Web Application and Security
Web Application and Security
Class 10
Unit – 4
WEB APPLICATIONS AND SECURITY
1|Page
SESSION 1: WORKING WITH ACCESSIBILITY OPTIONS
SESSION 1: CREATE AND APPLY STYLES IN THE DOCUMENT
Sticky Keys is an accessibility feature to help computer users with physical disabilities, but it is also
used by others as a means to reduce repetitive strain.
Sticky Keys allows the user to press and release a modifier key, such as Shift, Ctrl, Alt, or the Windows
key, and have it remained active until any other key is pressed.
Filter Keys is a feature of Microsoft Windows. It is an accessibility function that tells the keyboard to
ignore brief or repeated keystrokes, making typing easier for people with hand tremors.
ToggleKeys is also a feature of Microsoft Windows. It is an accessibility function which is designed for
people who have vision impairment or cognitive disabilities. When ToggleKeys is turned on, computer
emits sound cues when the locking keys (Caps Lock, Num Lock, or Scroll Lock) are pressed. A high
sound is emitted when the keys are switched on and a low sound is emitted when they are switched
off.
Sound Sentry is designed to help users with auditory impairments. Sound Sentry generates visual
warnings, such as a blinking title bar or a flashing border, whenever the computer generates a sound.
Mouse Keys is an accessibility feature that assists people who have difficulty using a mouse. This
option uses the keyboard (especially numeric keypad) as a pointing device instead of a mouse. Select
the Mouse Tab, a window to configure accessibility options for mouse will be displayed
2|Page
Serial Keys is an accessibility feature that assists people that have difficulty using a keyboard or a
mouse (or both). They can use special devices such as Sip, Puff and Breath Switches to provide input
to the computer through Serial Ports.
For example, sipping on the tube activates one device, while puffing on the same tube activates
another.
1. The option in Microsoft Windows XP used for helping users with physical disabilities and to reduce
repetitive strain is Sticky Keys.
2. Sound Sentry is designed to help users with auditory impairments.
3. The High Contrast option in Microsoft Windows XP is designed to assist people with vision
impairments.
4. Serial Keys is designed to assist people that have difficulty using a keyboard or a mouse.
Networks in which all computers have an equal status are called peer to peer networks. Generally, in
such a network each terminal has an equally competent CPU.
Networks in which certain computers have special dedicated tasks, providing services to other
computers (in the network) are called client server networks. The computer(s) which provide services
are called servers and the ones that use these services are called clients.
3) Give any three advantages of networking.
• Data Sharing: One of the most important uses of networking is to allow the sharing of data.
• Files Transfer: Users can send text files, spread sheets, documents, presentations, audio files,
video files, etc. to other users.
• Hardware Sharing: Hardware components such as printers, scanners, etc. can also be shared.
For example, instead of purchasing 10 printers for each user, one printer can be purchased and
shared among multiple users thus saving cost.
• Internet Access Sharing: You can purchase a single Internet connection and share it among other
computers in a network instead of purchasing multiple Internet connection for each computer.
This is very commonly found in Internet café (browsing centres), schools, colleges, companies,
etc.
• Usage of network-based applications: Such as web browsers, email clients, chat application,
audio & video calling, etc. is another advantage.
4|Page
A local area network (LAN) is one which connects computers and devices in a limited geographical
area such as home, school, computer laboratory, office building, or closely positioned group of
buildings.
Usually, local area networks offer very high speeds and are used for connecting computers and
peripherals such as printers, scanners, etc.
A wide area network (WAN) is one which covers a broad area (i.e., any network that links across
metropolitan, regional, or national boundaries). The Internet is the most popular WAN, and is used
by businesses, governments, non-profit organizations, individual consumers, artists, entertainers,
and many others.
5|Page
e. WiMAX: WiMAX (Worldwide Interoperability for Microwave Access) is a wireless
communications standard designed to provide mobile broadband connectivity across cities and
countries through a variety of devices. WiMAX is a long-range system, covering many kilometres
and is typically used where DSL or Cable Internet Access cannot be used; this could be difficulty in
laying out cables for home or offices located in remote locations but need access to the Internet.
f. Dial-up Internet access is a form of Internet access that uses the facilities of the public switched
telephone network (PSTN) to establish a connection to an Internet service provider
(ISP) via telephone lines using a device called MODEM. Users dial a particular number provided by
the ISP and gain access to the Internet.
Dial-up connections are extremely slow and, in most cases, it is replaced by a high-speed
connection such as DSL or Cable Modem.
g. 3G, short for 3rd Generation is a set of standards used for mobile devices and mobile
telecommunication services and networks. High-Speed Downlink Packet Access (HSDPA) is 3G
mobile telephony communications protocol that allows higher data transfer speeds and capacity.
If support for 3G is available on your mobile phone, you can subscribe to the 3G connectivity with
your ISP in order to get high speed Internet connection on your phone.
6|Page
SESSION 3: INTRODUCTION TO INSTANT MESSAGING
Web based instant messaging software is accessed using browsers such as Internet Explorer,
Mozilla Firefox, Google Chrome, etc. Some of the popular web based instant messaging software
are:
• Meebo
• Yahoo! Messenger for the Web
• MSN Web Messenger
• IMO, etc.
a. Instant messaging (IM) is a form of communication over the Internet that offers an instantaneous
transmission of text-based messages from sender to receiver.
b. microphone, headset/speaker & Internet Connection & Web Camera are required for audio and
video conferencing.
7|Page
SESSION 4: CHATTING WITH A CONTACT – GOOGLE TALK
1) State any 03 rules and etiquettes to be followed while chatting on the Internet.
There are some general rules and etiquettes to be followed while chatting. They are almost the
same as those that apply for emails.
•Messages should be short and to the point.
• Always introduce yourself by name if your screen name doesn’t reflect it.
• Always ask if the other person has time to chat first - regardless of how important you think what
you have to say is, it’s not going to be well received if the recipient is busy.
• In a business environment, know exactly what you want to discuss.
• Typing your messages in uppercase is extremely rude - it’s considered shouting and very
aggressive.
• Give people time to respond - Multiple questions sent to a recipient before they’ve had a chance
to answer can seem more like an interrogation rather than a conversation.
• Wherever possible, give the person you are communicating with your undivided attention. It’s
not just a sign of respect, but if you have multiple conversations happening or are allowing other
issues to distract you, you may miss an important point in the other person’s messages or lose
the gist of the conversation.
• It’s important to properly end an IM conversation - you may think the chat is over, but the other
person may not. While you’re off doing other things, they may be sitting there staring at the
screen waiting for further communication from you!!
2) What are the basic needs to use instant messaging (chat) software?
• Instant messaging account (Yahoo/Google/MSN etc.)
• Instant Messaging Software/App or Web Browser to access IM services.
• Good Internet Connection.
8|Page
SESSION 5: CREATING AND PUBLISHING WEB PAGES - BLOG
9|Page
SESSION 6: USING OFFLINE BLOG EDITORS
10 | P a g e
SESSION 7: ONLINE TRANSACTIONS
11 | P a g e
SESSION 8: INTERNET SECURITY
12 | P a g e
• Avoid using something that the public or workmates know you strongly like or dislike.
• Use random password generators if possible.
Example of a strong password: u1vX:,4Hd{]$
5) Explain any four best practices to secure data.
Use strong passwords, a combination of alphanumeric and special characters could be used for
creating a password that is not so easy to crack or guessed by other users. Do not keep passwords
such as your favorite color, friends or relatives name, bike number, mobile number either as single or
combined option.
Use encryption software: (Usually available within the operating system) to protect your data from
unauthorized users. If encryption software is not available within the operating system, use a 3rd
party software.
Keeping your username and password private: Never save your username or password on
computers that are used in shared environments such as internet café. Browsers may save your
personal data on the local computer that can be used by another user using the same computer.
Registering with websites: Read the privacy statement or policy whenever you register with a website,
the statement or policy will include information about how the website use personal data.
Do not share personal information: Websites require you to fill out forms containing fields such as
name, gender, age, email address, school, etc. Be cautious when filling out such forms; research and
verify if it’s a trustable website. Your email addressed could be used by unauthorized users to send
you fake or unwanted emails; think twice or thrice before providing information to any website and
decide if it is really necessary.
Secure transactions: If you are using online shopping or transactions, websites even store your credit
card or online banking personal information such as your credit card number, account details, etc.
This information can be tracked and used by un-authorized users often known as hackers to misuse
this information.
Use antivirus and antispyware software: Computers are prone to attacks from software known as
Malware that could harm your computer. Malware track browsing behaviour or transmit personal
data from your computer; programs such as keyloggers could be installed on your computer track
and transmit every key that is pressed on a keyboard (keystrokes) to unauthorized users.
Do not immediately respond to mails from unknown users: It may be a fake mail trying to gather
personal information such as your bank account details, home address, etc. Some mails could promise
you jobs or announce lottery results which in turn could compromise the user.
13 | P a g e
Clear browser cookies frequently: Cookies are programs that are created on your local computer
when you visit websites. Though cookies are meant for storing data based on your activity performed
during your earlier visit such as logon details, details of a shopping cart, visited pages in a website,
etc. they could also be tracked by unauthorized users and possibly gain access to your personal
information.
Keep the operating system and software applications up to date, though operating systems and
applications are designed, tested and distributed, sometimes they may have security holes through
which a hacker can take advantage; they may track and gather information or even damage the whole
computer.
Install firewalls: Firewalls could be software or hardware and can assist in keeping a computer and a
network secure. Firewalls analyze the network traffic and determine if the traffic should be allowed
or not.
Never install software from unknown sources: As they might not be trustworthy; download only
from well-known or reputed websites. Verify the source if it is legitimate by searching the internet or
referring to comments from other users before downloading them; understand the nature and the
purpose of the software before attempting to download and install them.
Remove unwanted or unknown software applications: These might have got installed without your
knowledge when you have visited some websites. Unwanted software could get installed as they
might have been bundled along with necessary software.
Use antivirus and antispyware software: Computers are prone to attacks from software known as
Malware that could harm your computer. Malware track browsing behaviour or transmit personal
data from your computer; programs such as keyloggers could be installed on your computer track
and transmit every key that is pressed on a keyboard (keystrokes) to unauthorized users.
Antivirus and Antispyware programs also offer real-time protection monitoring your computer for
any changes by malware software. Keep your Antivirus and Antispyware software always up to date,
this can help in protecting your computer from recent threats.
7) Explain the purpose of Online transactions.
Online transaction is a payment method in which the transfer of fund or money happens online over
electronic fund transfer. Online transaction process (OLTP) is secure and password protected. Three
steps involved in the online transaction are Registration, Placing an order, and, Payment.
14 | P a g e
SESSION 9: MAINTAIN WORKPLACE SAFETY
2) Give any two basic safety rules for ensuring Falls and Slips safety.
Falls and Slips Safety rules
- Keep the moving area clean and clutter free.
- Workplace must be proper ventilated receive light.
- Wear non slippery footwear.
- Floors must be clean and dry
- Oil spills, dust must be immediately cleaned.
3) Give any two electrical safety rules in any organization.
- Electrical equipment used should be approved by a recognised organization.
- Workers should be trained to handle the electric equipment safely
- Damaged and hazardous electrical equipment should be immediately replaced. All old and workout
and frayed switches and wires should be changed.
- Heat emanating equipment should be kept away from the electrical equipment.
- Take care that the outlets/ circuits should not be overloaded.
- Switch off and unplug the electrical appliances before cleaning or relocating them.
4) Explain any two first aid rules.
Some rules of First Aid are:
- Assure the injured to remain calm and not to panic
- Keep them warm if they are under shock
- Do not move the victim in case of back/neck injury
5) What do you mean by occupational hazards?
A worker may face Occupational hazards at workplace.: An occupational hazard is the illness one may
acquire due to his occupation. Like people working in a chemical factory may get affected due to
presence of certain chemicals.
6) List any three types of occupational hazards.
Some types of occupational hazards are: Physical hazards, chemical hazards, biological hazards,
behavioural hazards, radiological hazards, ergonomic hazards etc.
15 | P a g e
SESSION 10: PREVENT ACCIDENTS AND EMERGENCIES
16 | P a g e
SESSION 11: PROTECT HEALTH AND SAFETY AT WORK
1) Explain the term ‘Evacuation Policy’
An evacuation policy: Every organization must have an evacuation policy. All the Team Leaders are
responsible for informing about the policy to their employees about it. Proper attention must be paid
when the Team Leader is informing you about these details. Negligence at this time may cost lives.
2) List any 3 types of hazards.
Hazards can be of different types depending on the industry and the environment in which the
employees work. The different types of hazards include:
● Physical ● Chemical
● Biological ● Mechanical
3) Give the checklist for workstations to minimize the hazards.
Checklist for Workstations: The workstation should:
● provide sufficient space for the user to alter position comfortably
● provide adequate lighting
● have windows fitted with adjustable coverings to alter the sunlight level
● be spacious enough when a workstation is shared by more than one person
4) Explain Buddy System to implement evacuation efficiently in case of emergency
A ‘buddy system’ for individuals with special needs or disabilities must be designated. This system
ensures that differently-abled are assisted and guided out of the premises or the impacted area
properly. If you are a buddy to someone, ensure that your buddy is safe at the assembly point with
you.
5) Explain the terms Floor Plans and Assembly /areas.
Floor plans with evacuation routes in work areas. Ensure that you understand these so you can use it
in time of need.
Assembly areas, where you are required to assemble after evacuation, must be properly taken care
of.
6) Describe the importance of periodic evacuation drills.
Periodic evacuation drills should be conducted. Ensure that you pay attention during these drills. You
need to save your life and you can be helpful in saving someone else’s life too.
7) Explain importance of a healthy lifestyle.
‘A healthy body has a healthy mind’ - a very popular saying is true.
‘Healthy Lifestyle leads to a healthy being. A healthy living has a lasting impact on an individual which
ultimately yields a healthy environment at home as well as at work place. a happy and healthy worker
will always perform best to his ability.
A healthy lifestyle helps to keep and improve people’s health and well-being.
8) Give any four points of a healthy lifestyle
A healthy lifestyle includes:
- healthy eating habits - physical activities
- stress management - healthy mind
- sound sleep - goal setting
17 | P a g e
Fill in the Blanks
1. An organization can face some health hazards that could put the lives of the employees in danger.
2. Hazards can be of different types depending on the industry and the environment.
in which the employees work.
3. Organization must have a designated evacuation policy for emergencies
5. Give a checklist for workstations to minimize the hazards.
18 | P a g e