You are on page 1of 44

WEB APPLICATIONS AND

SECURITY
I.T. 402 CLASS 10TH (2021-2022)
Presented by VIVEK
WORKING WITH ACCESSIBILITY OPTIONS

The options which are developed to help people having disabilities in using the technology more easily is called
“ACCESSIBILITY OPTIONS”. for example the text to speech feature is useful to people who have limited vision.
Some of the basic accessibility options are given below.
• Make the computer easier to see.
• Make the mouse easier to use.
• Make the keyboard easier to use.
• Use text or visual alternative to sound.
You can turn on these feature by going to START menu > CONTROL PANNEL > EASE OF ACCESS > EASE OF ACCESS
CENTRE.
WORKING WITH ACCESSIBILITY OPTIONS

Make the computer easier to see- mostly people having difficulty In seeing the computer screen uses this feature. It
includes the following options-

• High contract theme- visually challenged people can see the screen relatively clearly with the help of this feature.

• Turn on narrator- visually challenged people uses this feature. Here the Microsoft narrator read out the text in the screen.

• Turn on magnifier- the user is able to see the objects present on the screen in a relatively larger size with the help of this
feature. This is also called lens mode.

• Turn on audio description- this feature read out to the visually impaired person about what is happening in any of video.
WORKING WITH ACCESSIBILITY OPTIONS

• Make the Mouse Easier to Use- It makes the cursor thicker to help the visually impaired person
to see the cursor clearly. We can also change the colour and size of the cursor here.
WORKING WITH ACCESSIBILITY OPTIONS

Make the Keyboard Easier To Use- We can use our keyboard to control the mouse and make it easier to type certain
key combination.

• Sticky Keys- If this feature is turned on, you can press different keys (Ctrl, Alt, Delete) one by one instead of pressing
them at once.

• Mouse Keys- It uses the keyboard's Numeric Keypad as a pointing device.

• Toggle Keys- It makes a sound to alert the user every time a key like CAPS LOCK or NUM LOCK is press.

• Filter Keys- It helps those people having a trembling hand by ignoring the long pressed keys of a keyboard.
WORKING WITH ACCESSIBILITY OPTIONS

• Use text or visual alternative to sound- This feature is used by people having hearing disability.
With the help of this feature people can see visual feedback on the screen instead of sound.
WORKING WITH ACCESSIBILITY OPTIONS

Serial Keys- It is an accessibility feature that assists people that have difficulty using a keyboard or
a mouse (or both). They can use special devices such as Sip, Puff and Breath Switches to provide
input to the computer through Serial Ports.

Fig- Serial Port


NETWORKING FUNDAMENTALS

 A computer network is a group of computers & peripheral devices connected through data
communication channels that allow sharing of resources & information.
 On the basis of ARCHITECTURE, there are 2 types of network-
• Peer-to-Peer- All computers have an equal status in this networking. In this networking there is no
specifically designed computer that stores all the data. It is use to share audio, video and other stuffs in
digital format via USB. Each computer in this networking has equal processing power.
• Client-Server- In this networking, an active device called SERVER, is connected to various other computers
(Clients) which request access to services provided by the server. In this networking Server is equipped
with high processing power than the Clients.
NETWORKING FUNDAMENTALS

Fig- Peer to Peer Networking Fig- Client-Server Networking


NETWORKING FUNDAMENTALS

• Types of networking based on SPAN-


• PAN (PERSONAL AREA NETWORK)- It is organised around an individual. It has a range less than 10
m. For example, printers, fax machines etc uses PAN.
• LAN (LOCAL AREA NETWORK)- It connects the computers and other devices in a limited
geographical area such as home, school etc. They have very high speed of data transfer.
• MAN (METROPOLITAN AREA NETWORK)- It is a large network that spans a city but do not exceeds
the boundary of a town.
• WAN (WIDE AREA NETWORK)- This network covers a large geographical area (even 2 or more
countries). Mostly it is used in Banks, ATMs and other places.
NETWORKING FUNDAMENTALS

• Internet- A collection of interconnected computer networks is called internet. It is an important


and efficient means of communication as it helps to exchange information all over the world. It
uses the standard Internet Protocol suite (TCP/IP) to serve the billions of users worldwide.
• IP (Internet Protocol) Address- It is a unique set of numbers that identifies each devices in a network.
• TCP- The information or file to be sent to another computer is divided into small parts called packets.
TCP manages how messages should be broken down into packets before being transmitted over the
internet and reassembled at the destination.
NETWORKING FUNDAMENTALS

• WWW- It is the largest information system on the internet. It contains millions of web sites that
provide information in the form of text, images, animations and videos.
• Difference between INTERNET and WWW- WWW is a common point of connectivity for
information sharing whereas, INTERNET is a connection between computers and countless other
devices that form a huge network of systems.
NETWORKING FUNDAMENTALS

Advantages of NETWORKING-
• It helps in communication through emails, chats, video calls etc.
• With the help of networking, file sharing can be done very easily.
• Hardware parts like printers, scanner etc can also be shared.
• Most of the TV channels use networking to broadcast live programs with the help of networking.
• Large companies save money by buying sharing software by networking their computers.
NETWORKING FUNDAMENTALS

• Internet connection are provided by certain organisations or companies called ISPs (Internet
Service Providers) like BSNL, AIRTLE etc.
• To connect the computer to the internet, we need certain hardware and software.
i. Cable line or a dongle (to transfer the data)
ii. Modem (enables a computer to transmit the data)
iii. Web Browser (to access web pages)
NETWORKING FUNDAMENTALS

Types of INTERNET CONNECTIVITY


WIRED CONNECTION
• Dial-Up- It is established using modem. It is a class of electronic devices that convets digital signal to analogue signal and
also vice versa. The modem connects the computer through standard telephone lines which serves as a medium of data
transfer. Here the user dial a particular number provided by the ISP and gain access to the internet. It is extremely slow
connection.
• Modem- It stands for modulator-demodulator. It is a device which is placed between computer network system and telephone line.
The modulator part convert digital signal to analogue signal. While the demodulator part convert analogue signal to digital signal.

• BROADBAND CONNECTION- This type of network is much faster as the signals carries more data. The full form of
Broadband is ‘BROAD BANDWITH’. It can be of two types as follows-
• DSL- It transmits digital data over wires of local telephone lines. A special type of modem is needed to access this internet.
• CABLE INTERNET CONNECTION- It uses existing cable TV networks for providing internet.
NETWORKING FUNDAMENTALS

Types of INTERNET CONNECTIVITY


WIRELESS CONNECTION
• Wi-Fi (Wireless Fidelity)- It uses radio frequencies to transfer data. It can provide high speed internet
connection without using wires. It can be private (used in homes) or public (hotels, airport etc.)
• WiMAX (Worldwide Interoperability for Microwave Access)- It is a Broadband Wireless Access (BMA)
services up to 3-10 miles. It is similar as Wi-Fi but with higher speed and greater area coverage. It is
usually used where Dial-Up internet connection can’t be used for various reasons like infrastructure.
NETWORKING FUNDAMENTALS

Data Transfer over Internet.


• The data is broken down into small units called packets.
• A header is added to the packets. The header contains information about the packet, such as its origin and
destination IP addresses.
• Each packet is sent from computer to computer until it reaches its destination. Each computer on the way
decides where next to send the packet. All packets may not take the same route as the other.
• At the destination, the packets are examined. If any packet is missing or damaged then a message is sent
asking for the sender to send the message them again.
• The packets are now reassembled into their original form.
NETWORKING FUNDAMENTALS

Networking Layouts / Topology-


TOPOLOGY- It refers to the arrangement of nodes (computers), interconnected in a network. It is
mainly of 5 types.
• BUS TOPOLOGY- one long link all the computers in a network
• RING TOPOLOGY- each computer is connected with the two computers on either side of it
• STAR TOPOLOGY- each computer is connected to a centrally located device called hub.
• MESH TOPOLOGY- each computer is connected to every other computer to provide an alternate path for
transferring data
• TREE TOPOLOGY- hybrid network topology in which star networks are interconnected via bus networks; the root
acts as a server; if one node fails then the node following the node gets detach from the main tree topology
NETWORKING FUNDAMENTALS

BUS TOPOLOGY RING TOPOLOGY STAR TOPOLOGY

MESH TOPOLOGY TREE TOPOLOGY


INTRODUCTION TO INSTANT MESSAGING

IM (Instant Messaging) is a form of communication over internet that offers communication with people in
real time through instant messaging software.
Unlike emails, instant messaging happens in real time and the response from participants can be spontaneous.
The person need to sign in to valid account on the same software to access instant messaging via that software
with others.
Features of IM software:
• Can send text, audio or other types of message to more than a person at a same time.

• Audio and Video calling.

• Manage history for future reference.

• Transferring of files.
INTRODUCTION TO INSTANT MESSAGING

Types of IM software-
• APPLICATION BASED- They need to be downloaded and installed before using. Eg- WhatsApp

• WEB BASED- These are accessed from web browser. Eg- IMO
CHATTING WITH A CONTACT- GOOGLE
TALK
GOOGLE TALK (GOOGLE HANGOUT)
Google Talk is an instant messaging service that provides both text and voice communication developed by Google Inc. It was
shut down in 2015 & is now replaced by Google Hangouts. For using both of them, you must have a Google account.

CHATTING ON GOOGLE TALKS


Whenever your friend in the contact list is online you can see the person along with a green dot. You can start sending text chat
message instantly by double-clicking on a contact.

CHATTING ON YAHOO
In order to do chatting on Yahoo Messenger, you should have a yahoo mail account. As you sign in your account, your contacts
lists will be available for chat.
CHATTING WITH A CONTACT- GOOGLE
TALK
CHAT ETIQUETTES
• Use short & on point messages.

• Always introduce yourself with your name.

• Do not use ALLCAPS, as it is like shouting on the internet.

• Give people time to respond.

• Respect others while chatting.

• Properly end a conversation.


CREATING AND PUBLISHING WEB PAGES-
BLOG
A blog is a discussion style used by technical and non technical users for creating personal web
pages. Blogs are like online personal diary. A typical blog combines text, images, links to other
blogs, web pages etc.
• EDUBLOG is a type of education blog from where we can get instructional resources.
• BLOGGER is the person who writes blog.

• POSTS are the entries of blog.


CREATING AND PUBLISHING WEB PAGES-
BLOG
Usually Blogs are created online, but offline blogs can also be created and it can be posted when internet
connection is available.
Some major sites that offer blog services are-
 www.wordpress.com
 www.blogger.com
 www.blog.com
 www.weebly.com

Some major applications for OFFLINE BLOG EDITORS


 Qumana
 Windows Live Writer
 Blogdesk
ONLINE TRANSACTIONS

The transaction made over the internet is called ONLINE TRANSACTIONS.


ONLINE SHOPPING is a form of electronic commerce where people can buy or sell goods over
internet.
Online Shopping is useful in the following cases-
• When the person don’t have much time to visit stores.

• A product which is not available in online stores.

• Online shopping can save money sometimes especially during sales.


ONLINE TRANSACTIONS

Some important online transaction sites are as follows-


• IRCTC- booking railway and flight tickets.

• Flipkart- online shopping

• eBay- online buying and selling goods

• Redbus- booking bus tickets

Requirements for performing online transactions-


 Web browser or particular application
 Active internet connection
 Valid Credit or Debit Card or Net Banking Subscription.
 A valid account on the particular website or application.
INTERNET SECURITY

Internet security is a branch of computer security that deals specifically with internet based threats.
It is established to protect the computers from hackers, phishers and online scammers. Some
websites also install malware in our computers without our knowledge.
Some simple practices can be followed to protect our computers from various internet threat-
PASSWORDS-
• A strong password must contains at least 10-12 characters.

• It can contain alpha-numeric and special characters.

• Avoid using same passwords on multiple websites.


INTERNET SECURITY

 Install ANTIVIRUS on your device from a known and trusted source. Update the antivirus on a
regular basis
 Keep your software up to date.
 Backup your data regularly.
 Don’t share personal information like user ID or passwords, with anyone.
 Never install any software from unknown sources.
 Install Firewalls. They controls the flow of data over any network.
 Clear Browsing data and cookies frequently. Cookies are the programs that are created on your
local computer when you visit websites.
INTERNET SECURITY

SMARTPHONE SAFETY MEASURES-


• Set up emergency numbers for instant calling.

• Protect your phone by getting rid of unwanted data.

• Protect your phone from physical theft.


• Use a good antivirus and password.

• Sign out of the apps which are not in use.

• Avoid automatic download settings.

• Keep a regular backup of your data.


INTERNET SECURITY

VARIOUS CYBER THREATS-


• Phishing- It is an illegal practice of obtaining personal and financial information through email or
phone call.
• Spoofing- It is done by when someone pretends to be someone else and gain confidence of the
user. They then get access of our system, steal data and spread malware.
• Cyberbullying- It is the bullying or harassing a person on a electric media. Nowadays most of the
teenagers are common victims of cyberbullying
INTERNET SECURITY

Types Of BROWSERS
• Graphical Browser- Browsers which can run audio, video or picture files. Eg- Google Chrome
• Text Only Browser- These browsers don’t show any audio, video or picture files. Eg- Lynx
MAINTAIN WORKPLACE SAFETY

Every organization must follow a standard set of safety rules and procedures. These rules must be
stated and displayed clearly at important areas. A safe working environment ensures better work
performance.
Basic Safety Rules to follow at workplace are as follows-
• FIRE SAFETY
 Fire escape plans must be installed at proper levels.
 Smoke alarms should be placed at proper interval.
 Keep the workplace no smoking zone.
 There must be enough routes for all people to escape.
MAINTAIN WORKPLACE SAFETY

• FALLS AND SLIPS-


 Keep the moving area clean and clutter free.
 Workplace must be properly ventilated and must receive light.
 Floors must be clean and dry.
 Oil spills must be cleaned immediately .

• ELECTRIC SAFETY
 Electrical equipment must be approved by a recognized organization.
 Workers should handle the electric equipment safely.
 Heat emitting equipment should be kept away from electrical equipment.
 Circuits should not be overloaded.
MAINTAIN WORKPLACE SAFETY

Use of First Aid


First Aid is the immediate assistance provided to the injured to save life and minimize health loss
till the proper medical aid/facility is provided.
Some rules for first aid are
 Assure the injured to remain calm and not to panic.

 Keep them warm if they are under shock.

 Do not move the victim in case of back/neck injury.

 In case of burning, run cool water over the burn area.


PREVENT ACCIDENTS AND EMERGENCIES

An accident can be defined as an unfortunate incident that occurs unintentionally causing hazardous
result or injury or unwanted results.
Types of Accidents:
➢ Accidents at workplace- Slips and fall accidents, fire.

➢ Industrial disease/illness.

➢ Road traffic accidents.

➢ Clinical Accidents.

➢ Sports related accidents.


PREVENT ACCIDENTS AND EMERGENCIES

HANDALING ACCIDENTS-
• In case of fire accidents, switch off non-essential services.

• Escape routes should be lit by emergency lighting.

• If the fire is small, you may use fire extinguishers to put down it.

• Immediately call the medical team for any injury.

• Avoid using the lifts.


PREVENT ACCIDENTS AND EMERGENCIES

EMERGENCY-
Emergency is an unexpected situation that needs immediate attention and action.

Types of emergencies-
 Chemical spills

 Extreme heat waves

 Fire.

 Floods.

 Leakage of some hazardous gas/chemical

 Workplace Violence
PROTECT HEALTH AND SAFETY AT WORK

A hazard is anything that is the source of any potential harm, damage or any kind of potential loss
of health or life.
Type of Hazards-
 Biological Hazards

 Chemical Hazards

 Physical Hazards

 Mechanical Hazards
PROTECT HEALTH AND SAFETY AT WORK

Common Hazards at WORKPLACE


 Improperly fitted moving parts that can hit a person.

 Equipment catching fire or explosion.

 Slippery floors or surfaces or falls.

 Faulty electrical installation.

 Uncovered electric lines.

 Exposer to radiations from various sources, lasers.

 Accidental exposers to microorganisms like viruses, bacteria etc.

 Improper ventilation leads to several health issues.


PROTECT HEALTH AND SAFETY AT WORK

Checklists for workstations-


 Provide sufficient space for the users

 Provide adequate lighting

 If you are working on a display, it should be adjustable height, angle, brightness, contrast. The display should be free from
glare.

 If working with keyboard, the user should be able to work in a comfortable position. There should be a surface to rest the
hand of the user.

 Avoid using a bulky mouse in work.

 Look away from the screen every 20 mins at a distant object for 10 seconds.
PROTECT HEALTH AND SAFETY AT WORK

WORKSPACE EVACUTION- Evacuation is the process of emptying a place in case of an


emergency, disaster.
• Every organization must have an evacuation policy.

• Organization must have a designated assembly point for emergencies.

• Periodic evacuation drills should be conducted


PROTECT HEALTH AND SAFETY AT WORK

HEALTHY LIVING
A healthy lifestyle includes:
• Healthy eating habits
• Physical activities
• Stress management
• Healthy mind
• Sound sleep
PROTECT HEALTH AND SAFETY AT WORK

Steps to maintain a healthy life style-


 Take care about your nutrient.

 Exercise regularly to stay fit and healthy.

 Don’t get too much tensed about something.

 Keep a record of your blood sugar, blood pressure etc of your body.

 Avoid drugs like tobacco, alcohol.

You might also like