0% found this document useful (0 votes)
38 views14 pages

Web Applications and Security Notes

Web application and security

Uploaded by

snegasen
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
38 views14 pages

Web Applications and Security Notes

Web application and security

Uploaded by

snegasen
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 14

WEB APPLICATIONS

SESSION-1

Q&A
1. What is Computer Accessibility?
ANS:
 Computer Accessibility refers to the user friendliness of a computer system for all,
regardless of their disability.
2.What is Assistive Technology?
ANS:
 When a combination of hardware and software enables a person with a disability or
impairment to use a computer. It is known as Assistive Technology.
3.What are the types of Impairment?
ANS:
 Cognitive impairments and learning disabilities, such as dyslexia, attention deficit-
hyperactivity disorder (ADHD) or autism.
 Visual impairment such as low-vision, complete or partial blindness, and color blindness.
 Hearing impairment including deafness.
 Motor or dexterity impairment such as paralysis, cerebral palsy, or carpal tunnel
syndrome and repetitive strain injury.
4.What are the two options in Cursor options. Explain them.
ANS:
 To change the speed of the cursor blink, move the Blink Rate slider back and forth.
 To change the width of the cursor, move the Width slider back and forth
5. Common Tools found in Ease of Access Center
ANS:
 START MAGNIFIER: Large Fonts
 START NARRATOR: Reads aloud what is on the screen
 START IB-SCREEN NARRATOR: On screen keyboard
 SET UP HIGH CONTRAST: Settings for color and contrast of display.
6. Explain High Contrast Feature.
ANS:
 It is an accessibility feature to assist people with eyesight impairment.
 You can change the size and color of fonts and the desktop background for the ease of
viewing
7. What is Sound Sentry?
ANS:
 It is designed to help users with auditory impairments.
 It generates visual warnings such as blinking title bar, flashing border whenever
computer generates a sound.
SESSION-2
Q&A:
1.What is a Computer Network?
ANS: A computer network is a collection of computers and other hardware components
interconnected by communication channels (cables or satellites) that allow sharing of resources
and information.
2.Explain about the network architecture.
ANS: PEER-PEER (P2P) ARCHITECTURE:
 Networks in which all computers have an equal status are called peer to peer networks.
 Generally, in such a network each terminal has an equally competent CPU.
CLIENT-SERVER ARCHITECTURE:
 Networks in which certain computers have special dedicated tasks, providing services to
other computers (in the network) are called client server networks.
 The computer(s) which provide services are called servers and the ones that use these
services are called clients.
3.TYPES OF NETWORK:
ANS: LAN, MAN, WAN
 LAN-LOCAL AREA NETWORK
 LAN is one which connects computers and devices in a limited geographical area such as
home, school, computer laboratory, office building, or closely positioned group of
buildings.
 Usually local area networks offer very high speeds and are used for connecting
computers and peripherals such as printers, scanners, etc.
 MAN-METROPOLIITAN AREA NETWORK
 MAN is a network that interconnects users with computer resources in a geographic area
or region.
 WAN-WIDE AREA NETWORK.
 A wide area network (WAN) is one which covers a broad area
 The Internet is the most popular WAN, and is used by businesses, governments, non-
profit organizations, individual consumers, artists, entertainers, and many others.

4.Explain the following terms:


a) World Wide Web b) Web browser c)Web server
 World Wide Web (abbreviated as WWW or W3, commonly known as the Web), is a
system of interlinked hypertext documents accessed via the Internet.
 A Web Browser is a software used to view Web sites and acts as an interface between
the user and the World Wide Web.
 A Web server is a computer that stores web sites and their related files for viewing on the
Internet

5. Explain in detail about the types of Internet Connectivity.


ANS:

Technology Type of Connectivity


Dial-Up Wired
DSL Wired
Cable Internet Access Wired
3G Wireless
WIMAX Wireless
WIFI Wireless
DIAL-UP
 Dial-up Internet access is a form of Internet access that uses the facilities of the public
switched telephone network (PSTN) to establish a connection
 Users dial a particular number provided by the ISP and gain access to the Internet.
DSL:
 Digital subscriber line(DSL) provide Internet access by transmitting digital data over
wires of a local telephone network.
 DSL filter removes the high frequency interference, enabling simultaneous use of the
telephone and data transmission.
CABLE INTERNET ACCESS
 Cable Internet Access is provided through existing cable TV networks; this is similar to
DSL that is provided over existing telephone lines
3G
 3rd Generation is a set of standards used for mobile devices and mobile
telecommunication services and networks.
 High-Speed Downlink Packet Access (HSDPA) is 3G mobile telephony communications
protocol that allows higher data transfer speeds and capacity.
WIMAX:
 WiMAX (Worldwide Interoperability for Microwave Access) is a long range system,
covering many kilometers and is typically used where DSL or Cable Internet Access
cannot be used;
WIFI:
 Wi-Fi devices such as personal computer, smartphones, video game console, etc. can
connect to a network resource such as Internet through a device called the Wireless
Access Point (WAP).
 Wi-Fi is used where cables cannot be run (such as old buildings, outdoor areas) to
provide network and Internet access.
6.Advantages of networking:
ANS:
Data Sharing: Users can send text files, spread sheets, documents, presentations, audio files,
video files, etc. to other users.
Hardware Sharing: Hardware components such as printers, scanners, etc. can also be shared.
Internet Access Sharing: You can purchase a single Internet connection and share it among
other computers in a network instead of purchasing multiple Internet connection for each
computer.
Usage of network based applications: Such as web browsers, email clients, chat application,
audio & video calling, etc is another advantage.

7. How is the data transferred on the Internet.


ANS:
 The data is broken up into bits of same sized pieces called packets.
 A header is added to each packet explaining where the data has come from, where it
should end up and where it fits in with the rest of the packets.
 Each packet is sent from computer to computer until it finds its destination. Each
computer on the way decides where next to send the packet. All packets may not take the
same route.
 At the destination, the packets are examined. If any packets are missing or damaged, a
message is sent asking for them to be re-sent. This continues until all packets have been
received intact.
 The packets are now reassembled into their original form. All this done in seconds!

8. TYPES OF TOPOLOGIES:
ANS:
 MESH TOPOLOGY: Each computer is connected to every other computer to provide an
alternate path for transferring data.
 STAR TOPOLOGY: Each computer is connected to a centrally located device called
hub.
 BUS TOPOLOGY: One long cable acts a backbone to link all the computers in a
network.
 RING TOPOLOGY: Each computer is connected with the two computers on either side
of it.

SESSION-3&4
Q&A:
1.What is IM and list out the key features of IM.
ANS:
Instant messaging (IM) is a form of communication over the Internet that offers an instantaneous
transmission of text-based messages from sender to receive.
Unlike email, instant messaging happens in real-time and the response from participants can be
spontaneous.
KEY FEATURES:
 Text Messages can be sent to one or more person (Similar to SMS)
 Audio calling and conferencing.
 Video calling and conferencing
 File transfers (Not limited to documents, spread sheets, audio files, video files, etc.)
 Message history (Save messages for future reference).

2.What are the two kinds of IM?


ANS:
There are two kinds of instant messaging software – application based and Web based.
Application based instant messaging software is downloaded and installed on user’s computer.
Some of the popular instant messaging software are:
• Google Talk
• Yahoo! Messenger
• Skype
• Windows Live Messenger
• Rediff Bol, etc
Web based instant messaging software is accessed using browsers such as Internet Explorer,
Mozilla Firefox, Google Chrome, etc. Some of the popular web based instant messaging
software are:
• Meebo
• Yahoo! Messenger for the Web
• MSN Web Messenger
• IMO, etc.
3.General etiquettes to be followed while chatting.
ANS:
 Messages should be short and to the point.
 Always introduce yourself by name if your screen name doesn’t reflect it.
 Always ask if the other person has time to chat first -.
 In a business environment, know exactly what you want to discuss.
 Typing your messages in uppercase is extremely rude - it’s considered shouting and very
aggressive.
 Give people time to respond.
 Wherever possible, give the person you are communicating with your undivided
attention
 It’s important to properly end an IM conversation

SESSION-5&6
Q&A:
1.What are Blogs. Give some websites of Online blogs
ANS:
 A blog is a discussion style site used by non-technical (or technical users) users for
creating personal web pages.
 Blogs are similar to an online personal diary and simple to use.
 You can use a blog to convey messages about events, announcements, news, reviews, etc.

WEBSITES:
www.WordPress.com , www.blogger.com , www.blog.com , www.weebly.com ,
www.blogsome.com

2.Write the steps to publish post.

ANS:
 To create a post, click New Post. A Window similar to the one displayed below appears.
 Title: You must provide a title for your post choose a title that this post will focus on.
 Once you have finished typing the content, you need to publish the post for others to see.
Click Publish Post to publish your content
 The comment option is available towards the end of the post. Look for options such as
Leave a comment, Leave a reply, etc. in the blog to comment

3.What is meant by Offline Blogs? List out few Offline Blogs?

ANS:
If you do not have an active internet connection, you can create blogs using a blog application
and publish the blog whenever internet connectivity is available.

Qumana, Windows Live Writer, Blog desk


(SESSION 7,8)

SESSION-7
Q&A:
1. Explain the purpose of Online transaction:
ANS:
 A customer does not have sufficient time to visit stores.
 Visiting a store is more expensive than purchasing a product online.
 A product or service that is not available in the local market is available
online.
2. List out few popular online transaction website.
ANS:
 IRCTC, an online portal for booking flight and train tickets.
 Flipkart, an online shopping portal for buying consumer products.
 EBay, an online portal for buying and selling goods.
 Redbus, an online portal for booking bus tickets.

SESSION-8
Q&A:
1. Explain the purpose of Internet Security.
ANS:
 Internet security is a branch of computer security specifically related to the
Internet, often involving browser security but also network security.
 Its objective is to establish rules and measures to use against attacks over the
Internet.
 The Internet represents an insecure channel for exchanging information
leading to a high risk of intrusion or fraud, such as phishing and email-
spoofing

2. List few Online threats:


ANS:
 Online threats are Phishing, email spoofing, chat spoofing, etc.

3. Mention some general guidelines for managing strong passwords:

ANS:
 Keep the length of the password at least 12-14 characters if permitted.
 Avoid keeping passwords based on repetition, dictionary words, letter or
number sequences, user names, relative or pet names, etc.
 Use capital and lower-case letters.
 Avoid using the same password for multiple sites or purposes.
 Avoid using something that the public or workmates know you strongly
like or dislike.
 Use random password generators if possible.
3. List few steps to protect data
ANS:
 Backup your data
 Use encryption software
 Keeping your username and password private
 Registering with websites:
 Do not share personal information
 Secure transactions
 Use antivirus and antispyware software
 Do not immediately respond to mails from unknown users
 Clear browser cookies frequently
 Install firewalls
 Never install software from unknown sources
 Remove unwanted or unknown software applications

4. How to cleat data stored in Browsers?


ANS:
 Click Tools Menu, click Options.
 Click Security Tab
 The following window will be displayed

 Notice that under Passwords section, Remember password for sites is


checked

SESSION-9 MAINTAIN WORKPLACE SAFETY


1. What are some basic fire safety rules in an organization?
 basic fire safety rules in an organization are:
 Fire escape plans must be installed at proper levels
 Conduct regular drills
 Maintenance of safety equipment must be taken care of regularly.

2. What are some basic falls and slips safety rules in an organization?
 Falls and slips safety rules:
 Workplace must be proper ventilated
 Floors must be clean and dry
 Oil spills, dust must be immediately cleaned.
 Smoke alarms must be placed at proper intervals
 Keep workplace a no-smoking zone.
3. What are some basic electrical safety rules?
 Electrical safety rules:

Electrical equipment approved by a recognized organization.


 Damaged and hazardous electrical equipment should be immediately replaced.
 Heat emanating equipment should be kept away from the electrical equipment.
 Take care that the outlets/ circuits should not be overloaded

4. What is first aid?

 First aid is the immediate assistance provided to the injured to save life and
minimize health loss till the proper medical aid/ facility is provided.

5. List out some rules of first aid.


 Some rules of first aid are:
 Assure the injured to remain calm and not to panic
 Keep them warm if they are under shock
 Do not move the victim in case of back/neck injury

6. Types of fire extinguishers:


Water and foam : extinguish the fire by taking the heat element away from the fire
Water extinguishers are for class A fire only – they should not be used for class b
or c
Carbon dioxide: Extinguish the fire by taking away the oxygen element of the fire
triangle and also be removing the heat with very cold discharge
Used for class B and c fires
7. Dry chemical :
Extinguish the fire primarily by interrupting the chemical reaction of the fire
triangle
Multipurpose dry chemical is effective for class A, B, C fire.
Ordinary dry chemical is for class B AND C
8. Wet chemical:
Extinguish the fire by removing the heat triangle and prevents re-ignition by
creating a barrier between the oxygen and fuel element
Wet chemicals of class K extinguishers were developed for modern, high
efficiency deep fat fryer in commercial cooking
SESSION-10 PREVENT ACCIDENTS AND EMERGENICIES
1. What is an accident?

An accident is an unplanned event that may happen all of a sudden and may lead
to unwanted or unprecedented results/outcomes
2. What is an emergency?

Any unexpected situation that needs immediate attention and action


3. List out some types of accidents. [write any 4]
 Slips and fall accidents
 Fire
 Industrial disease/illness
 Road traffic accidents
 Clinical accidents
 Sports related accidents

4. What is an emergency situation?


 an emergency situation is one that:
 Threatens the employees, customers or the public
 Disrupts or shuts down the operations
 Causes physical or environmental damage

5. What are some emergencies that require immediate evacuation? [write any 4]
 Fire
 Explosion
 Floods
 Earthquake
 Hurricane
 Tornado
 Toxic material release
 Civil disturbance
 Workplace violence

6. How to handle accidents?

 The accident should be handled compassionately without assigning blame on


others.
 Every organization must follow SOP
 Safety measures must be placed to prevent workplace accidents
 Immediately call the medical team for any injury
 Stay alert
 Pay attention to and follow emergency drills
SESSION-11 PROTECT HEALTH AND SAFETY AT WORk
1. List out the different types of hazards.
 The different types of hazards include:
 Physical – caused by radiation, pressure, constant sound , temperature extremes
 Chemical – depends of physical, chemical and toxic properties of the chemical
in any form
 Biological – caused by bacteria, virus
 Psychological hazard : caused by stress, violence in the work place
 Ergonomic – caused by repetitive movements, improper set up of workstation,
body posture, putting strain on your body
 Safety hazard- unsafe condition in the workplace
1. Slipping hazard
2. Tripping hazard: fall from height(ladder)
3. Inappropriate machine guarding and equipment malfunction

2. How should an ideal workstation be?


 The workstation should:
 Provide sufficient space for the user to alter position comfortably
 Provide adequate lighting

Have windows fitted with adjustable coverings to alter the sunlight level
 Be spacious enough when a workstation is shared by more than one person

3. How should an ideal display in a workplace be like?

 the display screen should:


 Display well-defined characters of adequate size and spacing
 Have a stable image
 Have easily adjustable brightness and contrast
 Tilt and swivel easily to suit the user
 Be free from glare and reflections
 Use a separate base for the screen or an adjustable table

4. How should an ideal keyboard in a workplace be like?


 The keyboard should:
 Be able to tilt easily and should be able to separate from the screen to allow the
user to adopt a comfortable working position
 Have space in front to provide support for the hands or arms of the user
 Have a matt surface
 Have clearly legible symbols on the keys

5. How should an ideal work surface be like?


 The work surface should:
 Provide adequate space for the user
 Have a low reflective surface
 Be of an adequate size to allow the screen, keyboard and other peripherals to be
flexibly arranged
 Have a stable and adjustable document holder, which should be at the same
level as the screen and at the same viewing distance.

6. What is evacuation?
Evacuation is the process of emptying a place in case of an emergency, disaster.

7. What are the requirements of a workplace evacuation?


 Every organization must have an evacuation policy.
 Organization must have a designated assembly point for emergencies.
 A ‘buddy system’ for individuals with special needs or disabilities must be
designated.

You might also like