Web Applications and Security
Web Applications and Security
CLASS -X
UNIT-4 WEB APPLICATIONS AND SECURITY
SESSION 1: WORKING WITH ACCESSIBILITY OPTIONS
Computer Accessibility refers to the user friendliness of a computer system for all, regardless of
their disability. It enables a person with a disability or impairment to use a computer. It is known
as Assistive Technology.
KEYBOARD TAB
Sticky Keys
StickyKeys is an accessibility feature to help computer users with physical disabilities, but it is
also used by others as a means to reduce repetitive strain.
FilterKeys
FilterKeys is a feature of Microsoft Windows. It is an accessibility function that tells the
keyboard to ignore brief or repeated keystrokes, making typing easier for people with hand
tremors.
ToggleKeys
ToggleKeys is also a feature of Microsoft Windows. It is an accessibility function which is
designed for people who have vision impairment or cognitive disabilities. When ToggleKeys is
turned on, computer emits sound cues when the locking keys (Caps Lock, Num Lock, or Scroll
Lock) are pressed. A high sound is emitted when the keys are switched on and a low sound is
emitted when they are switched off.
Sound Tab
Select the Sound Tab. A window with options to configure accessibility options for sound is
displayed
SoundSentry
SoundSentry is designed to help users with auditory impairments. SoundSentry generates visual
warnings, such as a blinking title bar or a flashing border, whenever the computer generates a
sound.
ShowSounds
ShowSounds instructs applications that convey information by sound, to also provide
information visually, through text captions or informative icons
.
Display Tab
Select the Display Tab. A window with options to configure accessibility options for display is
displayed.
High Contrast
High Contrast is an accessibility feature to assist people with vision impairment. You can change
the size and color of fonts and the background for ease of viewing.
Cursor Options
Cursor Options is also an accessibility feature that assists people with vision impairment by
changing the blink rate and width of the cursor.
MOUSE TAB
MouseKeys
MouseKeys is an accessibility feature that assists people who have difficulty using a mouse. This
option uses the keyboard (especially numeric keypad) as a pointing device instead of a mouse.
General Tab
This tab enables you to configure accessibility options for all users.
Select the General Tab, a window to configure additional accessibility options will be displayed
SerialKeys
SerialKeys is an accessibility feature that assists people that have difficulty using a keyboard or a
mouse (or both).
CLIENT-SERVER ARCHITECTURE:
Networks in which certain computers have special dedicated tasks, providing services to other
computers (in the network) are called client server networks. The computer(s) which provide
services are called servers and the ones that use these services are called clients.
TYPES OF NETWORKS
There are two major types of network Local Area Network (LAN) and Wide Area Network
(WAN).
INTERNET
The Internet is a global system of interconnected computer networks that use the standard
Internet protocol suite to serve billions of users worldwide. It is a network of networks that
consists of millions of private, public, academic, business, and government networks.
Data Sharing: One of the most important uses of networking is to allow the sharing of data.
Files transfer: Users can send text files, spread sheets, documents, presentations, audio files,
video files, etc. to other users.
Hardware Sharing: Hardware components such as printers, scanners, etc. can also be shared.
Internet Access Sharing: You can purchase a single Internet connection and share it among
other computers in a network instead of purchasing multiple Internet connection for each
computer
Usage of network based applications: Such as web browsers, email clients, chat application,
audio & video calling, etc. is another advantage.
MODEM
Á modem is a device that converts digital computer signals into a form (analog signals) that can
travel over phone lines. It also re-converts the analog signals back into digital signals. The word
modem is derived from its function MOdulator/DEModulator.
WI-Fi: Wi-Fi is a popular technology that allows an electronic device such as computers or
mobile phones to exchange data wirelessly over a network, including high-speed Internet
connections. WiFi devices such as personal computer, smartphones, video game console, etc. can
connect to a network resource such as Internet through a device called the Wireless Access Point
(WAP).
There are some general rules and etiquettes to be followed while chatting.
• Messages should be short and to the point.
• Always introduce yourself by name if your screen name doesn’t reflect it.
• Always ask if the other person has time to chat first - regardless of how important you
think what you have to say is, it’s not going to be well received if the recipient is busy.
• Give people time to respond - Multiple questions sent to a recipient before they’ve had a
chance to answer can seem more like an interrogation rather than a conversation.
A Blog is a discussion style site used by non-technical users for creating personal web pages.
Blog is similar to an online personal diary and similar to use. A blog is used to convey messages,
events, news, announcements etc.
Blogs are usually managed through web browser which needs an internet connection. A blog can
also be created through Offline Blog Software and later publish the content when the internet
connection is available.
Examples of Websites that offer blog services:-
www.blogger.com
www.wordpress.com
www.weebly.com
www.blog.com
If you do not have an active internet connection, you can create blogs using a blog application
and publish the blog whenever internet connectivity is available.
There are several free offline blog editors available that can be downloaded and installed on the
local computer such as:
• Qumana
• Windows Live Writer
• Blogdesk
SESSION 6: ONLINE TRANSACTIONS
The transactions over the internet are called Online Transactions like purchasing of goods,
selling of goods, booking a ticket, payment of fees etc. all comes under the category of Online
transactions
Examples
For Buying Goods :- amazon, jabong, myntra, flipkart , ebay etc.
For Booking of Tickets :- IRCTC , Redbus etc.
For Payment of School Fee :- epay.unionbankofindia.co.in/kvfee
Payments tools to use Online transaction
Online Threats
The threats / vulnerabilities that uses World Wide Web (Internet) to facilitate crimes are called
Online Threats.
Like:-
Phishing :- The act of acquiring personal / private and sensitive data from personal computers
for use in fraudulent activities. For eg. Mails from unknown persons that ask for your credit /
debit card details.
Email spoofing :- It is the creation of email messages with a forged sender address. For eg.
Sending an email with a forged email address which appears to be original. These mails are
infected mails which contain worms.
Chat Spoofing:- Spoofing means hoax, trick, or deceive which contains false information.
Hiding / Faking the identity of another person over the internet is called chat spoofing
Backup your data: Always keep copies of data in CD, pen drives etc, so it could be helpful in
situation when there is a loss of data.
Use Encryption software: Use encrypted software available within the operating software to
protect data from unauthorized users.
Keep username and password private: never save passwords or usernames on computers are
that used in shared environments like net café.
Registering with website: Read privacy policy whenever you register with a website, the policy
will include information about how the website use personal data.
Do not share personal information: Be cautious when filling out forms on internet. Because
you’re personal information or emails could be used by unauthorized users to send fake or
unwanted emails. So, first research and verify if it’s a trusted website or not before providing
personal information to any website.
Secure transactions: It is always recommended to use only secure websites for online shopping
or transactions, because these websites store your credit card or online banking personal
information. Verify if the website uses secure transaction, usually it is indicated through a digital
certificate represented as a golden lock in the web browser’s address bar.
Use Antivirus and antispyware software: These software’s protect
your computer from any changes by malwares/threats. Keep these software’s up to date.
Do not immediately respond to mails from unknown users: Some mails, that promise you
jobs or announce lottery results, may contain virus or scripts or they can try to gather your
personal information. Never open the attachments from unknown persons.
Install firewalls: Firewalls keep your system and network secure. They could be software or
hardware. So, Install and configure your firewall.
Regularly update your operating system and software applications.
When you visit websites, cookies are created on your system that may contain your personal or
logon details. Clear browser cookies frequently so that your logon details could not be tracked by
unauthorized users
Accident: an accident is an unplanned event that may happen all of a sudden and may lead to
unwanted or unprecedented results/outcomes.
Handling accidents:
• Safety measures must be placed to prevent workplace accidents
• Immediately call the medical team for any injury
• Stay alert
• Pay attention to and follow emergency drills
Emergency
Any unexpected situation that needs immediate attention and action.
An emergency situation might pose a sudden risk to life, property health etc. and needs
intervention to prevent deteriorating results/ hazards.
An emergency situation is one that:
● threatens the employees, customers or the public
● disrupts or shuts down the operations
● causes physical or environmental damage
• An emergency must be handled immediately to prevent further losses and to minimize
the loss. One must be alert to notice any kind of emergency. There are various types of
emergencies that may occur at home. School or workplace. Hence it becomes essential
requirement to have an emergency plan to minimize the loss and recover from
emergency.
Types of Emergency :
• Various types of emergencies are there and there should be an emergency management
plan to handle the situation of emergency. Some of the types of emergencies are as
follows :
• Chemical spills
• Extreme heat waves
• Droughts
• Pandemics
• Terrorist attack
• Fire
• Floods
• Thunderstorms
• Leakage of some hazardous gas/ chemical
Some of the types of emergencies that require evacuation are:
● Fire
● Explosion
● Floods
● Earthquake
● Hurricane
● Tornado
● Toxic material release
● Civil disturbance
● Workplace violence
Session 10: Protect Health and Safety at work
Checklist for Workstations:
Workplace Evacuation
In case of emergency there should be provision for evacuation. Evacuation is the process of
emptying a place in case of an emergency, disaster.
Every company must ensure following points for evacuation in case of any emergency:
An evacuation policy:
• Every organization must have an evacuation policy. All the Team Leaders are responsible
for informing about the policy to their employees about it. Proper attention must be paid
when the Team Leader is informing you about these details. Negligence at this time may
cost lives.
• Organization must have a designated assembly point for emergencies. Ensure that every
employee/ worker must know where it is.
• A ‘buddy system’ for individuals with special needs or disabilities must be designated.
This system ensures that differently-abled are assisted and guided out of the premises or
the impacted area properly. If you are a buddy to someone, ensure that your buddy is safe
at the assembly point with you.
• Floor plans with evacuation routes in work areas. Ensure that you understand these so
you can use it in time of need.
• Assembly areas, where you are required to assemble after evacuation, must be properly
taken care of.
• Periodic evacuation drills should be conducted. Ensure that you pay attention during
these drills. You need to save your life and you can be helpful in saving someone else’s
life too.
Healthy Living
‘A healthy body has a healthy mind’ - a very popular saying is true.
‘Healthy Lifestyle leads to a healthy being. A healthy living has a lasting impact on an individual
which ultimately yields a healthy environment at home as well as at work place. a happy and
healthy worker will always perform best to his ability.
A healthy lifestyle helps to keep and improve people’s health and well being.
A healthy lifestyle includes:
• Healthy eating habits
• Physical activities
• Stress management
• Healthy mind
• Sound sleep
• Goal setting