Jees 103
Jees 103
Communication
Technology Skills
Starting a Computer
What is the first thing you do after you wake up in
the morning? What if your father tells you to do your
homework immediately? Can you do it? Normally you
would do some daily activities and get ready before you
start working? Similarly, when a computer is switched
on, it performs some basic processes/functions before
it is ready to take instructions from the user.
To start a computer, press the Power button on the
CPU. This will start the operating system and display
the Ubuntu desktop as shown in Figure 3.4 or the main
Figure 3.4: Power Button screen on the monitor.
Function Keys
Keys labeled from F1 to F12 are function keys. You
use them to perform specific functions. Their functions
differ from program to program. The function of the F1
key in most programs is to get help on that program.
Some keyboards may have fewer function keys.
(a) Control keys: Keys, such as Control (CTRL),
SHIFT, SPACEBAR, ALT, CAPS LOCK and TAB,
are special control keys that perform special
functions depending on when and where they
are used.
(b) Enter key: The label on this key can be either
ENTER or RETURN, depending on the brand of
computer that you are using. You use the ENTER
or the RETURN key to move the cursor to the
beginning of a new line. In some programs, it is
used to send commands and to confirm a task on
a computer.
Double-click
Double-clicking means to quickly click the
left mouse button twice. When we double-
Figure 3.11 Drag and Drop click on a file, it will open the file.
Practical Exercise
The teacher will facilitate these activities by showing you the
e-Learning lesson athttp://www.psscive.ac.in/stud_text_book.
html ->Using a Computer. This will include videos and e-content
for the above topics as well as detailed instructions for some
activities below.
Initial Thinking Activity
After watching the initial video write what do you think happens
when you start a computer and enter data using a keyboard
and mouse?
Activity 1
Group Demo on Use of Computer
Material required
Pen, notebook, computer
Procedure
• Form groups depending on the number of computers
available. One student starts the computer and logs in.
• Another student identifies the keys on the keyboard.
A third student then performs all the functions of the
mouse such as hover, click, double-click, etc.
• Discuss and note differences between hardware and
software and also how they work together to perform a
task on the computer.
Activity 2
Group Practice: Using the Keyboard
Material required
Computer
Procedure
• Form groups depending on
the number of computers
available.
• Open a text editor in
Ubuntu by typing ‘editor’ Figure 3.12 Typing
in the search bar and then
selecting the Text Editor. You can also open Notepad in
Windows by typing Notepad on the Windows Search bar
and then selecting Notepad from the search result.
• One student positions his or her hands on the keyboard as
shown in Figure 3.12 and types the following paragraph
in the text editor.
“People use computers at work, at school and at home every day.
In factories computers are used to control the manufacturing
process and in offices to make documents, such as reports. We
also use computers for sending e-mails and playing games.”
Now, another student in the group will check the paragraph
and correct the grammar and spelling mistakes.
B. Subjective questions
1. What is the function of the ENTER key?
2. How will you prevent others from using your computer?
Figure 3.17: Choose the File Option Figure 3.18: File Explorer
Figure 3.19: Right-click on Desktop and Figure 3.20: Type Demo as the name of
click New Folder the new folder
Activity 1
Creating a folder
Material required
Pen, notebook, computer
Procedure
• Form groups depending on the number of computers
available. Each member of the group creates a new folder.
Others can watch and give feedback on what was done
correctly and what can be improved.
• Open a text editor in Ubuntu or Notepad in Windows
• Create a 2 folders Demo1 and Test1
• Now delete the folder Test1
Each group can study the following shortcut commands together.
CTRL+z — undo CTRL+c — copy
CTRL+y — redo CTRL+v — paste
CTRL+a — select all CTRL+p — print
CTRL+x — cut CTRL+s — save
B. Subjective questions
1. How is a computer file system similar to our physical file
system in a school?
2. What are the steps you will perform to save a text file in
Ubuntu?
Practical Exercise
Activity 1
Making a Chart
Material required
Pen, notebook, chart paper, pictures.
Procedure
• Form groups and make a chart to list down all the
ways in which a device can be damaged and how it can
be prevented.
• Make sure all students in the group get a chance
to participate.
B. Subjective questions
Threats to Computer
Threats are the ways in which personal
information can be leaked from a computer
without our knowing.
(a) Theft: Theft means stealing of
information or hardware. These maybe
of three types:
Figure 3.31: Physical stealing
• Physical: Where a person may
steal your desktop computer or
laptop.
• Identity: Where a hacker steals
your personal information and
assumes your identity. Using this
false identity, the hacker can gain
access to your account information
or perform illegal activity.
• Software Piracy: This is stealing
of software and includes using
Figure 3.32: Online stealing
or distributing unlicensed and
unauthorised copies of a computer
program or software.
(b) Virus: Viruses are computer programs that can
damage the data and software programs or steal
the information stored on a computer. Major
types of viruses are Worms and Trojan Horse.
• Worms: These are viruses that replicate
Figure 3.33: Worm virus themselves and spread to all files once they
80 Employability Skills – Class X
Practical Exercise
The teacher will facilitate these activities by showing you the
e-learning lesson athttp://www.psscive.ac.in/stud_text_book.
html. This will include videos and e-content for the above topics
as well as detailed instructions for some activities below.
Initial Thinking Activity
After watching the initial video write down the type of risk present
to the data available in different places, for example in a school,
hospital, bank, etc.
Activity 1
Group Chart Making
Material required
Pen, notebook, computer, Chart paper, colours
Procedure
• Form groups depending on the number of students
available. Make a chart to show all the different threats
faced by a computer and how you can protect a computer
from such treats.
B. Subjective questions