NOTES: UNIT-4 WEB APPLICATIONS AND SECURITY
NOTES: UNIT-4 WEB APPLICATIONS AND SECURITY
SESSION 1: WORKING WITH ACCESSIBILITY OPTIONS
Computer
Accessibility refers to the user-friendliness of a computer system for
all, regardless of their disability. it enables a person with a disability or
impairment to use a computer. It is known as Assistive Technology. There are
numerous types of impairment that impact computer usage. These include:
- Cognitive
impairments and learning disabilities
- Attention
Deficit Hyperactivity Disorder (ADHD) or autism.
- Visual
impairment.
- Hearing
impairment
- Motor
impairment
Launching Accessibility Options:
To
launch accessibility options in WindowsXP, Click Start > Control Panel >
Accessibility Options.
Various tabs in the Accessibility Option Window :
The keyboard Tab to configure accessibility
options for the Keyboard is displayed
1)
Sticky Keys: Sticky Keys is an accessibility feature to help computer
users with physical disabilities, but it is
also used by others as a means to reduce repetitive strain.
2)
Filter Keys: Filter Keys are a feature of Microsoft Windows. It is an
accessibility function that tells the keyboard to ignore brief or repeated
keystrokes, making typing easier for people with hand tremors.
3)
ToggleKeys: ToggleKeys is an accessibility function that is designed for
people who have vision impairment or cognitive disabilities. When ToggleKeys is
turned on, the computer emits sound cues when the locking keys (Caps Lock, Num
Lock, or Scroll Lock) are pressed.
A Sound
Tab to configure accessibility
options for sound is displayed.
1)
SoundSentry: SoundSentry is designed to help users with auditory
impairments. SoundSentry generates visual warnings, such as a blinking title
bar or a flashing border, whenever the computer generates a sound.
2)
ShowSounds: ShowSounds instructs applications that convey information by
sound, to also provide information visually, through text captions or
informative icons.
Display
Tab to configure accessibility
options for Display is displayed.
1)
High Contrast: High Contrast is an accessibility feature to assist people
with vision impairment. You can change the size and color of fonts and the
background for ease of viewing.
2)
Cursor Options: Cursor Options is also an accessibility feature that
assists people with vision impairment
by changing the blink rate and width of the cursor.
A Mouse
Tab to configure accessibility
options for the Mouse is displayed.
1)
MouseKeys: MouseKeys is an accessibility feature that assists people who
have difficulty using a mouse. This option uses the keyboard (especially the numeric keypad) as a pointing device instead of a mouse.
General
Tab: enables you to configure
accessibility options for all users.
1)
Serial Keys: Serial Keys are an accessibility feature that assists people
who have difficulty using a keyboard or a mouse (or both). They can use
special devices such as Sip, Puff, and Breath Switches to provide input to the
computer through Serial Ports.
Assessment
Fill in the blanks
1)
The option in Microsoft Windows XP used for helping users with physical
disabilities and to reduce repetitive strain is ________.
2)
Sound Sentry is designed to help users with __________ impairments.
3)
The High Contrast option in Microsoft Windows XP is designed to assist people
with____________ impairments.
4)
____________ is designed to assist people who have difficulty
using a keyboard or a mouse.
SESSION 2: NETWORKING FUNDAMENTALS
A computer
network is a collection of computers and other hardware components
interconnected by communication channels (cables or satellites) that allow the sharing of resources and information.
Networks
are designed using the following architecture:
1)
Peer-to-Peer (P2P) Architecture: Networks in which all computers have an
equal status are called peer-to-peer networks. Generally in such a network each
terminal has an equally competent CPU.
2)
Client-Server Architecture: Networks in which certain computers have
special dedicated tasks, providing services to other computers (in the network)
are called client-server networks. The computer(s) that provide services are
called servers and the ones that use these services are called clients.
TYPES OF NETWORKS :
1)
Local Area Network: A local area network (LAN) is one which connects
computers and devices in a limited
geographical area such as home, school, computer laboratory, and office building.
2)
Metropolitan Area Network: A Metropolitan Area Network (MAN) is one that
connects computers and devices in a single city or a town.
3)
Wide Area Network: A wide area network (WAN) is one that covers a broad
area (i.e., any network that links across metropolitan, regional, or national
boundaries).
Advantages of Networking :
1)
Data Sharing: Networking allows the sharing of data .
2)
Files Transfer : One User can send text files, spread sheets etc. to other
users.
3)
Hardware Sharing: Hardware components such as printers, scanners, etc. can
also be shared.
4)
Internet Access Sharing: You can purchase a single Internet connection and
share it among other computers in a network
Internet :
The
Internet is a global system of interconnected computer networks that use the
standard Internet protocol suite to serve billions of users worldwide. It is a
network of networks.
Uses
of Internet : There are various uses of Internet. Some of them are listed below
- Internet
is used by students, educational institutes to gather information for
research.
- It is
used for online shopping.
- It is
used for sending and receiving mail.
- It is
used for playing games.
- It is
used for Online Transaction.
World
Wide Web : World Wide Web (abbreviated as WWW or W3, commonly known as the
Web), is a
system of interlinked hypertext documents accessed via the Internet.
Web
Browser : A Web Browser is a software used to view Web sites and acts as
an interface between the user and the World Wide Web.
Web
Server : Web server is a computer that stores web sites and their related
files for viewing on the Internet.
Internet
Service Provider : An Internet service provider (ISP) is an organization
which provides you with access to the Internet via a dial-up (using modem) or
direct (hard wired) or wireless connection. for example Bharat Sanchar
Nigam Limited (BSNL), Airtel, MTS, Vodafone, Tata Docomo, etc.
Modem
: It stands for MOdulator/DEModulator. It is a device that converts
digital computer signals into a form analog signals and vice versa.
Types
Of Common Internet Connectivity : There are different types of Internet
Connectivity available today; it can be widely categorized into wired and
wireless access.
Technology |
Type of Connectivity |
Dial-up |
Wired |
DSL |
Wired |
Cable Internet Access |
Wired |
3G |
Wireless |
WiMAX |
Wireless |
Wi-Fi |
Wireless |
Some
of the commonly used Internet connectivity are:
1)
Dial-up connections are extremely slow and in most cases, it is replaced
by a high speed connection such as DSL or Cable Modem.
2)
DSL: Digital subscriber line(DSL) provide Internet access by transmitting
digital data over wires of a local telephone network.
3)
Cable Internet Access: Cable Internet Access is a form of broadband
Internet access that uses the cable television infrastructure.
4)
3G: 3G, short for 3rd Generation is a set of standards used for mobile
devices.
5)
WiMAX: WiMAX (Worldwide Interoperability for Microwave Access) is a
wireless communications standard designed to provide mobile broadband
connectivity across cities.
6)
WI-Fi : Wi-Fi (Wireless Fidelity) is a popular technology that allows an
electronic device such as computers or mobile phones to exchange data
wirelessly over a network.
ASSESSMENT
Fill in the blanks:
1)
The acronym for LAN is ________________________.
2)
Three types of Wired Internet Connectivity are _________ ,
______________ &__________________________.
3)
Three types of Wireless Internet Connectivity are ____________, ____________ &
__________________.
II. Answer the following:
Q1.
Define networking?
Q2.
Give any three advantages of networking.
Q3.
Explain the term packet with reference to data transfer.
Q4.
Explain Wi-Fi and its significance.
Q5.
Compare LAN with WAN
Q6.
Expand the following terms :
a. DSL
b. ISP
c. Modem
d. www
e. LAN
f. MAN
g. WAN
h. P2P
Q7.
Explain P2P Architecture and how it is different from Client Server
Architecture?
SESSION 3: INTRODUCTION TO INSTANT MESSAGING
Instant
messaging (IM) is a form of communication over the Internet that offers an
instantaneous transmission of text-based messages from sender to receiver.
Types
of Instant Messaging Software : There are two kinds of instant messaging
software – application based and Web based.
A)
Application based : Application based instant messaging software is
downloaded and installed on user’s computer. Some of the popular instant
messaging software are:
- Google
Talk
- Yahoo!
Messenger
- Skype
- Windows
Live Messenger
- Rediff
Bol, etc.
B)
Web based : Web based instant messaging software is accessed using
browsers such as Internet Explorer, Mozilla Firefox, Google Chrome, etc. Some
of the popular web based instant messaging software are:
- Meebo
- Yahoo!
Messenger for the Web
- MSN
Web Messenger
- IMO,
etc.
Key
Features of an instant messaging are as follows:
- Text
Messages can be sent to one or more person (Similar to SMS)
- Audio
calling and conferencing.
- Video
calling and conferencing.
- File
transfers (Not limited to documents, spread sheets, audio files, video
files, etc.)
- Message
history (Save messages for future reference).
NOTE
: To use instant messaging software, a user must have a valid instant
messaging account.
ASSESSMENT
Fill in the blanks:
a. ________________ is
a form of communication over the Internet that offers an instantaneous
transmission of text-based messages from sender to receiver.
b.
______________, _______________ & _________________&
Web Camera are required for audio and video conferencing.
Q1.
List any five application based instant messaging software.
Q2.
What do you mean by instant messages?
Q3.
Give any three key features of Instant Messaging.
SESSION 4: CHATTING WITH A CONTACT – GOOGLE TALK
Google
Talk : Google Talk is an instant messaging service that provides both text
and voice communication developed by Google Inc. Google Talk can also be used
for making video calls. Google Talk is free and is available as application
based as well as web based. A Gmail account is required to use Google Talk.
Steps to Chat with a contact that is already added
to your contact list.
a)
Whenever your friend in the contact list is online you can see the person along
with a green dot.
b)
You can start sending text chat message instantly by double-clicking on a
contact the other person will see the text message and respond to your message.
General rules and etiquettes to be followed while
chatting :
1)
Messages should be short and to the point.
2)
Always introduce yourself by name if your screen name doesn’t reflect it.
3)
Always ask if the other person has time to chat first.
4)
Don’t Type your messages in uppercase as it seems to be extremely rude.
5)
Give people time to respond.
ASSESSMENT
Q1.
State any 03 rules and etiquettes to be followed while chatting on the
Internet.
Q2.
What are the basic needs to use instant messaging (chat) software.
SESSION 5: CREATING AND PUBLISHING WEB PAGES – BLOG
Blog
: A blog is a discussion style site used by non-technical (or technical
users) users for creating personal web pages. Blogs are similar to an online
personal diary and simple to use.
Some
of the popular websites that offer blog service for free are:
•
www.WordPress.com
• www.blogger.com
• www.blog.com
• www.weebly.com
• www.blogsome.com
WordPress
: WordPress is free web service that you can use to create a beautiful
website or blog. WordPress has support for “themes” which can make the blog or
the webpage look attractive.
How
to create account in WordPress?
1)
Open the Web Browser and type https://signup.WordPress.com/signup/.
2)
Enter a unique address to your WordPress Blog. This is the address which others
will use to view your blog.
3)
Enter username and password to manage your blog.
4)
Enter your Email Address and click on create blog.
5)
An email will be sent (above mentioned email) for activating your blog account.
Open your email and click on the activation link.
6)
Now the blog is ready for use.
How
to create post in WordPress?
1)
Login to your WordPress Account.
2)
To create a post, click New Post.
3)
Type the title for your post.
4)
Type the content which you want others to read. You can also add photos,
videos, etc. to the blog using the options available in WordPress
5)
Once you have finished typing the content, Click Publish Post to publish your
content. This process is called posting content.
ASSESSMENT
Q1.
What is a blog? Explain its use
Q2.
List any 5 websites that provide blog service.
Q3.
Difference between web page and website.
Q4.
What do you mean by publishing a post?
SESSION 6: USING OFFLINE BLOG EDITORS
Offline Blog Editors :
Those
Editors in which we can create blog when we do not have an active internet
connection and publish the blog whenever internet connectivity is available are
called Offline Blog Editors.
There
are several free offline blog editors available such as :
- Qumana
- Windows
Live Writer
- Blogdesk
- BlogJet
- MarsEdit
ASSESSMENT
Q1.
Explain the purpose of an offline blog editor.
Q2.
List any five offline blog editors.
SESSION 7: ONLINE TRANSACTIONS
Online
transactions : Online transactions deals with transfer of money over the
internet. There are many benefits of online transactions like, fast transaction
speed, convenience, low risk of theft etc.
Some
of the popular online transaction websites are:
1)
IRCTC(Indian Railway Catering and Tourism Corporation), an online portal for
booking flight and train tickets.
2)
Flipkart, an online shopping portal for buying consumer products. Flipkart
offers multiple payment methods like credit card, debit card, net banking,
e-gift voucher, and Cash on Delivery.
3)
EBay, an online portal for buying and selling goods.
4)
Redbus, an online portal for booking bus tickets.
Online
shopping : Online shopping is a form of electronic commerce where
customers can buy or sell goods
over the Internet.
Online
shopping could be useful in situations when:
1)
A customer does not have sufficient time to visit stores.
2)
Visiting a store is more expensive than purchasing a product online.
3)
A product or service that is not available in the local market is available
online.
ASSESSMENT
Q1.
Explain the purpose of Online transactions.
Q2.
List any five websites that allow online transactions.
Q3.
List any three payment tools to use online transactions.
Q4.
Give any two benefits of online transactions.
SESSION 8: INTERNET SECURITY
Internet
security : Internet security is a branch of computer security specifically
related to the Internet. Its objective is to establish rules and measures to
use against attacks over the Internet.
Best Practices for Security :
1)
Use strong password and keep on changing after every 2 -3 weeks.
2)
Use encryption software to protect your data from unauthorized users.
3)
Never save your username or password on shared computers.
4)
Do not share personal information.
5)
Use updated antivirus and antispyware software.
6)
Clear browser cookies frequently.
7)
Keep the operating system and software applications up to date.
8)
Install Firewall : Firewalls analyse the network traffic and determine if the
traffic should be allowed or not.
9)
Never install software from unknown sources.
10)
Remove unwanted or unknown software applications: These might have got
installed without your knowledge when you have visited some websites.
11)
Clear Data Stored In Browsers : It is not advisable to leave the web browser
store data(username, password, credit card detail) particularly on public or
shared computers.
General guidelines for managing strong passwords
are :
- Keep
the length of the password at least 12-14 characters if permitted.
- Avoid
keeping passwords based on repetition, dictionary words, letter or number
sequences, usernames, relative or pet names, etc.
- Including
numbers, and symbols in passwords if allowed.
- Use
capital and lower-case letters.
- Avoid
using the same password for multiple sites or purposes.
- Avoid
using something that the public or workmates know you strongly like or
dislike.
NOTE
:
- www.strongpasswordgenerator.com
help to generate strong password.
- Example
of Online threats are Phishing, email spoofing, chat spoofing, etc.
- Combination
of alphanumeric and special characters could be used for creating a
password that is not so easy to crack.
- Programs
such as keyloggers track and transmit every key that is pressed on a
keyboard (keystrokes) to unauthorized users
ASSESSMENT
Q1.
Explain the purpose of Internet Security.
Q2.
Explain different kinds of online threats.
Q3.
Explain the need to clear data stored in browsers.
Q4.
Explain any five tips to manage strong passwords.
Q5.
Explain any four best practices to secure data .
Q6.
Explain use of Antivirus and Anti Spyware
SESSION 9 : MAINTAIN WORKPLACE SAFETY
Every
organization must follow a standard set of safety rules and procedures. These
rules must be stated and displayed clearly at important areas . All the
employees must be given a demonstrations and training to follow safety rules.
BASIC SAFETY RULES ARE GIVEN BELOW
A) Basic Fire safety rules in an
organization are :
1)
Fire escape plans must be installed at proper levels
2)
Conduct regular drills
3)
Smoke alarms must be placed at proper intervals
4)
Keep workplace a no-smoking zone
5)
Maintenance of safety equipment must be taken care of regularly
B) Falls and Slips Safety rules
1)
Keep the moving area clean and clutter free.
2)
Workplace must be proper ventilated receive light.
3)
Wear non slippery footwear.
4)
Floors must be clean and dry
5)
Oil spills, dust must be immediately cleaned.
C) Electrical Safety Rules:
1)
Electrical equipment used should be approved by a recognised organization.
2)
Workers should be trained to handle the electric equipment safely.
3)
Damaged and hazardous electrical equipment should be immediately replaced.
4)
Heat emanating equipment should be kept away from the electrical equipment.
What is First Aid?
First
Aid is the immediate assistance provided to the injured to save life and
minimize health loss till the proper medical aid/ facility is provided.
Some rules of First Aid are :
- Assure
the injured to remain calm and not to panic.
- Keep
them warm if they are under shock
- Do not
move the victim in case of back/neck injury
Occupational
hazard : An occupational hazard is the illness one may acquire due to his
occupation. Some types of occupational hazards are : Physical hazards, chemical
hazards, biological hazards, , behavioural hazards, radiological hazards,
ergonomic hazards etc.
ASSESSMENT
Q1.
Enlist any three basic safety rules to follow at workplace.
Q2.
Give any two basic safety rules for ensuring Falls and Slips safety.
Q3.
Give any two electrical safety rules in any organization.
Q4.
Explain any two first aid rules.
Q5.
What do you mean by occupational hazards?
Q6.
List any three types of occupational hazards.
SESSION 10 : PREVENT ACCIDENTS AND EMERGENCIES
Accident
: an accident is an unplanned
event that may happen all of a sudden and may lead to unwanted or unprecedented
results/outcomes.
Types
of Accidents: Accidents may be of following types :
- Accidents
at workplace : Slips and fall accidents, fire
- Industrial
disease/illness
- Road
traffic accidents
- Clinical
Accidents
- Sports
related accidents
Handling Accidents:
Accidents
must be handled carefully. The accident should be handled compassionately
without assigning blame on others.
- Every
organization must follow SOP for accident handling
- Safety
measures must be placed to prevent workplace accidents
- Immediately
call the medical team for any injury
- Stay
alert
- Pay
attention to and follow emergency drills
Emergency
: Any unexpected situation that needs immediate attention and action is
called emergency.
An
emergency situation is one that:
- threatens
the employees, customers or the public
- disrupts
or shuts down the operations
- causes
physical or environmental damage
Types of Emergency :
Various
types of emergencies are there and there should be an emergency management plan
to handle the situation of emergency. Some of the types of emergencies are as
follows :
- Chemical
spills
- Extreme
heat waves
- Droughts
- Pandemics
- Terrorist
attack
- Fire
- Floods
- Thunderstorms
- Leakage
of some hazardous gas/ chemical
Some
of the types of emergencies that require evacuation are:
- Fire
- Explosion
- Floods
- Earthquake
- Hurricane
- Tornado
- Toxic
material release
- Civil
disturbance
- Workplace
violence
ASSESSMENT
Q1.
Explain the terms accident and emergency.
Q2.
Enlist any four types of accidents.
Q3.
Give any three situations of emergency that require evacuation.
Q4.
Give any two ways to handle accidents.
SESSION 11: PROTECT HEALTH AND SAFETY AT WORK
Hazards And Sources Of Hazards :
A
hazard is anything that is the source of any potential harm, damage or any kind
of potential loss of health or life.
The
different types of hazards include:
- Physical
- Chemical
- Biological
- Mechanical
Evacuation
: Evacuation is the process of emptying a place in case of an emergency,
disaster. Every company must ensure following points for evacuation in
case of any emergency:
- An
evacuation policy.
- Organization
must have a designated assembly point for emergencies.
- Floor
plans with evacuation routes pasted in work areas
- Periodic
evacuation drills should be conducted
Healthy Living :
A
healthy living has a lasting impact on an individual which ultimately yields a
healthy environment at home as well as at work place.
A
healthy lifestyle helps to keep and improve people’s health and well being.
A
healthy lifestyle includes :
- healthy
eating habits
- physical
activities
- stress
management
- healthy
mind
- sound
sleep
- goal
setting
ASSESSMENT
Fill in the blanks
- An
organization can face some _________ that could put the
lives of the employees in danger.
- Hazards
can be of different types depending on the ______________ and the _________ in
which the employees work.
- Organization
must have a designated ___________ for emergencies.
Answer the following
Q1.
List any three types of hazards.
Q2.
Give a checklist for workstations to minimize the hazards
Q3.
Explain the term ‘ Evacuation Policy’
Q4.
Explain Buddy System to implement evacuation efficiently in case of emergency
Q5.
Explain the terms Floor Plans and Assembly /areas.
Q6.
Describe the importance of periodic evacuation drills.
Q7.
Explain importance of a healthy lifestyle.
Q8.
Give any four points of a healthy lifestyle.
UNIT-4 WEB APPLICATIONS AND SECURITY
SESSION 1: WORKING WITH ACCESSIBILITY OPTIONS
Computer
Accessibility refers to the user friendliness of a computer system for
all, regardless of their disability. it enables a person with a disability or
impairment to use a computer. It is known as Assistive Technology. There are
numerous types of impairment that impact computer usage. These include:
- Cognitive
impairments and learning disabilities
- Attention
Deficit Hyperactivity Disorder (ADHD) or autism.
- Visual
impairment.
- Hearing
impairment
- Motor
impairment
Launching Accessibility Options:
To
launch accessibility options in WindowsXP, Click Start > Control Panel >
Accessibility Options.
Various tabs in Accessibility Option Window :
Keyboard
Tab to configure accessibility
options for Keyboard is displayed
1)
Sticky Keys : Sticky Keys is an accessibility feature to help computer
users with physical disabilities, but it is
also used by others as a means to reduce repetitive strain.
2)
Filter Keys : Filter Keys is a feature of Microsoft Windows. It is an
accessibility function that tells the keyboard to ignore brief or repeated
keystrokes, making typing easier for people with hand tremors.
3)
ToggleKeys : ToggleKeys is an accessibility function which is designed for
people who have vision impairment or cognitive disabilities. When ToggleKeys is
turned on, computer emits sound cues when the locking keys (Caps Lock, Num
Lock, or Scroll Lock) are pressed.
Sound
Tab to configure accessibility
options for sound is displayed.
1)
SoundSentry : SoundSentry is designed to help users with auditory
impairments. SoundSentry generates visual warnings, such as a blinking title
bar or a flashing border, whenever the computer generates a sound.
2)
ShowSounds : ShowSounds instructs applications that convey information by
sound, to also provide information visually, through text captions or
informative icons.
Display
Tab to configure accessibility
options for Display is displayed.
1)
High Contrast : High Contrast is an accessibility feature to assist people
with vision impairment. You can change the size and color of fonts and the
background for ease of viewing.
2)
Cursor Options : Cursor Options is also an accessibility feature that
assists people with vision impairment
by changing the blink rate and width of the cursor.
Mouse
Tab to configure accessibility
options for Mouse is displayed.
1)
MouseKeys : MouseKeys is an accessibility feature that assists people who
have difficulty using a mouse. This option uses the keyboard (especially
numeric keypad) as a pointing device instead of a mouse.
General
Tab : enables you to configure
accessibility options for all users.
1)
Serial Keys : Serial Keys is an accessibility feature that assists people
that have difficulty using a keyboard or a mouse (or both). They can use
special devices such as Sip, Puff and Breath Switches to provide input to the
computer through Serial Ports.
Assessment
Fill in the blanks
1)
The option in Microsoft Windows XP used for helping users with physical
disabilities and to reduce repetitive strain is ________.
2)
Sound Sentry is designed to help users with __________ impairments.
3)
The High Contrast option in Microsoft Windows XP is designed to assist people
with____________ impairments.
4)
____________ is designed to assist people that have difficulty
using a keyboard or a mouse.
SESSION 2 : NETWORKING FUNDAMENTALS
A computer
network is a collection of computers and other hardware components
interconnected by communication channels (cables or satellites) that allow
sharing of resources and information.
Networks
are designed using the following architecture:
1)
Peer-to-Peer (P2P) Architecture : Networks in which all computers have an
equal status are called peer to peer networks. Generally in such a network each
terminal has an equally competent CPU.
2)
Client-Server Architecture : Networks in which certain computers have
special dedicated tasks, providing services to other computers (in the network)
are called client server networks. The computer(s) which provide services are
called servers and the ones that use these services are called clients.
TYPES OF NETWORKS :
1)
Local Area Network : A local area network (LAN) is one which connects
computers and devices in a limited
geographical area such as home, school, computer laboratory, office building.
2)
Metropolitan Area Network : A Metropolitan Area Network (MAN) is one which
connects computers and devices in a single city or a town.
3)
Wide Area Network : A wide area network (WAN) is one which covers a broad
area (i.e., any network that links across metropolitan, regional, or national
boundaries).
Advantages of Networking :
1)
Data Sharing : Networking allow the sharing of data .
2)
Files Transfer : One User can send text files, spread sheets etc. to other
users.
3)
Hardware Sharing: Hardware components such as printers, scanners, etc. can
also be shared.
4)
Internet Access Sharing: You can purchase a single Internet connection and
share it among other computers in a network
Internet :
The
Internet is a global system of interconnected computer networks that use the
standard Internet protocol suite to serve billions of users worldwide. It is a
network of networks.
Uses
of Internet : There are various uses of Internet. Some of them are listed below
- Internet
is used by students, educational institutes to gather information for
research.
- It is
used for online shopping.
- It is
used for sending and receiving mail.
- It is
used for playing games.
- It is
used for Online Transaction.
World
Wide Web : World Wide Web (abbreviated as WWW or W3, commonly known as the
Web), is a
system of interlinked hypertext documents accessed via the Internet.
Web
Browser : A Web Browser is a software used to view Web sites and acts as
an interface between the user and the World Wide Web.
Web
Server : Web server is a computer that stores web sites and their related
files for viewing on the Internet.
Internet
Service Provider : An Internet service provider (ISP) is an organization
which provides you with access to the Internet via a dial-up (using modem) or
direct (hard wired) or wireless connection. for example Bharat Sanchar
Nigam Limited (BSNL), Airtel, MTS, Vodafone, Tata Docomo, etc.
Modem
: It stands for MOdulator/DEModulator. It is a device that converts
digital computer signals into a form analog signals and vice versa.
Types
Of Common Internet Connectivity : There are different types of Internet
Connectivity available today; it can be widely categorized into wired and
wireless access.
Technology |
Type of Connectivity |
Dial-up |
Wired |
DSL |
Wired |
Cable Internet Access |
Wired |
3G |
Wireless |
WiMAX |
Wireless |
Wi-Fi |
Wireless |
Some
of the commonly used Internet connectivity are:
1)
Dial-up connections are extremely slow and in most cases, it is replaced
by a high speed connection such as DSL or Cable Modem.
2)
DSL: Digital subscriber line(DSL) provide Internet access by transmitting
digital data over wires of a local telephone network.
3)
Cable Internet Access: Cable Internet Access is a form of broadband
Internet access that uses the cable television infrastructure.
4)
3G: 3G, short for 3rd Generation is a set of standards used for mobile
devices.
5)
WiMAX: WiMAX (Worldwide Interoperability for Microwave Access) is a
wireless communications standard designed to provide mobile broadband
connectivity across cities.
6)
WI-Fi : Wi-Fi (Wireless Fidelity) is a popular technology that allows an
electronic device such as computers or mobile phones to exchange data
wirelessly over a network.
ASSESSMENT
Fill in the blanks:
1)
The acronym for LAN is ________________________.
2)
Three types of Wired Internet Connectivity are _________ ,
______________ &__________________________.
3)
Three types of Wireless Internet Connectivity are ____________, ____________ &
__________________.
II. Answer the following:
Q1.
Define networking?
Q2.
Give any three advantages of networking.
Q3.
Explain the term packet with reference to data transfer.
Q4.
Explain Wi-Fi and its significance.
Q5.
Compare LAN with WAN
Q6.
Expand the following terms :
a. DSL
b. ISP
c. Modem
d. www
e. LAN
f. MAN
g. WAN
h. P2P
Q7.
Explain P2P Architecture and how it is different from Client Server
Architecture?
SESSION 3: INTRODUCTION TO INSTANT MESSAGING
Instant
messaging (IM) is a form of communication over the Internet that offers an
instantaneous transmission of text-based messages from sender to receiver.
Types
of Instant Messaging Software : There are two kinds of instant messaging
software – application based and Web based.
A)
Application based : Application based instant messaging software is
downloaded and installed on user’s computer. Some of the popular instant
messaging software are:
- Google
Talk
- Yahoo!
Messenger
- Skype
- Windows
Live Messenger
- Rediff
Bol, etc.
B)
Web based : Web based instant messaging software is accessed using
browsers such as Internet Explorer, Mozilla Firefox, Google Chrome, etc. Some
of the popular web based instant messaging software are:
- Meebo
- Yahoo!
Messenger for the Web
- MSN
Web Messenger
- IMO,
etc.
Key
Features of an instant messaging are as follows:
- Text
Messages can be sent to one or more person (Similar to SMS)
- Audio
calling and conferencing.
- Video
calling and conferencing.
- File
transfers (Not limited to documents, spread sheets, audio files, video
files, etc.)
- Message
history (Save messages for future reference).
NOTE
: To use instant messaging software, a user must have a valid instant
messaging account.
ASSESSMENT
Fill in the blanks:
a. ________________ is
a form of communication over the Internet that offers an instantaneous
transmission of text-based messages from sender to receiver.
b.
______________, _______________ & _________________&
Web Camera are required for audio and video conferencing.
Q1.
List any five application based instant messaging software.
Q2.
What do you mean by instant messages?
Q3.
Give any three key features of Instant Messaging.
SESSION 4: CHATTING WITH A CONTACT – GOOGLE TALK
Google
Talk : Google Talk is an instant messaging service that provides both text
and voice communication developed by Google Inc. Google Talk can also be used
for making video calls. Google Talk is free and is available as application
based as well as web based. A Gmail account is required to use Google Talk.
Steps to Chat with a contact that is already added
to your contact list.
a)
Whenever your friend in the contact list is online you can see the person along
with a green dot.
b)
You can start sending text chat message instantly by double-clicking on a
contact the other person will see the text message and respond to your message.
General rules and etiquettes to be followed while
chatting :
1)
Messages should be short and to the point.
2)
Always introduce yourself by name if your screen name doesn’t reflect it.
3)
Always ask if the other person has time to chat first.
4)
Don’t Type your messages in uppercase as it seems to be extremely rude.
5)
Give people time to respond.
ASSESSMENT
Q1.
State any 03 rules and etiquettes to be followed while chatting on the
Internet.
Q2.
What are the basic needs to use instant messaging (chat) software.
SESSION 5: CREATING AND PUBLISHING WEB PAGES – BLOG
Blog
: A blog is a discussion style site used by non-technical (or technical
users) users for creating personal web pages. Blogs are similar to an online
personal diary and simple to use.
Some
of the popular websites that offer blog service for free are:
•
www.WordPress.com
• www.blogger.com
• www.blog.com
• www.weebly.com
• www.blogsome.com
WordPress
: WordPress is free web service that you can use to create a beautiful
website or blog. WordPress has support for “themes” which can make the blog or
the webpage look attractive.
How
to create account in WordPress?
1)
Open the Web Browser and type https://signup.WordPress.com/signup/.
2)
Enter a unique address to your WordPress Blog. This is the address which others
will use to view your blog.
3)
Enter username and password to manage your blog.
4)
Enter your Email Address and click on create blog.
5)
An email will be sent (above mentioned email) for activating your blog account.
Open your email and click on the activation link.
6)
Now the blog is ready for use.
How
to create post in WordPress?
1)
Login to your WordPress Account.
2)
To create a post, click New Post.
3)
Type the title for your post.
4)
Type the content which you want others to read. You can also add photos,
videos, etc. to the blog using the options available in WordPress
5)
Once you have finished typing the content, Click Publish Post to publish your
content. This process is called posting content.
ASSESSMENT
Q1.
What is a blog? Explain its use
Q2.
List any 5 websites that provide blog service.
Q3.
Difference between web page and website.
Q4.
What do you mean by publishing a post?
SESSION 6: USING OFFLINE BLOG EDITORS
Offline Blog Editors :
Those
Editors in which we can create blog when we do not have an active internet
connection and publish the blog whenever internet connectivity is available are
called Offline Blog Editors.
There
are several free offline blog editors available such as :
- Qumana
- Windows
Live Writer
- Blogdesk
- BlogJet
- MarsEdit
ASSESSMENT
Q1.
Explain the purpose of an offline blog editor.
Q2.
List any five offline blog editors.
SESSION 7: ONLINE TRANSACTIONS
Online
transactions : Online transactions deals with transfer of money over the
internet. There are many benefits of online transactions like, fast transaction
speed, convenience, low risk of theft etc.
Some
of the popular online transaction websites are:
1)
IRCTC(Indian Railway Catering and Tourism Corporation), an online portal for
booking flight and train tickets.
2)
Flipkart, an online shopping portal for buying consumer products. Flipkart
offers multiple payment methods like credit card, debit card, net banking,
e-gift voucher, and Cash on Delivery.
3)
EBay, an online portal for buying and selling goods.
4)
Redbus, an online portal for booking bus tickets.
Online
shopping : Online shopping is a form of electronic commerce where
customers can buy or sell goods
over the Internet.
Online
shopping could be useful in situations when:
1)
A customer does not have sufficient time to visit stores.
2)
Visiting a store is more expensive than purchasing a product online.
3)
A product or service that is not available in the local market is available
online.
ASSESSMENT
Q1.
Explain the purpose of Online transactions.
Q2.
List any five websites that allow online transactions.
Q3.
List any three payment tools to use online transactions.
Q4.
Give any two benefits of online transactions.
SESSION 8: INTERNET SECURITY
Internet
security : Internet security is a branch of computer security specifically
related to the Internet. Its objective is to establish rules and measures to
use against attacks over the Internet.
Best Practices for Security :
1)
Use strong password and keep on changing after every 2 -3 weeks.
2)
Use encryption software to protect your data from unauthorized users.
3)
Never save your username or password on shared computers.
4)
Do not share personal information.
5)
Use updated antivirus and antispyware software.
6)
Clear browser cookies frequently.
7)
Keep the operating system and software applications up to date.
8)
Install Firewall : Firewalls analyse the network traffic and determine if the
traffic should be allowed or not.
9)
Never install software from unknown sources.
10)
Remove unwanted or unknown software applications: These might have got
installed without your knowledge when you have visited some websites.
11)
Clear Data Stored In Browsers : It is not advisable to leave the web browser
store data(username, password, credit card detail) particularly on public or
shared computers.
General guidelines for managing strong passwords
are :
- Keep
the length of the password at least 12-14 characters if permitted.
- Avoid
keeping passwords based on repetition, dictionary words, letter or number
sequences, usernames, relative or pet names, etc.
- Including
numbers, and symbols in passwords if allowed.
- Use
capital and lower-case letters.
- Avoid
using the same password for multiple sites or purposes.
- Avoid
using something that the public or workmates know you strongly like or
dislike.
NOTE
:
- www.strongpasswordgenerator.com
help to generate strong password.
- Example
of Online threats are Phishing, email spoofing, chat spoofing, etc.
- Combination
of alphanumeric and special characters could be used for creating a
password that is not so easy to crack.
- Programs
such as keyloggers track and transmit every key that is pressed on a
keyboard (keystrokes) to unauthorized users
ASSESSMENT
Q1.
Explain the purpose of Internet Security.
Q2.
Explain different kinds of online threats.
Q3.
Explain the need to clear data stored in browsers.
Q4.
Explain any five tips to manage strong passwords.
Q5.
Explain any four best practices to secure data .
Q6.
Explain use of Antivirus and Anti Spyware
SESSION 9 : MAINTAIN WORKPLACE SAFETY
Every
organization must follow a standard set of safety rules and procedures. These
rules must be stated and displayed clearly at important areas . All the
employees must be given a demonstrations and training to follow safety rules.
BASIC SAFETY RULES ARE GIVEN BELOW
A) Basic Fire safety rules in an
organization are :
1)
Fire escape plans must be installed at proper levels
2)
Conduct regular drills
3)
Smoke alarms must be placed at proper intervals
4)
Keep workplace a no-smoking zone
5)
Maintenance of safety equipment must be taken care of regularly
B) Falls and Slips Safety rules
1)
Keep the moving area clean and clutter free.
2)
Workplace must be proper ventilated receive light.
3)
Wear non slippery footwear.
4)
Floors must be clean and dry
5)
Oil spills, dust must be immediately cleaned.
C) Electrical Safety Rules:
1)
Electrical equipment used should be approved by a recognised organization.
2)
Workers should be trained to handle the electric equipment safely.
3)
Damaged and hazardous electrical equipment should be immediately replaced.
4)
Heat emanating equipment should be kept away from the electrical equipment.
What is First Aid?
First
Aid is the immediate assistance provided to the injured to save life and
minimize health loss till the proper medical aid/ facility is provided.
Some rules of First Aid are :
- Assure
the injured to remain calm and not to panic.
- Keep
them warm if they are under shock
- Do not
move the victim in case of back/neck injury
Occupational
hazard : An occupational hazard is the illness one may acquire due to his
occupation. Some types of occupational hazards are : Physical hazards, chemical
hazards, biological hazards, , behavioural hazards, radiological hazards,
ergonomic hazards etc.
ASSESSMENT
Q1.
Enlist any three basic safety rules to follow at workplace.
Q2.
Give any two basic safety rules for ensuring Falls and Slips safety.
Q3.
Give any two electrical safety rules in any organization.
Q4.
Explain any two first aid rules.
Q5.
What do you mean by occupational hazards?
Q6.
List any three types of occupational hazards.
SESSION 10 : PREVENT ACCIDENTS AND EMERGENCIES
Accident
: an accident is an unplanned
event that may happen all of a sudden and may lead to unwanted or unprecedented
results/outcomes.
Types
of Accidents: Accidents may be of following types :
- Accidents
at workplace : Slips and fall accidents, fire
- Industrial
disease/illness
- Road
traffic accidents
- Clinical
Accidents
- Sports
related accidents
Handling Accidents:
Accidents
must be handled carefully. The accident should be handled compassionately
without assigning blame on others.
- Every
organization must follow SOP for accident handling
- Safety
measures must be placed to prevent workplace accidents
- Immediately
call the medical team for any injury
- Stay
alert
- Pay
attention to and follow emergency drills
Emergency
: Any unexpected situation that needs immediate attention and action is
called emergency.
An
emergency situation is one that:
- threatens
the employees, customers or the public
- disrupts
or shuts down the operations
- causes
physical or environmental damage
Types of Emergency :
Various
types of emergencies are there and there should be an emergency management plan
to handle the situation of emergency. Some of the types of emergencies are as
follows :
- Chemical
spills
- Extreme
heat waves
- Droughts
- Pandemics
- Terrorist
attack
- Fire
- Floods
- Thunderstorms
- Leakage
of some hazardous gas/ chemical
Some
of the types of emergencies that require evacuation are:
- Fire
- Explosion
- Floods
- Earthquake
- Hurricane
- Tornado
- Toxic
material release
- Civil
disturbance
- Workplace
violence
ASSESSMENT
Q1.
Explain the terms accident and emergency.
Q2.
Enlist any four types of accidents.
Q3.
Give any three situations of emergency that require evacuation.
Q4.
Give any two ways to handle accidents.
SESSION 11: PROTECT HEALTH AND SAFETY AT WORK
Hazards And Sources Of Hazards :
A
hazard is anything that is the source of any potential harm, damage or any kind
of potential loss of health or life.
The
different types of hazards include:
- Physical
- Chemical
- Biological
- Mechanical
Evacuation
: Evacuation is the process of emptying a place in case of an emergency,
disaster. Every company must ensure following points for evacuation in
case of any emergency:
- An
evacuation policy.
- Organization
must have a designated assembly point for emergencies.
- Floor
plans with evacuation routes pasted in work areas
- Periodic
evacuation drills should be conducted
Healthy Living :
A
healthy living has a lasting impact on an individual which ultimately yields a
healthy environment at home as well as at work place.
A
healthy lifestyle helps to keep and improve people’s health and well being.
A
healthy lifestyle includes :
- healthy
eating habits
- physical
activities
- stress
management
- healthy
mind
- sound
sleep
- goal
setting
ASSESSMENT
Fill in the blanks
- An
organization can face some _________ that could put the
lives of the employees in danger.
- Hazards
can be of different types depending on the ______________ and the _________ in
which the employees work.
- Organization
must have a designated ___________ for emergencies.
Answer the following
Q1.
List any three types of hazards.
Q2.
Give a checklist for workstations to minimize the hazards
Q3.
Explain the term ‘ Evacuation Policy’
Q4.
Explain Buddy System to implement evacuation efficiently in case of emergency
Q5.
Explain the terms Floor Plans and Assembly /areas.
Q6.
Describe the importance of periodic evacuation drills.
Q7.
Explain importance of a healthy lifestyle.
Q8.
Give any four points of a healthy lifestyle.
Comments
Post a Comment