0% found this document useful (0 votes)
1K views14 pages

Session 1: Working With Accessibility Options Answer The Following Questions

The document provides information about various accessibility options, networking fundamentals, and internet connections. It discusses accessibility options available on Windows OS for visually, hearing, and motor skills impaired users. It defines networking terms like a network, packet switching, different types of networks including PAN, LAN, MAN, and WAN. It also differentiates between peer-to-peer and client-server networking. Common internet connections like dial-up, DSL, cable, 3G, WiFi, and WiMAX are defined. Modems and internet service providers are also explained.

Uploaded by

Sai Santhosh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
1K views14 pages

Session 1: Working With Accessibility Options Answer The Following Questions

The document provides information about various accessibility options, networking fundamentals, and internet connections. It discusses accessibility options available on Windows OS for visually, hearing, and motor skills impaired users. It defines networking terms like a network, packet switching, different types of networks including PAN, LAN, MAN, and WAN. It also differentiates between peer-to-peer and client-server networking. Common internet connections like dial-up, DSL, cable, 3G, WiFi, and WiMAX are defined. Modems and internet service providers are also explained.

Uploaded by

Sai Santhosh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 14

Unit 4: Web Applications & Security

Session 1: Working With Accessibility Options

Answer the following questions

Q1. What do you understand by accessibility options? What is their need?


Ans: Accessibility options are the settings done on computer so that computer OS can take
input in different forms other than mouse and keyboard and provide output other than monitor
or printed form.
Not all computer users are equally abled. But ‘computers’ as a tool must be available for all
despite their visual or hearing or motor skills impairments. Thus, modern day computers come
with accessibility options so that all can use computers with equal ease.

Q2. What all accessibility options are available on Windows OS?


Ans: Various accessibility options on Windows OS are:
• Sticky Keys • High Contrast
• Toggle Keys • Sound Sentry
• Filter Keys • Mouse Keys
• Narrator • Serial Keys
• Magnifier • Show Sounds
• Speech recognition

Q3. For visually impaired people, what accessibility options would you set?
Ans: Visual display options such as Narrator, Magnifier, Toggle Keys, High Contrast and Speech
recognition are some of the accessibility options which can be used by visually impaired people.

Q4. For hearing impaired people, what accessibility options would you set?
Ans: Text or visual cues in place of sounds like Sound Sentry, Show sounds can be used by
hearing impaired people.

Q5. For motor skills impaired people, what accessibility options would you set?

Shailaja.DS– IT HOD
Ans: Speech commands or mouse or keyboard working options such as Speech Recognition,
Mouse Keys, Sticky Keys and Filter Keys can be used for motor skills impaired people.
Q6. Define
a) Sticky Keys b) Filter Keys c) Toggle Keys
Ans: a) Sticky Keys: Sticky keys means when a combination key like Ctrl or Shift etc. is
pressed, its effect will stick until you press the next key.
Sticky Keys enables the user to enter key combinations by pressing keys in sequence rather
than simultaneously.

b) Filter Keys: Filter keys are used to ignore unintentional key strokes. It allows the
computer to ignore brief and repeated keystrokes caused by slow or inaccurate finger
movements.

c) Toggle Keys: Toggle keys can play an alert each time you press the Caps Lock, Scroll
Lock or Num Lock Keys which helps you quickly confirm whether they have been turned on or
not.
Session 2: Networking Fundamentals

Answer the following questions


Q1. What is a network? Why is it needed?
Ans: A network is an interconnected collection of autonomous computers that can share and
exchange information.
Major reasons that emphasize on the need of the networks are:
a) Resource Sharing: Through a network, data, software and hardware resources can be
shared irrespective of the physical location of the resources and the user.
b) Reliability: A file can have its copies on two or more computers of the network, so if
one of them is unavailable, the other copies could be used.
c) Reduced Costs: Since resources can be shared, it greatly reduces the costs.
d) Fast Communication: With networks, it is possible to exchange information at very fast
speeds.

Q2. Define packet switching technique in network communication.

Shailaja.DS– IT HOD
Ans: Packet switching is a network switching technique. Here, the message is divided and
grouped into a number of units called packets that are individually routed from the source to
the destination. There is no need to establish a dedicated circuit for communication.

Each packet in a packet switching technique has two parts: a header and a payload. The
header contains the addressing information of the packet and is used by the intermediate
routers to direct it towards its destination. The payload carries the actual data.

Q3. What are different types in networks?


Ans: Networks vary widely in their size, complexity and geographical spread. On the basis of
geographical spread, networks can be classified into the following categories:

a) Personal Area Network (PAN):


PAN is the interconnection between devices within the range of a person’s private space,
typically within a range of 10 meters.

b) Local Area Network (LAN):


LAN or Local Area Network is a wired network spread over a single site like an office,
building or manufacturing unit. A LAN may be set up using wired or wireless connections. A
LAN that is completely wireless is called Wireless LAN or WLAN.

c) Metropolitan Area Network (MAN):


It is a network spread over a city, college campus or a small region. MAN is larger than a LAN
and typically spread over several kilometers.
The most common example of MAN is cable TV network.

d) Wide Area Network (WAN):


It is spread over a country or many countries. WAN is typically a network of many LANs,
MANs and WANs. Network is set up using wired or wireless connections, depending on
availability and reliability. The most common example of WAN is the Internet.

Q4. Differentiate between Peer to Peer Networking and Client Server Networking.
Ans:
S.NO CLIENT-SERVER NETWORK PEER-TO-PEER NETWORK

Shailaja.DS– IT HOD
1. Clients and server are differentiated, Clients and server are not
Specific server and clients are present. differentiated.
2. Network focuses on information sharing. Network focuses on connectivity.

3. Centralized server is used to store the Each peer has its own data.
data.
4. Server respond the services which is Each and every node can do both
request by Client. request and respond for the services.
5. Network are more stable Network are less stable if number of
peer is increase.
6. Network is used for both small and large Network is generally suited for small
networks. networks with fewer than 10 computers.

Q5. Define MODEM, ISP


Ans:
• MODEM (Modulation Demodulation):
Modem is short for "Modulator-Demodulator." It is a hardware component that allows a
computer or another device to connect to the Internet. It converts or "modulates" an
analog signal from a telephone or cable wire to digital data (1s and 0s) that a computer
can recognize. Similarly, it converts digital data from a computer or other device into
an analog signal that can be sent over standard telephone lines.

• ISP (Internet Service Provider):


An Internet service provider (ISP) is an organisation that provides services for
accessing, using, or participating in the Internet. An ISP typically serves as the access
point or the gateway that provides a user, access to everything available on the
Internet

Q6. Define various types of internet connections both wired and wireless
Ans: There are many ways to connect to internet

Shailaja.DS– IT HOD
Wired Connections
• Dial Up: A dial-up connection is established when two or more communication devices
use a public switched telephone network (PSTN) to connect to an Internet service
provider (ISP).

• DSL: Digital subscriber line (DSL) is a technology that is used to transmit digital data
over telephone lines. DSL service can be delivered simultaneously with wired telephone
service on the same telephone line since DSL uses higher frequency bands for data.

• Cable Internet : Cable Internet is a category of broadband Internet access that uses the
infrastructure of cable TV network to provide Internet services. Cable Internet
provides connectivity from the Internet service provider (ISP) to the end users in a
similar manner as digital subscriber line (DSL)

Wireless Connections
• 3G: Short for third generation is a wireless mobile telecommunications technology. This
is based on a set of standards used for mobile devices and mobile telecommunications
use services.
It provides mobile broadband access to smartphones and mobile modems in laptop
computers. This ensures it can be applied to wireless voice telephony, mobile Internet
access, fixed wireless Internet access, video calls and mobile TV technologies.

• Wifi : Wi-Fi is a popular technology that allows an electronic device such as computers
or mobile phones to exchange data wireless over a network, including high-speed
Internet connections. Wi-Fi devices such as personal computer, smartphones, video
game console, etc. can connect to a network resource such as Internet through a
device called the Wireless Access Point (WAP).

• WiMAX: WiMAX would operate similar to WiFi, but at higher speeds over greater
distances and for a greater number of users. WiMAX has the ability to provide service

Shailaja.DS– IT HOD
even in areas that are difficult for wired infrastructure to reach and the ability to
overcome the physical limitations of traditional wired infrastructure.

Q7. Define WWW. How is it different from the Internet?


Ans. World Wide Web (WWW) is a way of accessing information over the medium of the
internet whereas, internet is the massive interconnection of computer networks around the
world. WWW refers to software and internet refers to the physical connection of the paths
between two or more computers.

Session 3: Introduction To Instant Messaging


Answer the following questions
Q1. What is instant messaging?
Ans: Instant messaging refers to sending messages online to people whom we are connected
with ad the message gets delivered in real time i.e., instantly.
The Instant messengers can either be web based or application based.

Q2.Name some applications that offer instant messaging


Ans: Some popular instant messengers are: Google Hangouts, Facebook messenger, Skype,
Whats app, Telegram etc.

Q3. Etiquette of instant messaging


Ans: General Rules And Etiquette To Be Followed While Chatting
• Messages should be short and to the point.
• Always introduce yourself by name if your screen name doesn’t reflect it.
• Always ask if the other person has time to chat.
• Typing your messages in uppercase is extremely rude – it’s considered
• Shouting and very aggressive.
• Give people time to respond.
• It’s important to properly end an IM conversation.

Shailaja.DS– IT HOD
Session 4: Chatting with a Contact- Google Talk

Q1. Write about Google Talk


Ans: Google Talk was an instant messaging service that provided both text and voice
communication. A Google Talk mobile web app had also been previously available. Now Google
is recommending users to use Google Hangouts instead.

Q2. Write about Yahoo Messenger


Ans: Yahoo! Messenger was an instant messaging client provided by Yahoo!. It was a public
chat room service which was shut down in 2012.

Session 5: Creating And Publishing Web Pages – Blog


Answer the following questions
Q1. What is a blog? Name some of the websites used to create a blog
Ans: A blog refers to an online journal where entries are posted. The word blog has been
derived from WEB LOG.
There are many online sites that let you create your blogs. Some of the free blogging sites
are: Blogger, WordPress, Weebly, Wix etc.,

Q2. What is a post?


Ans: The entries or information in the blogs are known as posts.

Q3. Define a) Blogger b) Blogging


Ans:
a) Blogger: A person who writes and maintains a blog is called blogger.
b) Blogging: The art of writing a blog is called as blogging.

Session 6: Using Offline Blog Editors


Answer the following questions
Q1. What is offline blog editor?

Shailaja.DS– IT HOD
Ans: An offline blog editor is an editor that lets bloggers create blog posts without an internet
connection.

Q2. Name some offline blog editors


Ans: Some popular offline blog editors are: Windows Live Writer (Windows), BlogDesk
(Windows), Qumana (Windows & Mac), Ecto (Mac), BlogJet (Windows).

Session 7: Online Transactions


Answer the following questions
Q1. What is online transaction? What is other name?
Ans: Online transaction is a payment method in which the transfer of fund or money happens
online electronic fund transfer.
Online transactions are also known as e-Payments.

Q2. Define a) e-Shopping b) e-ticketing


Ans:
a) e-Shopping: e-shopping refers to shopping over internet by selecting items and placing
order to buy them on a website or through a mobile app.

b) e-Ticketing: Electronic Ticketing is the process of making e-Tickets available without


any need for printed tickets.

Session 8: Internet Security


Answer the following questions
Q1. Discuss all the point which should be kept in mind while working on computers.
Ans: We should follow below point while working on computers:

1. Set secure passwords and don’t share them with anyone. Avoid using common words,
phrases, or personal information and update regularly.
2.Restrict access and make personal information secure to prevent identity theft.
3. Be suspicious of unsolicited contact from individuals seeking internal organizational data or
personal information.

Shailaja.DS– IT HOD
4. Limit the amount of personal information you post. Do not post information that would
make you vulnerable, such as your address or information about your schedule or routine.
5. Take advantage of privacy and security settings. Use site settings to limit the information
you share with the general public online.
6. Be suspicious of unknown links or requests sent through email or text message. Do not
click on unknown links or answer strange questions sent to your mobile device, regardless of
who the sender appears to be.
7.Download only trusted applications from reputable sources or marketplaces.

Q2. Define Phishing, Spoofing, Virus, Firewall, Antivirus, Malware and Spyware
Ans:
• Phishing is the fraudulent attempt to obtain sensitive information or data, such as
usernames, passwords and credit card details, by disguising oneself as a trustworthy
entity in an electronic communication.
• Spoofing is when a hacker pretends to be someone known by a person or network in
order to access sensitive information, often in pursuit of financial gain.
• A computer virus, much like a flu virus, is designed to spread from host to host and
has the ability to replicate itself.
• A firewall is a network security system that monitors and controls incoming and
outgoing network traffic based on predetermined security rules.
• Antivirus software, or anti-virus software is a computer program used to prevent,
detect, and remove malware.
• Malware, or malicious software, is any program or file that is harmful to a computer
user. Types of malware can include computer viruses, worms, Trojan horses and
spyware.
• Spyware is a software which is installed on your computer to spy on your activities and
report this data to people willing to pay for it.

Q3. What points should be kept in mind while choosing passwords


Ans: Choosing effective passwords us very crucial
• Use different passwords on different accounts
• Don’t use passwords that are based on personal information that can be easily accessed
or guessed.

Shailaja.DS– IT HOD
• Use a combination of capital and lowercase letters, numbers and special characters
• Develop mnemonics such as passphrases for remembering complex passwords.

Q4. How to protect yourself against viruses and other malware


Ans: Follow the below guidelines
• Use Antivirus and Anti Spyware software
• Download Antivirus updates regularly
• Run frequent full system scans
• Keep your system up to date
• Use caution while downloading files on the internet
• Disable cookies, if possible.

Session 9: Maintain Workplace Safety


Answer the following questions
Q1. Describe any four rules that companies have about fire safety
Ans: Some of the rules that companies have about fire safety are:
a) Do not smoke in the offices
b) Do not carry lighters or matches into the office
c) Do not use elevator in times of fire in the building.
d) Get trained in the use of fire extinguishers.

Q2. General precautions to be taken in the workplace with respect to electrical safety
Ans: Eliminate workplace hazards like:
a) Damaged electrical outlets, cords, cables etc.
b) Overloaded outlets and circuits
c) Combustible substance in unsecured locations
d) Fire exit obstacles

Q3. What can be considered in fire risk assessment plan?


Ans: As part of the fire risk assessment plan, you will need to consider
a) Emergency routes and exits

Shailaja.DS– IT HOD
b) Fire detection and warning systems
c) Fire fighting equipment
d) An emergency fire evacuation plan
e) Staff fire safety training

Q4.What actions should be taken to minimize slips, trips, and falls in the workplace?
Ans: To minimize slips, trips and falls at workplace, we can follow certain rules like
• Proper ventilated workplace
• Clean and dry floors
• Immediately cleaning any oil spills or dust
• Smoke alarms placed at proper intervals

Q5. What is importance of First aid


Ans: The importance of first aid awareness in schools:
First aid is an important tool in quickly responding to accidents to ensure that injuries can be
efficiently and promptly dealt with before a trained medical professional arrives to administer
more specialized treatment.
First aid in schools is especially helpful as children often get into accidents that can need
swift care in order to prevent things from escalating.
Ensuring there are trained first aiders within the school will help a school be a safer
environment for everyone. Here are just some of the benefits that come from having a first
aider on site.
Session 10: Prevent Accidents And Emergencies
Answer the following questions
Q1. What is workplace emergency?
Ans: A workplace emergency is an unforeseen situation that threatens your employees,
customers, or the public; disrupts or shuts down the workplace operations; or causes physical
or environmental damage.

Q2. How can you prepare for emergencies?


Ans: A emergency action plan helps in preparing for emergencies. It must include the
following:
• An evacuation policy and procedure

Shailaja.DS– IT HOD
• Emergency escape procedures and route assignments
• Names, titles, departments and telephone numbers to contact in emergency
• Rescue and medical duties for any workers designated to perform them
• Designating an assembly location and procedures for all employees after an evacuation.
• A preferred method for reporting emergencies

Q3. Explain the different types of accidents


Ans: Some common accidents that can occur in workplace are as follows:
• Slips, trips and falls • Cuts
• Muscle strains • Inhaling toxic fumes
• Being hit by falling objects • Walking into objects
• Crashes and collisions • Fights at work

Session 11: Protect Health And Safety At Work


Answer the following questions
Q1. What are some examples of workplace hazards?
Ans: A hazard is any source of potential damage, harm or adverse health effects of the people
at workplace.
General examples include any substance, material, process, practice etc. that has the ability to
cause harm or adverse health effect to a person or property.

Q2. What are some of the ways in which workplace hazards can be eliminated?
Ans: By identifying hazards at your workplace, you will be better prepared to control or
eliminate them and prevent accidents.
The following points can be considered:
• First aid boxes at various places in the office
• Trained first aides – on all floors of a buildings
• Knowledge of the nearest casualty department or local hospital
• Access to call for an ambulance
• Ability to provide immediate assistance to casualties with illnesses or injuries caused by
a specific hazard at work.

Shailaja.DS– IT HOD
Q3. Explain what biological hazards are.
Ans: Biological hazards are caused by bacteria, viruses, insects, plants, animals and humans
etc. It includes exposure to harm or disease associated with working with animals, people or
infectious plant materials.

Q4. Define a) Physical Hazards b) Chemical Hazards c) Ergonomic/ Mechanical Hazards


Ans:
a) Physical hazards can be any factors within the environment that can harm the body
without necessarily touching it. It can be caused by radiation (microwave, radio wave),
pressure extremes (high pressure or vacuum), constant loud noise, high exposure to
sunlight/ultraviolet rays, temperature extremes (hot and cold), etc.

b) Chemical Hazards: It depends on the physical, chemical and toxic properties of the
chemical in any form (solid, liquid or gaseous). This type of hazards can cause skin
irritation, illness or breathing problems.

c) Ergonomic/ Mechanical Hazards: Caused by repetitive movements, improper set up of


workstation, etc. It normally occurs when the type of work, body posture and working
conditions put a strain on your body.

Q5. Explain any two ways through which one can maintain a healthy body at workplace.
Ans: There are many factors that should be taken into account to maintain a healthy living, two
of them are
Watch your plate:
• Consume variety of foods and get awareness regarding their serving sizes.
• Be conscious about calorie reduction.
• Have more fresh vegetables and fruits
• Drink clean water and stop consuming sugar-sweetened beverages.
• Do not consume foods high in salt, sugar and saturated and trans fats.
Watch your steps:
• Actively engage and promote physical activities: walking, using stairs, taking active
breaks and movements throughout the day.

Shailaja.DS– IT HOD
• Join sports events, use the fitness center, or participate in exercise sessions
• Exercise at least 30–45 minutes daily

Q6. Write any two precautions that are to be taken of at the workplace.
Ans:
• Be alert to hazards that could affect anyone – not just yourself; in this respect,
maintain a team mentality at all times.
• Fire extinguishers and first aid kits must be available and readily attainable.

Shailaja.DS– IT HOD

You might also like