IX Emplobility Skills Combined Book PDF
IX Emplobility Skills Combined Book PDF
IX Emplobility Skills Combined Book PDF
1. Introduction
18
2. Positive Results of Self-Management
Parents, teachers and guardians are not always along the child to guide him/ her. In that case
principles of self-management guide the individual day in and day out, on how to respond to the
environmental forces. These environmental forces for students can be the class schedule,
assignments, competitions, exams, different students and their behavior etc. Students can sail through
various situations in life comfortable by taking following benefits from self-management…
o Directs evaluation of
performance, objective resetting
and enhances self-esteem.
• It leads to self – reinforcement of positive behavior
Self-management reinforces appropriate behavior of students as per the time, situation and
people involved. It motivates individuals to take up right things and refrains from getting
indulged into negative things, keeping long term consequences in focus.
o Enforces self-learning for goal achievement
o Self-reliance is enhanced and which reinforces the behavior.
3. Self-Management Skills
Following are the self-management skills that individuals should possess to enjoy the fruits of self-
management.
19
o Doing homework well in time, will give you more free time which you can enjoy
without the shadow of homework hanging on you.
3.3 Independent Working
This typically means is when an individual is assigned a task(s), he/she takes ownership and
doesn't require constant assistance or supervision to complete that task(s).
o Preparing for a test, a competition or learning something new on your own shall help
enhance self-reliance.
3.4 Team Player
A person who conforms well with norms of a team and contributes to the attainment of the
common goals in an efficient and effective way is called as a team player.
o While doing a group project, you can develop your team work skills as well as you can
learn from someone else
3.5 Time Management
It is conscious effort to prioritize task according to the time at hand to increase productivity,
efficiency and effectiveness.
o While studying, you need to plan for sports and
relaxation activities. Proper time management for all
of them will leave you with more positive energy.
3.6 Self-Motivation
Motivation is defined as a driving force responsible to do
something. The students who are motivated to achieve their
academic goal, their future is much better than others.
o Making lists and study notes in advance
3.7 Personality management
General neatness, grooming, appropriate dressing, apt verbal and non-verbal communication
are components of good personality.
o Dressing in a prim proper way for school, friend’s place or for playground creates good
and favorable impression.
4. Self-Confidence
Realistic belief and trust of an individual in one’s own judgement, capabilities and worthiness is self-
confidence.
• Social
Interactions with family and social environment, like friends, relatives, teachers and media
influences self-confidence of individuals. Development of confidence on self is a process which
results from the experiences of individuals while interacting with others.
• Cultural
Cultural factors comprise of values, beliefs and customs. Indians give higher importance to
family values, believe in the philosophy of “Vasudhev Kutumbhkam” and follow custom of
celebrating Diwali. Conforming to cultural values, beliefs and customs enhances self-
confidence.
20
• Physical
Physical self-efficacy, physical activity and social physique anxiety are found to be influencing
self-confidence of individuals. Physical activity is found to be directly related to self-
confidence. Physical self-efficacy refers to physical potential to complete a given task. Social
physique anxiety is a concern amongst individuals about perceived evaluation of one’s
physical self by the society.
Mind is like a fertile land, if you do not plant good thoughts there, weeds are bound to grow.
• Thinking positively
Positive thinking brings brain to a peaceful stance and increases productivity and
performance. When individuals start thinking positively, they feel happy from within and their
self-confidence boosts up.
• Staying happy with small things
An individual who is full of gratitude for every small blessing in his life feels contended. Being
thankful towards people and the world, instills confidence in individuals.
• Staying clean, hygienic and smart
Personal hygiene is the first key to a confident person. Keeping hair, teeth, fingers, body and
skin clean and well maintained is an easy and effective way to be at best.
• Chatting with positive people
Interacting with positive people brings forth a fresh and progressive perspective to life. People
in similar stages of life go through similar issues. Some positively handle these situations, and
interacting with them shall help boost confidence.
21
A 1, A2
Lets’ Do It !!
22
23
Class IX ICT Skills
Information Technology means creating, managing, storing and exchanging information. It includes all
technologies that can be used to deal with information.
Information Technology has become a part of everyday life. ICT applications are found in every field –
education, health, business, design, manufacturing, science, environment. You can create a project
report, do office work, send messages, read books, manage daily planner, play games, listen to music,
watch movies, pay bills, book tickets, buy products, and the list in endless.
A computer can be used at home to play games, search information, listen to music, watch movies,
send or receive email, maintain household accounts. A device with internet connection can be used
to do online shopping, pay bills, do e-banking etc.
24
1.2.2 ICT in education
Students are also using their own smart phones or other devices for learning during class time. Online
assessment is also helpful for students.
The concept of “flipped classroom” is becoming popular in many countries where students watch
lectures at home on the computer and use classroom time for more interactive exercises.
• Complex topics can be easily explained to the students with the help of pictures, videos,
presentations, etc.
• Images and videos used for teaching improves the retention memory of the students.
• Presentations can make the lessons interesting.
• Practical demonstration can be given to the students.
• If the teaching process in the class is interactive, it will make the lesson more enjoyable.
• An e-learning program allows students to learn at their own pace, at any convenient time,
and from any place.
25
condition. The Doctor can also interact with patient, recommend to take medical
examination and prescribe medicine.
• Using the ICT tool or a suitable communication system, government can make efforts to
create awareness among the public about the communicable diseases, prevention measures
and various current diagnostic & etc.
• ICT in healthcare research helps to find the possible prevention measures to eradicate and
reduce the spread of diseases.
• Through ICT, the traditional healthcare systems can be eliminated and new models can be
formed for effective quality care.
• Hospitals can use different electronic media to store medical data. This helps to retrieve the
information easily. This data can be transferred to the patient or to the Doctors for
consultation.
• Computer based machines are used for MRI, CT-scan, ultrasound are done in hospitals,
diagnostic centres, to diagnose the diseases.
• Life support systems are provided to the patients
• You can search information on any disease, medicines, etc. on the internet.
1.2.4 ICT in Governance
ICT in governance means using Internet, other electronic media buy the central and state
governments, by local administrative bodies to improve the efficiency, transparency, efficiency
of the government. Many government services are available online. Electronic voting for
elections has replaced the traditional voting slip.
ICT has affected the society in both positive and negative way. We have already discussed the use of
ICT in various fields.
26
ICT has divided the society into two groups:
1. Persons who can do their personal and professional work efficiently. They are efficient in using
services like, e-banking, e-learning, e-governance sites, etc.
2. People who do not have access to a computer and internet. They also do not have knowledge to
use facilities available on the internet.
This has resulted in digital divide, which refers to the gap between people who have access to
latest information technologies, like, computer, smart phones, internet, ipad, etc. and have
knowledge to use them and people who do not have access to use these devices.
ICT has a great impact in our daily life. Some of the uses of ICT in our daily life are given below:
Lets Try It
Worksheet
27
1.4 ICT Tools
ICT tools are devices that are used in Information and communication technology. For example,
computer, smart phone, radio, television, iPad, tablets, etc.
1.4.1 Mobile
Mobile phones are the easiest and simplest way of communication. It is small in
size, lightweight and portable. You can stay in touch with your friends, relatives,
anytime and anywhere.
Mobile phones are useful in studies. Students can access the internet on their
mobile phones and get knowledge on any topic.
You can even create documents, make presentations, etc on your smart phones
as you do on your computer.
1.4.2 Tablets
1.4.3 Radio
1.4.4 TV
1.4.5 Newspaper
Newspaper is another most important ICT tool. News related to all the
issues , national, international, sports, space, etc, are printed in
newspapers.
1.4.6 Email
Email is the most common way of communication in today’s world. It is the official way of
communication. Some of the advantages of using email are:
28
• You don’t have to pay anything extra for sending or receiving email. You just pay for the
internet connection.
• You can send bulk mails
• The receiver may not be online when you send the email.
• You can send documents, presentations, images, videos, etc. as an attachment to email.
• When you send an email, it reaches, the receiver at any part of the world in few seconds.
1.4.7 Interactive White Boards (Smart Boards)
1.4.8 E-readers
Lets try it
1. Discuss the role and importance of ICT in personal life and at workplace.
2. Discuss use of various ICT tools.
Worksheet
Session
29
Unit 2. Identify the Various Components of Computer System
A computer is an electronic device that has devices to enter data, store data and process raw facts
and figures according to the given instructions and give the desired result on an output device.
Data: Data refers to raw facts and figures. For example, 123, “English”, etc.
Information: Information refers to processed data. For example, total marks and percentage of a
student.
• Computer hardware – Physical parts of a computer such as Input devices, output devices,
central processing unit and storage devices are called computer hardware.
• Computer software – Software are the programs or applications that run on computer.
For example, MS Word, MS PowerPoint, Operating systems, etc.
The physical components of a computer system are called hardware. A computer basically consists of
following physical components:
• Input unit
• Processing unit
• Storage unit
• Auxiliary storage
• Output unit
<A> Input Devices
30
It consists of the following main units:
+ (addition)
- (subtraction)
*(multiplication)
/(Division)
^(Exponent)
The ALU also performs the following logical operations:
< (less than)
<(greater than)
<= (less than or equal to)
>= (greater than or equal to)
<> (not equal to)
<D> Control Unit
The control unit controls the flow of data from the input devices to memory and from memory to
output devices. It does not process the data.
When the processing begins, the first instruction of the program is selected and fed into the control
section of the primary storage area. It is then interpreted there and then the signals are sent to other
components to perform the necessary action.
The next instruction, is then selected, interpreted, and executed. This is continued till all the
instructions are processed.
<E> Registers
2.2.2 Software
31
Software
System software is a set of one or more programs designed to control the operation of a computer
system.
Operating systems and language processors come under the category of system software.
Operating System
Operating system is a master control program that runs the computer. When the computer is
switched on, operating system is the first program loaded into the computer’s memory.
Examples of operating system are Windows, UNIX, MS-DOS, Mac OS, Solaris, etc.
Language Processors
A computer understands instructions in the form of machine code, i.e., 0 and 1. The programs are
written in English like high level language called source code. The source code must be converted
into machine language in order to be executed. The translator program that is used to convert
source program written in high level language to machine code is called language processor. The
program translated into machine code is called the object program.
32
<C> Application Software
Application software is a computer program that is designed to perform a certain type of work.
This type of software pertains to one specific application. For example, software written to
calculate salary of the school employees cannot be used to prepare school result.
Application softwares can be classified as General purpose software and Specific purpose
application software.
General purpose application software includes word processing software, like, Microsoft Word.,
spreadsheet software, like, Microsoft Excel, etc.
Antivirus software:- This program helps in detecting and removing viruses. For example, Norton
antivirus, McAffee virus scan, etc.
File management tools:-These tools help in storing, searching, and sorting files and folders on the
system. For example, Windows Explorer.
Compression:- This program helps in compression of large files so that they take less storage
space. For example, WinZip.
• Disk Cleaner:-This utility scans for the files that have not been used since long. These files may
be occupying large amount of space. It prompts the user to delete such files to create more
disk space.
• Disk Defragmenter:-It rearranges the files and free space on the computer so that files are
stored in contiguous and free space is consolidated in one contiguous block. This speeds up
the disk access.
33
• Backup:- backup means making a duplicate of the files and data stored on the computer. This
program is used to take backup copy of the data. In case the original data is lost, the backed
up data can be used.
Lets Try It
Worksheet 1
Worksheet 2
34
2.3 PRIMARY AND SECONDARY MEMORY
• Primary storage
• Temporary Storage
2.3.1 Primary Storage
The primary storage is also called the primary memory. It is directly accessible by the CPU. It can be:
Units of computer memory are:- Bit (Binary Digit), Byte (Kilobyte, Megabyte, GigaByte, TeraByte,
PetaByte, ExaByte, ZettaByte, YottaByte)
The elementary unit of memory is a bit. A group of 4 bits is called a nibble and a group of 8 bits is
called a byte.
1 Byte = 8 bits
One petabyte (PB) = 1024 TB=1024 x 1024 x 1024 x 1024 x 1024 bytes
One ExaByte (EB)=1024 PB=1024 x 1024 x1024 x 1024 x 1024 x 1024 bytes
One ZettaByte (ZB)=1024 EB)= 1024 x 1024 x 1024 x1024 x 1024 x 1024 x 1024 bytes
RAM is used to hold active information of data and instructions. Information in RAM is stored in
random order, that is why it is known as Random Access Memory.
35
It is a temporary memory. When power supply is switched off, the information stored in RAM is lost,
so it is also known as volatile memory.
It is also known as read/write memory as information can be read from RAM and also written onto it.
Information stored in RAM may be erased or written over.
ROM is a part of computer’s main memory. It is used to store the instructions provided by the
manufacturer to check basic hardware and to load operating system from appropriate storage device.
The storage of data and instructions in ROM is permanent until it is written over.
The contents of the ROM are not lost when power supply is switched off. That is why, ROM is called
non-volatile memory.
Since the computer’s main memory stores the data and information temporarily, the secondary
memory is used. Secondary memory is sued to store bulk of information.
The information stored in secondary memory is not lost, so it is also a non-volatile memory. These
devices are non-volatile as data is stored in these devices till it is deleted.
Secondary storage devices include hard disk, CD, DVDs, Pen drive , etc.
Scanners are another important hardware devices that are used to convert a picture or text in a book
or page in a digital form.
The output unit comprises of devices such as Monitor, Printer, speaker, etc. to display information to
the user.
36
<C> Storage Devices
Lets Try It
1. Discuss different secondary storage devices, their uses and their storage capacities.
2. Name a few external storage devices.
3. Discuss various output devices and their uses.
Worksheet
37
Unit 3. Identify Various Peripheral Devices
A peripheral device is an internal or external device that connects directly to a computer but does not
contribute to the computer's primary function, such as computing. It helps end users access and use
the functionalities of a computer.
<A> Keyboard
38
Laptops have inbuilt keyboard but they are very delicate.
A virtual keyboard
is not a physical
keyboard. It is not a
hardware but a
software. You must have used a full touch Smart phone.
The keypad of your Smartphone is an example of a virtual
keyboard. In Windows operating System, there is an On
Screen keyboard, which is an example of a virtual
keyboard. It can be made to appear when required.
• Alphanumeric keys are used to type alphabets, numbers and special symbols like $, %, @, A etc.
• Special keys such as Shift, Ctrl, Alt, etc. are used for special functions.
• Function keys such as Fl, F2, F3 etc. are used to give special commands and these commands may
be different for different softwares.
• Cursor Movement keys. These keys are used to move the cursor in a document. These include the
arrow keys, PAGE UP, PAGE DOWN, etc.
Numeric keypad. The numeric keypad is present to the right of the keyboard and can be used to enter
numbers quickly.
<B> Mouse
A computer mouse may be connected to a computer using wire and connected to PS/2 or USB post.
Some of the computer mouse are wireless.
A mouse usually has two buttons with a scroll wheel in the center.
When you move the mouse, the mouse pointer moves in the same direction on the
screen.
39
Nowadays, we have Optical mouse that uses an LED sensor to detect the movement of the mouse on
the tabletop and send the information to the computer.
<C> Joystick
<F> Scanner
A scanner is a device that is sued to convert text or image into a digital file.
<H> Microphone
A microphone is a device used to record your voice and save it in the form of a
digital file in the computer.
Let’s Try
1. Go to a grocery shop/ store. Ask the accountant to demonstrate the use of barcode
reader to read the barcode. Note what happens/appears on the computer screen when
he clicks the barcode.
40
Worksheet
_______________________________
_______________________________
41
Then came the LCD (liquid Crystal Display) monitors. These were thinner and lighter than
Cathode Ray Tube monitors.
<B> Printer
A printer is a device used to print the files stored on the computer on paper. The output produced
on paper is called the hard copy.
It is the most commonly used character printer, i.e, it prints one character at
a time. Most of the dot matrix printers are bidirectional, i.e., they print one
line of text from left to right and then the next line from right to left.
Inkjet Printer
Inkjet Printer
Laser Printer
42
Laser Printer
These printers print one page at a time and are very fast.
Braille Printers
<C> Plotters
<D> Speaker
Lets Try It
Worksheet
43
3.2.3 Storage Devices
<A> CDs/DVDs
Compact Disc (CD) and Digital Versatile disc (DVD) are optical media that is used
to record data from computer. Data can then be read from the CD. To read data
from the CD, we need to have a CD Drive in our computer.
• CD-R and
• CD-RW
In CD-R, data once recorded can be read only and cannot be erased.
In CD-RW, previously recorded data can be erased and new data can
be recorded.
Both CD and DVD look same in appearance but DVDs can hold much
more data than CDs.
To read data from the DVD, we need to have a DVD driv e in our
computer system. We can read a CD using DVD drive but we cannot
read a DVD using CD drive.
A CD can store upto 700 MB of data whereas a DVD can store 4.7 GB of data.
A pen drive is a very small and portable device used to store data from a
computer. It can also be used to access and transfer data. Pen drives are
available in various capacities- 1 GB, 8 GB, 16 GB, 32 GB, etc.
Let’s Try It
3.3 USE ANY TYPING TUTOR SOFTWARE TO PRACTICE TYPING AND LEARN USING
DIFFERENT KEYS OF THE KEYBOARD.
Tux Typing tutor is a software used to teach typing to children and even adults. Regular practice will
help you to increase typing speed and reduce the mistakes while typing.
Before learning typing, you should learn how to place your fingers properly on the keyboard.
Before typing we should always place our fingers on the second row of alphabet keys.
The figure shown below shows which figure is used for which key.
45
a. Start Tux Typing
b. The Tux Typing main window appears (Fig 1 ).
d. A number of lessons are available. Start from lesson 1 and then try other lessons.
3.4 Recording your voice using Sound Recorder in Windows 7.
46
a. Make sure that microphone is properly attached to the computer.
b. Select Start ➢ All Programs ➢ Accessories ➢ Sound Recorder.
c. The Sound Recorder window appears (Fig 3 )
Fig 4 Recording
g. Select the drive and folder. Type the filename and click Save button.
47
Unit 4. Performing Basic Computer Operations
To turn off the computer completely, click the Start button, and then click Shut Down.
If you choose Sleep option, the system uses very little power, the computer starts up faster and you
are back to where you left. You can use sleep option if you going away for a short time. Laptops and
tablets goes to sleep when you close the lid or press the Power button.
If you select Hibernate option, system uses less power than Sleep. When you start the PC again, you
are back to where you left.
• It manages all the devices of a computer and keeps track of the status of the device, whether it
is busy or not.
• It also checks whether the device is functioning properly or not.
• It also controls software resources of the computer.
48
• t manages the computer memory and keeps track of which memory space is in use by which
program and which space is free.
• It manages the structure of the files and directories on a computer system.
• It keeps track of the amount of disk space used by a specific file.
• It allows you to create, copy, move and delete files.
DOS (Disk Operating System) is an operating system for a personal computer. Early computers were
able to run one program at a time. It had a command line interface in which a user has to remember
the commands to run the program and do other operating system tasks. For example, the DOS
command, dir, will display the list of files in the current directory.
<B> Windows
<C> Linux
It is an operating system designed for personal computers. It is a free and open-source software, which
means it can be modified and redistributed.
<A> Android It is an operating system used in mobile phones and tablets. It is owned and maintained
by Google and is an open-source operating system. The android releases were nicknamed after sweets
or dessert items like Cupcake (1.5), Donout (1.6), Éclair (2.0), Frozen Yogurt (2.2), Honeycomb (3.0)
and Jelly Bean (4.1), Kitkat (4.4), marshmallow (6.0),
<B> Symbian It is an operating system used in mobile phones. Symbian was developed and sold by
Symbian Ltd. It is primarily used by Nokia. It is also used by Japanese mobile phone manufacturers for
handsets sold in Japan.
<C> Windows Phone It is a mobile operating system developed by Microsoft for smart phones and
pocket
PCs. Windows Mobile. Windows 8.1 is the latest release of this operating system.
iOS It is a mobile operating system developed by Apple Inc. for iPhones, iPads, and iPods. It is
supported only by Apple hardware. iOS 9 is the latest release of this operating system.
Lets Try It
1. Start your computer and see the changes on the computer screen. Shut down the
computer properly.
2. Identify and name the operating system installed in your computer.
3. Discuss the functions of operating system.
4. Discuss how to properly start the computer and shut down the computer.
49
Worksheet
After loading Windows 7, the first screen that appears on the monitor is called desktop. From the
desktop, you can access different components of Windows 7.
By default, Windows 7 has a picture for the desktop background. This is called wallpaper.
Small pictures on the desktop are called icons. These icons represent files, folders, applications, etc.
At the bottom of the desktop is a long bar called the Taskbar. To the left of the taskbar is the Start
button.
icons
Computer
icon
Wall paper
Recycle
Bin
Task bar
Start
button
Let us discuss some special icons on the Desktop – Computer, Documents, My Network Places, and
Recycle Bin.
<B> Computer
It displays all the storage areas of the computer. Through the Computer icon, you can access all drives,
files, and folders on the computer.
<C> Documents
50
<D> My Network places
Files and folders deleted by the user are stored in the Recycle Bin. From Recycle Bin, you can retrieve
files or folders deleted by mistake.
You can permanently delete the contents of the Recycle Bin in any one of the
following ways:
Right-click the Recycle Bin icon and then click Empty Recycle Bin.
OR
Fig 2
Taskbar is the long horizontal bar present at the bottom of the screen. To the left is the Start button.
Right of the taskbar contains Date/Time. You can also see icons of active applications and some
shortcuts on the Taskbar
Active Notification
Start button Date/Time icon
Applications Area
Fig 4 Taskbar
51
<G> Start button It is located on the left of the taskbar. Clicking
the Start button opens the Start menu and provides access to
programs and features, like:
Search Box:- This allows the user to search a file or a folder or run
executable files.
Lets Try It
52
Worksheet
1. The first screen that appears after starting the computer is called ________
2. Small pictures on the desktop are called __________
3. The long horizontal bar present at the bottom of the desktop is called _________
4. Name the folder where all the temporarily deleted files are stored.
5. How can you recover files from Recycle Bin?
53
Fig 8 New Folder created
54
4.6 KEYBOARD AND MOUSE ACTIONS
4.6.1 keyboard operations
We already know that a keyboard has many keys on it. We can type numbers, letters, and symbols by
pressing keys of the keyboard. The characters we press on the keyboard appear on the screen.
Backspace key
Delete key
If the Caps Lock key is turned off, all the letters you type
will appear in lowercase.
Alt key
This key is used in combination with other keys to perform certain actions. It
is located on both sides of the space bar key. It can be sued to access the
options in the File menu or Ribbon. For example, pressing Ctrl + Alt +Del keys
together, opens the Windows Task Manager window.
Shift Key
The Shift key is used along with the other keys. There are two shift keys
on the keyboard. The Shift key is used to type the upper symbol present
on some of the keys of the keyboard.
If Caps Lock key is on, the Shift key can be used to type alphabets in
lowercase.
This key is used in combination with other keys for performing particular
operation. For example, Ctrl + C is keyboard shortcut for Copy command,
Ctrl + V is the keyboard shortcut for paste command.
55
Esc (Escape) key
Esc key is found on the top left corner of the keyboard. This key is used to stop an
action, leave a program, close a dialog box, etc. For example, you can stop a
browser from loading web page if it is taking too long. You can also close a dialog
box by pressing Esc key.
Function keys
On the top of the keyboard, there are function keys marked from F1, F2, f3, and so on. These keys
have special function defined by operating system or currently running program. They may be
combined with Alt or Ctrl keys. For example, F1 key is used as the Help key in almost every program.
On pressing this key, the help screen appears.
Also pressing Windows key + F1 opens the Microsoft Windows help and support centre.
Tab key
Pressing this key moves the cursor several places along the same line.
Fn (Function) key
On pressing the fn key and the key that increases the brightness on the
laptop screen.
When you press this key, the current screen image is sent to the computer
clipboard. Once the image is stored in the clipboard, you can paste the image
in any image editor or any other program.
56
Different mouse actions are:
• Click
• Double-click
• Right-click
• Drag and drop
Click
Clicking the mouse means pressing the left mouse button once and releasing it. A click is used to
select an item on the computer monitor.
Double-click
Double-clicking the left mouse button twice within a short period of time and releasing it. This action
is used to open a program, a file, or a folder.
Right-click
Right-clicking the mouse means clicking the right button of the mouse once. This shows a list of
commands.
Drag and drop action of mouse is used to move an item from one position to another.
Fig 11
57
3. Holding the mouse button, drag the icon to the new position. (Fig 12)
Fig 12
Hard disk
drives
Removable
disk drives like
CD, DVD, Pen
Drive
To view the contents of any item, e.g., a particular hard disk drive partition, double-click its icon.
58
Lets Try It
1. Create a folder on the desktop named ‘MyPracticalFile’.
a. Open this folder ‘MyPracticalFile’.
b. Right-click anywhere in the blank area of the right-column.
c. In the Shortcut menu, click New and select the type of the file you want to create, say Text
Document.
d. The default name for the text document appears. Type the desired name and press Enter key.
e. Double-click to open the file in Notepad (in this case).
f. Type few lines on the topic ‘Functions of Operating system’.
g. Save the file by pressing Ctrl + S or by selecting Save option from the File menu.
2. Discuss the concept of files and folders. Also discuss the importance of creating folders.
59
Unit 5. Connect with the World Using Internet and its Applications
Protocol
Protocol is a set of rules to be followed while
communicating or transferring data on internet.
For example,
http://www.mywebsite.com
here, http is the protocol
www.mywebsite .com is the resource name
• Email
• Chatting
• Video conferencing
• Social networking
• E-learning
60
• E-shopping
• E-reservation
• E-banking, etc.
5.2.1 Email
E-mail stands for electronic mail. It is a message in an electronic form that is sent or received from one
computer to another.
5.2.2 Chatting
Chatting on internet refers to textual communication that offers a real-time transmission of text
messages from one person to another. These messages are generally short.
Video conferencing using internet is a visual communication between two or more persons who may
be present at different locations.
Social networking is the use of internet based social media sites that is used by people to stay
connected with friends, family, etc.
5.2.5 E-learning
E-learning or online learning refers to a learning system that is done using an electronic device with
internet connection.
5.2.6 E-shopping
Buying products online, i.e., using an electronic device with internet connection is called e-shopping.
Customer can buy products from the comfort of their home. It saves time and effort. You can even
compare products, even cancel the transactions. Most important, this facility is available 24 X 7 and
365 days.
5.2.7 E-reservation
E-reservation means booking of tickets online. You can book airline tickets, train tickets, movie tickets
and even hotel rooms and tour packages online.
61
2. It displays the information on the computer.
A web site is a collection of two or more related web pages. Web pages of a web site are linked
together through hyperlinks.
An individual page of a web site is called a web page. It is written in a special computer language
called HTML (Hyper text markup Language).
Static web page is a web page in which all the information is presented to the user exactly as it is
stored. For example, any tutorial web site.
Dynamic web page is a web page which shows different content each time you visit the page. For
example, shopping web sites.
5.4.3 Home Page
To send or receive email messages, you first need to open your email account and have your email
address.
62
Email address
• User name
• Host name
These two parts are separated by @ symbol.
In the above email address, myemail is the user name and gmail.com is the host name.
Email program
An email program enables you to send and receive email messages. Some of the popular email
programs are:
Gmail.com
Yahoo.com
Rediff.com
63
To send an email, you first open your email account. Then click Compose option. The following
window opens.
To This option allows you to write the email address of the person you want to send the message to.
Cc It stands for carbon copy. This option allows you to send the same message to several persons at
the same time and every recipient will know all the recipients of this mail. The multiple email
addresses are separated by semicolon.
BCc It stands for Blind Carbon copy. This option allows you to send the same message to several
persons at the same time but a recipient will not know who the other recipients of this message are.
Subject This option allows you to write in few words about the content of the message.
Attachment This icon helps you to attach files such as, documents, presentations, images, videos, etc
with your email message.
Social media refers to different online communications channels that are dedicated to community-
based input, interaction, content-sharing and collaboration.
A social networking service is an online platform which people use to build social networks or social
relationship with others. Social networking has created a change in the way we communicate with
one another.
A website that provides facility to people to keep in touch with friends, build social relations, or share
common interests is called a social networking website.
People often use these websites to communicate and share ideas, information, post comments,
messages, images, etc. on a social networking website.
• These sites provide a way to connect with people around the world.
• Social Networking site, like Facebook can be used to stay in touch with the family, and connecting
with old friends has become very easy
• These sites help us to learn about current events.
• These sites also work as a platform to launch new business ides, or for advertisers to market their
products and services to their subscribers.
• Social networking sites can be used to disarm social stigmas.
• These sites expose people to a lot of information, which may or may not be authentic.
• If you share your current location over social media, you can easily become a target.
• Peer pressure and cyberbullying are also important issues.
64
• Online interactions have now substituted the face-to-face interactions and this has reduced the
social skills.
• Social networking has become a distraction for most of the people. Students who use social
networking too often have lower grades.
• Using social networking for long hours in a day can lead to a sedentary lifestyle.
• Social networking sites can spread false or unreliable information quickly.
• Do not post and share private information like mobile phone number, home address, etc. on social
networking websites.
• You should be familiar with the privacy policy of the social networking sites. You can adjust your
privacy settings on social networking websites, so as to control who can access your information.
• Use a strong password. Longer password is more secure than a shorter one.
• Use a different password for each social media account.
• Be selective with friend requests. Don’t accept the friend request if you don’t know the person
personally.
• Be careful while clicking at any link or any pop-up window.
• Protect your computer with anti-virus software and keep it updated.
• Always Log Off when you are done.
5.9 BLOG
Blog
A blog is a website which is maintained by an individual. The person who creates and maintains the
blog is called the blogger.
5.10 TWITTER
Twitter is a social networking service that allows you to send short messages
to communicate with your friends or followers. You can send short messages
of upto 140 characters, which are called tweets. Twitter is sued by people to
inform others about the latest happenings in their lives.
5.11 FACEBOOK
Facebook, founded by Mark Zuckerberg, is the most popular social networking site.
To use Facebook, you need to first create an account. Then add other users as friends.
You can then exchange messages, pictures, etc. with your friends on the Facebook.
Companies also setup their own Facebook pages to connect and communicate with
customers and clients.
65
5.12 YOUTUBE
Companies are also using You tube to launch and advertise their
product.
5.13 WhatsApp
WhatsApp is a free messenger app for smartphones. WhatsApp uses internet to send
text messages, pictures, audio or video. You can make audio and video call to any
person having WhatsApp in their smartphone, in any part of the world. You don’t have
to pay anything extra for sending message or making calls. You just pay for the internet
connection.
Digital India
Digital India is a campaign launched by the Government of India in 2015, to ensure that the
Government's services are made available to citizens electronically by improved online infrastructure.
It also aims at increasing Internet connectivity and making the country digitally empowered in the field
of technology.
Cyber crime refers to any crime done using computer or any electronic device with internet
connection.
• Cyber Bullying
• Cyber Stalking – It refers to harassing an individual or
an organization using internet. This may include making
false accusation or defaming, threatening, damaging data,
etc.
• Hacking – If someone tries to get into computer
systems in order to steal, corrupt or illegitimately view data, then it is called hacking. The person
who does hacking is called a hacker.
• Phishing – Phishing means an attempt to acquire a sensitive information such as username,
password, etc.
• Spamming – Spam refers to unsolicited email which is sent in large quantities to a large number
of users.
66
5.15.2 Cyber Bullying
Cyber bullying is when a student uses any electronic device like, computer, smart phone, tablet, etc.to
post text and images with the intention to hurt, embarrass, threaten or humiliate the victim. Cyber
bullying usually involves posting or sending gossip, posting or sending offensive, rude post to damage
a person’s reputation, relationship with others.
Children usually bully others to seek attention, for revenge, for pleasure, to satisfy their ego, jealousy,
peer pressure, etc.
Cyber bullying can lower the confidence of the child. It can also result in poor academic performance.
Child may get stressed, loose appetite, become a loner, may be unwilling to got to school, afraid of
using technology and even have suicidal thoughts.
Internet has become an essential part of our life. We use internet for various purposes like, for
communication, for upgrading our knowledge, for shopping, in schools, for payment of bills, at home
and in office.
Above all, we use internet as a companion when we are alone and we cannot live without it.
Addiction is generally thought to be a mental disorder involving compulsive behavior and when a
mental condition characterized by excessive use of the internet it is called Cyber/Internet addiction.
When someone is constantly online, they may be described as addicted to it.
67
After Effects of Cyber Addiction
• Headaches
• Back aches
• Irregular eating habits
• Sleep disturbances
• Neglect of family and friends
• Dry eyes and eye problem
• Feeling of depression, irritation
Cyber addiction may lead to cyber crime.
Lets Try!
Worksheet
68
69
70
Class IX Entrepreneurial Skills
8. Introduction
Businesses vary across industries and sectors. Based on economic activity, businesses are categorized
in manufacturing, service and trading. Based on size, businesses are categorized into micro, small
scale, medium scale and large scale. Based on business model, they might be categorized differently.
Based on legal form, they have to follow different procedures and norms and thus are categorized
differently.
Irrespective of nature, size, scale or ownership, businesses have some common features:
2.1 Trade-related: Most businesses involve the purchase and sale of goods or services and hence
are trade-based.
2.2 Economic or social motive: Usually, most businesses performs economic activities such as
production, distribution, exchange, expansion etc. with the objective of earning a profit. However
some businesses have the sole motive of social welfare. Yet, there are other businesses which have
both the motives – social and economic.
71
2.3 Presence of an entrepreneur: More than an entrepreneur, there is a forerunner in every
business. This person is responsible for taking the initiative of establishing, running and growing the
business, making key decisions and undertaking the risks involved with it.
2.4 Regular Transactions: A business must be doing and dealing in transactions on a regular basis.
An activity that involves only a one-time transaction where the transaction deals in exchange or
transfer of goods and services cannot be necessarily considered as a business even if a profit is earned.
2.5 Uncertainty: Every business is featured with uncertainty of sales, return and success. There is no
guarantee that the amount invested will come with return or the business will earn a specific amount
of profit. Similarly, there is uncertainty about whether customers will choose the product or service
offered.
3. Types of Businesses
3.2 Service Business: As mentioned in the tertiary sector, a service business is involved into provision
of intangible offering, i.e. a service that does not have a physical form but provides value to the
customer. Services businesses offer value using skills, consultancy, expertise, efficiency etc. Some
service businesses include banks, law firms, chartered accountants, financial consultants, beauty
salons, schools, e-commerce platforms, event planners etc.
72
For example, convenience stores, resellers, distributors, grocery stores, supermarkets, retail clothing
stores are examples of merchandising businesses.
3.4 Trading Business: A trading business is also involved in reselling of goods. However, the
difference between a trading business and a merchandising business is that in trading business, a
trader does not necessarily have to keep stock of inventory. Trading businesses work with different
kinds of products and services that is sold to consumers, businesses or government organizations.
Some activities trading businesses are involved in are buying of products or brokering of services,
negotiating for prices and coordinating delivery. A trading business earns money from the profit
margin purchase cost and selling price. Import and export of goods and services largely make up the
trading sector. Some examples of trading businesses are real estate brokers, middlemen, importers,
exporters, foreign exchange traders etc.
3.5 Hybrid Business: Hybrid businesses are some businesses that are involved in different activities
ranging from manufacturing, service, merchandising etc. These could be business groups involved in
different types of businesses that cannot be classified as a definite service business or a manufacturing
business. It may not use the traditional methods of production and distribution. Sometimes,
businesses that focus on socially beneficial goals are also termed as hybrid businesses. For example,
though a traditional restaurant business is classified as a service business, some are also considered
to be hybrid businesses. If they are involved in combining ingredients to make different products, they
are performing a manufacturing activity. If they are involved reselling of alcoholic items, it can be
considered to be involved in merchandising. Similarly, it also provides the service of fulfilling customer
orders. Hence, it can be categorized as a hybrid business.
73
Customer demand Demand is forecasted and Services provided as Procured goods are
goods are produced per needs and sold
accordingly demands of the
clients
5.1.2 Small Enterprise: A small enterprise is a business enterprise where the investment in plant and
machinery or equipment is not more than INR 10 crore and turnover does not exceed INR 50 crores.
5.1.3 medium enterprise: A medium enterprise is a business enterprise where the investment in plant
and machinery or equipment is not more than INR 50 crore and turnover does not exceed INR 250
crores.
5.2.2 One Person Company: A One Person company also has only one person as a member, who acts
in the capacity of both, a shareholder and a director, but an OPC is legally separate from its owners.
There is no threat on the owner’s personal property in case of unmet liabilities.
5.2.3 Partnership: Partnership is a legal form, where at least two people, or more start a business as
co-founders or co-owners and divide the share as per agreement. The partners are personally liable
for an unlimited amount of liabilities.
5.2.4 Limited Liability Partnership: In a Limited Liability Partnership, there are two or more partners.
In this, no one single partner or owner is individually responsible for any other partner’s or member’s
negligence or misconduct or liability.
5.2.5 Company: A company is defined as a legal entity formed to get engaged in business, by a group
of individuals. Usually, these individuals have limited liability, and the capital in units of equal value of
a company are called ‘shares’. Company can be public or private.
5.3.2 Secondary sector: The main activity of businesses in this sector is transformation of raw
materials into finished goods. It takes products from primary sector and organizes all factors of
production to make utility as well as luxury products.
74
5.3.3 Tertiary sector: This sector is defined by provision of services to businesses and customers. It is
completely based on a service and there is no production of goods involved.
Activity I
Read the case study below and answer the questions given below:
Sanjeev Bikhchandani, the founder of Naukri.com, believes that entrepreneurship is all about taking
action to convert creative ideas into a business plan and then into a successful business. Though,
action is not the only thing that one needs to be an entrepreneur. The need to deal with failure, stay
persistent and handle uncertainty is the difficult part in entrepreneurship. Sanjeev learnt the difficult
part during his entrepreneurial journey.
During his adolescent years, Sanjeev often noticed that everyone around him wanted job security
through government jobs. However, the salary in a government job was meagre. Sanjeev realized at
the age of 12 and decided that he would make a different choice for his career. Business was one
career option that he thought would give him money and freedom. With this, he was determined to
not look for jobs. However, his parents pressured him to pursue higher education and give the IIT-JEE
entrance exam. Though he was able to clear the exam, Sanjeev decided to not take admission in IIT
and pursued a Bachelor of Arts degree in economics.
After this, he pursued an MBA from IIM Ahmedabad and started working at Hindustan Milkfood
Manufacturers (HMM). While working at HMM, he often observed his colleagues skim through
magazines and newspapers that contained job listings. Although they were already employed, they
were still curious to know the options available out there. This behavior was observed for working
professionals at all levels. Many of his colleagues also received calls from head-hunters at least twice
or thrice a week for jobs that were not even advertised anywhere. After keenly observing this pattern
and talking to some people in the office, Sanjeev thought that he must figure out a way to market
these jobs. For this, he realized that he would have to create a database of jobs. The only problem
was people had not even heard of the internet in India, thus there was no facility as such where a
database could be created and eventually accessed by customers and head-hunters.
With this, Sanjeev decided to drop the idea and started to think of other ideas. Soon, he quit his job
and started two companies in partnership with his friend, ‘Info Edge’ and ‘Indmark’. Leveraging the
technology of creating databases, Info Edge provided the information about entry level salaries for
graduates from different fields, where these salary reports were ultimately sold to companies.
Indmark was a database that provided assistance for trademark registration, where the client paid for
these consultancy services. Most of Indmark’s clients were pharmaceutical companies, who paid to
get detailed reports about pending applications, likelihood of trademark getting accepted etc. While
these companies made little money, Sanjeev struggled to sustain them. Ultimately, the two partners
decided to split up and Info Edge was taken by Sanjeev.
While Sanjeev was selling salary reports and conducting market studies, he came across the
technology of the World Wide Web at an exhibition in Delhi. At this time, it was a very new concept.
After deeply understanding the technology, he contacted his brother in the US to help him hire a
server that could be used to build a portal for finding and marketing jobs. With this, he launched
Naukri.com, the first India-based job portal.
Soon, Sanjeev started to get media coverage. Both his businesses, Info Edge and Naukri.com started
to grow. While Info Edge could earn profit, it was not enough for even distribute salaries for all
75
employees. On the other hand, Naukri.com was gaining more and more popularity as it was a pioneer
in this space. Sanjeev decided to shut Info Edge and focus on building and running Naukri.com. As a
result, by the third year of its operations, Naukri.com earned a turnover of INR 3.6 million. This is when
the expected journey of Naukri.com was set.
Sanjeev grew the business by securing external finance and innovating in terms of building an efficient
sales force. Soon the competition grew but Sanjeev was able to keep the business afloat by offering
value-added products to customers. Seeing the success of Naukri.com, Sanjeev expanded its
operations to other countries. He also acquired Jeevansathi.com, a matrimonial website and launched
99acres.com, a marketplace for real estate sites. In 2006, Sanjeev decided to do an Initial Public
Offering for the company Info Edge that was the umbrella company for all of Sanjeev’s businesses.
This was an extremely successful move, which eventually led to Sanjeev’s worth coming to INR 720
crore by 2007. Using his initial idea of commercializing databases and staying driven towards his goal
of entrepreneurship, Sanjeev Bikhchandani is known to be one of the most successful Indian
entrepreneurs.
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
76
A1
I. Business Around ME
• Enlist businesses you can think of, that provide products/services and take money in exchange
for it.
• Prepare posters of businesses found in towns/villages/cities, using pictures. For example, malls
in cities, kirana stores in villages, shopping complexes in towns etc.
• Identify and discuss key activities carried out by small businesses in a local community.
Entrepreneurship development is the process of strengthening the skills and knowledge of budding
and existing entrepreneurs by handholding them during their entrepreneurial journey.
However, before delving into entrepreneurship development, let us understand the concept of
entrepreneurship.
An entrepreneur is the one who always searches for change, responds to it and exploits it as an
opportunity.
The main aim of entrepreneurship development is to enlarge the base of entrepreneurs, encourage
overall entrepreneurial activity and catalyze the pace at which new ventures are created. Some of the
core objectives of entrepreneurship development include:
77
• Assisting entrepreneurs in undergoing the process of entrepreneurship.
• Handholding budding entrepreneurs to recognize and design unique business opportunities.
• Helping aspiring entrepreneurs start and grow dynamic businesses that provide high value
add.
• Developing the motivational needs of entrepreneurs.
• Training entrepreneurs to develop the required skills and gain knowledge for running and
managing a new business.
• Providing support to entrepreneurs for effective business planning
• Accelerating and incubating new ideas.
• Aiding in the availability of technology or raw material.
• Creating adequate infrastructure for entrepreneurial activities.
• Providing financial assistance from banks and other financial institutions.
• Enabling a suitable entrepreneurship ecosystem and business environment.
• Implementing norms, policies and rules for establishment of new ventures and enterprises.
• Providing tax benefits, incentives, subsidies etc. for creation of new enterprises.
• Encouraging research and development across industries.
Entrepreneurship development is also a process in itself and can be divided into following three
phases:
8.1 Stimulatory phase: Stimulatory phase involves stimulating or generating need, interest,
motivation and awareness among individuals to become entrepreneurs. It is done by orienting them
towards the meaning, process, benefits and practice of entrepreneurship.
8.2 Support phase: Support phase is about providing support for various activities of new ventures
by mentoring, incubating, financing and advising the entrepreneurs. Some of these activities include
business model design, prototype and product development, legal registration, management
consultancy, financial assistance, provision of land, shed and power, selection of plant and machinery,
marketing support, approvals and licenses etc.
8.3 Sustenance phase: Sustenance phase focuses on helping enterprises to plan for growth.
Guidance is provided around growth strategies, expansion, diversification, modernization etc. Support
is also given in terms of research and development, additional finance, exploration of global markets
etc.
78
• Lack of awareness about entrepreneurship schemes
• Strict regulatory framework
• Low margin market linkages
Activity II
The Indian government has also taken various initiatives for entrepreneurship development.
Some organizations were set up to implement policies for entrepreneurship development.
Research, read and discuss about the above initiatives taken by the Indian Government for
entrepreneurship development.
Activity III
You read about some initiatives taken by the Indian Government for entrepreneurship development.
Entrepreneurship has proven to be beneficial for various sections of the society. Can it bring a
difference in school children? Will learning entrepreneurship help college students? Can any working
professional at the age of 30, 40 or 50 become an entrepreneur? Does entrepreneurship development
have the potential to uplift farmers? Can entrepreneurship transform careers for women?
Think about different sections and cohorts of the society who can be benefited by participating in
entrepreneurship development programs and list them below. After making the list, write some ways
in which entrepreneurship development can take place for these sections. Keep in mind the objectives
of entrepreneurship development given above.
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
79
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
9.1.1 Innovation: In simple words, innovation can be understood as creative use of one’s ideas to
propose a solution that introduces something unique or new to the world. There are many types of
innovation such as product, process, disruptive etc. Entrepreneurship is characterized by innovation
as it is about using innovation to bring unique solutions to fruition. It involves continuously searching
for new ideas, evaluate existing solutions, systems and processes, finding ways to increase efficiency
and effectiveness of products and services etc.
9.1.2 Dynamic Economic Activity: Entrepreneurship involves creation of value or wealth through a
business enterprise, that buys and sells commodities/product/services and uses resources optimally.
Hence, entrepreneurship is an economic activity. The process of value creation occurs in an uncertain
and dynamic business and economic environment. A lot of ambiguity is involved in running a business
due to many unknowns or things not going as planned. Due to this, entrepreneurship is considered a
dynamic economic activity.
9.1.3 Risk bearing: Since entrepreneurship is about starting something new, it involves uncertainties
and risks. Entrepreneurs have to take risks in implementation of certain decisions and ideas. There are
some risks that can be projected by businesses such as supply shortage, increase in cost of raw
materials, volatility in market prices, changes in government regulations etc. while there are some
risks which cannot be projected such as disasters, pandemics, economic slowdowns etc. The risk of
profit versus loss is always prevalent in a business.
9.1.4 Potential For Profit: “Profit potential is the likely level of return or compensation to the
entrepreneur for taking on the risk of developing an idea into an actual business venture.” For a
commercial entrepreneur, profit is usually the main goal. Even for social entrepreneurs, profit might
not be the main motive, but a way to sustain the organization has to be found. Without recurring
revenue transactions and low profitability, entrepreneurship can turn into a theoretical and leisurely
activity.
80
Motivation Motivator Motive
Risk-bearing Risk- bearer Risk Management
Visualisation Visionary Vision
Creativity Creator Creation
Innovation Innovator Innovative
9.3.4 Value Creation: Value creation occurs when the worth of products and services increases for
a customer base and a business earns profit by selling the product or service to fulfil customer needs
and wants. Value is created when outputs are more valuable than inputs. Value creation is the
foundation of every entrepreneurial activity or business.
9.3.5 Wealth Distribution: Wealth and income are distribution across people and geographies due
to entrepreneurship and transaction-based activities. Employees are paid salaries, vendors are paid
for their supplies, goods are sold in multiple markets, services are provided at large scale etc. This
stimulates distribution of wealth to larger sections of society.
9.3.6 Industrialization and Development: Establishment of even a single enterprise can lead to
beginning of a new industry. In a specific region, if a business is set up and seen to be a profitable
opportunity, it is likely that others will get motivated to set up similar businesses. Additionally a
business might require certain inputs, which leads to setting up of businesses that can supply those
inputs. Hence, entrepreneurship catalyses industrialization in almost a chain reaction form, which
in turn contributes positively to economic and infrastructural development.
9.4.1 Economic development: Some features of economic development include optimal use of
resources, creation of new ideas, wealth generation, continuous flow of money, skill building etc. All
these factors are enabled due to entrepreneurship and are essential for economic development of a
nation.
9.4.2 Enterprise and Business Creation: Business creation is a direct result of entrepreneurship.
Many types of enterprises can be created by coordinating and combining different types of resources
81
such as physical, financial, human, intellectual and entrepreneurial skills such as risk taking,
innovation, leadership, resource planning etc.
9.4.4 Improved Standard of Living: With entrepreneurship, customers have many options of
choosing from different products and services to solve the same purpose. This variety and availability
of improved goods and services offered by enterprises leads to higher standards of living.
A2
• Discuss in groups and prepare a chart to explain advantages of entrepreneurship, based on its
characteristics, role and rewards.
• Interact with 5 entrepreneurs in your community OR Read about any 5 successful Indian
entrepreneurs and their success stories.
82
83