0% found this document useful (0 votes)
92 views47 pages

ICT Skills

ICT

Uploaded by

rosyjioxo121
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
92 views47 pages

ICT Skills

ICT

Uploaded by

rosyjioxo121
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

Class IX ICT Skills

Unit 1. Role of ICT in Day-to-Day Life

1.1 INTRODUCTION TO ICT

Information Technology means creating, managing, storing and exchanging information. It includes all
technologies that can be used to deal with information.

ICT stands for Information


and Communication
Technology which deals
with the use of electronic
media like computer,
smart phone, iPad, etc. to
store process, and retrieve
data or information.
Nowadays, ICT is one of
the basic requirement of
modern society. Even
mobile devices, like, iPad,
smart phones with
Internet connectivity can
be used to perform daily
life tasks.

1.2 ROLE AND IMPORTANCE OF ICT IN PERSONAL LIFE AND AT WORKPLACE

Information Technology has become a part of everyday life. ICT applications are found in every field –
education, health, business, design, manufacturing, science, environment. You can create a project
report, do office work, send messages, read books, manage daily planner, play games, listen to music,
watch movies, pay bills, book tickets, buy products, and the list in endless.

1.2.1 ICT at Home

A computer can be used at home to play games, search information, listen to music, watch movies,
send or receive email, maintain household accounts. A device with internet connection can be used
to do online shopping, pay bills, do e-banking etc.

24
1.2.2 ICT in education

ICT for education refers to the development of


information and communications technology
specifically for teaching/learning purposes.

ICT has also become integral to the teaching-


learning process. ICT, to some extent, has replaced
traditional chalkboards with interactive digital
whiteboards. It is used for teaching-learning and
assessment. Teach resources for the teachers are
available.

Students are also using their own smart phones or other devices for learning during class time. Online
assessment is also helpful for students.

The concept of “flipped classroom” is becoming popular in many countries where students watch
lectures at home on the computer and use classroom time for more interactive exercises.

Using ICT tools can lead to

• higher order thinking skills


• provide creative and individualized options for students to express their understandings
• Students are better prepared to deal with ongoing technological change in society and the
workplace.
Some of the advantages of ICT in education are:

• Complex topics can be easily explained to the students with the help of pictures, videos,
presentations, etc.
• Images and videos used for teaching improves the retention memory of the students.
• Presentations can make the lessons interesting.
• Practical demonstration can be given to the students.
• If the teaching process in the class is interactive, it will make the lesson more enjoyable.
• An e-learning program allows students to learn at their own pace, at any convenient time,
and from any place.

1.2.3 ICT in Healthcare

ICT plays an important role in healthcare. Some of the


uses of ICT in health care are:

• Through the right communication media, a


doctor can easily deliver treatment and care to
the patient who is located far away. Doctor can
also continuously monitor the patient’s history,
diagnostic report, and track the current health

25
condition. The Doctor can also interact with patient, recommend to take medical
examination and prescribe medicine.
• Using the ICT tool or a suitable communication system, government can make efforts to
create awareness among the public about the communicable diseases, prevention measures
and various current diagnostic & etc.
• ICT in healthcare research helps to find the possible prevention measures to eradicate and
reduce the spread of diseases.
• Through ICT, the traditional healthcare systems can be eliminated and new models can be
formed for effective quality care.
• Hospitals can use different electronic media to store medical data. This helps to retrieve the
information easily. This data can be transferred to the patient or to the Doctors for
consultation.
• Computer based machines are used for MRI, CT-scan, ultrasound are done in hospitals,
diagnostic centres, to diagnose the diseases.
• Life support systems are provided to the patients
• You can search information on any disease, medicines, etc. on the internet.
1.2.4 ICT in Governance

ICT in governance means using Internet, other electronic media buy the central and state
governments, by local administrative bodies to improve the efficiency, transparency, efficiency
of the government. Many government services are available online. Electronic voting for
elections has replaced the traditional voting slip.

ICT in governance can be help:

• Deliver government services efficiently


• E-governance sites enable people to perform various tasks such as filling a form,
applying for passport, paying bills, property tax, etc. even sitting at home.
1.2.5 ICT in Business

ICT in business can be used for the following purposes:

• Keep records of the stock


• Prepare accounts and balance sheets
• Maintain database of staff and customers
• E-commerce enables people to buy and sell products online.
This service is available 24 x 7.
• E-banking facility helps to make banking transactions at any
time of the day .

1.2.6 Impact of ICT on society

ICT has affected the society in both positive and negative way. We have already discussed the use of
ICT in various fields.

26
ICT has divided the society into two groups:

1. Persons who can do their personal and professional work efficiently. They are efficient in using
services like, e-banking, e-learning, e-governance sites, etc.
2. People who do not have access to a computer and internet. They also do not have knowledge to
use facilities available on the internet.
This has resulted in digital divide, which refers to the gap between people who have access to
latest information technologies, like, computer, smart phones, internet, ipad, etc. and have
knowledge to use them and people who do not have access to use these devices.

1.3 ICT in our daily life (examples)

ICT has a great impact in our daily life. Some of the uses of ICT in our daily life are given below:

• We can read newspapers online.


• We can get connected with our friends, relatives or even family members far away from us using
email, messenger, video conferencing etc.
• With the introduction of video conferencing, business meetings are now easier.
• Nowadays people use mobile phone apps to meet and connect with new and old friends.
• Social networks like [Link] have played a big role in connecting both old and new
relationships.
• We can access a full library of educational material via a mobile app or website on any
smartphone or iPad.
• Technology has also made the buying and selling of goods and services flexible and a lot safer.
• Most banks now offer online banking facilities. People make use of this service daily to manage
their finances.
• Most businesses use online banking facility to pay employees and transfer money.

Lets Try It

Discuss the role of ICT in different fields.

Worksheet

1. Name any three latest information technologies.


2. What do you mean by digital divide?
3. How is ICT helpful in education?
4. What is the use of ICT in business?
5. What is the role of ICT in e-governance?

27
1.4 ICT Tools

ICT tools are devices that are used in Information and communication technology. For example,
computer, smart phone, radio, television, iPad, tablets, etc.

Some of these are discussed below:

1.4.1 Mobile

Mobile phones are the easiest and simplest way of communication. It is small in
size, lightweight and portable. You can stay in touch with your friends, relatives,
anytime and anywhere.

Mobile phones are useful in studies. Students can access the internet on their
mobile phones and get knowledge on any topic.

You can even create documents, make presentations, etc on your smart phones
as you do on your computer.

1.4.2 Tablets

Tablets are small personal computers with a touch screen. Tablets


allows user to input data and instructions through keyboard or mouse.
Learning software called apps can be downloaded onto tablets. You can
also watch videos relevant to your subject.

1.4.3 Radio

Radio is the oldest tool used to provide entertainment and information


to people. You can listen to music, radio shows, etc. on radio.

1.4.4 TV

Television is another important ICT tool. You


can watch music, view programs, etc. on television.

1.4.5 Newspaper

Newspaper is another most important ICT tool. News related to all the
issues , national, international, sports, space, etc, are printed in
newspapers.

1.4.6 Email

Email is the most common way of communication in today’s world. It is the official way of
communication. Some of the advantages of using email are:

28
• You don’t have to pay anything extra for sending or receiving email. You just pay for the
internet connection.
• You can send bulk mails
• The receiver may not be online when you send the email.
• You can send documents, presentations, images, videos, etc. as an attachment to email.
• When you send an email, it reaches, the receiver at any part of the world in few seconds.
1.4.7 Interactive White Boards (Smart Boards)

These boards a allow to project computer . Also handwritten


notes can be taken on the board and saved for later use.

1.4.8 E-readers

E-readers are electronic devices that


can hold hundreds of books in digital
form. E-readers are portable, have a long battery life.

Lets try it

1. Discuss the role and importance of ICT in personal life and at workplace.
2. Discuss use of various ICT tools.

Worksheet

1. Name any three ICT tools.


2. Name the electronic device that can hold hundreds of books in digital form.
3. Mention any three advantages of email.
4. Mention use of tablets.

Session

Prepare poster or collage to show the role of ICT at workplace

29
Unit 2. Identify the Various Components of Computer System

2.1 BAISC COMPONENTS OF COMPUTER SYSTEM

A computer is an electronic device that has devices to enter data, store data and process raw facts
and figures according to the given instructions and give the desired result on an output device.

Data: Data refers to raw facts and figures. For example, 123, “English”, etc.
Information: Information refers to processed data. For example, total marks and percentage of a
student.

2.2 HARDWARE AND SOFTWARE

A computer system comprises of hardware and software.

• Computer hardware – Physical parts of a computer such as Input devices, output devices,
central processing unit and storage devices are called computer hardware.
• Computer software – Software are the programs or applications that run on computer.
For example, MS Word, MS PowerPoint, Operating systems, etc.

2.2.1 Computer hardware

The physical components of a computer system are called hardware. A computer basically consists of
following physical components:

• Input unit
• Processing unit
• Storage unit
• Auxiliary storage
• Output unit
<A> Input Devices

Input devices are used for


entering data or instructions
into the computer.

<B> The Central Processing Unit


(CPU)

The Central Processing Unit is


the brain of the computer
system.

Functions of Central Processing


Unit are:

• It controls the sequence of operations within the computer


• It gives commands to other parts of the computer
• It controls the use of main memory for storing data and instructions

30
It consists of the following main units:

• Arithmetic and Logic unit (ALU)


• Control Unit (CU)
• Main Memory Unit
<C> Arithmetic and Logic Unit (ALU)

All the calculations and comparisons are done in this


unit.

The ALU performs all the following arithmetic


operations:

+ (addition)
- (subtraction)
*(multiplication)
/(Division)
^(Exponent)
The ALU also performs the following logical operations:
< (less than)
<(greater than)
<= (less than or equal to)
>= (greater than or equal to)
<> (not equal to)
<D> Control Unit

The control unit controls the flow of data from the input devices to memory and from memory to
output devices. It does not process the data.

When the processing begins, the first instruction of the program is selected and fed into the control
section of the primary storage area. It is then interpreted there and then the signals are sent to other
components to perform the necessary action.

The next instruction, is then selected, interpreted, and executed. This is continued till all the
instructions are processed.

<E> Registers

These are temporary storage areas found in CPU of modern computers.

2.2.2 Software

Software is a set of computer programs that perform a particular task.


Following are the categories of softwares:

31
Software

System Utility Application


Software Software Software

Operating Language General Customized


System Processors Purpose Software

Compiler Assembler Interpreter

<A> System Software

System software is a set of one or more programs designed to control the operation of a computer
system.

Operating systems and language processors come under the category of system software.

Operating System

Operating system is a master control program that runs the computer. When the computer is
switched on, operating system is the first program loaded into the computer’s memory.

Examples of operating system are Windows, UNIX, MS-DOS, Mac OS, Solaris, etc.

Language Processors

A computer understands instructions in the form of machine code, i.e., 0 and 1. The programs are
written in English like high level language called source code. The source code must be converted
into machine language in order to be executed. The translator program that is used to convert
source program written in high level language to machine code is called language processor. The
program translated into machine code is called the object program.

Language processor is of three types:

1. Assembler:- It is a program that translates an assembly language program into machine


language.
2. Compiler:-It is a program that translates a high-level language program into machine
language. For example C++ compiler.
3. Interpreter:-It is a program that translates a high-level language into machine language
program line by line. For example, Visual basic Interpreter.

32
<C> Application Software

Application software is a computer program that is designed to perform a certain type of work.
This type of software pertains to one specific application. For example, software written to
calculate salary of the school employees cannot be used to prepare school result.

Application softwares can be classified as General purpose software and Specific purpose
application software.

General purpose application software includes word processing software, like, Microsoft Word.,
spreadsheet software, like, Microsoft Excel, etc.

Specific Purpose Application software

Specific purpose application software


are the softwares that perform a
particular task. Examples of specific
purpose application software are
Accounting management software,
Reservation system, Payroll system, etc.

<D> Utility Program

A utility program is used to perform


maintenance work on a system or on the
components of the computer.

Examples of Utility program are;- anti-


virus software, file management
programs, etc.

Antivirus software:- This program helps in detecting and removing viruses. For example, Norton
antivirus, McAffee virus scan, etc.

File management tools:-These tools help in storing, searching, and sorting files and folders on the
system. For example, Windows Explorer.

Compression:- This program helps in compression of large files so that they take less storage
space. For example, WinZip.

Disk Management Tools:- These programs include

• Disk Cleaner:-This utility scans for the files that have not been used since long. These files may
be occupying large amount of space. It prompts the user to delete such files to create more
disk space.
• Disk Defragmenter:-It rearranges the files and free space on the computer so that files are
stored in contiguous and free space is consolidated in one contiguous block. This speeds up
the disk access.

33
• Backup:- backup means making a duplicate of the files and data stored on the computer. This
program is used to take backup copy of the data. In case the original data is lost, the backed
up data can be used.

Lets Try It

1. Discuss various components of a computer system.


2. List few hardware devices.
3. List names of few softwares.
4. Identify and name application software(s) installed in your computer.
5. Identify and name anti-virus software installed in your computer.
6. Identify few Utility softwares in your computer system.
7. Discuss different types of softwares.

Worksheet 1

1. What is the difference between system software and application software?


2. Name any three disk management tools.
3. Name the program that rearranges the files and folders in the computer system.
4. Give example of file management tool.
5. Name the types of language processors.

Worksheet 2

1. Give full form of the following:


a. ALU
b. CU
c. CPU
2. Name the unit of computer that controls the flow of data from input device to memory.
3. Name logical operations that can be performed in ALU.
4. Identify the following arithmetic operations:
a. *
b. ^
c. /
5. Which unit of computer is called the brain of the computer?
6. Identify as hardware or software.
Monitor
MS Word
Operating system
Mouse
Keyboard
MS PowerPoint
7. Differentiate between hardware and software.
8. What is the difference between data and information/
9. Name the unit of computer where arithmetic operations are performed.
10. Name any three input devices.

34
2.3 PRIMARY AND SECONDARY MEMORY

The storage unit consists of the following components:

• Primary storage
• Temporary Storage
2.3.1 Primary Storage

The primary storage is also called the primary memory. It is directly accessible by the CPU. It can be:

• RAM (Random Access Memory)


• ROM (Read Only Memory)
Functions of primary memory are:

• Here data is fed and held until it is ready to be accessed.


• It is used to hold the data being processed and the intermediate results of processing.
• It holds the result of the processing.
• It holds the processing instructions.
<A> Memory Units

Units of computer memory are:- Bit (Binary Digit), Byte (Kilobyte, Megabyte, GigaByte, TeraByte,
PetaByte, ExaByte, ZettaByte, YottaByte)

The elementary unit of memory is a bit. A group of 4 bits is called a nibble and a group of 8 bits is
called a byte.

One byte is the minimum space required to store one character.

1 Byte = 8 bits

One kilobyte (KB) = 1024 bytes

One Megabyte (MB) = 1024 KB = 1024 x 1024 bytes

One Gigabyte (GB) = 1024 MB =1024 x 1024 x 1024 bytes

One Terabyte (TB) = 1024 GB = 1024 x 1024 x 1024 x 1024 bytes

One petabyte (PB) = 1024 TB=1024 x 1024 x 1024 x 1024 x 1024 bytes

One ExaByte (EB)=1024 PB=1024 x 1024 x1024 x 1024 x 1024 x 1024 bytes

One ZettaByte (ZB)=1024 EB)= 1024 x 1024 x 1024 x1024 x 1024 x 1024 x 1024 bytes

<B> Random Access Memory (RAM)

RAM is used to hold active information of data and instructions. Information in RAM is stored in
random order, that is why it is known as Random Access Memory.

35
It is a temporary memory. When power supply is switched off, the information stored in RAM is lost,
so it is also known as volatile memory.

It is also known as read/write memory as information can be read from RAM and also written onto it.
Information stored in RAM may be erased or written over.

<C> Read-Only memory (ROM)

ROM is a part of computer’s main memory. It is used to store the instructions provided by the
manufacturer to check basic hardware and to load operating system from appropriate storage device.

The storage of data and instructions in ROM is permanent until it is written over.

The contents of the ROM are not lost when power supply is switched off. That is why, ROM is called
non-volatile memory.

2.3.2 Secondary Storage

Since the computer’s main memory stores the data and information temporarily, the secondary
memory is used. Secondary memory is sued to store bulk of information.

The information stored in secondary memory is not lost, so it is also a non-volatile memory. These
devices are non-volatile as data is stored in these devices till it is deleted.

Secondary storage devices include hard disk, CD, DVDs, Pen drive , etc.

2.4 INPUT, OUTPUT AND STORAGE DEVICES

<A> Input devices

Input devices are used for entering data or


instructions into the computer.

Another most important device that is


commonly used is the computer mouse. It is a
pointing device that is used to point to an
object or menu option on the computer
screen. It can also be used to open a document
or a software. Mouse can also be used to move
the selected object by using drag-and-drop
method.

Scanners are another important hardware devices that are used to convert a picture or text in a book
or page in a digital form.

<B> Output Devices

The output unit comprises of devices such as Monitor, Printer, speaker, etc. to display information to
the user.

36
<C> Storage Devices

All computers have a hard disk drive installed in them. It is used to


store files of Operating system, softwares and other files. A
computer cannot function without this installed hard disk drive.

Nowadays, external hard disk drives


are used to take backup of data on the
computer. External hard disk drives are available in different sizes and
storage capacity. These are potable and can be moved from one place
to another easily.

Lets Try It

1. Discuss different secondary storage devices, their uses and their storage capacities.
2. Name a few external storage devices.
3. Discuss various output devices and their uses.

Worksheet

1. Give full form of the following:


a. RAM
b. ROM
2. Which memory- RAM or ROM is called the volatile memory and why?
3. Name the parts of primary memory.
4. What is one byte?
5. Complete the following:
a. 1 KB= ___________Bytes
b. 1 GB = _____________ bytes
6. Arrange in increasing order of storage capacity.
TB, MB, GB, KB, Byte
7. Name the memory which is also known as read/write memory.
8. Name few output devices.
9. Write three functions of primary memory.
10. Name the elementary unit of memory.

37
Unit 3. Identify Various Peripheral Devices

3.1 VARIOUS PERIPHERAL DEVICES AND THEIR USES

A peripheral device is an internal or external device that connects directly to a computer but does not
contribute to the computer's primary function, such as computing. It helps end users access and use
the functionalities of a computer.

For example, a computer mouse, keyboard, monitor, printer and scanner.

Different peripheral devices, fall into following three general categories:

1. Input devices, such as a mouse and a keyboard


2. Output devices, such as a monitor and a printer
3. Storage devices, such as a hard drive or flash drive

3.2 EXAMPLES OF PERIPHERAL DEVICES

3.2.1 Input Devices

<A> Keyboard

A keyboard is a device used to enter data directly


into the computer. First six alphabets of first row of
alphabet keys contains alphabets Q, W, E, R, T, Y.
That is why it is known as QWERTY keyboard.

Different types of keyboards are available but


keyboards with 101 keys is the most popular one.

Keyboard can be wired or wireless.

A wired keyboard is attached to the CPU


with a wire. Earlier there were PS2
keyboards. PS2 was a type of port for the
keyboard. Nowadays, there are USB
keyboards.

A wireless keyboard uses radio frequency or Bluetooth technology. A


wireless keyboard can be attached to different gadgets like – PC,
smart phone, tablet or laptop that supports wireless technology.
There are two parts of wireless keyboard – a transmitter and a trans-
receiver. The transmitter is attached to the keyboard and the
receiver is attached
to the CPU or the
parent device.

Multimedia keyboards are very popular as they have


keys to control the media. It includes additional keys to
play, pause, stop, etc for playing the music. There are
keys for controlling the video playback also.

38
Laptops have inbuilt keyboard but they are very delicate.

A virtual keyboard
is not a physical
keyboard. It is not a
hardware but a
software. You must have used a full touch Smart phone.
The keypad of your Smartphone is an example of a virtual
keyboard. In Windows operating System, there is an On
Screen keyboard, which is an example of a virtual
keyboard. It can be made to appear when required.

Different types of keys of the keyboard are:

• Alphanumeric keys are used to type alphabets, numbers and special symbols like $, %, @, A etc.
• Special keys such as Shift, Ctrl, Alt, etc. are used for special functions.
• Function keys such as Fl, F2, F3 etc. are used to give special commands and these commands may
be different for different softwares.
• Cursor Movement keys. These keys are used to move the cursor in a document. These include the
arrow keys, PAGE UP, PAGE DOWN, etc.

Numeric keypad. The numeric keypad is present to the right of the keyboard and can be used to enter
numbers quickly.

<B> Mouse

A mouse is a pointing device and is used to move mouse pointer on a computer


monitor. When you move the mouse on a flat surface, the mouse pointer on the
computer monitor moves in the direction of the mouse’s movement.

A computer mouse may be connected to a computer using wire and connected to PS/2 or USB post.
Some of the computer mouse are wireless.

A mouse usually has two buttons with a scroll wheel in the center.

When you move the mouse, the mouse pointer moves in the same direction on the
screen.

Earlier, mechanical mouse were used. These had a hard


rubber ball that rolled when the mouse was moved. There
were sensors inside the mouse that could detect the
movement and translate it into information that was
interpreted by computer.

39
Nowadays, we have Optical mouse that uses an LED sensor to detect the movement of the mouse on
the tabletop and send the information to the computer.

Cordless mouse are also available. These need batteries to give


the power required by the mouse.

A laptop has a touchpad as a mouse.

<C> Joystick

A Joystick is used to play games on the computer. It consists of a vertical stick


that is moved to control objects on the computer screen.

<D> Light pen

A light pen is a pointing device. It is


used to draw directly on the screen. It
can also be used to point to an object or option directly on the
computer screen.

<E> Graphics Tablet

A graphic tablet is used to create digital drawings by hand drawing


image on a flat surface called the tablet using a special pen. This
special pen is called stylus.

<F> Scanner

A scanner is a device that is sued to convert text or image into a digital file.

<G> Barcode Reader

A barcode consists of a combination of thick and thin vertical lines found on


products. The bar code identifies the product and the manufacturer. These
barcodes can be read by a device called Barcode reader.

<H> Microphone

A microphone is a device used to record your voice and save it in the form of a
digital file in the computer.

Let’s Try

1. Go to a grocery shop/ store. Ask the accountant to demonstrate the use of barcode
reader to read the barcode. Note what happens/appears on the computer screen when
he clicks the barcode.

40
Worksheet

1. A peripheral device can be ___________ or internal.


2. Different categories of peripheral devices are:
_________________
_________________
_________________
3. Name the device used to enter data directly into the computer. _________
4. Name the device used to play games on the computer. _________
5. What is the name given to thick and thin lines on any grocery item called? Name the
device used to read these lines.

_______________________________

_______________________________

3.2.2 Output Devices

<A> Computer Monitor

A computer monitor, resembles a TV screen and can display both


text and images. The output displayed on computer screen is called
the soft copy.

The size of a computer monitor is measured in diagonal length of the


screen. Computer monitors are available in different sizes, 14 inch,
15 inch, 17 inches, etc.

The monitor has a grid of tiny dots called pixels. Information on


monitor is displayed using these pixels. There is a graphics card in
the monitor that helps monitor to display the information. Quality
of the picture depends of the resolution of the computer monitor.
Higher the resolution, i.e. more number of
pixels, better is the quality. Nowadays, monitors
with resolution 1024 x 768 are widely used.

The first computer monitors used Cathode Ray


tubes. They were big in size.

41
Then came the LCD (liquid Crystal Display) monitors. These were thinner and lighter than
Cathode Ray Tube monitors.

The LED (Light -emitting monitors) are very popular.

Touch screen monitors are becoming very popular these


days. In Touchscreen Monitors of computers,
Smartphones, and Tablets, you simply have to touch the
screen to activate a menu option or perform a specific
function. Even ATM’s have touch screen monitors.

<B> Printer

A printer is a device used to print the files stored on the computer on paper. The output produced
on paper is called the hard copy.

Commonly used printers are:

• Dot matrix printer


• Inkjet printer
• Laser printer

Dot matrix printer

It is the most commonly used character printer, i.e, it prints one character at
a time. Most of the dot matrix printers are bidirectional, i.e., they print one
line of text from left to right and then the next line from right to left.

Inkjet Printer

These printers use a continuous stream of ink drops to print on paper.

Inkjet Printer

Laser Printer

42
Laser Printer

These printers print one page at a time and are very fast.

Braille Printers

A Braille Printer or embosser producer Braille printouts, i.e., patterns


Braille Printer of raised dots of computer files. It works with software that translates
text to Braille.

<C> Plotters

A plotter is a device used to print large size engineering


and architectural drawing on a paper or a polyester film.

<D> Speaker

A speaker is a device used to


listen sound from the
computer. Speakers convert
electrical current into sound.
Some computers have built-in speakers while others have external
speakers.

Lets Try It

1. Discuss various input and output devices and their uses.


2. Attach a speaker to your computer and listen to the sound file you created in the
previous session.
3. Identify with the help of your teacher, the type of printer in your computer lab.
4. Teacher can open any document on computer and demonstrate to the students how to
take a print out.

Worksheet

1. Name the device used to listen sound from the computer.


2. Name the printer that prints one page at a time.
3. Differentiate between hard copy and soft copy.
4. Name the printer that prints one character at a time.
5. Name the printer that uses a continuous stream of ink drops to print on paper.

43
3.2.3 Storage Devices

<A> CDs/DVDs

Compact Disc (CD) and Digital Versatile disc (DVD) are optical media that is used
to record data from computer. Data can then be read from the CD. To read data
from the CD, we need to have a CD Drive in our computer.

There are two variations of CD-

• CD-R and
• CD-RW
In CD-R, data once recorded can be read only and cannot be erased.
In CD-RW, previously recorded data can be erased and new data can
be recorded.

Both CD and DVD look same in appearance but DVDs can hold much
more data than CDs.

To read data from the DVD, we need to have a DVD driv e in our
computer system. We can read a CD using DVD drive but we cannot
read a DVD using CD drive.

A CD can store upto 700 MB of data whereas a DVD can store 4.7 GB of data.

<B> Pen Drive/Flash Drive

A pen drive is a very small and portable device used to store data from a
computer. It can also be used to access and transfer data. Pen drives are
available in various capacities- 1 GB, 8 GB, 16 GB, 32 GB, etc.

<C> External hard disk

An external hard drive is a storage device located outside of a computer


that is connected through a USB cable or wireless connection. An
external hard disc has a high storage capacity compared to flash
drives and are mostly used to take backup of computer files and other
important data. External hard disk of capacity upto 1TB and 2TB are
available.

Let’s Try It

1. Discuss the need of secondary storage devices.


2. Discuss use of various secondary storage devices.
3. Insert a CD in CD/DVD drive in your computer system. Teacher should demonstrate how
to view the contents of the CD/DVD?
4. Open Paintbrush software. Draw any figure using tools available in Paintbrush. With the
help of your teacher, save the file in your pen drive.
44
Worksheet

1. Name any two external storage devices.


2. Which has more capacity- CD or DVD?
3. If you have to take your project from home to school in a digital form, which storage device
is best suited for this purpose/
4. What is the use of external hard disk?
5. Which device has more storage capacity?
a. 16 GB pen drive or a CD
b. 16 GB pen drive or 1 TB hard disk

3.3 USE ANY TYPING TUTOR SOFTWARE TO PRACTICE TYPING AND LEARN USING
DIFFERENT KEYS OF THE KEYBOARD.

Tux Typing tutor is a software used to teach typing to children and even adults. Regular practice will
help you to increase typing speed and reduce the mistakes while typing.

Before learning typing, you should learn how to place your fingers properly on the keyboard.

Before typing we should always place our fingers on the second row of alphabet keys.

Fig Placing fingers

The figure shown below shows which figure is used for which key.

45
a. Start Tux Typing
b. The Tux Typing main window appears (Fig 1 ).

Fig 1 Tux Typing main window

c. Click Lessons. The Lessons mode window appears (Fig 2 ).

Fig 2 Lessons mode window

d. A number of lessons are available. Start from lesson 1 and then try other lessons.
3.4 Recording your voice using Sound Recorder in Windows 7.

46
a. Make sure that microphone is properly attached to the computer.
b. Select Start ➢ All Programs ➢ Accessories ➢ Sound Recorder.
c. The Sound Recorder window appears (Fig 3 )

Fig 3 Sound recorder

d. Click Start Recording button to click start your recording. (Fig 4 )

Fig 4 Recording

e. To finish recording, click Stop Recording button.


f. The Save As dialog box appears ( Fig 5 )

Fig 5 Save As dialog box

g. Select the drive and folder. Type the filename and click Save button.

47
Unit 4. Performing Basic Computer Operations

4.1 PROCEDURE FOR STARTING AND SHUTTING DOWN A COMPUTER


As we all know that computer is a very useful machine. It is very important to properly start the
computer and after finishing the work, it needs to be properly shut down. If the power of the computer
is switched off, and the files you were working on were not closed, the files and the operating system
may get corrupted.

4.1.1 Starting a Computer


The steps to start a computer are given below:

1. Press the Power button of the computer.


2. When you turn on the computer, lights on the keyboard may blink for a while and you may
hear a beep sound. This indicates that the Power-on-self text (POST) has started. POST is a
sequence of tests that determines if the computer hardware like, keyboard, RAM, disk drives,
etc are working correctly. The monitor may display a message, if a component is not
functioning.
3. After the POST, the computer starts the operating system. The process of bringing up the
operating system is called booting. The computer knows how to boot because the instructions
of booting are built into a chip called BIOS (Basic Input/ Output System).
4. When the operating system starts, say Windows 7, Windows welcome screen appears. The
first screen that appears after Windows 7 is successfully loaded is called desktop.
5. Now, you can perform various tasks on the computer.

4.1.2 Shutting down the computer


Before shutting down the computer, you need to save and close all the files and applications. You can
completely turn off the computer, you can make it sleep or hibernate it.

To turn off the computer completely, click the Start button, and then click Shut Down.

If you choose Sleep option, the system uses very little power, the computer starts up faster and you
are back to where you left. You can use sleep option if you going away for a short time. Laptops and
tablets goes to sleep when you close the lid or press the Power button.

If you select Hibernate option, system uses less power than Sleep. When you start the PC again, you
are back to where you left.

4.2 Operating Systems


An operating system is the basic software that controls the computer. It serves as an interface
between the user and the computer.

Some of the functions of Operating system are:

• It manages all the devices of a computer and keeps track of the status of the device, whether it
is busy or not.
• It also checks whether the device is functioning properly or not.
• It also controls software resources of the computer.

48
• t manages the computer memory and keeps track of which memory space is in use by which
program and which space is free.
• It manages the structure of the files and directories on a computer system.
• It keeps track of the amount of disk space used by a specific file.
• It allows you to create, copy, move and delete files.

4.3 TYPES OF OPERATING SYSTEMS


4.3.1 Commonly used operating systems
<A> DOS

DOS (Disk Operating System) is an operating system for a personal computer. Early computers were
able to run one program at a time. It had a command line interface in which a user has to remember
the commands to run the program and do other operating system tasks. For example, the DOS
command, dir, will display the list of files in the current directory.

<B> Windows

It is an operating system developed by Microsoft. Some popular versions of Windows operating


system are- Windows 98, Windows, 2000, Windows XP, Windows 7, Windows 8, and Windows 10.

<C> Linux

It is an operating system designed for personal computers. It is a free and open-source software, which
means it can be modified and redistributed.

4.3.2 Mobile operating Systems


Some popular operating systems that are used in mobile phones are:

<A> Android It is an operating system used in mobile phones and tablets. It is owned and maintained
by Google and is an open-source operating system. The android releases were nicknamed after sweets
or dessert items like Cupcake (1.5), Donout (1.6), Éclair (2.0), Frozen Yogurt (2.2), Honeycomb (3.0)
and Jelly Bean (4.1), Kitkat (4.4), marshmallow (6.0),

<B> Symbian It is an operating system used in mobile phones. Symbian was developed and sold by
Symbian Ltd. It is primarily used by Nokia. It is also used by Japanese mobile phone manufacturers for
handsets sold in Japan.

<C> Windows Phone It is a mobile operating system developed by Microsoft for smart phones and
pocket
PCs. Windows Mobile. Windows 8.1 is the latest release of this operating system.
iOS It is a mobile operating system developed by Apple Inc. for iPhones, iPads, and iPods. It is
supported only by Apple hardware. iOS 9 is the latest release of this operating system.

Lets Try It

1. Start your computer and see the changes on the computer screen. Shut down the
computer properly.
2. Identify and name the operating system installed in your computer.
3. Discuss the functions of operating system.
4. Discuss how to properly start the computer and shut down the computer.

49
Worksheet

1. What is an operating system?


2. Write functions of operating system.
3. Name any three operating systems for computers.
4. Name any two mobile operating systems.
5. Why is it necessary to properly shut down the computer?

4.4 DESKTOP OF WINDOWS AND LINUX


4.4.1 Windows 7 operating system
Windows 7 is an operating system developed by Microsoft and is used on personal computers.

After loading Windows 7, the first screen that appears on the monitor is called desktop. From the
desktop, you can access different components of Windows 7.

By default, Windows 7 has a picture for the desktop background. This is called wallpaper.

Small pictures on the desktop are called icons. These icons represent files, folders, applications, etc.
At the bottom of the desktop is a long bar called the Taskbar. To the left of the taskbar is the Start
button.

<A> Components of Windows 7 Desktop are shown below in figure 1:

icons
Computer
icon
Wall paper
Recycle
Bin

Task bar

Start
button

Let us discuss some special icons on the Desktop – Computer, Documents, My Network Places, and
Recycle Bin.

<B> Computer

It displays all the storage areas of the computer. Through the Computer icon, you can access all drives,
files, and folders on the computer.

<C> Documents

This contains area to store files on the computer.

50
<D> My Network places

It contains information about the interconnected computers.

<E> Recycle Bin

Files and folders deleted by the user are stored in the Recycle Bin. From Recycle Bin, you can retrieve
files or folders deleted by mistake.

Permanently Deleting Files

You can permanently delete the contents of the Recycle Bin in any one of the
following ways:

Right-click the Recycle Bin icon and then click Empty Recycle Bin.

OR

1. Double-click the Recycle Bin icon.


2. The Recycle Bin window appears. (Fig 2)
3. Click Empty the Recycle Bin.

Fig 2

Restore Files/Folder from Recycle Bin window


Fig 3
To recover a file from the Recycle Bin, right-click the file, and then click Restore. (Fig 3)
Or
Select the file and click Restore this item
<F> Taskbar

Taskbar is the long horizontal bar present at the bottom of the screen. To the left is the Start button.
Right of the taskbar contains Date/Time. You can also see icons of active applications and some
shortcuts on the Taskbar

The main components of Taskbar are shown in the following figure 4:

Active Notification
Start button Date/Time icon
Applications Area

Fig 4 Taskbar

51
<G> Start button It is located on the left of the taskbar. Clicking
the Start button opens the Start menu and provides access to
programs and features, like:

Shut Down:- allows the user to turn off the computer

All Programs:- Provides access to all the installed programs and


applications. To start an application, just click it.

Search Box:- This allows the user to search a file or a folder or run
executable files.

Control panel:- This allows the user to change various settings.

Lets Try It

1. Start your computer.


2. Name the operating system on your computer. _____________________.
3. Observe the icons on the desktop. Identify Computer icon, Recycle Bin, Start button, taskbar,
etc.
4. Double-click Computer icon.
5. Write down the partitions of the hard disk.
_______________
_______________
_______________
_______________
6. Identify removable disks on the computer.
______________
______________
______________
______________
7. Double-click Recycle Bin.
8. Restore any one file.
9. Empty Recycle Bin.
10. Click Start button.
11. Write names of any three programs/applications installed in your computer.
_________________
_________________
_________________
12. Change the Wallpaper using following steps:
a. Click Start ➢ Control panel.
b. Under Appearance and personalization, click Change desktop background.
c. In the window that appears, select the desired picture.
d. Click Save Changes button.

52
Worksheet

1. The first screen that appears after starting the computer is called ________
2. Small pictures on the desktop are called __________
3. The long horizontal bar present at the bottom of the desktop is called _________
4. Name the folder where all the temporarily deleted files are stored.
5. How can you recover files from Recycle Bin?

4.5 FILES AND FOLDER


Everything you store on your computer is stored in the form of a file. Files can be separately placed
into groups, called folders/directories. Each directory/folder can contain related files and/or sub-
folders. This allows easy accessibility of files.

4.5.1 Creating a folder


The steps to create a new folder are:

1. Double-click the Computer icon. (Fig 5 )

Fig 5 Fig 6 Files and folders in Local


Disc D:
2. Select the drive in which you want to create a new folder. Say, Local Disk D:.
3. Window will open up showing files and folders in Local Disc D: (Fig 6 )
4. Click New Folder on the toolbar.
Or
Right-click anywhere in the blank area of the right column. A shortcut menu appears. Select
New ➢ Folder from the shortcut menu. (Fig 7 )

Fig 7 Shortcut Menu

53
Fig 8 New Folder created

5. A new folder is created with name New Folder highlighted (Fig 8 ).


6. Type a name for the folder (Fig 9 ). Press Enter key.

Fig 9 Naming a folder

4.5.2 Creating a file


To create a new file:

1. Right-click anywhere in the blank


area of the right-column.
2. In the Shortcut menu, click New and
select the type of the file you want to
create. (Fig 10)

Fig 10 Creating a new file

54
4.6 KEYBOARD AND MOUSE ACTIONS
4.6.1 keyboard operations
We already know that a keyboard has many keys on it. We can type numbers, letters, and symbols by
pressing keys of the keyboard. The characters we press on the keyboard appear on the screen.

The most common keyboard used these days is QWERTY keyboard. It


is so called because the first six letters on the keyboard are Q,W,E,R,T,
and Y.

Let us discuss some special keys of the keyboard.

Backspace key

This key is used to erase the character to the left of the


cursor.

Delete key

This key is used to delete the


character to the right of the cursor.

Caps Lock key

The Caps Lock key is present on the left side of the


keyboard. When you press the Caps Lock key, a light is
turned on. When the Caps Lock key is ON, all the letters
you type will appear in uppercase (capital).

If the Caps Lock key is turned off, all the letters you type
will appear in lowercase.

Alt key

This key is used in combination with other keys to perform certain actions. It
is located on both sides of the space bar key. It can be sued to access the
options in the File menu or Ribbon. For example, pressing Ctrl + Alt +Del keys
together, opens the Windows Task Manager window.

Shift Key

The Shift key is used along with the other keys. There are two shift keys
on the keyboard. The Shift key is used to type the upper symbol present
on some of the keys of the keyboard.

It is also used to type letters in uppercase, if Caps Lock key is off.

If Caps Lock key is on, the Shift key can be used to type alphabets in
lowercase.

Ctrl (Control) key

This key is used in combination with other keys for performing particular
operation. For example, Ctrl + C is keyboard shortcut for Copy command,
Ctrl + V is the keyboard shortcut for paste command.

55
Esc (Escape) key

Esc key is found on the top left corner of the keyboard. This key is used to stop an
action, leave a program, close a dialog box, etc. For example, you can stop a
browser from loading web page if it is taking too long. You can also close a dialog
box by pressing Esc key.

Function keys

On the top of the keyboard, there are function keys marked from F1, F2, f3, and so on. These keys
have special function defined by operating system or currently running program. They may be
combined with Alt or Ctrl keys. For example, F1 key is used as the Help key in almost every program.
On pressing this key, the help screen appears.

Also pressing Windows key + F1 opens the Microsoft Windows help and support centre.

Tab key

Pressing this key moves the cursor several places along the same line.

Fn (Function) key

Function (Fn) key is found in most laptop


computers and some desktop computer keyboards. This key can be used to
perform special hardware functions, such as adjusting the screen brightness,
volume of the speaker, etc.

On pressing the fn key and the key that increases the brightness on the
laptop screen.

Print Screen key

When you press this key, the current screen image is sent to the computer
clipboard. Once the image is stored in the clipboard, you can paste the image
in any image editor or any other program.

4.6.2 Mouse actions


When you move the mouse, a tilted arrow, called the mouse pointer moves on the screen. The
mouse pointer helps in pointing and selecting objects on the screen.

56
Different mouse actions are:

• Click
• Double-click
• Right-click
• Drag and drop
Click

Clicking the mouse means pressing the left mouse button once and releasing it. A click is used to
select an item on the computer monitor.

Double-click

Double-clicking the left mouse button twice within a short period of time and releasing it. This action
is used to open a program, a file, or a folder.

Right-click

Right-clicking the mouse means clicking the right button of the mouse once. This shows a list of
commands.

Drag and drop

Drag and drop action of mouse is used to move an item from one position to another.

4.7 COMMON DESKTOP OPERATIONS


4.7.1 Moving an icon from one position to another
Lets see how to move the icon ‘Recycle Bin’ on the Desktop from one position to another.

1. Place the mouse pointer on the icon ‘Recycle Bin’.


2. Press and hold the mouse button. (Fig 11)

Fig 11

57
3. Holding the mouse button, drag the icon to the new position. (Fig 12)

Fig 12

4. Release the mouse button.

4.7.2 Using Computer icon on Desktop


When you double-click Computer icon, a window shown below appears on the screen. In the following
figure, you can see that hard disk has three partitions- Local Disk (C:), Local Disk (D:) , and New Volume
(F:) . Also a removable DVD Drive (E: ) is there in the system.

Hard disk
drives

Removable
disk drives like
CD, DVD, Pen
Drive

Fig 13 Computer Window

To view the contents of any item, e.g., a particular hard disk drive partition, double-click its icon.

58
Lets Try It
1. Create a folder on the desktop named ‘MyPracticalFile’.
a. Open this folder ‘MyPracticalFile’.
b. Right-click anywhere in the blank area of the right-column.
c. In the Shortcut menu, click New and select the type of the file you want to create, say Text
Document.
d. The default name for the text document appears. Type the desired name and press Enter key.
e. Double-click to open the file in Notepad (in this case).
f. Type few lines on the topic ‘Functions of Operating system’.
g. Save the file by pressing Ctrl + S or by selecting Save option from the File menu.
2. Discuss the concept of files and folders. Also discuss the importance of creating folders.

59
Unit 5. Connect with the World Using Internet and its Applications

5.1 INTRODUCTION TO INTERNET

Internet is a network of networks. It is an interconnection between several computers of different


types belonging to various networks all over the world. The Internet is a medium of communication
and exchange of information.

Exploring information on the web is called web surfing.

5.1.1 Some common terms related to Internet

WWW (World Wide Web)


WWW stands for world wide web is a network of world wide computers.

Protocol
Protocol is a set of rules to be followed while
communicating or transferring data on internet.

HTTP (Hyper Text Transfer Protocol): This protocol


defines the rules to be followed while transferring the
information. The information may be in the form of text,
images, videos, etc.

This is the most commonly used protocol over world


wide web.
HTTPs is the secured version of http. It ensures better protection against data theft.

URL (Uniform Resource Locator)


Each web page has a unique address which identifies its location on the network. This unique address
is called the URL.
The URL has two parts:
• Protocol identifier: It identifies the name of the protocol used.
• Resource name: It specifies the complete address to the resource on the Internet.

For example,
[Link]
here, http is the protocol
[Link] .com is the resource name

5.2 APPLICATIONS OF INTERNET

Some of the services provided by internet are:

• Email
• Chatting
• Video conferencing
• Social networking
• E-learning

60
• E-shopping
• E-reservation
• E-banking, etc.
5.2.1 Email

E-mail stands for electronic mail. It is a message in an electronic form that is sent or received from one
computer to another.

5.2.2 Chatting

Chatting on internet refers to textual communication that offers a real-time transmission of text
messages from one person to another. These messages are generally short.

5.2.3 Video Conferencing

Video conferencing using internet is a visual communication between two or more persons who may
be present at different locations.

5.2.4 Social Networking

Social networking is the use of internet based social media sites that is used by people to stay
connected with friends, family, etc.

5.2.5 E-learning

E-learning or online learning refers to a learning system that is done using an electronic device with
internet connection.

5.2.6 E-shopping

Buying products online, i.e., using an electronic device with internet connection is called e-shopping.
Customer can buy products from the comfort of their home. It saves time and effort. You can even
compare products, even cancel the transactions. Most important, this facility is available 24 X 7 and
365 days.

5.2.7 E-reservation

E-reservation means booking of tickets online. You can book airline tickets, train tickets, movie tickets
and even hotel rooms and tour packages online.

5.3 INTERNET BROWSER

A web browser or internet browser is a program that is used to view


the web sites. It acts as an interface between the web server and the
world wide web. Some commonly used web browser are – Google
Chrome, Microsoft Internet Explorer, Microsoft Edge, opera, etc.

A web browser performs the following tasks:


1. It connects to the web server and sends a request for the
information.

61
2. It displays the information on the computer.

5.4 WEBSITES AND WEBPAGES

5.4.1 Web site

A web site is a collection of two or more related web pages. Web pages of a web site are linked
together through hyperlinks.

5.4.2 Web page

An individual page of a web site is called a web page. It is written in a special computer language
called HTML (Hyper text markup Language).

There are two types of web pages:

• Static web pages


• Dynamic web pages

Static web page is a web page in which all the information is presented to the user exactly as it is
stored. For example, any tutorial web site.

Dynamic web page is a web page which shows different content each time you visit the page. For
example, shopping web sites.
5.4.3 Home Page

The first web page of a website is called the home page.

5.5 EMAIL APPLICATIONS

Some of the advantages of e-mail are:

• It is fast and easy to use.


• It is the fastest means of communication. A message can reach any part of the world in a fraction
of a second.
• You can send text message, pictures, sound messages across the globe.
• Message can consist of few lines or more. It is not charge by weight.
• You don’t have to pay anything extra for the sending or receiving the email. You just pay for the
internet connection.
• You need not be on your computer or online to receive the e-mail.
• E-mails are eco-friendly as no paper is used.
• You can also send bulk messages to a large number of people at the same time.

5.6 EMAIL ACCOUNTS

To send or receive email messages, you first need to open your email account and have your email
address.

62
Email address

An email address has two main parts:

• User name
• Host name
These two parts are separated by @ symbol.

For example, consider the following email address:

myemail@[Link]

In the above email address, myemail is the user name and [Link] is the host name.

Email program

An email program enables you to send and receive email messages. Some of the popular email
programs are:

[Link]

[Link]

[Link]

5.7 SENDING AND RECEIVING EMAIL

63
To send an email, you first open your email account. Then click Compose option. The following
window opens.

Some of the options while composing an email are:

To This option allows you to write the email address of the person you want to send the message to.

Cc It stands for carbon copy. This option allows you to send the same message to several persons at
the same time and every recipient will know all the recipients of this mail. The multiple email
addresses are separated by semicolon.

BCc It stands for Blind Carbon copy. This option allows you to send the same message to several
persons at the same time but a recipient will not know who the other recipients of this message are.

Subject This option allows you to write in few words about the content of the message.

Attachment This icon helps you to attach files such as, documents, presentations, images, videos, etc
with your email message.

5.8 INTRODUCTION TO SOCIAL MEDIA

Social media refers to different online communications channels that are dedicated to community-
based input, interaction, content-sharing and collaboration.

A social networking service is an online platform which people use to build social networks or social
relationship with others. Social networking has created a change in the way we communicate with
one another.

A website that provides facility to people to keep in touch with friends, build social relations, or share
common interests is called a social networking website.

People often use these websites to communicate and share ideas, information, post comments,
messages, images, etc. on a social networking website.

Benefits of Social Networking Websites

The benefits of social networking websites are:

• These sites provide a way to connect with people around the world.
• Social Networking site, like Facebook can be used to stay in touch with the family, and connecting
with old friends has become very easy
• These sites help us to learn about current events.
• These sites also work as a platform to launch new business ides, or for advertisers to market their
products and services to their subscribers.
• Social networking sites can be used to disarm social stigmas.

Disadvantages of Social Networking websites

• These sites expose people to a lot of information, which may or may not be authentic.
• If you share your current location over social media, you can easily become a target.
• Peer pressure and cyberbullying are also important issues.

64
• Online interactions have now substituted the face-to-face interactions and this has reduced the
social skills.
• Social networking has become a distraction for most of the people. Students who use social
networking too often have lower grades.
• Using social networking for long hours in a day can lead to a sedentary lifestyle.
• Social networking sites can spread false or unreliable information quickly.

How to stay safe on Social networking Websites

The following actions keep you safe on social networking websites:

• Do not post and share private information like mobile phone number, home address, etc. on social
networking websites.
• You should be familiar with the privacy policy of the social networking sites. You can adjust your
privacy settings on social networking websites, so as to control who can access your information.
• Use a strong password. Longer password is more secure than a shorter one.
• Use a different password for each social media account.
• Be selective with friend requests. Don’t accept the friend request if you don’t know the person
personally.
• Be careful while clicking at any link or any pop-up window.
• Protect your computer with anti-virus software and keep it updated.
• Always Log Off when you are done.

5.9 BLOG

Blog

A blog is a website which is maintained by an individual. The person who creates and maintains the
blog is called the blogger.

5.10 TWITTER

Twitter is a social networking service that allows you to send short messages
to communicate with your friends or followers. You can send short messages
of upto 140 characters, which are called tweets. Twitter is sued by people to
inform others about the latest happenings in their lives.

5.11 FACEBOOK

Facebook, founded by Mark Zuckerberg, is the most popular social networking site.
To use Facebook, you need to first create an account. Then add other users as friends.
You can then exchange messages, pictures, etc. with your friends on the Facebook.

Companies also setup their own Facebook pages to connect and communicate with
customers and clients.

65
5.12 YOUTUBE

You tube allows people to watch and share self-created videos.

Companies are also using You tube to launch and advertise their
product.

5.13 WhatsApp

WhatsApp is a free messenger app for smartphones. WhatsApp uses internet to send
text messages, pictures, audio or video. You can make audio and video call to any
person having WhatsApp in their smartphone, in any part of the world. You don’t have
to pay anything extra for sending message or making calls. You just pay for the internet
connection.

5.14 DIGITAL INDIA

Digital India

Digital India is a campaign launched by the Government of India in 2015, to ensure that the
Government's services are made available to citizens electronically by improved online infrastructure.
It also aims at increasing Internet connectivity and making the country digitally empowered in the field
of technology.

5.15 CYBER CRIME

5.15.1 Introduction to Cyber Crime

Cyber crime refers to any crime done using computer or any electronic device with internet
connection.

Some of the cyber crimes are:

• Cyber Bullying
• Cyber Stalking – It refers to harassing an individual or
an organization using internet. This may include making
false accusation or defaming, threatening, damaging data,
etc.
• Hacking – If someone tries to get into computer
systems in order to steal, corrupt or illegitimately view data, then it is called hacking. The person
who does hacking is called a hacker.
• Phishing – Phishing means an attempt to acquire a sensitive information such as username,
password, etc.
• Spamming – Spam refers to unsolicited email which is sent in large quantities to a large number
of users.

66
5.15.2 Cyber Bullying

Cyber bullying is when a student uses any electronic device like, computer, smart phone, tablet, [Link]
post text and images with the intention to hurt, embarrass, threaten or humiliate the victim. Cyber
bullying usually involves posting or sending gossip, posting or sending offensive, rude post to damage
a person’s reputation, relationship with others.

Children usually bully others to seek attention, for revenge, for pleasure, to satisfy their ego, jealousy,
peer pressure, etc.

Cyber bullying can lower the confidence of the child. It can also result in poor academic performance.
Child may get stressed, loose appetite, become a loner, may be unwilling to got to school, afraid of
using technology and even have suicidal thoughts.

5.15.3 Cyber Addiction

Internet has become an essential part of our life. We use internet for various purposes like, for
communication, for upgrading our knowledge, for shopping, in schools, for payment of bills, at home
and in office.

Above all, we use internet as a companion when we are alone and we cannot live without it.

Addiction is generally thought to be a mental disorder involving compulsive behavior and when a
mental condition characterized by excessive use of the internet it is called Cyber/Internet addiction.
When someone is constantly online, they may be described as addicted to it.

Some of the factors responsible for cyber addiction are:

• Lack of family interaction


• Change in life style
• Lack of social circle
• To compete with latest up comings and technology to keep updated.
• Mostly both the parents are working and doesn’t have time for kids and want their kids to be busy
on computer or mobiles.

Some warning signs of cyber addiction

• Loss of control when trying to stop or limit the amount of


time on the internet.
• Breaking promises to self or others
• Feeling of depression or anxiety when someone stops or
interrupts while working on the computer.
• Feeling of guilt over excessive use of internet

67
After Effects of Cyber Addiction

Over use of internet may lead to:

• Headaches
• Back aches
• Irregular eating habits
• Sleep disturbances
• Neglect of family and friends
• Dry eyes and eye problem
• Feeling of depression, irritation
Cyber addiction may lead to cyber crime.

Lets Try!

1. Discuss various applications of Internet.


2. List names of various Internet browsers
3. Demonstrate how to search information on a website.
4. Demonstrate how to create an email account, compose and send a message and
also open the received message.
5. Discuss various social media.

Worksheet

1. What is cyber bullying?


2. What are the affects of cyber addiction?
3. What can be the possible causes of cyber addiction?
4. What is the difference between website and web page?
5. What is WWW?
6. What do you mean by URL?
7. Define the following terms
a. Phishing
b. Spamming
c. Cyber stalking
8. Name any two social networking sites.
9. Explain different parts of an email address with an example.
10. What are the benefits of social networking websites?

68
69
70

You might also like