WEB APPLICATION AND SECURITY (CBSE CLASS X IT(402)) NOTES
WEB APPLICATIONS AND SECURITY
Computer Accessibility refers
to the user friendliness of a computer system for all, regardless of their
disability. it enables a person with a disability or impairment to use a
computer. It is known as Assistive Technology. There are numerous types of
impairment that impact computer usage. These include:
1. Cognitive impairments and
learning disabilities
2. Attention Deficit
Hyperactivity Disorder (ADHD) or autism.
3. Visual impairment.
4. Hearing impairment
5. Motor impairment
Launching Accessibility
Options :
To launch accessibility options in Windows 7, Click
Start > Control Panel > Accessibility Options.
Various tabs in
Accessibility Option Window :
Keyboard Tab to configure
accessibility options for Keyboard is displayed
1) Sticky Keys : Sticky Keys is an accessibility feature to
help computer users with physical disabilities, but it is
also used by others as a means to reduce repetitive strain.
2) Filter Keys : Filter Keys is a feature of Microsoft
Windows. It is an accessibility function that tells the keyboard to ignore
brief or repeated keystrokes, making typing easier for people with hand
tremors.
3) ToggleKeys : ToggleKeys is an accessibility function which
is designed for people who have vision impairment or cognitive disabilities.
When ToggleKeys is turned on, computer emits sound cues when the locking keys
(Caps Lock, Num Lock, or Scroll Lock) are pressed.
Sound Tab to configure accessibility
options for sound is displayed.
1) SoundSentry : SoundSentry is designed to help users with
auditory impairments. SoundSentry generates visual warnings, such as a blinking
title bar or a flashing border, whenever the computer generates a sound.
2) ShowSounds : ShowSounds instructs applications that convey
information by sound, to also provide information visually, through text
captions or informative icons.
Display Tab to configure
accessibility options for Display is displayed.
1) High Contrast : High Contrast is an
accessibility feature to assist people with vision impairment. You can change
the size and color of fonts and the background for ease of viewing.
2) Cursor Options : Cursor Options is also an
accessibility feature that assists people with vision impairment
by changing the blink rate and width of the cursor.
Mouse Tab to configure accessibility options for Mouse
is displayed.
1) MouseKeys : MouseKeys is an accessibility feature that
assists people who have difficulty using a mouse. This option uses the keyboard
(especially numeric keypad) as a pointing device instead of a mouse.
General Tab : enables you to configure
accessibility options for all users.
1) Serial Keys : Serial Keys is an accessibility feature that
assists people that have difficulty using a keyboard or a mouse (or both). They
can use special devices such as Sip, Puff and Breath Switches to provide input
to the computer through Serial Ports.
SESSION 2 : NETWORKING FUNDAMENTALS
A computer network is
a collection of computers and other hardware components interconnected by
communication channels (cables or satellites) that allow sharing of resources
and information.
Networks are designed using the following
architecture:
1) Peer-to-Peer (P2P) Architecture : Networks in which all
computers have an equal status are called peer to peer networks. Generally in
such a network each terminal has an equally competent CPU.
2) Client-Server Architecture : Networks in which
certain computers have special dedicated tasks, providing services to other
computers (in the network) are called client server networks. The computer(s)
which provide services are called servers and the ones that use these services
are called clients.
TYPES OF NETWORKS :
1) Local Area Network : A local area network
(LAN) is one which connects computers and devices in a limited
geographical area such as home, school, computer laboratory, office building.
2) Metropolitan Area Network : A Metropolitan
Area Network (MAN) is one which connects computers and devices in a single city
or a town.
3) Wide Area Network : A wide area network
(WAN) is one which covers a broad area (i.e., any network that links across
metropolitan, regional, or national boundaries).
Advantages of Networking :
1) Data Sharing : Networking allow the sharing
of data .
2) Files Transfer : One User can send text
files, spread sheets etc. to other users.
3) Hardware Sharing: Hardware components such
as printers, scanners, etc. can also be shared.
4) Internet Access Sharing: You can purchase a
single Internet connection and share it among other computers in a network
Internet :
The Internet is a global system of interconnected
computer networks that use the standard Internet protocol suite to serve
billions of users worldwide. It is a network of networks.
Uses of Internet : There are various uses of
Internet. Some of them are listed below
1. Internet is used by
students, educational institutes to gather information for research.
2. It is used for online
shopping.
3. It is used for sending and
receiving mail.
4. It is used for playing
games.
5. It is used for Online
Transaction.
World Wide Web : World Wide Web (abbreviated as WWW or W3,
commonly known as the Web), is a
system of interlinked hypertext documents accessed via the Internet.
Web Browser : A Web Browser is a software used to view Web
sites and acts as an interface between the user and the World Wide Web.
Web Server : Web server is a computer that stores web
sites and their related files for viewing on the Internet.
Internet Service Provider : An Internet service
provider (ISP) is an organization which provides you with access to the Internet
via a dial-up (using modem) or direct (hard wired) or wireless connection. for
example Bharat Sanchar Nigam Limited (BSNL), Airtel, MTS, Vodafone, Tata
Docomo, etc.
Modem : It stands for MOdulator/DEModulator. It is a
device that converts digital computer signals into a form analog signals and
vice versa.
Types Of Common Internet Connectivity : There are different
types of Internet Connectivity available today; it can be widely categorized
into wired and wireless access.
Technology |
|
Type of Connectivity |
Dial-up |
|
Wired |
DSL |
|
Wired |
Cable Internet Access |
|
Wired |
3G |
|
Wireless |
WiMAX |
|
Wireless |
Wi-Fi |
|
Wireless |
Some of the commonly used Internet connectivity
are:
1) Dial-up connections are extremely slow and in most
cases, it is replaced by a high speed connection such as DSL or Cable Modem.
2) DSL: Digital subscriber line(DSL) provide Internet
access by transmitting digital data over wires of a local telephone network.
3) Cable Internet Access: Cable Internet Access
is a form of broadband Internet access that uses the cable television
infrastructure.
4) 3G: 3G, short for 3rd Generation is a set of
standards used for mobile devices.
5) WiMAX: WiMAX (Worldwide Interoperability for
Microwave Access) is a wireless communications standard designed to provide
mobile broadband connectivity across cities.
6) WI-Fi : Wi-Fi (Wireless Fidelity) is a popular
technology that allows an electronic device such as computers or mobile phones
to exchange data wirelessly over a network.
SESSION 3: INTRODUCTION TO
INSTANT MESSAGING
Instant messaging (IM) is a form of
communication over the Internet that offers an instantaneous transmission of
text-based messages from sender to receiver.
Types of Instant Messaging Software : There
are two kinds of instant messaging software – application based and Web based.
A) Application based : Application based
instant messaging software is downloaded and installed on user’s computer. Some
of the popular instant messaging software are:
1. Google Talk
2. Yahoo! Messenger
3. Skype
4. Windows Live Messenger
5. Rediff Bol, etc.
B) Web based : Web based instant messaging
software is accessed using browsers such as Internet Explorer, Mozilla Firefox,
Google Chrome, etc. Some of the popular web based instant messaging software
are:
1. Meebo
2. Yahoo! Messenger for the
Web
3. MSN Web Messenger
4. IMO, etc.
Key Features of an instant messaging are as
follows:
1. Text Messages can be sent
to one or more person (Similar to SMS)
2. Audio calling and
conferencing.
3. Video calling and
conferencing.
4. File transfers (Not limited
to documents, spread sheets, audio files, video files, etc.)
5. Message history (Save
messages for future reference).
NOTE : To use instant messaging software, a
user must have a valid instant messaging account.
SESSION 4: CHATTING WITH A
CONTACT – GOOGLE TALK
Google Talk : Google Talk is an instant
messaging service that provides both text and voice communication developed by
Google Inc. Google Talk can also be used for making video calls. Google Talk is
free and is available as application based as well as web based. A Gmail
account is required to use Google Talk.
Steps to Chat with a
contact that is already added to your contact list.
a) Whenever your friend in the contact list is
online you can see the person along with a green dot.
b) You can start sending text chat message
instantly by double-clicking on a contact the other person will see the text
message and respond to your message.
General rules and
etiquettes to be followed while chatting :
1) Messages should be short and to the point.
2) Always introduce yourself by name if your screen
name doesn’t reflect it.
3) Always ask if the other person has time to chat
first.
4) Don’t Type your messages in uppercase as it
seems to be extremely rude.
5) Give people time to respond.
SESSION 5: CREATING AND
PUBLISHING WEB PAGES – BLOG
Blog : A blog is a discussion style site used
by non-technical (or technical users) users for creating personal web pages.
Blogs are similar to an online personal diary and simple to use.
Some of the popular websites that offer blog
service for free are:
•
www.WordPress.com
• www.blogger.com
• www.blog.com
• www.weebly.com
• www.blogsome.com
WordPress : WordPress is free web service that
you can use to create a beautiful website or blog. WordPress has support for
“themes” which can make the blog or the webpage look attractive.
How to create account in WordPress?
1) Open the Web
Browser and type https://signup.WordPress.com/signup/.
2) Enter a unique address to your WordPress Blog.
This is the address which others will use to view your blog.
3) Enter username and password to manage your blog.
4) Enter your Email Address and click on create
blog.
5) An email will be sent (above mentioned email)
for activating your blog account. Open your email and click on the activation
link.
6) Now the blog is ready for use.
How to create post in WordPress?
1) Login to your WordPress Account.
2) To create a post, click New Post.
3) Type the title for your post.
4) Type the content which you want others to read.
You can also add photos, videos, etc. to the blog using the options available
in WordPress
5) Once you have finished typing the content, Click
Publish Post to publish your content. This process is called posting content.
SESSION 6: USING OFFLINE BLOG
EDITORS
Offline Blog Editors :
Those Editors in which we can create blog when we
do not have an active internet connection and publish the blog whenever
internet connectivity is available are called Offline Blog Editors.
There are several free offline blog editors
available such as :
1. Qumana
2. Windows Live Writer
3. Blogdesk
4. BlogJet
5. MarsEdit
SESSION 7: ONLINE
TRANSACTIONS
Online transactions : Online transactions
deals with transfer of money over the internet. There are many benefits of
online transactions like, fast transaction speed, convenience, low risk of
theft etc.
Some of the popular online transaction websites
are:
1) IRCTC(Indian Railway Catering and Tourism
Corporation), an online portal for booking flight and train tickets.
2) Flipkart, an online shopping portal for buying
consumer products. Flipkart offers multiple payment methods like credit
card, debit card, net banking, e-gift voucher, and Cash on Delivery.
3) EBay, an online portal for buying and selling
goods.
4) Redbus, an online portal for booking bus
tickets.
Online shopping : Online shopping is a form of
electronic commerce where customers can buy or sell goods
over the Internet.
Online shopping could be useful in situations when:
1) A customer does not have sufficient time to
visit stores.
2) Visiting a store is more expensive than
purchasing a product online.
3) A product or service that is not available in
the local market is available online.
SESSION 8: INTERNET
SECURITY
Internet security : Internet security is a
branch of computer security specifically related to the Internet. Its objective
is to establish rules and measures to use against attacks over the Internet.
Best Practices for Security
:
1) Use strong password and keep on changing after
every 2 -3 weeks.
2) Use encryption software to protect your data
from unauthorized users.
3) Never save your username or password on shared
computers.
4) Do not share personal information.
5) Use updated antivirus and antispyware software.
6) Clear browser cookies frequently.
7) Keep the operating system and software
applications up to date.
8) Install Firewall : Firewalls analyse the network
traffic and determine if the traffic should be allowed or not.
9) Never install software from unknown sources.
10) Remove unwanted or unknown software
applications: These might have got installed without your knowledge when you
have visited some websites.
11) Clear Data Stored In Browsers : It is not
advisable to leave the web browser store data(username, password, credit card
detail) particularly on public or shared computers.
General guidelines for
managing strong passwords are :
1. Keep the length of the
password at least 12-14 characters if permitted.
2. Avoid keeping passwords
based on repetition, dictionary words, letter or number sequences, usernames,
relative or pet names, etc.
3. Including numbers, and
symbols in passwords if allowed.
4. Use capital and lower-case
letters.
5. Avoid using the same
password for multiple sites or purposes.
6. Avoid using something that
the public or workmates know you strongly like or dislike.
NOTE :
1. www.strongpasswordgenerator.com
help to generate strong password.
2. Example of Online threats
are Phishing, email spoofing, chat spoofing, etc.
3. Combination of alphanumeric
and special characters could be used for creating a password that is not so
easy to crack.
4. Programs such as keyloggers
track and transmit every key that is pressed on a keyboard (keystrokes) to
unauthorized users
SESSION 9 : MAINTAIN
WORKPLACE SAFETY
Every organization must follow a standard set of
safety rules and procedures. These rules must be stated and displayed clearly
at important areas . All the employees must be given a demonstrations and
training to follow safety rules.
BASIC SAFETY RULES ARE
GIVEN BELOW
A) Basic Fire
safety rules in an organization are :
1) Fire escape plans must be installed at proper
levels
2) Conduct regular drills
3) Smoke alarms must be placed at proper intervals
4) Keep workplace a no-smoking zone
5) Maintenance of safety equipment must be taken
care of regularly
B) Falls and Slips Safety
rules
1) Keep the moving area clean and clutter free.
2) Workplace must be proper ventilated receive
light.
3) Wear non slippery footwear.
4) Floors must be clean and dry
5) Oil spills, dust must be immediately cleaned.
C) Electrical Safety Rules:
1) Electrical equipment used should be approved by
a recognised organization.
2) Workers should be trained to handle the electric
equipment safely.
3) Damaged and hazardous electrical equipment
should be immediately replaced.
4) Heat emanating equipment should be kept away
from the electrical equipment.
What is First Aid?
First Aid is the immediate assistance provided to
the injured to save life and minimize health loss till the proper medical aid/
facility is provided.
Some rules of First Aid are
:
1. Assure the injured to
remain calm and not to panic.
2. Keep them warm if they are
under shock
3. Do not move the victim in
case of back/neck injury
Occupational hazard : An occupational hazard
is the illness one may acquire due to his occupation. Some types of
occupational hazards are : Physical hazards, chemical hazards, biological
hazards, , behavioural hazards, radiological hazards, ergonomic hazards etc.
SESSION 10 : PREVENT
ACCIDENTS AND EMERGENCIES
Accident : an accident is an unplanned event that may happen
all of a sudden and may lead to unwanted or unprecedented results/outcomes.
Types of Accidents: Accidents may be of
following types :
1. Accidents at workplace :
Slips and fall accidents, fire
2. Industrial disease/illness
3. Road traffic accidents
4. Clinical Accidents
5. Sports related accidents
Handling Accidents:
Accidents must be handled carefully. The accident
should be handled compassionately without assigning blame on others.
1. Every organization must
follow SOP for accident handling
2. Safety measures must be
placed to prevent workplace accidents
3. Immediately call the
medical team for any injury
4. Stay alert
5. Pay attention to and follow
emergency drills
Emergency : Any unexpected situation that needs
immediate attention and action is called emergency.
An emergency situation is one that:
1. threatens the employees,
customers or the public
2. disrupts or shuts down the
operations
3. causes physical or
environmental damage
Types of Emergency :
Various types of emergencies are there and there
should be an emergency management plan to handle the situation of emergency.
Some of the types of emergencies are as follows :
1. Chemical spills
2. Extreme heat waves
3. Droughts
4. Pandemics
5. Terrorist attack
6. Fire
7. Floods
8. Thunderstorms
9. Leakage of some hazardous
gas/ chemical
Some of the types of emergencies that require
evacuation are:
1. Fire
2. Explosion
3. Floods
4. Earthquake
5. Hurricane
6. Tornado
7. Toxic material release
8. Civil disturbance
9. Workplace violence
SESSION 11: PROTECT HEALTH
AND SAFETY AT WORK
Hazards And Sources Of
Hazards :
A hazard is anything that is the source of any
potential harm, damage or any kind of potential loss of health or life.
The different types of hazards include:
1. Physical
2. Chemical
3. Biological
4. Mechanical
Evacuation : Evacuation is the process of emptying a
place in case of an emergency, disaster. Every company must ensure
following points for evacuation in case of any emergency:
1. An evacuation policy.
2. Organization must have a
designated assembly point for emergencies.
3. Floor plans with evacuation
routes pasted in work areas
4. Periodic evacuation drills
should be conducted
Healthy Living :
A healthy living has a lasting impact on an
individual which ultimately yields a healthy environment at home as well as at
work place.
A healthy lifestyle helps to keep and improve people’s
health and well being.
A healthy lifestyle includes :
1. healthy eating habits
2. physical activities
3. stress management
4. healthy mind
5. sound sleep
6. goal setting
Comments
Post a Comment