Page 2 :
Information Technology (402), Class - IX (2021-2022), , PART - A, TERM - I, PART - B, , PART - A, TERM - II, PART - B, , Employability Skills, Unit 1 : Communication Skills-I, Unit 2 : Self-Management Skills-I, Unit 3 : ICT Skills-I, Subject Specific Skills, Unit 1: Introduction to IT- ITeS industry, Unit 2: Data Entry & Keyboarding Skills, Unit 3: Digital Documentation, , Max. Marks, , Employability Skills, Unit 4 : Entrepreneurial Skills-I, Unit 5 : Green Skills-I, Subject Specific Skills, Unit 4:Electronic Spreadsheet, Unit 5: Digital Presentation, , Max. Marks, , Practical Work, PART - C, , PART - D, , Practical Examination, Written Test, Viva Voce, Project Work/Field Visit, Practical File/ Student Portfolio, Viva Voce, , 5, , 20, , 5, 20, , Max. Marks, 15, 10, 10, Total, 35, Max. Marks, 10, 5, Total, 15
Page 3 :
Unit-I, , Class-IX [2021-22], , Chapter-1:: COMMUNICATION SKILLS, Communication skills are those skills which are needed to speak and write properly. As a student, you may study any, language, but it is important that you are able to read, write, speak and listen well in order to communicate properly., The word ‘Communication’ comes from the Latin word commūnicāre, meaning ‘to share’., Communication can be defined as the ability to exchange ideas or express feeling with each other., , Importance of communication:, •, •, •, •, •, , It promotes sharing of knowledge., It enables you to ask for help., It helps us in avoiding misunderstanding and helps in solving potential problem., It allows people to develop relationship., It facilitates growth and success in organizations., , Characteristics of communication :, Number of people involved: Communication is always between at least two parties. Here, one or all parties, could be a group of individuals., Information Shared: Communication should always include all the information that the other party needs to, know about the situation at hand., To the point messages: The messages should always be short and to the point, long messages are often, difficult to under., Mindful of other parties: Whenever you communicate with someone else you should keep in mind their, beliefs, values and culture., Use of correct language: the language used in communication must be correct., Effective communication: It refers to the right way of communication that makes the right impact and delivers, the right message., , Effective Communication:, It refers to the right way of communication that makes the right impact and delivers the right message., Effective communication can happen if we follow the basic seven principles of professional communication skills., These can be abbreviated as 7 Cs, i.e., Clear, Concise, Concrete, Correct, Coherent, Complete and Courteous., , Information Technology [402], , Page 1
Page 4 :
Unit-I, , Class-IX [2021-22], , Methods of Communication:, •, •, •, •, , Verbal Communication, Written Communication, Non-verbal Communication, Visual Communication, , Verbal Communication: Verbal or Oral communication is the sharing of information by using words. It is what most, people use as a method of communication. Eg., o Face to face, o Talking on the phone, o Video Conferencing, o Lectures and conferencing, Advantages, Conveying our message is easy and quick, You can keep updating your speech according to the, response you get from the audience., It promotes secure exchange of ideas, The response you get is quick and immediate, , Disadvantages, The lingual and cultural differences of the speaker and the, listener may result in miscommunication., If we use confusing and complicated words, it will be, difficult to understand., , Written Communication: It is methods which involves written or typed words. There is no need of body language,, eye contact, etc. Eg., o Email, o SMS, o Books and newspaper, Advantages, It is permanent means of communication. It is useful, where record maintenance is required., , Disadvantages, It is comparatively costly. It cost more in terms of, stationery and manpower employed, , It provides ready records and references., , Instant clarification is not possible., Time consuming, Additional Workload, , Non Verbal Communication: You can communicate your thoughts and feelings even without speaking a single, word, through your facial expression, hand movement, body language, eye contact. Non-verbal communication has, more powerful impact on the other person than your verbal communication. Eg., o Body language, o Facial Expression, o Eye contact, o Hand movement, Advantages, Time is usually not wasted, Even illiterate people can pick up non-verbal cues, because the message are conveyed though expression, and the body language., , Information Technology [402], , Disadvantages, Long and details messages cannot be communicated., Speaker only use gestures, facial expression etc, which, might become difficult for some people to understand., , Page 2
Page 5 :
Unit-I, , Class-IX [2021-22], , Visual Communication: It is a type of communication in which the messages are conveyed through pictures,, signboards, logos, etc., Eg., o Creating model, o Photograph, Logos, o Maps, o Drawings and illustrations, o Graph, Advantages, It is immediate. Its messages get delivered, immediately., It is simple and easy to remember., It is Universal. A simple emoji make sense to people, from all over the world., , Disadvantages, Visual media can’t handle complex data., It is culturally ambiguous. Eg. Thumbs Up sign, Increased cost. It take time and money to produce a visual, media., , Elements of Communication :, , Sender: Sender is the person who wants to communicate with someone., Idea: The message that the sender wants to convey is the idea. It can be guideline, suggestion, feeling, etc., Encoding: Once the sender gets the idea for the message, he/she encodes it. Encoding is the process of, converting the ideas into words, images, action, etc. so that the message could be sent., Communication Channel: It is the medium through which the sender sends the information. It could be faceto-face, email, telephone, presentation, etc.. The selection of communication channel depends upon your, message as well as the receiving capacity of the other party., Receiver: Receiver is the person who receives the message sent by the sender over the communication, channel., Decoding: The message received by the receiver might be in the form of written material, images, videos,, audios, etc. The receiver needs to understand what the sender is trying to convey. This is process of decoding., Feedback: The sender must receive the feedback from the receiver for the communication process to, complete. If the sender sends the message but the receiver is not able to understand, that is a complete, breakdown (failure) of the communication., Noise: It is not an active element but an important component that decides the outcome of communication. It, plays an important role in deciding whether communication has been successful or not., , Information Technology [402], , Page 3
Page 6 :
Unit-I, , Class-IX [2021-22], , Perspective in communication:, When you communicate with someone it is not necessary that what you are trying to tell will be received in the same, spirit by the receiver. The way a person receives your information depends upon his/her perspective towards you, the, group you belong to and your culture. The various factors affecting perspective in communication are:, Culture: Signs which have a different meaning in different cultures, such as showing a thumb may mean ‘good, job’ done for some people but may be insulting to others., Environment: Noise or disturbance in the surroundings may make communication difficult. Example, talking, to a friend in a function where there is loud music being played., Feelings: Feelings often interrupt smooth flow of communication. If the person you are speaking to get, emotional, whether it is negative or positive, communication is hampered., Language: Language is the most important means of communication between people because it makes, exchange of ideas immediate and effective. Sometimes, even is the language is same its dialect or use of, phrases, sentence construction might be different because the sender and the receiver belong to different, places., Past Experience: Memory is an asset for human being. It makes them stand a part from other animal., However, this memory can prove an obstruction in effective communication. People tend to absorb, information according to their previous experience., Prejudice: Prejudice is a negative opinion that has been formed without any evidence or experience., Visual Perception: Visual perception is the brain’s ability to make sense of what we see through our eyes. For, example, completing partially drawn pictures with visual perception whereas they may be something else., , SELF-MANAGEMENT SKILLS, Self-management, which is also referred to as ‘self-control’ or ‘self-regulation’, is the ability to regulate one’s, emotions, thoughts, and behaviour effectively in different situations. This includes motivating oneself, setting and, working towards personal and academic goals., Self-management can also help in:, • developing good habits, • reaching your goals, • overcoming bad habits, • overcoming challenges and difficulties, Self-management skills include the following:, Self-Awareness: Knowing yourself as an individual – your values, likes, dislikes, strengths and weaknesses., Self-Control: Ability to control your behaviour, discipline, etc., Self-Confidence: Believe yourself that you can do any task that is given to you and not scared of taking risks., Self-Motivation: Realistic belief and trust of an individual in one’s own judgement, capabilities and worthiness., Problem solving: Understanding a problem and finding a solution using step-by-step method., Positive thinking: Positive thinking requires a person to look at the good in things, observe, understand and, patiently work towards improving them rather than worrying and/or looking for the bad in things., Time management: Achieving tasks on time and according the plan., Goal setting: You need to break down your long term goal into small term goals so that you keep moving, towards your goals. These goals to be accomplished within a set timeframe., Grooming: Grooming is the process of making yourself look neat, tidy and smart. The way you dress, and, groom can either send the message that you are confident, smart and sincere or possess opposite qualities., Dressing and grooming are important because they help us:, o look smart, o feel confident about ourselves, o make a good impression of ourselves, Decision making: You need to take decision right from the time you wake up in the morning till you go to bed., People who are able to take the correct decision at correct time are successful., Be organized: If you always lag behind your work, forget important task to be completed and wish there were, more than 24 hours in a day, you need to get organized., , Information Technology [402], , Page 4
Page 7 :
Unit-I, , Class-IX [2021-22], , Self Confidence:, Self-confidence is a sense of trusting own’s abilities and self. If you are an intelligent, hardworking and talented, person, but lack confidence, and avoid taking initiative, then it may be difficult for others to recognise your talent., Self-confidence can be developed through changes in attitude and practice., Factors affecting self-confidence:, - Social factors: Right from childhood you receive direct or indirect messages about yourself and your abilities. If, these messages are positive you end up having high self-confidence. On the other hand if these messages are negative, you end up have low self-confidence., - Physical factors: Physical factors like healthy body, mind, sense of beauty, etc. can also affect person selfconfidence., - Cultural factors: If the culture dictates a person to be always low-key, bow down to what others have to say, not to, think highly of oneself, it inherently brings about low self-confidence in people., - When we think we cannot do a particular work., - When we keep thinking of our past mistakes and feel bad about it, instead of learning from them., - When we expect to be successful at the first attempt itself and do not try again., - When we are surrounded by people who have a negative attitude, which is reflected in their speech., Tips to build self-confidence:, Get rid of all your negative thoughts and start thinking positively., Start setting small goals in life and achieving them on the way to larger dreams., Take good care of yourself – eat healthy, stay clean, be hygienic and try to surround yourself with positive, people., Some tips to convey positive message through a positive body languageLook into the eyes of the other person, but do not stare, Do not fidget as it may distract the other person, Arms should not be crossed as it shows you are angry, Always smile and never frown(glare) while talking, Keep your body erect whether you are standing or sitting, Be properly dressed, , Information Technology, Information Technology (IT) means creating, managing, storing and exchanging information. IT includes all types of, technology used to deal with information, such as computer hardware and software technology used for creating,, storing, and transferring information., Information Technology enabled Services (ITeS), When IT and IT tools are used for the improvement of efficiency of other regular operations of organizations., Key ITeS are listed below:, Call center, Electronic Publishing, Data center, Portals, ERP (Enterprise Resource Planning), Categories of ITES Industry:, Business Process Outsourcing (BPO): BPO services means performing business operations through an outside, service provider. BPO also comes under IT services as IT plays a very useful role in optimising the business, performance. The BPO industry is highly organised and hence various kinds of jobs are outsourced in India., Some of the BPO services are as follows:, a) Financial and Accounting Services, b) Taxation and Insurance Services, Information Technology [402], , Page 5
Page 8 :
Unit-I, , Class-IX [2021-22], c) E-Publishing and Web Promotion, d) Legal Services and Content Writing, e) Multimedia and Design Services, , f) Document Management Services, g) Software Testing Services, h) Health Care Services, , Business Process Management (BPM): The BPM industry involves automating the core tasks (not the, operational task) within the business processes of the contracting company using strategies and tools which may, or may not involve technology. The BPM industry mainly caters to services that require some expertise and, experience to handle it and improve the performance., Categories of the BPM industry:, The organisations within the IT‑BPM industry vary from their sizes to sector they are serving, geographic spread of, operations:, a) Multinational Companies (MNCs): MNCs have their headquarters outside India but operate in multiple, locations worldwide including those in India. They cater to external clients (both domestic and/or global)., b) Indian Service Providers (ISPs): ISPs started with their operations in India. Most of these organisations have, their headquarters in India while having offices in many international locations. While most have a client, base, which is global as well as domestic, there are some that have focussed on serving only the Indian, clients., c) Global In-house Centers(GIC): GIC organisations cater to the needs of their parent company only and do, not serve external clients. This model allows the organisation the option to keep IT Operations in-house and at, the same time take advantage of expanding their global footprint and offering opportunities for innovation in, a cost-effective manner., , Information Technology [402], , Page 6
Page 9 :
Unit :: IV-V, , Class-IX [2021-22], , BUSINESS, Any person/organization using economic resources to provide services or product to any other, person/organization in exchange of money is known as business., There are 4 types of business:, 1. Service business: An organisation or a person providing professional expertise, advice, guidance or, any such thing that has no physical form is called a service business. Let's take some examples to, understand this. If your fan stops working, you call the electrician, who repairs it. The electrician here, is providing you a service and his business is a service business., 2. Manufacturing business: Manufacturing business provides you with a tangible product that you can, see. Manufacturing businesses are involved in the process of purchasing raw materials and then, converting it into finished products. For example, a garment manufacturing unit purchases cloth from, handlooms or textile factories and stitches them into finished products like shirts, trousers, dresses,, etc. The cost of a product includes not only the raw material but also infrastructure cost, labour, charges, etc., 3. Merchandising business: The goods that are manufactured in factories are usually not sold to the, customers directly. So, some businesses source the goods from manufacturers and sell it to, customers. These are known as the merchandising business or retail business. For example, Vishal, Mega mart, Unik Bazaar, 4. Hybrid businesses: As the name suggests, hybrid business are the businesses that cannot be strictly, put into any of the three categories discussed above, it includes other three types of business. For, example, you must have visited a restaurant to have lunch or dinner with your friends or family. It, gets groceries from a shop and makes food out of it. This is manufacturing. The restaurant also sells, ready made products like cold drinks etc., this is merchandising. It provides service to the customers, according to their requirements. This is a service business. You can see that a restaurant does a bit of, everything. So, it is a hybrid business., , ENTREPRENEURSHIP, Setting up a business, based upon some idea to cater to society, while taking some risk and working, towards its growth to create profit is called entrepreneurship. The business set up in the above process is, called an enterprise, and a person who sets up a business to cater to the needs of society and thereby, make profits, is called an entrepreneur., Risks of Entrepreneurs, There are many risks involved with entrepreneurship. Some common risks are being listed below:, i. No guarantee of Paycheck: Entrepreneurs never have a guarantee of paycheck. Initially, the income is, so low as even if there are small earnings, a maximum share of these is invested back in the venture., ii. No regular income: Initially, startup cannot provide a steady paycheck. The income may fluctuate from, month to month and even from day to day., iii. No Personal time: Entrepreneurs are so much involved in their venture in initial days that they have, generally no personal time left. They cannot enjoy personal moments, vacations or leisurely sleep etc., in their initial days., iv. Emotionally Taxing initially: While setting up an entrepreneurial venture, an entrepreneur is involved, at every aspect of the venture be it hiring right people, outsourcing the work, investments, taking up, decisions. Taking up so much may be emotionally taxing initially., , Information Technology [402], , Page 2
Page 10 :
Unit :: IV-V, , Class-IX [2021-22], , Rewards of Entrepreneurs, The risks of becoming a full time entrepreneur are many, BUT the rewards outweigh them. The rewards of, being an entrepreneur are being listed here., i. You live your Passion: If you are working on something you are passionate about, not a moment, arises when you do not enjoy. Enjoyment leads to a great satisfaction and you always feel happy. This, is the greatest reward an entrepreneur gets., ii. Great Boss: Entrepreneurs are own boss - when your boss is 'yourself then you have the greatest boss, in all forms: the greatest critic to greatest admirer to greatest motivator., iii. Own Time: An entrepreneur is not bound to work for fixed set of hours chosen by someone else., Rather an entrepreneur can choose to work as per Own time - day or night., iv. Location: An entrepreneur gets to choose own work location. S/he can be anywhere in the world, while working and still be doing a meaningful contribution towards her/his venture. There is no, constraint of being at a certain location., v. Monetary Gains: Once successfully set up, a venture starts growing up. After initial financial, problems, it later starts earning big revenue giving a big boost to the financial health of the venture, and of the entrepreneur., vi. Can make contribution at large scale: An entrepreneur can make larger contribution towards nation, and society at a large scale as her/his venture can make impact in multiple forms. Not only it, generates employment, an entrepreneurship can also make contributions socially, financially and so, on., Challenges in Entrepreneurship, There are many challenges associated with entrepreneurship., i. Giving up a career: Building a growing business can't be done along with your side job. Entrepreneurs, have to give up their promising jobs and careers for the unpredictable journey of entrepreneurship., ii. Team building: Choosing the right candidates and considering their cost to the business is another big, challenge for an entrepreneur., iii. Cash-flow management: Cash-flow is crucial for any business to survive. Delays in payment from, customers on one side, and on the other side paying employees, vendors, debt repayment and office, bills can affect small business' survival, iv. Time management: Owners have to play multiple roles and wear many hats. It's challenging to plan, and balance the time between different roles., v. Proper people Skills: Delegating tasks and getting output involves people skills. These people skills are, very crucial for the success of the venture., vi. Decision making: Entrepreneurs make hundreds of decisions every day. It can be stressful to take the, right decision at the right time., Entrepreneurship Development Process:, Basically there are four steps in an entrepreneurial development process being discussed below., , Step 1, , Step 2, , • Business Idea, • Develeoping a, Business Plan, , • Get Finance or, money, , Information Technology [402], , Step 3, • Understand, Customer, needs, , Step 4, • Launch your, product or, service, , Page 3
Page 11 :
Unit :: IV-V, , Class-IX [2021-22], , Step 1.1 Business Idea: Finding the Right Business Idea, It requires a proper market research to identify the problems around us and to know what people really, need., Step 1.2 Developing the Business Plan, In this step, the entrepreneur clearly lists his/her vision, goals, plans to achieve goals, basic requirements,, basic strategy towards the fulfillment and so on., Step 2- Get Finances/Money, Getting funding for your business will be one of the hardest steps. People and firms won't invest in you, unless and until they are convinced about your business idea and about your abilities and passion., Step 3 Understand Customer Needs to get Paying Customers, Aim of any entrepreneurship venture is to solve a specific problem. A customer pays for something that, solves his/her problem. The goal of this step is to acquire as many customers as possible, at the lowest cost, possible, and do everything to retain them in the most efficient way possible. Happy customers are the key, to success of any venture, Step 4 Launch Your Product /Service: After all above steps, the final step is to launch your product or idea, in the market. Sometimes, despite being an amazing product or idea, it may not succeed because the, timing or the target customer segment is not right., Even if everything is all right, still you may face failures. In this case, you should learn from your failures by:, taking feedback from the customers about the products, finding out the shortcomings of your product/idea, finding out how customers expect more from your product, , ↓, , Information Technology [402], , Environment, Green Skills, , ↓, , Page 4
Page 12 :
Unit :: IV-V, , Class-IX [2021-22], , Unit - V, ENVIRONMENT, The surrounding in which a person or an organisation operates is called its environment. Everything around you is, your environment, be it living or non-living. So, plants, animals, soil, water, buildings, plateaus, hills, oceans, all these, form our environment., All living things that you observe form our ecosystem and are essential to maintain the balance in the ecosystem., This is called ecological balance. If an imbalance is caused in the ecosystem due to pollution, extinction of some, species, abundance of some species, etc. ecology is disturbed and whatever we get out of the environment is also, hampered. The environment gives us so many things- food that we eat, water that we drink, air that we breathe-the, list is endless., Ecological imbalance is caused by various reasons. In India, it is attributed to these five factors:, • Degradation of land and soil: Due to continuous use of land, dumping of waste material, construction of, buildings, etc. the quality of land and soil has become very poor., • Deforestation: Trees have been cut mercilessly for building industries, roads, railway lines and residential, areas., • Poor utilisation of water resources: Though Earth is 2/3rd water, only 1% of it is drinkable. Forgetting this,, people have used the water resources continuously without thinking of recharging them., • Environmental issues due to wrong mining practices: Wrong ways of mining have led to drying of rivers,, extinction of complete ecosystems, pollution, etc., • Industrial and atmospheric pollution: Industries that were set up earlier pollute the air, land and water around, them., Correcting ecological imbalance,, Now that you know the ways in which ecological imbalance is caused, let us discuss some ways of correcting it., These are some of the ways in which we can control ecological imbalance:, • Manage natural resources carefully: We must manage the natural resources that is left for us carefully. We, have to think of the scenario when all the natural resources are finished. If we assume that this is a scenario, right now, what we will do, and build on from there for adopting an eco-friendly lifestyle, • Population control: It's the people who put pressure on the natural resources. If the human population of an, area is less, the natural resources are required by the people less and hence can be conserved., • Protecting water bodies: As you know the earth is two third covered with water bodies. If we protect our, water bodies we would be protecting two third of the earth., • Recycling waste: Whatever waste we've already generated, we need to keep recycling them so that they are, not dumped in the ecosystem to cause harm and degradation., , ↓, , Information Technology [402], , Natural Resources, , ↓, , Page 5
Page 13 :
Unit :: IV-V, , Class-IX [2021-22], , Since beginning, we humans have depended on water, forests, animal, rocks, sun, the air , minerals, land, etc. All, these freely available resources are our natural resources., Categories of Natural Resources:, (i) Renewable resources: These are the resources whose used up quantity is replaced on its own as nature is, producing them constantly. For example, wood, timber, solar energy, water, etc. The renewable resources, are also sometimes called the infinite resources. E.g. Solar energy, water, timber/wood, biomass, (ii) Non-renewable resources: A natural resource that takes time for its regeneration and cannot be replaced, or re-grown at a scale comparable to its consumption, is a non-renewable resource. For, example,petroleum, coal, earth minerals, etc., (iii) Non-Exhaustible resource:. Infinitely available natural resources that the living being of Earth can never, consume to finish them are known as non-exhaustible or inexhaustible resources. For example solar energy,, wind energy, tidal energy., (iv) Exhaustible resources: Natural resources that are finite in quantity and use of these, is reducing their, quantities at a fast rate. Since these have finite quantity, they will exhaust one day. Such resources are, called exhaustible resources. For example, coal that we extract from the coal mines is limited in quantity, and is an exhaustible resource., Natural Resource Conservation, These are the ways in which we can conserve our natural resources:, • Use renewable sources of power, like solar energy and wind energy, • Afforestation to prevent soil erosion, • Reduce water consumption in our homes, • Treat industrial wastes and sewage before they are released into water bodies, • Rainwater harvesting, • Use biogas and biofuels as much as possible, • Recycle waste, • Adopt paperless way of life both at home and at office, • Stop using plastic, • Minimise consumption of electricity, 3R’s Principle, Reduce- The reduce principle says, purchase the product with less packaging or try to buy products with, biodegradable packaging material., Reuse- The reuse principle says, use a product as much as you can use it healthily, eg old water bottles as, planter for small plants., Recycle- The recycle principle says, take a used item transform it in a different usable form.eg. you can, process old papers and newspaper into a new usable product., , ↓, , Information Technology [402], , Green Skills, , ↓, , Page 6
Page 14 :
Unit :: IV-V, , Class-IX [2021-22], , An economy that co-exist with the environment and aims for a sustainable development without harming the, environment is called green economy., A green economy should be based on these six main ideals:, i. Renewable energy: Sources that are replenished by the nature are called renewable energy resources. Sunlight,, wind, rainwater, waves, etc. are some examples of renewable energy sources. They are usually used for, generating electricity, transportation and rural energy supply., ii. Green buildings: A building that is built in such a way that it does not degrade the environment, right from, planning, construction, and operation to maintenance and demolition is called a green building. Some things, that can be done to have a green building are:, a. Using natural materials like mud, bamboo, etc., b. Using rain water harvesting techniques., c. Supplying energy through renewable resources like sunlight, iii. Water management: Water management refers to optimising availability of water through minimised, utilisation, recycling and rainwater harvesting., iv. Sustainable transport: Sustainable transport refers to using transport that is environmentally sustainable. It, means that the mode of transport uses renewable energy, does not pollute the environment and is not, expensive as well., v. Waste management: Every economy generates lots of waste. A green economy manages its waste from, collection to final disposal in an eco-friendly way. Some examples of waste management practices include:, a. Segregating waste, b. Recycling as much as possible, c. Producing biogas from biodegradable waste, vi. Land management: Using and developing land resources in a way that it is ecologically balanced and is not, disturbed is called land management. Essentially, it means that practices like organic agriculture,, reforestation, groundwater level management, etc. must be adopted., Importance of green economy:, The most important benefit of adopting green economy is decreasing environmental effect of pollution. It has the, potential to fight burning issues like:, • Global warming, • Reduce Ozone layer hole, • Desertification of land, • Deforestation, Benefits of adopting green economy practices:, • Better living quality: Green economy can improve air, water and soil quality, leading to immediate benefits like, increased farming output, better health, access to more natural produces, etc., • Economic growth: Green economy can accelerate economic growth by creating new jobs. For example, if, alternative energy resources are tapped more people will have access to energy. This would raise living, standards, help in more education and provide better business opportunities., • Sustainable development: Green economy provides the way to sustainable development. If you look around, yourself you will find people worrying about energy resources like petrol, diesel, coal, etc. drying up after a, couple of decades. If we adopt renewable energy sources and take care to replenish them, we never need to, worry about them finishing up and leaving us deprived., , Information Technology [402], , Page 7
Page 15 :
Unit-I, , Class-IX [2021-22], , Chapter-3:: Computer Fundamentals, ICT stands for Information and Communication Technologies. It refers to technologies that are used to create,, update or store data electronically i.e computer, mobile, and helps us to use them in various fields of our lives. The, most common digital device used in ICT is computers. Wherever you go you can see computers. Whether you are in, your school, visiting a hospital, bank, any office, railway station, etc you will find computers being used everywhere., Benefits of Computers, They are very fast in doing their work, They can store huge amounts of data in very small spaces., They do not commit error even if the same work has to be repeated again and again., They do not get bored., They do not need to take rest if they have to work for long hours., One computer can be used for many types of work., The application areas of computer are:1. Bank: Almost every bank uses computers to keep the records money transactions and financial documents., 2. Communication: Communication has become very easy and simple through internet and email. Through, email we can send message in a split of seconds to anybody in any part of the world., 3. Business – Today, computers can be found in every store, supermarkets, offices etc. One can buy and sell, things online and bills & taxes can be paid online. Business transaction takes place easily, accurately and, records can be stored., 4. Medical Science and Health care- Diseases can be diagnosed and cured with the help of computers., 5. Education – Computers are used in classrooms by teachers to teach and maintain records. Online learning, and assessments are increasing day by day., 6. Media – Almost every type of editing and audio-visual composition, special effects for action and science, fiction movies are created on computers., 7. Travel and Ticketing - With the advent of computers, ticketing and reservation have become an easy task., We can check seat availability, PNR status and can also book hotels online., 8. Weather Predictions – Weather forecasting now relies on computers that take atmospheric factors into, account, 9. Sports - In cricket, third umpire decision, in which computer recording is seen, is reached to accurate and fair, decision with the help of computers. Computers also help sportsman to practice and improve his skills., 10. Social Media - The spreading of an idea or of news occurring somewhere in the world is now possible, through social sites on the internet. Sites such as Facebook, Twitter, Youtube and LinkedIn allow people to, share ideas on news, products and services., 11. Scientific Research- Scientist uses computers to view images from space and to publish information on their, recent research., 12. Government- Computers are also used for providing services to citizens by the government., 13. Publishing- Computers are also used to design any type of publication such as magazines, books,, newspapers, e-books etc., 14. Daily Life- We operate washing machines, microwave oven etc. using software. We can store our, information, important work, contacts, appointments on the computer., , How the computer works, Computer is an electronic machine that takes some input, processes it and produces an output., The input that the computer takes is called data and the output that it produces is called information. The, instructions provided by the user to process the data also form the part of input. Data is also called raw facts and, figures; data produced during processing is called interim data, after the data has been processed it is called, information and can be also called as processed data., , Information Technology [402], , Page 1
Page 16 :
Unit-I, , Class-IX [2021-22], , Parts of Computer, A computer follows an Input-Process-Output (IPO) cycle. To perform this cycle, computer has many parts. As there, are three stages in the IPO cycle, there are three categories of computer parts as well:, Input Unit: The devices that are used to give data and instructions to the computer form the input unit., Central Processing Unit (CPU): The devices that are used to process the given data and instructions to get the, desired output from the CPU. CPU is the brain of the computer and performs multiple tasks. It has a Control, Unit, Arithmetic Unit and Memory Unit to help in performing all the processes., Output Unit: The devices that are used to give processed information to the user form the output unit., , Block diagram of computer, Central Processing Unit (CPU), Control Unit (CU), Input Device, , Output Device, , ALU, , MU, , Flow of data, Flow of instruction, , Secondary Storage Device, , CPU is the brain of the computer. It is responsible for processing all the data as per the instructions given by the, user. It has three internal parts — ALU, CU and MU — to enable it to perform all the functions., Control Unit: Control Unit (CU) controls all the functions of the compute Besides the ALU and memory, the, control unit is directly connected to all the devices, like input devices, output devices, storage devices, etc., All devices communicate through the CU., Arithmetic Logic Unit: ALU is the part of CPU where all arithmetic operations and logical comparisons take, place. You can say that all the actual processing takes place inside the ALU., Memory Unit: Control Unit stores all the data and instructions in memory. When we say data, it includes, input data, output data and data produced during the processing. Computer also produces interim data that, needs to be stored in the memory for further processing., Bytes/Bits, As you know, computer stores all the data, instructions and information in the form of 0s and 1s. These 0 and 1 are, the binary digits or bits. The capacity of computer memory is measured in bytes., 1 Byte (B) = 8 Bit (b), 1 Kilo Byte (KB) =1024 Byte, 1 Mega Byte (MB)= 1024 KB, , Information Technology [402], , 1 Giga Byte (GB) = 1024 MB, 1 Tera Byte (TB) = 1024 GB, , Page 2
Page 17 :
Unit-I, , Class-IX [2021-22], , Computer memory is of two types — primary memory and secondary memory, , Memory, , Random Access Memory, Primary Memory, Read Only Memory, Fixed Memory, Secondary Memory, , Removeable Memory, Cloud Storage, , Primary Memory: The memory located inside the CPU is called Primary memory. As it is located within the CPU, it is, first accessed by the CU for storing data and instructions. So, it has to be very fast. The characteristics of primary, memory are:, • Very fast, • Very expensive, • Available in small amounts, to the tune of 1 - 8 GB, Primary memory is of two types:, • Random access memory (RAM)- Data (data and instructions), stored on RAM gets erased when the power to the computer, is switched off. The memory that loses its data when power, is switched off is called volatile or temporary memory. You, can read and write to/from the RAM., , •, Read only memory (ROM)- ROM is non-volatile or, permanent memory. This means that the data stored on ROM is, retained even when the computer is switched off. ROM is used, to store information that does not change, like booting, sequence, algorithmic tables, scientific constant values, etc., , The sequence of instruction to be followed when the system is switched on, till the time you see your desktop is, called booting sequence., Secondary Memory: The memory that is located outside the CPU is call the secondary as the amount of primary, memory is very less, secondary storage is used by CU to store large data sets, instructions and results. The, characteristics of secondary memory:, • Slower than primary memory, • Cheaper than primary memory, • Available in large quantities, to the tune of Tera Bytes (Tbs), Secondary memory devices are also called auxiliary devices. Auxiliary devices, are of three types:, • Fixed storage: The storage devices that cannot be easily removed from, the computer are called fixed devices. Once they are connected to the, CPU externally through wires, they always remain connected. Example, of a fixed device is hard disk., Information Technology [402], , Page 3
Page 18 :
Unit-I, , •, •, , Class-IX [2021-22], , Removable: The storage devices that can be easily removed from and attached to a computer are called, removable devices. Example of a removable device is pen drive., Cloud Storage: Data stored on remote servers using internet, you can upload documents, pictures, etc. from, your computer and smartphone. Examples are Google Drive, dropbox., , Input Devices, Keyboards:, The keys of the keyboard are categorized into following:i. Function Keys – Keys labeled from F1 to F12 are function keys. We use them to perform specific functions., ii. Special Keys – Keys, such as CTRL, SHIFT, SPACEBAR, ALT, CAPS LOCK and TAB are special keys. The special keys perform, special functions depending on when and where they are used. WINDOWS LOGO key is also a special key which is used to, open Start Menu., iii. Punctuation Keys – It include keys for punctuation marks, such as colon (:), semicolon (;), question mark (?), single, quotation marks (‘ ‘), double quotation marks (“ “ )., iv. ENTER or RETURN Key – This key is used to move the cursor to the beginning of a new line. It is also used to send, commands and to confirm a task on a computer., v. COMMAND Keys - Keys such as INSERT (INS), DELETE (DEL), and BACKSPACE are command keys., vi. NAVIGATION Keys - Keys such as the arrow keys, HOME, END, PAGE UP and PAGE DOWN are navigation keys. The arrow, keys are used to move the cursor up, down, right and left, vii. ALPHABET keys - These keys are used for entering letters. (A to Z), viii. NUMERIC keys - These keys are used for entering numbers. (0 to 9), ix. Home Keys - Alphabets ASDF are home keys for the left hand and ; (semi-colon) LKJ for the right hand. The fingers are, trained to make the correct movement to other keys and each finger returns immediately to its respective home key., x. Guide Keys -On a keyboard, keys ‘F’ and ‘J’ are called guide keys for left and right hand, respectively. Both contain a small, raised tangible mark with the help of which the touch typist can place the fingers correctly on the home keys., , Mouse, , Scanner, , Touchpad, , Web camera, , Joystick, , Touch Screen, , Barcode reader, , Optical Mark Reader (OMR), , Magnetic Ink Character Reader (MICR), , Output Device:, Monitor: It is also called as Visual Display Unit (VDU), Printer: The printed output sheet is called hard copy and the output that is stored in the computer memory, is called soft copy. Printer are of two types : Impact and Non-Impact Printer, Speaker, LCD Projector, , Information Technology [402], , Page 4
Page 19 :
Unit-I, , Class-IX [2021-22], , Auxiliary Devices:, The secondary storage devices are also called auxiliary devices., Hard disk drive: Hard disk drive (HDD) is a fixed auxiliary device which is present inside the CPU cabinet., They are capable of storing huge amounts of data, in the range of Terabytes. Each hard disk is a collection of, circular magnetic disks arranged one over the other., Compact disc (CD): CDs are circular discs that can store up to 700 MB of data on circular optical discs They, are very cheap. Though CD drive is fixed inside the cabinet CDs can be inserted and removed easily. So, it is, called a removable storage device, Digital Video Display (DVD): DVDs are also optical discs that can store data. They are used to store, multimedia files like audio and video because high storage capacity is needed for that. Data may be stored, on any one side or both the sides of the disc. Typical capacities of DVDs are 1.46GB and 2.92 GB for singlesided discs and 4.7 GB and 9.4 GB for double-sided discs., Blu-ray disc (BD): It is used for recording, rewriting and playback of high-definition (HD) videos, storing large, amount of data. Can store 25 GB on a single layer disc and 50GB on a double layer disc., Pen drive: Pen drive is a portable non-volatile memory device. It is also called USB drive, Flash Memory., , Port, The different hardware in a computer system exchange information with each other through special electrical paths, called communication buses. All other I/O devices are connected to the CPU through ports on motherboard. The, interface between the CPU and external devices like mouse, keyboard, printer, microphone, etc., is called port. A, computer has many ports, they are as follows:, • Serial Port, • HDMi Port (High-Definition Multimedia, Interface), • PS/2 Port, • USB Port (Universal Serial Bus), • Audio Port, o USB 1.0:- 1.5 Mbps, • Ethernet port, o, USB 2.0:- 480 Mbps, • Parallel Port, o USB 3.0:- 5 Gbps, • VGA Port (Video Graphics Array), o USB 4.0:- 40 Gbps, , Information Technology [402], , Page 5
Page 20 :
Unit-I, , Information Technology [402], , Class-IX [2021-22], , Page 6
Page 21 :
Unit-III, , Class-IX [2021-22], , Chapter-4:: Introduction to Windows, 1- Software, Software’s are those instructions and data which make the hardware work to process the data and produce desired, output. The software is classified as, System Software, Application Software, , 1.1 System Software:, System software is essential for operating or using the hardware and providing a platform for using the application, software. System software handles the smooth running of all the component of the computer. It can be classified as, o Operating System, o Translators, o Utility Software, o Device Drivers, 1.1.1 Operating System (OS) is the software that is required for the functioning of each device of the computer, system, right from input and output devices to the Control Unit, ALU and Memory Unit. A computer is not, capable of taking decision., Operating system is the interface between the user and computer. Operating system is a software that connects, all the hardware devices to each other through the control unit, so that they may function together to perform, any task given by the user. When the computer starts, operating system is the first software that is loaded from, hard disk to main memory, it is called booting. The O.S then prepares all the other software and hardware that, are available in the computer system for use., Types of O.S:• MS DOS, • Linux, • BOSS, • iOS, • Unix, • Windows, • Android, • Symbian, Functions that an operating system carries out:, • It keeps all the hardware parts ready for carrying out instructions given by user., • It enables the users to use the different applications that are available on the computer., • The operating system is responsible for ensuring that multiple applications can run together., • Operating system is required to connect the computer to a network as well as the Internet., • Operating system also ensures that the computer is used correctly by the user., • Operating system keeps monitoring the system so that it can detect if there is any problem with any, hardware device or software application., , Information Technology [402], , Page 1
Page 22 :
Unit-III, , Class-IX [2021-22], Classification of Operating System, , Operating systems are of many types and there are many ways to categorise operating systems, Depending on, their interface, operating systems are of two types:, 1. Character User Interface (CUI): In CUI operating system all commands to the computer must be typed., DOS is an example of CUI operating system. CUI interface is difficult to handle because you need to, remember all the commands. This is also called as Command Line Interface (CLI)., 2. Graphical User Interface (GUI): In GUI operating system all commands can be given to the computer by, clicking on icons or commands written on the screen. Example Windows, Edubuntu and Mac., Depending on the number of users, operating systems are of two types:, 1. Single user: Here only one user can work on the computer at a time. Personal computers and laptops are, examples of single user OS., 2. Multi-user: Here two or more users can work on the system simultaneously., Many systems need operating systems for specialized functions. There are many different types of OS available, to perform such tasks. Some of these are:, 1. Batch OS: The operating system performs a batch of processes together. For example, banks update their, database at the end of banking hours., 2. Real-time OS: Many tasks need to be performed immediately, in real time. For example, railway, reservation status must be updated immediately after each booking is done, an operating system, equipped to handle vast number of real time transactions is called real-time OS., 3. Time-sharing OS: You are used to working on many tasks simultaneously. For example, you have word, processor, web browser and music player running simultaneously. An operating system that can handle, multiple tasks so that each task can share the same time is called a time-sharing OS., 4. Network OS: A network has many systems and hardware attached. It needs to perform network specific, functions like monitoring the network for security threats, maintaining network speed and sharing, network resources. An operating system that can manage a network is called network OS., 1.1.2 Translators, All computers understand the binary language (binary code of 0 and 1's). Initially programs were written in binary, language (or machine language) but later this language included some pseudo codes and was called as Assembly, language. These languages were called as Low Level Languages (LLL)., In the 2nd generation computers High Level Languages (HLL) such as FORTRAN and COBOL were developed. These, were English like and easy to learn. Code written in HLL is called Source Code. They had to be converted into, machine language or binary language (called as object code) for the computer to understand. Thus, there was a, requirement of software which could do this. Translators are used for this purpose., Information Technology [402], , Page 2
Page 23 :
Unit-III, , Class-IX [2021-22], , There are 3 types of translators used, those are• Interpreters - Interpreter is a program that translates High Level into Low Level Language but it does so line by, line. The execution stops if any line has an error. Examples are BASIC, JavaScript, and Python., • Assemblers - Assemblers are used to convert assembly language into machine code., • Compilers - Compiler is a program that translates a high level language into machine code. It converts the, whole program into object code in one go and lists all the errors at the end. Once all the errors are removed,, the object code is stored in the computer and the compiler is no longer required. Examples of compiled, languages include C, C++, FORTRAN, Cobol etc., 1.1.3 Utility Programs, They are small, powerful programs with a limited capability. Different examples of Utility programs include copy,, paste, delete, file searching, antivirus, disk cleanup, disk defragmenter, etc., 1.1.4 Device Drivers, A device driver is a computer program that controls a particular device which is connected to your computer., Device drivers act as a translator between the operating system of the computer and the device connected to it., 1.2 Application Software, These are software used for a specific purpose. Application software is specific to the task it is designed for. They are, divided into two categories, 1.2.1 Special purpose software is special software tailored or custom made for a company, school or an, organisation as per their need or requirement. For example, • Accounting software describes a type of application software that records and processes accounting, transactions and keeps the financial accounts of a company., • Computer reservations system (CRS) is a computerized system used to store and retrieve information and, conduct online transactions related to tickets bookings, hotel bookings, car rental etc., • Billing Software refers to program that prepare bills of product and services delivered to a customer., • Enterprise resource planning (ERP) is a category of business-management software., • School Management System handles key attendance and performance grade data of students., 1.2.2 General purpose software is developed for general purpose use. These are usually available in the form of, packages and can be used by different users. For example, • Word Processing Software: These are used to create professional looking documents like letters, bio-data,, reports, posters etc. with formatted text and graphics. MS Word, WordPerfect are examples., • Spreadsheet package: These are used to create documents that can manage and organise numeric data, which involve a lot of calculations or for the production of graphs and charts. Lotus 123 and MS Excel are, examples., • Communications software is used to access and surf the Internet and send and receive e-mail. Examples, are Internet Explorer, Chrome, Mozilla Firefox., • Database Management Software: These are used to create and manage a database that can store and, retrieve information. It can store related data of a school to form a student database, employee database, etc. Examples include MS Access, MySQL and Oracle., • Multimedia Presentation Software: Those are used to create slide shows and presentation which can be, viewed on-screen or projector. Example includes MS Powerpoint, Flash, etc, , Information Technology [402], , Page 3
Page 24 :
Unit-III, , Class-IX [2021-22], , Classification of software based on their availability and share-ability., 1. Freeware, Freeware software is available without any cost. However, freeware does not provide any liberty for modifying, the software or charging a fee for its distribution. Examples are:, • Skype, • Team Viewer, 2. Shareware, It is software that is freely distributed to users on a trial basis. It usually comes with a time limit and when the, time limit expires, the user is asked to pay for the continued services. Some examples of shareware are:, • Adobe Acrobat, • Winzip, 3. Open Source, These kinds of software are available to users with the source code which means that a user can freely modify, or add additional features to the software and distribute the software. Open-Source software can either be free, or chargeable. Some examples of open-source software are:, • Open Office., • Linux OS, , 2- Hardware, Hardware is tangible and physical in nature. Hardware components can only start their operation once the software, has been loaded correctly. There are many hardware parts in a computer. For example, , •, , Motherboard, , • Expansion Cards –, o, , Graphics Card, , o, , Sound Card, , o, , Solid State Drives (SSD), , Information Technology [402], , Page 4
Page 25 :
Unit-III, , Class-IX [2021-22], , 3- Microsoft Windows 7, A Microsoft window is one of the most popular operating system. It is developed by a company called Microsoft cofounded by Bill Gates. It is a GUI (Graphical User Interface) based operating system. The first Windows Operating, system was launched in 1985. Windows 7 was launched in 2009., When you switch on the computer, you get a screen with a blue background and some small images on the left side, of the screen. This is your desktop., Windows desktop has these parts:, • Background: The image that covers the screen or the desktop completely is called the background., • Icons: Small images that are placed on the desktop on the left side are called icons. You can click or double, click on these icons to start any application., • Taskbar: The long horizontal bar at the bottom of the screen from left end to the right end of the screen is, called the taskbar. It contains three major components:, o Start button: The round button in the bottom left corner of the desktop with the Windows logo is, called the Start button. When you click on the start button you are able to access all the software, that is available on your system., o Frequently and currently used programs: The middle portion of the Taskbar has icons for the most, frequently used programs. Icons of all the software or applications that are currently open are also, displayed here., o Quick access tools: The extreme right portion of the Taskbar contains Quick Access Tools such as, Network icon, Sound icon and Hidden icons. It also displays system date and time., , •, , Title Bar: A title bar is always at the top of the window. It displays name of the file at the left side and has, three buttons (Minimize, Maximize/Restore and Close) on the right side, , Title Bar, , Everything that you store on a computer, be it some written text, photograph, music, etc., is stored in the form of a, file. These files are stored on the hard disk, the secondary memory of the computer because it has lots of space for, storing data., To enable you to store and access the files easily, a hard disk is divided into partitions called drives. These drives are, labeled with alphabets starting with C, D and so on. The drives can be further organised in the form of folders., Windows provides a utility program called Windows Explorer to help you in viewing and accessing these files and, folders., Windows helps you by providing four default folders to save your files. These are:, • Documents, • Music, • Pictures, • Video, These folders are always available under the Libraries folder. The Libraries folder is always accessible from the left, pane of the File explorer window., , Information Technology [402], , Page 5
Page 26 :
Unit-III, , Class-IX [2021-22], , Accessories Folder, This folder contains applications which are used for day-to-day task like creating documents, drawing pictures, doing, calculation, recording audio or video, etc. This is called accessories folder., • Wordpad: Software that enables us to type in the computer is called word processing software. The file, created using word processors are called documents., • MS Paint: It is a windows application that helps us in creating images. The work area is called canvas., • Calculator: In this application we perform various calculations., • Sticky Notes: This application can be used like the remainder, which can be put on the desktop., • Sound Recorder: This application is used for recording the audio, using microphone., , Terms:, -, , Tool Tip: A rectangle box of information when you take your mouse pointer to any icon is called tool tip., , -, , Font: The way the computer writes, or its handwriting is called font. The maximum font size is 72., Work area: The area where we write using the keyboard. We can write from the place where the vertical link, blinks called cursor., , 4- Linux, Linux operating system is becoming very popular with networking professionals. Software applications are widely, available for this OS and it is open source software which is free. Its source code is available and can be modified and, redistributed., Features of Linux OS., • It is a free Unix — like operating system., • It was created by Linus Torvalds in 1992., • It is open source software which is free., • It provides user security using authentication features like password., • It is also a multiuser-multiprogramming system., , Information Technology [402], , Page 6
Page 27 :
Unit-II, , Class-IX [2021-22], , Chapter-5 :: Introduction to Internet, Internet is actually short form for Interconnected Networks. So you can say that many networks connect together to, form an internet. When a group of devices like computers, laptops, printers, web servers, etc. connect together to, exchange information and share resources, they are collectively called a network. This network may be located in, any corner of the world, say, your school, your parent's offices, banks, etc. The Internet is a medium of, communication and exchange of information., A private network that is set up so that people of an organization can access it is called Intranet., Some common terms related to Internet, • Protocol: Protocol is a set of rules to be followed while communicating or transferring data on internet., • HTTP (Hyper Text Transfer Protocol): This protocol defines the rules to be followed while transferring the, information. The information may be in the form of text, images, videos, etc. This is the most commonly used, protocol over World Wide Web., HTTPs is the secured version of http. It ensures better protection against data theft., • URL (Uniform Resource Locator): Each web page has a unique address which identifies its location on the, network. This unique address is called the URL., The URL has two parts:, • Protocol identifier: It identifies the name of the protocol used., • Resource name: It specifies the complete address to the resource on the Internet., For example, http://www.google.com here,, ‘http’ is the protocol and ‘www.google.com’ is the resource name., , Brief History, The first network was the ARPANet — Advanced Research Project Agency Network. It was established in 1960s by US, Department of Defense (DoD) to connect universities that were carrying out defense related research., The first commercial network was Telnet. It was introduced in 1974 and enabled small networks located in far off, places to connect with each other., As the size of internet was increasing, it was needed to have some rules and regulations for sharing information and, resources over the internet. These rules and regulation was finally laid down by Timothy Berners-Lee to create a, global network of networks called World Wide Web (WWW) in year 1989., Internet in India, Internet in India began with the launch of the Educational Research Network (ERNet) in 1986, initiated by, the Department of Electronics (DoE). The network was made available only to educational and research, communities., 1995, Aug 15: The service was available to public was launched by Videsh Sanchar Nigam Limited (VSNL)., 2000: Broadband Service launched by Spectranet, now Spectra., 2000: Deep Kalra launches MakeMyTrip.com, 2001: Indian Railways allows online booking of tickets through IRCTC., 2007: Sachin Bansal and Binny Bansal start Flipkart., 2007: Google News launches Hindi service., , Information Technology [402], , Page 1
Page 28 :
Unit-II, , Class-IX [2021-22], , Applications of Internet, •, •, •, •, •, •, •, •, , Get information on different topics., Connect with friends and family to exchange messages and talk., Book railway or air tickets., Watch movies, TV shows, live events, etc., Shopping sitting in the comfort from home., Consult with world famous doctors working in a different city or country., Get news from around the world instantly, Work from our homes for companies that are located far away from us., , Webpages and Website, All information on the Internet is available through webpages. An individual page of a web site is called a webpage., A webpage can have text, audio, video, polls, images, links to other pages and other multimedia components to, assist you with whatever you want to do. It is written in a special computer language called HTML (Hyper Text, Markup Language)., There are two types of web pages:, • Static web pages: Static web page is a web page in which all the information is presented to the user exactly as it, is stored. For example, any tutorial web site., • Dynamic web pages: Dynamic web page is a web page which shows different content each time you visit the, page. For example: shopping web sites., The searching for information on the web by moving from page to page, website to website is known as web, browsing or Surfing., The first webpage of a website is called homepage. From the homepage you get to all other pages of the site by, clicking on the hyperlinks., A website is a collection of interlinked webpages on a related topic or theme. The pages are interlinked through text, called hyperlink. A piece of text that opens another webpage when it is clicked is called hyperlink., , Web Browser, Web browser is software that is required to access any website or webpage on the Internet. Some of the most, popular web browsers include Internet explorer, Google Chrome, Mozilla Firefox, Safari, etc. Each website is given an, address called the web address or URL (Uniform Resource Locator)., , E-Mail, Sending and receiving message from one computer to another through internet is called Electronic Mail (E-Mail)., The advantages of E-mail are:, • It is fast and easy to use., • It is the fastest means of communication. A message can reach any part of the world in a fraction of a second., • You can send text message, pictures and sound messages across the globe., • Message can consist of few lines or more. It is not charge by weight. You just pay for the internet connection., • You need not be on your computer or online to receive the e-mail., • E-mails are eco-friendly as no paper is used., • You can also send bulk messages to a large number of people at the same time., , Email Account: To send or receive email messages, you first need to open your email account and have your email, address., , Information Technology [402], , Page 2
Page 29 : Unit-II, , Class-IX [2021-22], , Email address, An email address has two main parts:, • User name, • Host name, These two parts are separated by @ symbol., For example, consider the following email address:
[email protected], In the above email address, myemail is the user name and gmail.com is the host name (domain name)., , Email program, An email program enables you to send and receive email messages. Some of the popular email programs are:, • Gmail.com, • Yahoo.com, • Rediff.com, Parts of gmail window, • Inbox: This is the place where you receive all your mails. Gmail allows you to categorise all your mails into, five groups—primary, social, promotion, forums and updates., • Action buttons: These buttons are located just above your inbox. The have many options to work with your, messages, like marking them as read or spam, deleting mails, sorting through the mails, etc., • Search box: You can search for any specific mail by typing in search text like some words that could be in that, mail, sender's name, sender's email id, etc., • Settings: Gear icon is the Settings icon for Gmail. When you do not like any of the settings of Gmail, you can, change it by clicking on the Settings icon and opening the Settings window., Components of mail Compose Window, • Message Header: The top part of the message is the header. It containsTo field: In this we enter the email address of the user to whom we want to send the email., Subject field: It is the heading or short description to pull the readers, CC field: When you CC people on an email, the CC list is visible to all other recipients., Bcc field: BCC stands for “blind carbon copy”. Someone on the BCC list can see everything, including, the CC list and the contents of the email. However, the BCC list is secret—no other one can see this, list except the sender., Attachment: This icon helps you to attach files such as, documents, presentations, images, videos,, etc. with your email message., •, , Message Body: This email body has the message and any attachment, if required. You can attach more than, one file. After finished writing the message, click on Send button to send the email., , Information Technology [402], , Page 3
Page 30 :
Unit-II, , Class-IX [2021-22], , INTRODUCTION TO SOCIAL MEDIA, Darrell Berry, a photographer and writer, is supposed to be the first person to use the term "social media" in 1994., Collection of communication channels that enable users to share ideas on the internet is called social media. A social, networking service is an online platform which people use to build social networks or social relationship with others., Social networking has created a change in the way we communicate with one another., A website that provides facility to people to keep in touch with friends, builds social relations, or share common, interests is called a social networking website. People often use these websites to communicate and share ideas,, information, post comments, messages, images, etc., Benefits of Social Networking Websites, The benefits of social networking websites are:, • These sites provide a way to connect with people around the world., • Social Networking site can be used to stay in touch with the family, and connecting with old friends., • These sites help us to learn about current events., • These sites also work as a platform to launch new business ideas, or for advertisers to market their products and, services to their subscribers., • Social networking sites can be used to disarm social stigmas., , Information Technology [402], , Page 4
Page 31 :
Unit-II, , Class-IX [2021-22], , Disadvantages of Social Networking websites, • These sites expose people to a lot of information, which may or may not be authentic., • If you share your current location over social media, you can easily become a target., • Online interactions have now substituted the face-to-face interactions and this has reduced the social skills., • Social networking has become a distraction for most of the people. Students who use social networking too, often have lower grades., • Using social networking for long hours in a day can lead to a sedentary lifestyle., • Social networking sites can spread false or unreliable information quickly., How to stay safe on Social networking Websites, • Do not post and share private information like mobile number, address, etc. on social networking websites., • You should be familiar with the privacy policy of the social networking sites. You can adjust your privacy, settings on social networking websites, so as to control who can access your information., • Use a strong password. Longer password is more secure than a shorter one., • Use a different password for each social media account., • Be selective with friend requests. Don’t accept the friend request if you don’t know the person personally., • Be careful while clicking at any link or any pop-up window., • Protect your computer with anti-virus software and keep it updated., • Always Log Off when you are done., Some of the most popular social media channel:, • Blog: Blog is the short form for weblog. Bloggers are people who want to share their ideas with the online, community through their writing and connect with like-minded people. The act of writing blogs is called, blogging. There are many websites like WordPress, Blogger, Tumblr, etc., • Facebook: Facebook is a social networking website that was launched on 4 Feb 2004 by Mark Zuckerberg., Facebook is used to share messages, images, videos and other multimedia content with your connection., The message shared on facebook is called post., • Youtube: YouTube was launched in14 Feb 2005, is the most popular network for sharing videos., • Twitter: Twitter was launched on 21 Mar 2006, it is social networking website where users can post their, messages and comment on others messages. The messages posted by the users are known as tweets., Tweets can be only 280 characters long but you can attach images video audio etc. with them. Each user has, a distinct Twitter account known as twitter handle., • WhatsApp: WhatsApp launched on 24 Feb 2009 is a free messaging app for smartphones, it uses internet to, send messages or make calls. Users send text messages, audio, video, documents, etc. to those people who, are also using WhatsApp. The app can also be used to make audio or video calls to other WhatsApp users., , Digital India, Digital India is an initiative taken by the government of India in year 2015 to bring all citizens of India online. This, initiative aims to technologically empower Indian citizens by providing them better online infrastructure, high speed, network and training to be digitally aware. Under this program people are encouraged to perform all their day to day, activities online., Some of the activities are given as under:, Getting information about government schemes through government websites., • Applying online for government IDs like PAN card, Aadhaar card, Driving license, etc., • Using online banking facilities., • Making online purchases., • Joining forums to share ideas., • Enrolling in online courses to gain knowledge., , Information Technology [402], , Page 5
Page 32 :
Unit-II, , Class-IX [2021-22], , CYBER CRIME, Cyber-crime refers to any crime done using computer or any electronic device with internet connection., Some of the cyber-crimes are:, • Cyber Bullying: Cyber bullying usually involves posting or sending gossip, posting or sending offensive, rude, post to damage a person’s reputation, relationship with others., • Cyber Stalking: It refers to harassing an individual or an organization using internet. This may include making, false accusation or defaming, threatening, damaging data, etc., • Hacking: If someone tries to get into computer systems in order to steal, corrupt or illegitimately view data,, then it is called hacking. The person who does hacking is called a hacker., • Phishing: Phishing means an attempt to acquire sensitive information such as username, password, etc., • Spamming: Spam refers to unsolicited email which is sent in large quantities to a large number of users., , Cyber Addiction, Internet has become an essential part of our life. We use internet for various purposes like, for communication, for, upgrading our knowledge, for shopping, in schools, for payment of bills, at home and in office. Above all, we use, internet as a companion when we are alone and we cannot live without it., Addiction is generally thought to be a mental disorder involving compulsive behavior and when a mental condition, characterized by excessive use of the internet it is called Cyber/Internet addiction. When someone is constantly, online, they may be described as addicted to it., Effects of Cyber Addiction, Over use of internet may lead to:, Headaches, Back aches, Irregular eating habits, Sleep disturbances, , Information Technology [402], , Neglect of family and friends, Dry eyes and eye problem, Feeling of depression, irritation, Cyber addiction may lead to cyber-crime., , Page 6
Page 33 :
Unit – 3 :: Digital Documentation, Chapter No. – 6, 7, 8, A word processor is application software which is used for creating, storing and printing documents. The popular, word processing software are• Microsoft Word, • Open Office Writer, • Libre Office Writer, Advantages of Word processing software:, • We can create, save and print document., • We can make changes to document whenever we want., • We can add picture, charts, tables to the document., • Spelling and grammatical errors can be corrected easily., • We can add page number, date, borders and watermarks., , Parts of a document writer:, , We can format the document in many ways like making the texts Bold, Italics, Underline, coloured text, various, alignments., OpenOffice.org supports the following types of styles:, • Page styles include margins, headers and footers, borders and backgrounds., • Paragraph styles control text alignment, tab stops, line spacing, and borders, and can include character, formatting., • Character styles affect selected text within a paragraph., • Frame styles are used to format graphic and text frames, borders, backgrounds and columns., • Numbering styles apply similar alignment, numbering or bullet characters, and fonts to numbered or bulleted, lists., • Graphics styles in drawings include line, area, shadowing, transparency, connectors.
Page 34 :
Shortcut for, , Bold, Italics, Underline, , –, -, , Ctrl + b, Ctrl + I, Ctrl + u, , -, , SuperScript, , -, , Ctrl + shift + +, , -, , Subscript, , -, , Ctrl + =, , -, , Bold, Italics, Underline, x, , 10, , H20, , Spelling and grammar:, Red colour is example for rong spelling. Green colour is meaning grammar ., , Find and Replace:, Find shortcut, Find and Replace shortcut, , -, , Ctrl + F, Ctrl + H, , Indentation: It is the space between the page margin and the text., Alignment: It is the placement of text on the page with respect to its left and right margin. There are four types of, alignment:, Right Alignment:, , Ctrl + R, This is example for right alignment. This is example for right alignment., , Left Alignment:, , Ctrl + L, , This is example for left alignment. This is example for left alignment., Center Alignment:, , Ctrl + E, , This is example for center alignment. This is example for center alignment. The shortcut key for, center alignment is Ctrl + E., Justify Alignment:, , Ctrl + J, , This is example for justify alignment. The shortcut key for justify, alignment is Ctrl + J., You can see that the right and left margin are filled with extra gaps between each word., , Column, , Tables:, , We can insert table in 3 ways:, 1. Using the table Grid Button, 2. Using Insert table option, 3. Using Draw table option, , A cell, Row, , A table represents the data in the form of row and column., The intersection of rows and column forms a rectangular, box called a cell., A row is the horizontal series of cells while,, A column is the vertical series of cells in a table.
Page 35 :
Merging and splitting table:, Steps:, Select a table, Click on the Layout Tab, in Merge group you can merge or split the cells., , I, , II, , Maths, , I.T, , Tue, , Chem, , Phy, , Wed, , English, , Bio, , IV, , V, , Phy, , Chem, , Hindi, LUNCH, , Mon, , III, , SST, I.T, , Maths, , English, Hindi, , Inserting images in OpenOffice Writer:, i. Drag and drop, ii. Inserting an image using a scanner, iii. Inserting an Image From The Clipboard, , iv. Insert Picture dialog box, v. Inserting an image from the Gallery, , Thesaurus:, The book of synonyms is known as Thesaurus., Shortcut -> Shift + F7, Example: I am giving you last error., , Listing:, This is example of ordered List (Numbered List), 1) January (Level 1), a. Day 1 (Level 2), b. Day 2 (Level 2), i. Anything (Level 3), 2) Feb, 3) Mar, 4) April, , Printing (Ctrl + P):, Print Preview, , This is example of unordered list (Bulleted List), Verbal skill (Level 1), o Face 2 face (level 2), o Telephone (level 2), Samsung (level 3), • Galaxy (level 4), Non-verbal, o Sign language (Level 2)
Page 36 :
UNIT - IV, Electronic Spreadsheet, Chapter 9 - 10
Page 39 :
Keyboard Shortcuts, CTRL + A, CTRL + B, CTRL + C, CTRL + D, CTRL + E, CTRL + F, CTRL + G, CTRL + H, CTRL + I, CTRL + J, CTRL + K, CTRL + L, CTRL + M, CTRL + N, CTRL + O, CTRL + P, CTRL + Q, CTRL + R, CTRL + S, CTRL + U, CTRL + V, CTRL + W, CTRL + X, , Select text, Bold text, Copy text, Open font formatting window, Center text, Find a phrase, Go To a specific page, Replace text or replace, formatting, Italicize text, Justify text, Open Insert Hyperlink window, Left align text, Indent a paragraph from the left, Open new Word document, Open an existing Word, document, Print Word document, Remove paragraph formatting, Right align text, Save Word document, Underline text, Paste text, Close Word document, Cut text, , CTRL + Y, CTRL + Z, CTRL + SHIFT + +, CTRL + =, CTRL + Home key, CTRL + End key, SHIFT + F7, , Redo, Undo, Superscript, Subscript, Go directly to first page, Go directly to last page, Open Thesaurus
Page 40 :
Sr., No, , 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, , Abb., ICT, ITES, BPM, BPO, MNC, ISP, GIC, ERP, SMS, LMS, MRI, ECG, IPO, RAM, ROM, CPU, ALU, CU, MU, KB, Kb, MB, GB, TB, CD, DVD, HDD, SSD, CRT, LCD, , Full forms, Information Communication and Technology, Information Technology enabled Services, Business Process Management, Business Process Outsourcing, Multi National Company, Indian Service Provider, Global In-house Center, Enterprise Resource planning, School Management System, Learning Management System, Magnetic Resonance Imaging, Electro CardioGram, Input Process Output, Random Access Memory, Read Only Memory, Central Processing Unit, Arithmetic Logical Unit, Control Unit, Memory Unit, Kilo Byte, Kilo Bit, Mega Byte, Giga Byte, Tera Byte, Compact Disc, Digital Video Display, Hard Disk Drive, Solid State Drive, Cathode Ray Tube, Liquid Crystal Display, , Sr., No, , 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60, , Abb., LED, TFT, USB, VGA, VDU, MICR, OCR, OMR, OS, ALL, HLL, CLI, CUI, GUI, Ms-DOS, BOSS, CRS, DNS, INTERNET, HTTP, WWW, FTP, URL, ARPANET, ERNet, GIF, JPEG, PDF, PNG, UPS, , Full forms, Light Emitting Diode, Thin Film Transistor, Universal Serial Bus, Visual Graphics Array, Visual Display Unit, Magnetic Ink Character Recognition, Optical Character Reader, Optical Mark Recognition, Operating System, Assembly Level Language, High Level Language, Command Line Interface, Character User Interface, Graphical User Interface, Microsoft Disk Operating system, Bharat Operating System Solution, Computer Reservtion System, Domain Name System, Interconnected Network, Hyper Text Transfer Protocol, World Wide Web, File Transfer Protocol, Uniform Resource Locator, Advanced Research Project Agency Network, Educational Research Network, Graphics Image File, Joint Picture Expert Group, Portable Document File, Portable Network Graphics, Uninterrupted Power Supply