0% found this document useful (0 votes)
101 views10 pages

Web Applications and Security Revision Notes

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
101 views10 pages

Web Applications and Security Revision Notes

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

WEB APPLICATIONS AND SECURITY

REVISION NOTES

Computer Accessibility refers to the user friendliness of a computer system for all, regardless of
their disability. it enables a person with a disability or impairment to use a computer. It is known as
Assistive Technology. There are numerous types of impairment that impact computer usage. These
include:
 Cognitive impairments and learning disabilities
 Attention Deficit Hyperactivity Disorder (ADHD) or autism.
 Visual impairment.
 Hearing impairment
 Motor impairment

Launching Accessibility Options:


To launch accessibility options in WindowsXP, Click Start > Control Panel > Accessibility Options.

Various tabs in Accessibility Option Window:


Keyboard Tab to configure accessibility options for Keyboard is displayed
1) Sticky Keys: Sticky Keys is an accessibility feature to help computer users with physical
disabilities, but it is also used by others as a means to reduce repetitive strain.
StickyKeys allows the user to press and release a modifier key, such as Shift, Ctrl, Alt, or the
Windows key, and have it remain active until any other key is pressed.
• To enable StickyKeys, select Use StickyKeys.
• Click Apply.
• Click OK.
The Sticky Keys icon appears in the system tray.

2) Filter Keys: Filter Keys is a feature of Microsoft Windows. It is an accessibility function that tells
the keyboard to ignore brief or repeated keystrokes, making typing easier for people with hand
tremors.
• To enable Filter Keys, check Use Filter Keys.
• Click Settings under Filter Keys and check “Ignore Repeated Keystrokes”.
• Click Apply.
• Click OK.
The FilterKeys icon appears in the system tray

3) ToggleKeys: ToggleKeys is an accessibility function which is designed for people who have
vision impairment or cognitive disabilities. When ToggleKeys is turned on, computer emits sound
cues when the locking keys (Caps Lock, Num Lock, or Scroll Lock) are pressed.
A high sound is emitted when the keys are switched on and a low sound is emitted when they are
switched off.
• To enable ToggleKeys, Check Use ToggleKeys.
• Click Settings under ToggleKeys. • Click Apply
• Click OK.
Having enabled ToggleKeys, you can see its effect by any one of the following keys NUM LOCK,
CAPS LOCK or SCROLL LOCK. Notice that on doing so, you hear a beep.

Sound Tab to configure accessibility options for sound is displayed.


1) SoundSentry: SoundSentry is designed to help users with auditory impairments. SoundSentry
generates visual warnings, such as a blinking title bar or a flashing border, whenever the computer
generates a sound.

Page - 1 -
• To enable SoundSentry, Check Use SoundSentry under Sound Tab. Doing so activates a drop down
list wherefrom you can choose the type of visual warning desired.
• Click Apply.
• Click OK.

2) ShowSounds: ShowSounds instructs applications that convey information by sound, to also


provide information visually, through text captions or informative icons.
• To enable ShowSounds, Check Use ShowSounds under Sound Tab.
• Click Apply.
• Click OK

Display Tab to configure accessibility options for Display is displayed.


1) High Contrast: High Contrast is an accessibility feature to assist people with vision impairment.
You can change the size and color of fonts and the background for ease of viewing.
• To enable HighContrast, Check Use HighContrast
• Under Display Tab (figure 5).
• Click Apply.
• Click OK.

2) Cursor Options: Cursor Options is also an accessibility feature that assists people with vision
impairment by changing the blink rate and width of the cursor.
• To change the speed of the cursor blink, move the Blink Rate slider back and forth. Notice the
cursor blinking at various speeds.
• To change the width of the cursor, move the Width slider back and forth. Notice the with of the
cursor changing.

Mouse Tab to configure accessibility options for Mouse is displayed.


1) MouseKeys: MouseKeys is an accessibility feature that assists people who have difficulty using a
mouse. This option uses the keyboard (especially numeric keypad) as a pointing device instead of a
mouse.
• To enable MouseKeys, Check Use MouseKeys.
• Click Apply.
• Click OK.

General Tab enables you to configure accessibility options for all users.
1) Serial Keys: Serial Keys is an accessibility feature that assists people that have difficulty using a
keyboard or a mouse (or both). They can use special devices such as Sip, Puff and Breath Switches to
provide input to the computer through Serial Ports.

NETWORKING FUNDAMENTALS
A network can be defined as an interconnected collection of autonomous computers. A ‘computer
network’ or simply a ‘network’ is a collection of computers and other hardware devices,
interconnected by communication channels (satellites or cables) that allow sharing of resources and
information. A computer networking is the practice for exchanging informations/services between
two or more computer devices together for the purpose of sharing data. The speed of a network is
measured in Mbps (Megabits per second).

Networks are designed using the following architecture:


1) Peer-to-Peer (P2P) Architecture: Networks in which all computers have an equal status are
called peer to peer networks. Generally in such a network each terminal has an equally competent
CPU.
2) Client-Server Architecture: Networks in which certain computers have special dedicated tasks,
providing services to other computers (in the network) are called client server networks. The
Page - 2 -
computer(s) which provide services are called servers and the ones that use these services are called
clients.

BENEFITS OF NETWORKING
Computer network is very useful in modern environment, so some of the benefits of networking are
discussed here:
 Data Sharing: One of the most important uses of networking is to allow the sharing of data.
 File Sharing: Networking of computers helps the users to share data files.
 Hardware Sharing: Users can share devices such as printers, scanners, CD-ROM drives, hard
drives, etc.
 Application Sharing: Applications can be shared over the network and this allows to implement
client/server applications.
 User Communication: This allows users to communicate using E-mail, newsgroups, video
conferencing within the network.
 Access to Remote Database: By networking, we are able to access to the remote database. It is
easy for any person using his PC to make reservations for aeroplanes, trains, hotels, etc.,
anywhere in the world with instant confirmation within the network.

TYPES OF NETWORK
A network refers to a group of interconnected computers which are capable of sharing information
and communication devices.
On the basis of coverage or geographical spread, a network can be divided into following types:

LAN (Local Area Network)


When a group of computers and its devices are connected in a small area, then this network is said to
be a LAN. Computers or users in a local area network can share data, information, software and
common hardware devices such as printer, modem, hard disk, etc. A LAN typically relies mostly on
wired connections for increased speed and security but wireless connection also be a part of LAN.
LAN are used within office building, school, etc.

MAN (Metropolitan Area Network)


This is basically bigger version of LAN and normally uses similar technology. It might cover few
buildings in a city and might either be private or public. e.g. In a city, a MAN, which can support
both data and voice might even be related to local cable television network.

WAN (Wide Area Network)


The network which connects the different countries network is known as WAN. It can be a group of
LANs. The largest existing WAN is Internet. For example, a network of ATMs, BANKs, National
Government Offices spread over a country or continents are examples of WANs.

INTERNET:
The Internet is a global system of interconnected computer networks that use the standard Internet
protocol suite to serve billions of users worldwide. It is a network of networks.

Uses of Internet: There are various uses of Internet. Some of them are listed below
 Internet is used by students, educational institutes to gather information for research.
 It is used for online shopping.
 It is used for sending and receiving mail.
 It is used for playing games.
 It is used for Online Transaction.

World Wide Web: World Wide Web (abbreviated as WWW or W3, commonly known as the Web),
is a system of interlinked hypertext documents accessed via the Internet.
Page - 3 -
Web Browser: A Web Browser is a software used to view Web sites and acts as an interface between
the user and the World Wide Web.

Web Server: Web server is a computer that stores web sites and their related files for viewing on the
Internet.

Internet Service Provider: An Internet service provider (ISP) is an organization which provides you
with access to the Internet via a dial-up (using modem) or direct (hard wired) or wireless connection.
for example Bharat Sanchar Nigam Limited (BSNL), Airtel, MTS, Vodafone, Tata Docomo, etc.

Modem: It stands for MOdulator/DEModulator. It is a device that converts digital computer signals
into a form analog signals and vice versa.

Types of Common Internet Connectivity: There are different types of Internet Connectivity
available today; it can be widely categorized into wired and wireless access.

Technology Type of Connectivity

Dial-up Wired

DSL Wired

Cable Internet Access Wired

3G Wireless

WiMAX Wireless

Wi-Fi Wireless

Some of the commonly used Internet connectivity are:


1) Dial-up connections are extremely slow and in most cases, it is replaced by a high speed
connection such as DSL or Cable Modem.

2) DSL: Digital subscriber line(DSL) provide Internet access by transmitting digital data over wires
of a local telephone network. DSL service is delivered along with wired telephone service on the
same telephone line. On the customer premises, a DSL filter removes the high frequency interference,
enabling simultaneous use of the telephone and data transmission. For using a DSL connection, you
need a DSL modem and a subscription.

3) Cable Internet Access: Cable Internet Access is a form of broadband Internet access that uses the
cable television infrastructure. Cable Internet Access is provided through existing cable TV networks;
this is similar to DSL that is provided over existing telephone lines

4) 3G: 3G, short for 3rd Generation is a set of standards used for mobile devices and mobile
telecommunication services and networks. High-Speed Downlink Packet Access (HSDPA) is 3G
mobile telephony communications protocol that allows higher data transfer speeds and capacity.

5) WiMAX: WiMAX (Worldwide Interoperability for Microwave Access) is a wireless


communications standard designed to provide mobile broadband connectivity across cities and
countries through a variety of devices. WiMAX is a long range system, covering many kilometres

Page - 4 -
and is typically used where DSL or Cable Internet Access cannot be used; this could be difficulty in
laying out cables for home or offices located in remote locations but need access to the Internet.

6) WI-Fi : Wi-Fi (Wireless Fidelity) is a popular technology that allows an electronic device such as
computers or mobile phones to exchange data wirelessly over a network, including high-speed
Internet connections. WiFi devices such as personal computer, smartphones, video game console, etc.
can connect to a network resource such as Internet through a device called the Wireless Access Point
(WAP).
Wi-Fi is used where cables cannot be run (such as old buildings, outdoor areas) to provide network
and Internet access. Wi-Fi can also be used where users require mobile connectivity.
Wi-Fi connectivity is used in home & offices, hotels, college & school campus typically for Internet
Access. Shopping malls, coffee shops, resorts mostly offer free or paid Wi-Fi access to the Internet
for their customers.

INSTANT MESSAGING
Instant messaging (IM) is a form of communication over the Internet that offers an instantaneous
transmission of text-based messages from sender to receiver.

Types of Instant Messaging Software: There are two kinds of instant messaging software –
application based and Web based.

A) Application based: Application based instant messaging software is downloaded and installed on
user’s computer. Some of the popular instant messaging software are:
 Google Talk
 Yahoo! Messenger
 Skype
 Windows Live Messenger
 Rediff Bol, etc.

B) Web based: Web based instant messaging software is accessed using browsers such as Internet
Explorer, Mozilla Firefox, Google Chrome, etc. Some of the popular web based instant messaging
software are:
 Meebo
 Yahoo! Messenger for the Web
 MSN Web Messenger
 IMO, etc.

Key Features of an instant messaging are as follows:


 Text Messages can be sent to one or more person (Similar to SMS)
 Audio calling and conferencing.
 Video calling and conferencing.
 File transfers (Not limited to documents, spread sheets, audio files, video files, etc.)
 Message history (Save messages for future reference).

NOTE: To use instant messaging software, a user must have a valid instant messaging account.

GOOGLE TALK
Google Talk : Google Talk is an instant messaging service that provides both text and voice
communication developed by Google Inc. Google Talk can also be used for making video calls.
Google Talk is free and is available as application based as well as web based. A Gmail account is
required to use Google Talk.

Steps to Chat with a contact that is already added to your contact list.
Page - 5 -
a) Whenever your friend in the contact list is online you can see the person along with a green dot.
b) You can start sending text chat message instantly by double-clicking on a contact the other person
will see the text message and respond to your message.

General rules and etiquettes to be followed while chatting :


1) Messages should be short and to the point.
2) Always introduce yourself by name if your screen name doesn’t reflect it.
3) Always ask if the other person has time to chat first.
4) Don’t Type your messages in uppercase as it seems to be extremely rude.
5) Give people time to respond.

CREATING AND PUBLISHING WEB PAGES – BLOG


Blog: A blog is a discussion style site used by non-technical (or technical users) users for creating
personal web pages. Blogs are similar to an online personal diary and simple to use.

Some of the popular websites that offer blog service for free are:
 www.wordpress.com
 www.blogger.com
 www.blog.com
 www.weebly.com
 www.blogsome.com

WordPress: WordPress is free web service that you can use to create a beautiful website or blog.
WordPress has support for “themes” which can make the blog or the webpage look attractive.

How to create account in WordPress?


1) Open the Web Browser and type https://signup.WordPress.com/signup/.
2) Enter a unique address to your WordPress Blog. This is the address which others will use to view
your blog.
3) Enter username and password to manage your blog.
4) Enter your Email Address and click on create blog.
5) An email will be sent (above mentioned email) for activating your blog account. Open your email
and click on the activation link.
6) Now the blog is ready for use.

How to create post in WordPress?


1) Login to your WordPress Account.
2) To create a post, click New Post.
3) Type the title for your post.
4) Type the content which you want others to read. You can also add photos, videos, etc. to the blog
using the options available in WordPress
5) Once you have finished typing the content, Click Publish Post to publish your content. This
process is called posting content.

USING OFFLINE BLOG EDITORS


Offline Blog Editors:
Those Editors in which we can create blog when we do not have an active internet connection and
publish the blog whenever internet connectivity is available are called Offline Blog Editors.

There are several free offline blog editors available such as :


 Qumana
 Windows Live Writer
 Blogdesk
Page - 6 -
 BlogJet
 MarsEdit

Online transactions: Online transactions deals with transfer of money over the internet. There are
many benefits of online transactions like, fast transaction speed, convenience, low risk of theft etc.

Some of the popular online transaction websites are:


1) IRCTC(Indian Railway Catering and Tourism Corporation), an online portal for booking flight
and train tickets.
2) Flipkart, an online shopping portal for buying consumer products. Flipkart offers multiple
payment methods like credit card, debit card, net banking, e-gift voucher, and Cash on Delivery.
3) EBay, an online portal for buying and selling goods.
4) Redbus, an online portal for booking bus tickets.

Online shopping: Online shopping is a form of electronic commerce where customers can buy or sell
goods over the Internet.

Online shopping could be useful in situations when:


1) A customer does not have sufficient time to visit stores.
2) Visiting a store is more expensive than purchasing a product online.
3) A product or service that is not available in the local market is available online.

Internet security: Internet security is a branch of computer security specifically related to the
Internet. Its objective is to establish rules and measures to use against attacks over the Internet.

Best Practices for Security:


1) Use strong password and keep on changing after every 2 -3 weeks.
2) Use encryption software to protect your data from unauthorized users.
3) Never save your username or password on shared computers.
4) Do not share personal information.
5) Use updated antivirus and antispyware software.
6) Clear browser cookies frequently.
7) Keep the operating system and software applications up to date.
8) Install Firewall : Firewalls analyse the network traffic and determine if the traffic should be
allowed or not.
9) Never install software from unknown sources.
10) Remove unwanted or unknown software applications: These might have got installed without
your knowledge when you have visited some websites.
11) Clear Data Stored In Browsers : It is not advisable to leave the web browser store data(username,
password, credit card detail) particularly on public or shared computers.

General guidelines for managing strong passwords are:


 Keep the length of the password at least 12-14 characters if permitted.
 Avoid keeping passwords based on repetition, dictionary words, letter or number sequences,
usernames, relative or pet names, etc.
 Including numbers, and symbols in passwords if allowed.
 Use capital and lower-case letters.
 Avoid using the same password for multiple sites or purposes.
 Avoid using something that the public or workmates know you strongly like or dislike.

NOTE :
 www.strongpasswordgenerator.com help to generate strong password.
 Example of Online threats are Phishing, email spoofing, chat spoofing, etc.
Page - 7 -
 Combination of alphanumeric and special characters could be used for creating a password that is
not so easy to crack.
 Programs such as keyloggers track and transmit every key that is pressed on a keyboard
(keystrokes) to unauthorized users

MAINTAIN WORKPLACE SAFETY


Every organization must follow a standard set of safety rules and procedures. These rules must be
stated and displayed clearly at important areas . All the employees must be given a demonstrations
and training to follow safety rules .
Basic safety rules to follow at workplace – Fire safety, Falls and slips, Electrical safety, Use of first
aid.
Timely repairs should be carried out by a competent person/ organization at workplace / home to
avoid/minimize any hazards.

Basic Fire safety rules in an organization are:


Most of the time fire can be prevented using appropriate measures.
 Fire escape plans must be installed at proper levels
 Conduct regular drills
 Smoke alarms must be placed at proper intervals
 Keep workplace a no-smoking zone
 Maintenance of safety equipment must be taken care of regularly

Falls and Slips Safety rules:


 Keep the moving area clean and clutter free.
 Workplace must be proper ventilated receive light.
 Wear non slippery footwear.
 Floors must be clean and dry
 Oil spills, dust must be immediately cleaned.

ELECTRICAL SAFETY RULES:


Following are some of the measures we should take to keep ourselves safe from electricity hazards
and accidents:-
 Electrical equipment used should be approved by a recognised organization.
 Workers should be trained to handle the electric equipment safely
 Damaged and hazardous electrical equipment should be immediately replaced. All old and
workout and frayed switches and wires should be changed.
 Heat emanating equipment should be kept away from the electrical equipment.
 Take care that the outlets/ circuits should not be overloaded .
 Switch off and unplug the electrical appliances before cleaning or relocating them.

USE OF FIRST AID


First Aid is the immediate assistance provided to the injured to save life and minimize health loss till
the proper medical aid/ facility is provided.
Every organization must have basic First Aid Kit. Kit must have all necessary items. Make sure to
check for the expiry of medical related items.
Some rules of First Aid are :
 Assure the injured to remain calm and not to panic
 Keep them warm if they are under shock
 Do not move the victim in case of back/neck injury

Occupational hazard: An occupational hazard is the illness one may acquire due to his occupation.
Some types of occupational hazards are : Physical hazards, chemical hazards, biological hazards, ,
behavioural hazards, radiological hazards, ergonomic hazards etc.
Page - 8 -
Accident: an accident is an unplanned event that may happen all of a sudden and may lead to
unwanted or unprecedented results/outcomes.

Types of Accidents: Accidents may be of following types :


 Accidents at workplace : Slips and fall accidents, fire
 Industrial disease/illness
 Road traffic accidents
 Clinical Accidents
 Sports related accidents

Handling Accidents:
Accidents must be handled carefully. The accident should be handled compassionately without
assigning blame on others.
 Every organization must follow SOP for accident handling
 Safety measures must be placed to prevent workplace accidents
 Immediately call the medical team for any injury
 Stay alert
 Pay attention to and follow emergency drills

EMERGENCY: Any unexpected situation that needs immediate attention and action is called
emergency.

An emergency situation is one that:


 threatens the employees, customers or the public
 disrupts or shuts down the operations
 causes physical or environmental damage

TYPES OF EMERGENCY:
Various types of emergencies are there and there should be an emergency management plan to handle
the situation of emergency. Some of the types of emergencies are as follows :
 Chemical spills
 Extreme heat waves
 Droughts
 Pandemics
 Terrorist attack
 Fire
 Floods
 Thunderstorms
 Leakage of some hazardous gas/ chemical

Some of the types of emergencies that require evacuation are:


 Fire
 Explosion
 Floods
 Earthquake
 Hurricane
 Tornado
 Toxic material release
 Civil disturbance
 Workplace violence

Prepared by: M. S. KumarSwamy, TGT(Maths) Page - 9 -


HAZARDS AND SOURCES OF HAZARDS:
A hazard is anything that is the source of any potential harm, damage or any kind of potential loss of
health or life.

The different types of hazards include:


 Physical
 Chemical
 Biological
 Mechanical

Evacuation: Evacuation is the process of emptying a place in case of an emergency, disaster. Every
company must ensure following points for evacuation in case of any emergency:
 An evacuation policy.
 Organization must have a designated assembly point for emergencies.
 Floor plans with evacuation routes pasted in work areas
 Periodic evacuation drills should be conducted

Healthy Living:
A healthy living has a lasting impact on an individual which ultimately yields a healthy environment
at home as well as at work place.

A healthy lifestyle helps to keep and improve people’s health and well being.

A healthy lifestyle includes :


 healthy eating habits
 physical activities
 stress management
 healthy mind
 sound sleep
 goal setting

Prepared by: M. S. KumarSwamy, TGT(Maths) Page - 10 -

You might also like