotate the wheel. | Scrolls the page up or down. |
1.7 Files, Folders & the File System
🔹 File Names & Extensions
Every file has a name and an extension separated by a dot (.) — the extension tells the computer what type of file it is.
| Extension | File Type | Opens with |
|---|---|---|
| .txt | Plain text | Notepad, gedit, Text Editor |
| .doc / .docx | Word document | MS Word, LibreOffice Writer |
| .xls / .xlsx | Spreadsheet | MS Excel, LibreOffice Calc |
| .ppt / .pptx | Presentation | MS PowerPoint, LibreOffice Impress |
| .jpg / .png | Image | Photo viewer, paint apps |
| .mp3 / .wav | Audio | Media player |
| .mp4 / .avi | Video | Media player, VLC |
| Portable document | Adobe Reader, web browsers | |
| .exe | Executable program (Windows) | Runs when double-clicked |
| .zip | Compressed archive | WinZip, 7-Zip, Archive Manager |
🔹 File Operations
1.8 File Organisation & Directory Structure
🔹 Tree Structure Example
C: (Root drive) ├── Users │ └── Vivek │ ├── Documents │ │ ├── School │ │ │ ├── English.docx │ │ │ └── Maths.docx │ │ └── Projects │ ├── Pictures │ └── Music ├── Program Files └── Windows
🔹 Key Concepts of a File System
| Term | Meaning |
|---|---|
| Root Directory | Top-most folder (e.g., C:\ on Windows, / on Linux). |
| Path | The full address of a file, e.g., C:\Users\Vivek\Documents\English.docx. |
| Sub-folder | A folder inside another folder. |
| Drive | A storage unit — C: (hard disk), D: (DVD), E: (USB), etc. |
| Shortcut | A link that points to a file or folder stored elsewhere. |
| File-system type | The way the OS arranges files on disk — NTFS / FAT32 / exFAT (Windows), ext4 (Linux), APFS (macOS). |
1.9 Creating & Managing Files and Folders
📝 1. Creating a New File (Example: Text File)
- Open a text editor — gedit in Ubuntu or Notepad in Windows.
- Type the content — e.g., "Neha Tiwari, Shakti Nagar, New Delhi, 7856453451".
- Click File → Save (or press Ctrl+S).
- Choose the location (e.g., Desktop), type a name (e.g., Neha) and click Save.
📁 2. Creating a New Folder
- Open File Explorer (Windows) or Files (Ubuntu).
- Go to the location (e.g., Desktop).
- Right-click in an empty area → New Folder.
- Type the folder name (e.g., Demo) and press Enter.
✏️ 3. Renaming a File or Folder
Right-click on the item → Rename → type the new name → press Enter. Shortcut: select the item and press F2.
🗑️ 4. Deleting & Restoring
- Select the item → press Delete. It goes to the Recycle Bin (Windows) / Trash (Ubuntu).
- To recover: open Recycle Bin → right-click the item → Restore.
- To delete permanently: press Shift + Delete, or empty the Recycle Bin.
📦 5. Copying vs Moving
📋 Copy
Keeps the original and creates a duplicate in a new location.
Shortcut: Ctrl+C → paste with Ctrl+V.
✂️ Move
Removes from current location and places in a new location.
Shortcut: Ctrl+X → paste with Ctrl+V.
🔹 Common Keyboard Shortcuts
| Shortcut | Action | Shortcut | Action |
|---|---|---|---|
| Ctrl + C | Copy | Ctrl + S | Save |
| Ctrl + X | Cut | Ctrl + P | |
| Ctrl + V | Paste | Ctrl + A | Select All |
| Ctrl + Z | Undo | Ctrl + F | Find |
| Ctrl + Y | Redo | Alt + Tab | Switch window |
| Ctrl + N | New file / folder | F2 | Rename |
2.1 Why Care & Maintenance Matter
Taking care of computers (and mobile phones) helps them work properly and last longer. A computer is a delicate machine with many moving electronic parts — it must be protected from dust, heat, moisture and damage. Regular care saves money because you don't need to buy new devices frequently.
2.2 Cleaning Computer Components
⌨️ 1. Keyboard
- Never eat over a keyboard — crumbs damage internal parts.
- Clean with a soft brush to remove dust and crumbs.
- Turn the keyboard upside down and shake gently to remove loose particles.
- Use a slightly damp (not wet) non-abrasive cloth for stains on key caps.
🖥️ 2. Screen / Monitor
- Wipe the screen with a soft, dry microfibre cloth to remove fingerprints.
- Never spray liquid directly on the screen — dampen the cloth instead.
- Do not use paper towels or tissues — they can scratch.
🍔 3. Be Careful with Food & Drinks
Avoid eating or keeping glasses of water / cups of coffee near the computer. Any liquid spilt can spoil an electronic device beyond repair.
💼 4. Handle Devices Carefully
- Move your laptop carefully and avoid dropping or banging it.
- Even a short fall can damage the screen or hard disk.
- Use a cover for mobiles and a padded case for laptops.
🌡️ 5. Keep the Computer Cool
- Overheating damages internal parts. The CPU has an internal fan — make sure it works.
- Avoid leaving devices in direct sun or in a closed car.
- When using a laptop on a bed, don't cover the fan vents.
- You can use an external cooling pad.
🔋 6. Do Not Overcharge the Battery
Leaving a device plugged in for a long time after it is fully charged can overheat the battery and reduce its life. Always unplug at 100%.
🔌 7. Plug in Devices Carefully
Any device — USB drive, headphones, charger — should be plugged in gently. Don't force a cable into a port. If it doesn't fit, change the direction.
⏳ 8. Don't Run Too Many Programs at Once
When too many programs run simultaneously, the computer slows down and may even crash. Close apps you are not using.
2.3 Preparing a Maintenance Schedule
A maintenance schedule keeps the computer running in perfect condition for a long time. Break tasks into daily, weekly, monthly and yearly:
- Clean up e-mail inbox
- Download e-mail attachments, save in proper folders
- Clean keyboard, monitor, CPU & printer
- Back up data to external drive
- Transfer photos to computer, organise into folders
- Clean up Downloads folder
- Uninstall unused programs & apps
- Run disk-cleaner software
- Run full system virus scan
- Clean up social-media contacts list
- Clean up e-mail contact list
- Update operating system
- Check anti-virus expiry, renew
2.4 Backing Up Your Data
🔹 Common Backup Devices
- External Hard Disk / SSD — large capacity, portable.
- USB Pen Drive — quick and simple.
- CD / DVD — archival storage.
- Cloud Storage — Google Drive, OneDrive, Dropbox — accessible from anywhere.
2.5 Protecting the Computer Against Viruses
🔹 Major Types of Viruses & Threats
2.6 Scanning & Cleaning Viruses
🛡️ 1. Install Anti-virus & Firewall
Anti-virus software monitors data entering and leaving the computer, prevents viruses from getting in and can detect and clean viruses that have already entered. Examples: Windows Defender, Avast, AVG, Kaspersky, Norton, Quick Heal.
🔍 2. Run Regular Virus Scans
- Quick scan — checks common infection points (weekly).
- Full scan — checks every file on the computer (monthly).
- Scan USB drives immediately when connected.
🚫 3. Safe Browsing Habits
- Do not download files from unknown websites.
- Do not open email attachments from unknown senders.
- Keep the OS and browser updated.
- Look for https:// and a padlock icon before entering any card / account details.
2.7 Increasing Computer Performance — Cleaning Junk
Over time, the computer accumulates unnecessary files — temporary files, old images, duplicate downloads. These use up hard-disk space and slow the machine down.
🔹 What to Clean
tmpreaper (Linux).2.8 Removing SPAM
🔹 How to Deal with SPAM
- Never respond to SPAM mail — responding signals your address is active.
- Delete SPAM regularly.
- Set filters in email settings to block suspicious senders.
- Most email apps have a dedicated SPAM folder — mails are moved there automatically.
- Mark unknown mails as "Report SPAM" so the filter learns.
2.9 Computer Security & Privacy
🔹 Why Security Matters
We store a lot of information on our computers — photos, personal details, financial records, medical records. If this information is leaked or lost, it can cause serious harm — financial loss, identity theft, reputational damage.
🔹 Types of Threats
🕵️ 1. Theft
Stealing information or hardware — of three kinds:
- Physical theft — someone steals your desktop or laptop.
- Identity theft — a hacker steals your personal info and assumes your identity to access accounts or do illegal activity.
- Software piracy — using or distributing unlicensed / unauthorised copies of a program.
🦠 2. Virus
As covered in 2.5 — programs that damage or steal data (worms, Trojans, malware).
2.10 Measures to Protect Data
🔐 1. Strong Passwords
Use passwords that are difficult to guess — a mix of:
- Small letters (a, b, c, d)
- Capital letters (H, J, E, R)
- Numbers (8, 7, 6, 5)
- Special characters (%, ^, #, $)
password123 — easy to guess.Strong password:
H8jeR#2mKq$ — mix of letters, numbers and symbols.
🛡️ 2. Install Anti-virus & Firewall
These monitor data coming in and going out of the computer and block viruses. Firewall also prevents unauthorised network access.
🔒 3. Encrypt Data
Banks and companies encrypt important data. A decryption password (or key) is needed before the data can be read. Windows has the BitLocker feature for whole-disk encryption.
🌐 4. Use Secure Sites Only
Give credit card or bank details only on secure sites. Check the address bar — it should begin with https:// and show a padlock icon.
🧑💻 5. Other Safe Habits
- Lock your computer when you leave it (Windows: ⊞ + L).
- Do not share login IDs or OTPs with anyone.
- Do not click suspicious links in emails or messages.
- Keep the OS, browser and anti-virus up to date.
- Back up important data regularly.
- Do not install pirated software.
Quick Revision — Key Points to Remember
- ICT = Information and Communication Technology — digital tools for storing, recording, sending information.
- Computer = Hardware + Software. Hardware is physical; software makes hardware work.
- Operating System (OS) = most important software; boots, manages hardware/files, runs apps, provides UI, enforces security.
- 6 Classes of OS: Single-user single-task, Single-user multi-task, Multi-user, Real-time, Distributed, Mobile.
- Desktop parts: Icons · Menu · Taskbar · Mouse pointer · Windows · Recycle Bin.
- Starting a computer: Power → BIOS/POST → OS loads → Login → Desktop.
- Keyboard groups: Function, Control, Enter, Punctuation, Navigation, Command, Windows keys.
- Mouse actions: Hover · Click · Right-click · Double-click · Drag-drop · Scroll.
- File = electronic container; Folder = group of files; extension tells file type.
- Common extensions: .txt, .docx, .xlsx, .pptx, .jpg, .png, .mp3, .mp4, .pdf, .exe, .zip.
- File system = tree/hierarchical — root directory → folders → sub-folders. Path shows full address.
- File operations: Create, Save, Open, Rename, Copy, Cut, Paste, Delete, Restore.
- Shortcuts: Ctrl+C copy, Ctrl+X cut, Ctrl+V paste, Ctrl+Z undo, Ctrl+Y redo, Ctrl+S save, Ctrl+A select all, Ctrl+P print, F2 rename, Alt+Tab switch.
- Care tips: keep clean, handle gently, no food/drinks, keep cool, don't overcharge, plug gently, don't run too many programs.
- Maintenance schedule: Daily · Weekly · Monthly · Yearly tasks.
- Backup = save copy to another device (HDD / USB / CD / cloud).
- Virus types: Worms, Trojan Horse. Threats also include Online Predators and Internet Scams.
- Protection: strong passwords, antivirus + firewall, encryption, https sites, lock computer, update OS, backup.
- SPAM = unwanted promotional mail — delete, set filters, never respond.