ICT Skills
ICT Skills
Information Technology means creating, managing, storing and exchanging information. It includes all
technologies that can be used to deal with information.
Information Technology has become a part of everyday life. ICT applications are found in every field –
education, health, business, design, manufacturing, science, environment. You can create a project
report, do office work, send messages, read books, manage daily planner, play games, listen to music,
watch movies, pay bills, book tickets, buy products, and the list in endless.
A computer can be used at home to play games, search information, listen to music, watch movies,
send or receive email, maintain household accounts. A device with internet connection can be used
to do online shopping, pay bills, do e-banking etc.
24
1.2.2 ICT in education
Students are also using their own smart phones or other devices for learning during class time. Online
assessment is also helpful for students.
The concept of “flipped classroom” is becoming popular in many countries where students watch
lectures at home on the computer and use classroom time for more interactive exercises.
• Complex topics can be easily explained to the students with the help of pictures, videos,
presentations, etc.
• Images and videos used for teaching improves the retention memory of the students.
• Presentations can make the lessons interesting.
• Practical demonstration can be given to the students.
• If the teaching process in the class is interactive, it will make the lesson more enjoyable.
• An e-learning program allows students to learn at their own pace, at any convenient time,
and from any place.
25
condition. The Doctor can also interact with patient, recommend to take medical
examination and prescribe medicine.
• Using the ICT tool or a suitable communication system, government can make efforts to
create awareness among the public about the communicable diseases, prevention measures
and various current diagnostic & etc.
• ICT in healthcare research helps to find the possible prevention measures to eradicate and
reduce the spread of diseases.
• Through ICT, the traditional healthcare systems can be eliminated and new models can be
formed for effective quality care.
• Hospitals can use different electronic media to store medical data. This helps to retrieve the
information easily. This data can be transferred to the patient or to the Doctors for
consultation.
• Computer based machines are used for MRI, CT-scan, ultrasound are done in hospitals,
diagnostic centres, to diagnose the diseases.
• Life support systems are provided to the patients
• You can search information on any disease, medicines, etc. on the internet.
1.2.4 ICT in Governance
ICT in governance means using Internet, other electronic media buy the central and state
governments, by local administrative bodies to improve the efficiency, transparency, efficiency
of the government. Many government services are available online. Electronic voting for
elections has replaced the traditional voting slip.
ICT has affected the society in both positive and negative way. We have already discussed the use of
ICT in various fields.
26
ICT has divided the society into two groups:
1. Persons who can do their personal and professional work efficiently. They are efficient in using
services like, e-banking, e-learning, e-governance sites, etc.
2. People who do not have access to a computer and internet. They also do not have knowledge to
use facilities available on the internet.
This has resulted in digital divide, which refers to the gap between people who have access to
latest information technologies, like, computer, smart phones, internet, ipad, etc. and have
knowledge to use them and people who do not have access to use these devices.
ICT has a great impact in our daily life. Some of the uses of ICT in our daily life are given below:
Lets Try It
Worksheet
27
1.4 ICT Tools
ICT tools are devices that are used in Information and communication technology. For example,
computer, smart phone, radio, television, iPad, tablets, etc.
1.4.1 Mobile
Mobile phones are the easiest and simplest way of communication. It is small in
size, lightweight and portable. You can stay in touch with your friends, relatives,
anytime and anywhere.
Mobile phones are useful in studies. Students can access the internet on their
mobile phones and get knowledge on any topic.
You can even create documents, make presentations, etc on your smart phones
as you do on your computer.
1.4.2 Tablets
1.4.3 Radio
1.4.4 TV
1.4.5 Newspaper
Newspaper is another most important ICT tool. News related to all the
issues , national, international, sports, space, etc, are printed in
newspapers.
1.4.6 Email
Email is the most common way of communication in today’s world. It is the official way of
communication. Some of the advantages of using email are:
28
• You don’t have to pay anything extra for sending or receiving email. You just pay for the
internet connection.
• You can send bulk mails
• The receiver may not be online when you send the email.
• You can send documents, presentations, images, videos, etc. as an attachment to email.
• When you send an email, it reaches, the receiver at any part of the world in few seconds.
1.4.7 Interactive White Boards (Smart Boards)
1.4.8 E-readers
Lets try it
1. Discuss the role and importance of ICT in personal life and at workplace.
2. Discuss use of various ICT tools.
Worksheet
Session
29
Unit 2. Identify the Various Components of Computer System
A computer is an electronic device that has devices to enter data, store data and process raw facts
and figures according to the given instructions and give the desired result on an output device.
Data: Data refers to raw facts and figures. For example, 123, “English”, etc.
Information: Information refers to processed data. For example, total marks and percentage of a
student.
• Computer hardware – Physical parts of a computer such as Input devices, output devices,
central processing unit and storage devices are called computer hardware.
• Computer software – Software are the programs or applications that run on computer.
For example, MS Word, MS PowerPoint, Operating systems, etc.
The physical components of a computer system are called hardware. A computer basically consists of
following physical components:
• Input unit
• Processing unit
• Storage unit
• Auxiliary storage
• Output unit
<A> Input Devices
30
It consists of the following main units:
+ (addition)
- (subtraction)
*(multiplication)
/(Division)
^(Exponent)
The ALU also performs the following logical operations:
< (less than)
<(greater than)
<= (less than or equal to)
>= (greater than or equal to)
<> (not equal to)
<D> Control Unit
The control unit controls the flow of data from the input devices to memory and from memory to
output devices. It does not process the data.
When the processing begins, the first instruction of the program is selected and fed into the control
section of the primary storage area. It is then interpreted there and then the signals are sent to other
components to perform the necessary action.
The next instruction, is then selected, interpreted, and executed. This is continued till all the
instructions are processed.
<E> Registers
2.2.2 Software
31
Software
System software is a set of one or more programs designed to control the operation of a computer
system.
Operating systems and language processors come under the category of system software.
Operating System
Operating system is a master control program that runs the computer. When the computer is
switched on, operating system is the first program loaded into the computer’s memory.
Examples of operating system are Windows, UNIX, MS-DOS, Mac OS, Solaris, etc.
Language Processors
A computer understands instructions in the form of machine code, i.e., 0 and 1. The programs are
written in English like high level language called source code. The source code must be converted
into machine language in order to be executed. The translator program that is used to convert
source program written in high level language to machine code is called language processor. The
program translated into machine code is called the object program.
32
<C> Application Software
Application software is a computer program that is designed to perform a certain type of work.
This type of software pertains to one specific application. For example, software written to
calculate salary of the school employees cannot be used to prepare school result.
Application softwares can be classified as General purpose software and Specific purpose
application software.
General purpose application software includes word processing software, like, Microsoft Word.,
spreadsheet software, like, Microsoft Excel, etc.
Antivirus software:- This program helps in detecting and removing viruses. For example, Norton
antivirus, McAffee virus scan, etc.
File management tools:-These tools help in storing, searching, and sorting files and folders on the
system. For example, Windows Explorer.
Compression:- This program helps in compression of large files so that they take less storage
space. For example, WinZip.
• Disk Cleaner:-This utility scans for the files that have not been used since long. These files may
be occupying large amount of space. It prompts the user to delete such files to create more
disk space.
• Disk Defragmenter:-It rearranges the files and free space on the computer so that files are
stored in contiguous and free space is consolidated in one contiguous block. This speeds up
the disk access.
33
• Backup:- backup means making a duplicate of the files and data stored on the computer. This
program is used to take backup copy of the data. In case the original data is lost, the backed
up data can be used.
Lets Try It
Worksheet 1
Worksheet 2
34
2.3 PRIMARY AND SECONDARY MEMORY
• Primary storage
• Temporary Storage
2.3.1 Primary Storage
The primary storage is also called the primary memory. It is directly accessible by the CPU. It can be:
Units of computer memory are:- Bit (Binary Digit), Byte (Kilobyte, Megabyte, GigaByte, TeraByte,
PetaByte, ExaByte, ZettaByte, YottaByte)
The elementary unit of memory is a bit. A group of 4 bits is called a nibble and a group of 8 bits is
called a byte.
1 Byte = 8 bits
One petabyte (PB) = 1024 TB=1024 x 1024 x 1024 x 1024 x 1024 bytes
One ExaByte (EB)=1024 PB=1024 x 1024 x1024 x 1024 x 1024 x 1024 bytes
One ZettaByte (ZB)=1024 EB)= 1024 x 1024 x 1024 x1024 x 1024 x 1024 x 1024 bytes
RAM is used to hold active information of data and instructions. Information in RAM is stored in
random order, that is why it is known as Random Access Memory.
35
It is a temporary memory. When power supply is switched off, the information stored in RAM is lost,
so it is also known as volatile memory.
It is also known as read/write memory as information can be read from RAM and also written onto it.
Information stored in RAM may be erased or written over.
ROM is a part of computer’s main memory. It is used to store the instructions provided by the
manufacturer to check basic hardware and to load operating system from appropriate storage device.
The storage of data and instructions in ROM is permanent until it is written over.
The contents of the ROM are not lost when power supply is switched off. That is why, ROM is called
non-volatile memory.
Since the computer’s main memory stores the data and information temporarily, the secondary
memory is used. Secondary memory is sued to store bulk of information.
The information stored in secondary memory is not lost, so it is also a non-volatile memory. These
devices are non-volatile as data is stored in these devices till it is deleted.
Secondary storage devices include hard disk, CD, DVDs, Pen drive , etc.
Scanners are another important hardware devices that are used to convert a picture or text in a book
or page in a digital form.
The output unit comprises of devices such as Monitor, Printer, speaker, etc. to display information to
the user.
36
<C> Storage Devices
Lets Try It
1. Discuss different secondary storage devices, their uses and their storage capacities.
2. Name a few external storage devices.
3. Discuss various output devices and their uses.
Worksheet
37
Unit 3. Identify Various Peripheral Devices
A peripheral device is an internal or external device that connects directly to a computer but does not
contribute to the computer's primary function, such as computing. It helps end users access and use
the functionalities of a computer.
<A> Keyboard
38
Laptops have inbuilt keyboard but they are very delicate.
A virtual keyboard
is not a physical
keyboard. It is not a
hardware but a
software. You must have used a full touch Smart phone.
The keypad of your Smartphone is an example of a virtual
keyboard. In Windows operating System, there is an On
Screen keyboard, which is an example of a virtual
keyboard. It can be made to appear when required.
• Alphanumeric keys are used to type alphabets, numbers and special symbols like $, %, @, A etc.
• Special keys such as Shift, Ctrl, Alt, etc. are used for special functions.
• Function keys such as Fl, F2, F3 etc. are used to give special commands and these commands may
be different for different softwares.
• Cursor Movement keys. These keys are used to move the cursor in a document. These include the
arrow keys, PAGE UP, PAGE DOWN, etc.
Numeric keypad. The numeric keypad is present to the right of the keyboard and can be used to enter
numbers quickly.
<B> Mouse
A computer mouse may be connected to a computer using wire and connected to PS/2 or USB post.
Some of the computer mouse are wireless.
A mouse usually has two buttons with a scroll wheel in the center.
When you move the mouse, the mouse pointer moves in the same direction on the
screen.
39
Nowadays, we have Optical mouse that uses an LED sensor to detect the movement of the mouse on
the tabletop and send the information to the computer.
<C> Joystick
<F> Scanner
A scanner is a device that is sued to convert text or image into a digital file.
<H> Microphone
A microphone is a device used to record your voice and save it in the form of a
digital file in the computer.
Let’s Try
1. Go to a grocery shop/ store. Ask the accountant to demonstrate the use of barcode
reader to read the barcode. Note what happens/appears on the computer screen when
he clicks the barcode.
40
Worksheet
_______________________________
_______________________________
41
Then came the LCD (liquid Crystal Display) monitors. These were thinner and lighter than
Cathode Ray Tube monitors.
<B> Printer
A printer is a device used to print the files stored on the computer on paper. The output produced
on paper is called the hard copy.
It is the most commonly used character printer, i.e, it prints one character at
a time. Most of the dot matrix printers are bidirectional, i.e., they print one
line of text from left to right and then the next line from right to left.
Inkjet Printer
Inkjet Printer
Laser Printer
42
Laser Printer
These printers print one page at a time and are very fast.
Braille Printers
<C> Plotters
<D> Speaker
Lets Try It
Worksheet
43
3.2.3 Storage Devices
<A> CDs/DVDs
Compact Disc (CD) and Digital Versatile disc (DVD) are optical media that is used
to record data from computer. Data can then be read from the CD. To read data
from the CD, we need to have a CD Drive in our computer.
• CD-R and
• CD-RW
In CD-R, data once recorded can be read only and cannot be erased.
In CD-RW, previously recorded data can be erased and new data can
be recorded.
Both CD and DVD look same in appearance but DVDs can hold much
more data than CDs.
To read data from the DVD, we need to have a DVD driv e in our
computer system. We can read a CD using DVD drive but we cannot
read a DVD using CD drive.
A CD can store upto 700 MB of data whereas a DVD can store 4.7 GB of data.
A pen drive is a very small and portable device used to store data from a
computer. It can also be used to access and transfer data. Pen drives are
available in various capacities- 1 GB, 8 GB, 16 GB, 32 GB, etc.
Let’s Try It
3.3 USE ANY TYPING TUTOR SOFTWARE TO PRACTICE TYPING AND LEARN USING
DIFFERENT KEYS OF THE KEYBOARD.
Tux Typing tutor is a software used to teach typing to children and even adults. Regular practice will
help you to increase typing speed and reduce the mistakes while typing.
Before learning typing, you should learn how to place your fingers properly on the keyboard.
Before typing we should always place our fingers on the second row of alphabet keys.
The figure shown below shows which figure is used for which key.
45
a. Start Tux Typing
b. The Tux Typing main window appears (Fig 1 ).
d. A number of lessons are available. Start from lesson 1 and then try other lessons.
3.4 Recording your voice using Sound Recorder in Windows 7.
46
a. Make sure that microphone is properly attached to the computer.
b. Select Start ➢ All Programs ➢ Accessories ➢ Sound Recorder.
c. The Sound Recorder window appears (Fig 3 )
Fig 4 Recording
g. Select the drive and folder. Type the filename and click Save button.
47
Unit 4. Performing Basic Computer Operations
To turn off the computer completely, click the Start button, and then click Shut Down.
If you choose Sleep option, the system uses very little power, the computer starts up faster and you
are back to where you left. You can use sleep option if you going away for a short time. Laptops and
tablets goes to sleep when you close the lid or press the Power button.
If you select Hibernate option, system uses less power than Sleep. When you start the PC again, you
are back to where you left.
• It manages all the devices of a computer and keeps track of the status of the device, whether it
is busy or not.
• It also checks whether the device is functioning properly or not.
• It also controls software resources of the computer.
48
• t manages the computer memory and keeps track of which memory space is in use by which
program and which space is free.
• It manages the structure of the files and directories on a computer system.
• It keeps track of the amount of disk space used by a specific file.
• It allows you to create, copy, move and delete files.
DOS (Disk Operating System) is an operating system for a personal computer. Early computers were
able to run one program at a time. It had a command line interface in which a user has to remember
the commands to run the program and do other operating system tasks. For example, the DOS
command, dir, will display the list of files in the current directory.
<B> Windows
<C> Linux
It is an operating system designed for personal computers. It is a free and open-source software, which
means it can be modified and redistributed.
<A> Android It is an operating system used in mobile phones and tablets. It is owned and maintained
by Google and is an open-source operating system. The android releases were nicknamed after sweets
or dessert items like Cupcake (1.5), Donout (1.6), Éclair (2.0), Frozen Yogurt (2.2), Honeycomb (3.0)
and Jelly Bean (4.1), Kitkat (4.4), marshmallow (6.0),
<B> Symbian It is an operating system used in mobile phones. Symbian was developed and sold by
Symbian Ltd. It is primarily used by Nokia. It is also used by Japanese mobile phone manufacturers for
handsets sold in Japan.
<C> Windows Phone It is a mobile operating system developed by Microsoft for smart phones and
pocket
PCs. Windows Mobile. Windows 8.1 is the latest release of this operating system.
iOS It is a mobile operating system developed by Apple Inc. for iPhones, iPads, and iPods. It is
supported only by Apple hardware. iOS 9 is the latest release of this operating system.
Lets Try It
1. Start your computer and see the changes on the computer screen. Shut down the
computer properly.
2. Identify and name the operating system installed in your computer.
3. Discuss the functions of operating system.
4. Discuss how to properly start the computer and shut down the computer.
49
Worksheet
After loading Windows 7, the first screen that appears on the monitor is called desktop. From the
desktop, you can access different components of Windows 7.
By default, Windows 7 has a picture for the desktop background. This is called wallpaper.
Small pictures on the desktop are called icons. These icons represent files, folders, applications, etc.
At the bottom of the desktop is a long bar called the Taskbar. To the left of the taskbar is the Start
button.
icons
Computer
icon
Wall paper
Recycle
Bin
Task bar
Start
button
Let us discuss some special icons on the Desktop – Computer, Documents, My Network Places, and
Recycle Bin.
<B> Computer
It displays all the storage areas of the computer. Through the Computer icon, you can access all drives,
files, and folders on the computer.
<C> Documents
50
<D> My Network places
Files and folders deleted by the user are stored in the Recycle Bin. From Recycle Bin, you can retrieve
files or folders deleted by mistake.
You can permanently delete the contents of the Recycle Bin in any one of the
following ways:
Right-click the Recycle Bin icon and then click Empty Recycle Bin.
OR
Fig 2
Taskbar is the long horizontal bar present at the bottom of the screen. To the left is the Start button.
Right of the taskbar contains Date/Time. You can also see icons of active applications and some
shortcuts on the Taskbar
Active Notification
Start button Date/Time icon
Applications Area
Fig 4 Taskbar
51
<G> Start button It is located on the left of the taskbar. Clicking
the Start button opens the Start menu and provides access to
programs and features, like:
Search Box:- This allows the user to search a file or a folder or run
executable files.
Lets Try It
52
Worksheet
1. The first screen that appears after starting the computer is called ________
2. Small pictures on the desktop are called __________
3. The long horizontal bar present at the bottom of the desktop is called _________
4. Name the folder where all the temporarily deleted files are stored.
5. How can you recover files from Recycle Bin?
53
Fig 8 New Folder created
54
4.6 KEYBOARD AND MOUSE ACTIONS
4.6.1 keyboard operations
We already know that a keyboard has many keys on it. We can type numbers, letters, and symbols by
pressing keys of the keyboard. The characters we press on the keyboard appear on the screen.
Backspace key
Delete key
If the Caps Lock key is turned off, all the letters you type
will appear in lowercase.
Alt key
This key is used in combination with other keys to perform certain actions. It
is located on both sides of the space bar key. It can be sued to access the
options in the File menu or Ribbon. For example, pressing Ctrl + Alt +Del keys
together, opens the Windows Task Manager window.
Shift Key
The Shift key is used along with the other keys. There are two shift keys
on the keyboard. The Shift key is used to type the upper symbol present
on some of the keys of the keyboard.
If Caps Lock key is on, the Shift key can be used to type alphabets in
lowercase.
This key is used in combination with other keys for performing particular
operation. For example, Ctrl + C is keyboard shortcut for Copy command,
Ctrl + V is the keyboard shortcut for paste command.
55
Esc (Escape) key
Esc key is found on the top left corner of the keyboard. This key is used to stop an
action, leave a program, close a dialog box, etc. For example, you can stop a
browser from loading web page if it is taking too long. You can also close a dialog
box by pressing Esc key.
Function keys
On the top of the keyboard, there are function keys marked from F1, F2, f3, and so on. These keys
have special function defined by operating system or currently running program. They may be
combined with Alt or Ctrl keys. For example, F1 key is used as the Help key in almost every program.
On pressing this key, the help screen appears.
Also pressing Windows key + F1 opens the Microsoft Windows help and support centre.
Tab key
Pressing this key moves the cursor several places along the same line.
Fn (Function) key
On pressing the fn key and the key that increases the brightness on the
laptop screen.
When you press this key, the current screen image is sent to the computer
clipboard. Once the image is stored in the clipboard, you can paste the image
in any image editor or any other program.
56
Different mouse actions are:
• Click
• Double-click
• Right-click
• Drag and drop
Click
Clicking the mouse means pressing the left mouse button once and releasing it. A click is used to
select an item on the computer monitor.
Double-click
Double-clicking the left mouse button twice within a short period of time and releasing it. This action
is used to open a program, a file, or a folder.
Right-click
Right-clicking the mouse means clicking the right button of the mouse once. This shows a list of
commands.
Drag and drop action of mouse is used to move an item from one position to another.
Fig 11
57
3. Holding the mouse button, drag the icon to the new position. (Fig 12)
Fig 12
Hard disk
drives
Removable
disk drives like
CD, DVD, Pen
Drive
To view the contents of any item, e.g., a particular hard disk drive partition, double-click its icon.
58
Lets Try It
1. Create a folder on the desktop named ‘MyPracticalFile’.
a. Open this folder ‘MyPracticalFile’.
b. Right-click anywhere in the blank area of the right-column.
c. In the Shortcut menu, click New and select the type of the file you want to create, say Text
Document.
d. The default name for the text document appears. Type the desired name and press Enter key.
e. Double-click to open the file in Notepad (in this case).
f. Type few lines on the topic ‘Functions of Operating system’.
g. Save the file by pressing Ctrl + S or by selecting Save option from the File menu.
2. Discuss the concept of files and folders. Also discuss the importance of creating folders.
59
Unit 5. Connect with the World Using Internet and its Applications
Protocol
Protocol is a set of rules to be followed while
communicating or transferring data on internet.
For example,
[Link]
here, http is the protocol
[Link] .com is the resource name
• Email
• Chatting
• Video conferencing
• Social networking
• E-learning
60
• E-shopping
• E-reservation
• E-banking, etc.
5.2.1 Email
E-mail stands for electronic mail. It is a message in an electronic form that is sent or received from one
computer to another.
5.2.2 Chatting
Chatting on internet refers to textual communication that offers a real-time transmission of text
messages from one person to another. These messages are generally short.
Video conferencing using internet is a visual communication between two or more persons who may
be present at different locations.
Social networking is the use of internet based social media sites that is used by people to stay
connected with friends, family, etc.
5.2.5 E-learning
E-learning or online learning refers to a learning system that is done using an electronic device with
internet connection.
5.2.6 E-shopping
Buying products online, i.e., using an electronic device with internet connection is called e-shopping.
Customer can buy products from the comfort of their home. It saves time and effort. You can even
compare products, even cancel the transactions. Most important, this facility is available 24 X 7 and
365 days.
5.2.7 E-reservation
E-reservation means booking of tickets online. You can book airline tickets, train tickets, movie tickets
and even hotel rooms and tour packages online.
61
2. It displays the information on the computer.
A web site is a collection of two or more related web pages. Web pages of a web site are linked
together through hyperlinks.
An individual page of a web site is called a web page. It is written in a special computer language
called HTML (Hyper text markup Language).
Static web page is a web page in which all the information is presented to the user exactly as it is
stored. For example, any tutorial web site.
Dynamic web page is a web page which shows different content each time you visit the page. For
example, shopping web sites.
5.4.3 Home Page
To send or receive email messages, you first need to open your email account and have your email
address.
62
Email address
• User name
• Host name
These two parts are separated by @ symbol.
myemail@[Link]
In the above email address, myemail is the user name and [Link] is the host name.
Email program
An email program enables you to send and receive email messages. Some of the popular email
programs are:
[Link]
[Link]
[Link]
63
To send an email, you first open your email account. Then click Compose option. The following
window opens.
To This option allows you to write the email address of the person you want to send the message to.
Cc It stands for carbon copy. This option allows you to send the same message to several persons at
the same time and every recipient will know all the recipients of this mail. The multiple email
addresses are separated by semicolon.
BCc It stands for Blind Carbon copy. This option allows you to send the same message to several
persons at the same time but a recipient will not know who the other recipients of this message are.
Subject This option allows you to write in few words about the content of the message.
Attachment This icon helps you to attach files such as, documents, presentations, images, videos, etc
with your email message.
Social media refers to different online communications channels that are dedicated to community-
based input, interaction, content-sharing and collaboration.
A social networking service is an online platform which people use to build social networks or social
relationship with others. Social networking has created a change in the way we communicate with
one another.
A website that provides facility to people to keep in touch with friends, build social relations, or share
common interests is called a social networking website.
People often use these websites to communicate and share ideas, information, post comments,
messages, images, etc. on a social networking website.
• These sites provide a way to connect with people around the world.
• Social Networking site, like Facebook can be used to stay in touch with the family, and connecting
with old friends has become very easy
• These sites help us to learn about current events.
• These sites also work as a platform to launch new business ides, or for advertisers to market their
products and services to their subscribers.
• Social networking sites can be used to disarm social stigmas.
• These sites expose people to a lot of information, which may or may not be authentic.
• If you share your current location over social media, you can easily become a target.
• Peer pressure and cyberbullying are also important issues.
64
• Online interactions have now substituted the face-to-face interactions and this has reduced the
social skills.
• Social networking has become a distraction for most of the people. Students who use social
networking too often have lower grades.
• Using social networking for long hours in a day can lead to a sedentary lifestyle.
• Social networking sites can spread false or unreliable information quickly.
• Do not post and share private information like mobile phone number, home address, etc. on social
networking websites.
• You should be familiar with the privacy policy of the social networking sites. You can adjust your
privacy settings on social networking websites, so as to control who can access your information.
• Use a strong password. Longer password is more secure than a shorter one.
• Use a different password for each social media account.
• Be selective with friend requests. Don’t accept the friend request if you don’t know the person
personally.
• Be careful while clicking at any link or any pop-up window.
• Protect your computer with anti-virus software and keep it updated.
• Always Log Off when you are done.
5.9 BLOG
Blog
A blog is a website which is maintained by an individual. The person who creates and maintains the
blog is called the blogger.
5.10 TWITTER
Twitter is a social networking service that allows you to send short messages
to communicate with your friends or followers. You can send short messages
of upto 140 characters, which are called tweets. Twitter is sued by people to
inform others about the latest happenings in their lives.
5.11 FACEBOOK
Facebook, founded by Mark Zuckerberg, is the most popular social networking site.
To use Facebook, you need to first create an account. Then add other users as friends.
You can then exchange messages, pictures, etc. with your friends on the Facebook.
Companies also setup their own Facebook pages to connect and communicate with
customers and clients.
65
5.12 YOUTUBE
Companies are also using You tube to launch and advertise their
product.
5.13 WhatsApp
WhatsApp is a free messenger app for smartphones. WhatsApp uses internet to send
text messages, pictures, audio or video. You can make audio and video call to any
person having WhatsApp in their smartphone, in any part of the world. You don’t have
to pay anything extra for sending message or making calls. You just pay for the internet
connection.
Digital India
Digital India is a campaign launched by the Government of India in 2015, to ensure that the
Government's services are made available to citizens electronically by improved online infrastructure.
It also aims at increasing Internet connectivity and making the country digitally empowered in the field
of technology.
Cyber crime refers to any crime done using computer or any electronic device with internet
connection.
• Cyber Bullying
• Cyber Stalking – It refers to harassing an individual or
an organization using internet. This may include making
false accusation or defaming, threatening, damaging data,
etc.
• Hacking – If someone tries to get into computer
systems in order to steal, corrupt or illegitimately view data, then it is called hacking. The person
who does hacking is called a hacker.
• Phishing – Phishing means an attempt to acquire a sensitive information such as username,
password, etc.
• Spamming – Spam refers to unsolicited email which is sent in large quantities to a large number
of users.
66
5.15.2 Cyber Bullying
Cyber bullying is when a student uses any electronic device like, computer, smart phone, tablet, [Link]
post text and images with the intention to hurt, embarrass, threaten or humiliate the victim. Cyber
bullying usually involves posting or sending gossip, posting or sending offensive, rude post to damage
a person’s reputation, relationship with others.
Children usually bully others to seek attention, for revenge, for pleasure, to satisfy their ego, jealousy,
peer pressure, etc.
Cyber bullying can lower the confidence of the child. It can also result in poor academic performance.
Child may get stressed, loose appetite, become a loner, may be unwilling to got to school, afraid of
using technology and even have suicidal thoughts.
Internet has become an essential part of our life. We use internet for various purposes like, for
communication, for upgrading our knowledge, for shopping, in schools, for payment of bills, at home
and in office.
Above all, we use internet as a companion when we are alone and we cannot live without it.
Addiction is generally thought to be a mental disorder involving compulsive behavior and when a
mental condition characterized by excessive use of the internet it is called Cyber/Internet addiction.
When someone is constantly online, they may be described as addicted to it.
67
After Effects of Cyber Addiction
• Headaches
• Back aches
• Irregular eating habits
• Sleep disturbances
• Neglect of family and friends
• Dry eyes and eye problem
• Feeling of depression, irritation
Cyber addiction may lead to cyber crime.
Lets Try!
Worksheet
68
69
70