Session 1: Working With Accessibility Options Answer The Following Questions
Session 1: Working With Accessibility Options Answer The Following Questions
Q3. For visually impaired people, what accessibility options would you set?
Ans: Visual display options such as Narrator, Magnifier, Toggle Keys, High Contrast and Speech
recognition are some of the accessibility options which can be used by visually impaired people.
Q4. For hearing impaired people, what accessibility options would you set?
Ans: Text or visual cues in place of sounds like Sound Sentry, Show sounds can be used by
hearing impaired people.
Q5. For motor skills impaired people, what accessibility options would you set?
Shailaja.DS– IT HOD
Ans: Speech commands or mouse or keyboard working options such as Speech Recognition,
Mouse Keys, Sticky Keys and Filter Keys can be used for motor skills impaired people.
Q6. Define
a) Sticky Keys b) Filter Keys c) Toggle Keys
Ans: a) Sticky Keys: Sticky keys means when a combination key like Ctrl or Shift etc. is
pressed, its effect will stick until you press the next key.
Sticky Keys enables the user to enter key combinations by pressing keys in sequence rather
than simultaneously.
b) Filter Keys: Filter keys are used to ignore unintentional key strokes. It allows the
computer to ignore brief and repeated keystrokes caused by slow or inaccurate finger
movements.
c) Toggle Keys: Toggle keys can play an alert each time you press the Caps Lock, Scroll
Lock or Num Lock Keys which helps you quickly confirm whether they have been turned on or
not.
Session 2: Networking Fundamentals
Shailaja.DS– IT HOD
Ans: Packet switching is a network switching technique. Here, the message is divided and
grouped into a number of units called packets that are individually routed from the source to
the destination. There is no need to establish a dedicated circuit for communication.
Each packet in a packet switching technique has two parts: a header and a payload. The
header contains the addressing information of the packet and is used by the intermediate
routers to direct it towards its destination. The payload carries the actual data.
Q4. Differentiate between Peer to Peer Networking and Client Server Networking.
Ans:
S.NO CLIENT-SERVER NETWORK PEER-TO-PEER NETWORK
Shailaja.DS– IT HOD
1. Clients and server are differentiated, Clients and server are not
Specific server and clients are present. differentiated.
2. Network focuses on information sharing. Network focuses on connectivity.
3. Centralized server is used to store the Each peer has its own data.
data.
4. Server respond the services which is Each and every node can do both
request by Client. request and respond for the services.
5. Network are more stable Network are less stable if number of
peer is increase.
6. Network is used for both small and large Network is generally suited for small
networks. networks with fewer than 10 computers.
Q6. Define various types of internet connections both wired and wireless
Ans: There are many ways to connect to internet
Shailaja.DS– IT HOD
Wired Connections
• Dial Up: A dial-up connection is established when two or more communication devices
use a public switched telephone network (PSTN) to connect to an Internet service
provider (ISP).
• DSL: Digital subscriber line (DSL) is a technology that is used to transmit digital data
over telephone lines. DSL service can be delivered simultaneously with wired telephone
service on the same telephone line since DSL uses higher frequency bands for data.
• Cable Internet : Cable Internet is a category of broadband Internet access that uses the
infrastructure of cable TV network to provide Internet services. Cable Internet
provides connectivity from the Internet service provider (ISP) to the end users in a
similar manner as digital subscriber line (DSL)
Wireless Connections
• 3G: Short for third generation is a wireless mobile telecommunications technology. This
is based on a set of standards used for mobile devices and mobile telecommunications
use services.
It provides mobile broadband access to smartphones and mobile modems in laptop
computers. This ensures it can be applied to wireless voice telephony, mobile Internet
access, fixed wireless Internet access, video calls and mobile TV technologies.
• Wifi : Wi-Fi is a popular technology that allows an electronic device such as computers
or mobile phones to exchange data wireless over a network, including high-speed
Internet connections. Wi-Fi devices such as personal computer, smartphones, video
game console, etc. can connect to a network resource such as Internet through a
device called the Wireless Access Point (WAP).
• WiMAX: WiMAX would operate similar to WiFi, but at higher speeds over greater
distances and for a greater number of users. WiMAX has the ability to provide service
Shailaja.DS– IT HOD
even in areas that are difficult for wired infrastructure to reach and the ability to
overcome the physical limitations of traditional wired infrastructure.
Shailaja.DS– IT HOD
Session 4: Chatting with a Contact- Google Talk
Shailaja.DS– IT HOD
Ans: An offline blog editor is an editor that lets bloggers create blog posts without an internet
connection.
1. Set secure passwords and don’t share them with anyone. Avoid using common words,
phrases, or personal information and update regularly.
2.Restrict access and make personal information secure to prevent identity theft.
3. Be suspicious of unsolicited contact from individuals seeking internal organizational data or
personal information.
Shailaja.DS– IT HOD
4. Limit the amount of personal information you post. Do not post information that would
make you vulnerable, such as your address or information about your schedule or routine.
5. Take advantage of privacy and security settings. Use site settings to limit the information
you share with the general public online.
6. Be suspicious of unknown links or requests sent through email or text message. Do not
click on unknown links or answer strange questions sent to your mobile device, regardless of
who the sender appears to be.
7.Download only trusted applications from reputable sources or marketplaces.
Q2. Define Phishing, Spoofing, Virus, Firewall, Antivirus, Malware and Spyware
Ans:
• Phishing is the fraudulent attempt to obtain sensitive information or data, such as
usernames, passwords and credit card details, by disguising oneself as a trustworthy
entity in an electronic communication.
• Spoofing is when a hacker pretends to be someone known by a person or network in
order to access sensitive information, often in pursuit of financial gain.
• A computer virus, much like a flu virus, is designed to spread from host to host and
has the ability to replicate itself.
• A firewall is a network security system that monitors and controls incoming and
outgoing network traffic based on predetermined security rules.
• Antivirus software, or anti-virus software is a computer program used to prevent,
detect, and remove malware.
• Malware, or malicious software, is any program or file that is harmful to a computer
user. Types of malware can include computer viruses, worms, Trojan horses and
spyware.
• Spyware is a software which is installed on your computer to spy on your activities and
report this data to people willing to pay for it.
Shailaja.DS– IT HOD
• Use a combination of capital and lowercase letters, numbers and special characters
• Develop mnemonics such as passphrases for remembering complex passwords.
Q2. General precautions to be taken in the workplace with respect to electrical safety
Ans: Eliminate workplace hazards like:
a) Damaged electrical outlets, cords, cables etc.
b) Overloaded outlets and circuits
c) Combustible substance in unsecured locations
d) Fire exit obstacles
Shailaja.DS– IT HOD
b) Fire detection and warning systems
c) Fire fighting equipment
d) An emergency fire evacuation plan
e) Staff fire safety training
Q4.What actions should be taken to minimize slips, trips, and falls in the workplace?
Ans: To minimize slips, trips and falls at workplace, we can follow certain rules like
• Proper ventilated workplace
• Clean and dry floors
• Immediately cleaning any oil spills or dust
• Smoke alarms placed at proper intervals
Shailaja.DS– IT HOD
• Emergency escape procedures and route assignments
• Names, titles, departments and telephone numbers to contact in emergency
• Rescue and medical duties for any workers designated to perform them
• Designating an assembly location and procedures for all employees after an evacuation.
• A preferred method for reporting emergencies
Q2. What are some of the ways in which workplace hazards can be eliminated?
Ans: By identifying hazards at your workplace, you will be better prepared to control or
eliminate them and prevent accidents.
The following points can be considered:
• First aid boxes at various places in the office
• Trained first aides – on all floors of a buildings
• Knowledge of the nearest casualty department or local hospital
• Access to call for an ambulance
• Ability to provide immediate assistance to casualties with illnesses or injuries caused by
a specific hazard at work.
Shailaja.DS– IT HOD
Q3. Explain what biological hazards are.
Ans: Biological hazards are caused by bacteria, viruses, insects, plants, animals and humans
etc. It includes exposure to harm or disease associated with working with animals, people or
infectious plant materials.
b) Chemical Hazards: It depends on the physical, chemical and toxic properties of the
chemical in any form (solid, liquid or gaseous). This type of hazards can cause skin
irritation, illness or breathing problems.
Q5. Explain any two ways through which one can maintain a healthy body at workplace.
Ans: There are many factors that should be taken into account to maintain a healthy living, two
of them are
Watch your plate:
• Consume variety of foods and get awareness regarding their serving sizes.
• Be conscious about calorie reduction.
• Have more fresh vegetables and fruits
• Drink clean water and stop consuming sugar-sweetened beverages.
• Do not consume foods high in salt, sugar and saturated and trans fats.
Watch your steps:
• Actively engage and promote physical activities: walking, using stairs, taking active
breaks and movements throughout the day.
Shailaja.DS– IT HOD
• Join sports events, use the fitness center, or participate in exercise sessions
• Exercise at least 30–45 minutes daily
Q6. Write any two precautions that are to be taken of at the workplace.
Ans:
• Be alert to hazards that could affect anyone – not just yourself; in this respect,
maintain a team mentality at all times.
• Fire extinguishers and first aid kits must be available and readily attainable.
Shailaja.DS– IT HOD