Web Applications and Security Notes
Web Applications and Security Notes
SESSION-1
Q&A
1. What is Computer Accessibility?
ANS:
Computer Accessibility refers to the user friendliness of a computer system for all,
regardless of their disability.
2.What is Assistive Technology?
ANS:
When a combination of hardware and software enables a person with a disability or
impairment to use a computer. It is known as Assistive Technology.
3.What are the types of Impairment?
ANS:
Cognitive impairments and learning disabilities, such as dyslexia, attention deficit-
hyperactivity disorder (ADHD) or autism.
Visual impairment such as low-vision, complete or partial blindness, and color blindness.
Hearing impairment including deafness.
Motor or dexterity impairment such as paralysis, cerebral palsy, or carpal tunnel
syndrome and repetitive strain injury.
4.What are the two options in Cursor options. Explain them.
ANS:
To change the speed of the cursor blink, move the Blink Rate slider back and forth.
To change the width of the cursor, move the Width slider back and forth
5. Common Tools found in Ease of Access Center
ANS:
START MAGNIFIER: Large Fonts
START NARRATOR: Reads aloud what is on the screen
START IB-SCREEN NARRATOR: On screen keyboard
SET UP HIGH CONTRAST: Settings for color and contrast of display.
6. Explain High Contrast Feature.
ANS:
It is an accessibility feature to assist people with eyesight impairment.
You can change the size and color of fonts and the desktop background for the ease of
viewing
7. What is Sound Sentry?
ANS:
It is designed to help users with auditory impairments.
It generates visual warnings such as blinking title bar, flashing border whenever
computer generates a sound.
SESSION-2
Q&A:
1.What is a Computer Network?
ANS: A computer network is a collection of computers and other hardware components
interconnected by communication channels (cables or satellites) that allow sharing of resources
and information.
2.Explain about the network architecture.
ANS: PEER-PEER (P2P) ARCHITECTURE:
Networks in which all computers have an equal status are called peer to peer networks.
Generally, in such a network each terminal has an equally competent CPU.
CLIENT-SERVER ARCHITECTURE:
Networks in which certain computers have special dedicated tasks, providing services to
other computers (in the network) are called client server networks.
The computer(s) which provide services are called servers and the ones that use these
services are called clients.
3.TYPES OF NETWORK:
ANS: LAN, MAN, WAN
LAN-LOCAL AREA NETWORK
LAN is one which connects computers and devices in a limited geographical area such as
home, school, computer laboratory, office building, or closely positioned group of
buildings.
Usually local area networks offer very high speeds and are used for connecting
computers and peripherals such as printers, scanners, etc.
MAN-METROPOLIITAN AREA NETWORK
MAN is a network that interconnects users with computer resources in a geographic area
or region.
WAN-WIDE AREA NETWORK.
A wide area network (WAN) is one which covers a broad area
The Internet is the most popular WAN, and is used by businesses, governments, non-
profit organizations, individual consumers, artists, entertainers, and many others.
8. TYPES OF TOPOLOGIES:
ANS:
MESH TOPOLOGY: Each computer is connected to every other computer to provide an
alternate path for transferring data.
STAR TOPOLOGY: Each computer is connected to a centrally located device called
hub.
BUS TOPOLOGY: One long cable acts a backbone to link all the computers in a
network.
RING TOPOLOGY: Each computer is connected with the two computers on either side
of it.
SESSION-3&4
Q&A:
1.What is IM and list out the key features of IM.
ANS:
Instant messaging (IM) is a form of communication over the Internet that offers an instantaneous
transmission of text-based messages from sender to receive.
Unlike email, instant messaging happens in real-time and the response from participants can be
spontaneous.
KEY FEATURES:
Text Messages can be sent to one or more person (Similar to SMS)
Audio calling and conferencing.
Video calling and conferencing
File transfers (Not limited to documents, spread sheets, audio files, video files, etc.)
Message history (Save messages for future reference).
SESSION-5&6
Q&A:
1.What are Blogs. Give some websites of Online blogs
ANS:
A blog is a discussion style site used by non-technical (or technical users) users for
creating personal web pages.
Blogs are similar to an online personal diary and simple to use.
You can use a blog to convey messages about events, announcements, news, reviews, etc.
WEBSITES:
www.WordPress.com , www.blogger.com , www.blog.com , www.weebly.com ,
www.blogsome.com
ANS:
To create a post, click New Post. A Window similar to the one displayed below appears.
Title: You must provide a title for your post choose a title that this post will focus on.
Once you have finished typing the content, you need to publish the post for others to see.
Click Publish Post to publish your content
The comment option is available towards the end of the post. Look for options such as
Leave a comment, Leave a reply, etc. in the blog to comment
ANS:
If you do not have an active internet connection, you can create blogs using a blog application
and publish the blog whenever internet connectivity is available.
SESSION-7
Q&A:
1. Explain the purpose of Online transaction:
ANS:
A customer does not have sufficient time to visit stores.
Visiting a store is more expensive than purchasing a product online.
A product or service that is not available in the local market is available
online.
2. List out few popular online transaction website.
ANS:
IRCTC, an online portal for booking flight and train tickets.
Flipkart, an online shopping portal for buying consumer products.
EBay, an online portal for buying and selling goods.
Redbus, an online portal for booking bus tickets.
SESSION-8
Q&A:
1. Explain the purpose of Internet Security.
ANS:
Internet security is a branch of computer security specifically related to the
Internet, often involving browser security but also network security.
Its objective is to establish rules and measures to use against attacks over the
Internet.
The Internet represents an insecure channel for exchanging information
leading to a high risk of intrusion or fraud, such as phishing and email-
spoofing
ANS:
Keep the length of the password at least 12-14 characters if permitted.
Avoid keeping passwords based on repetition, dictionary words, letter or
number sequences, user names, relative or pet names, etc.
Use capital and lower-case letters.
Avoid using the same password for multiple sites or purposes.
Avoid using something that the public or workmates know you strongly
like or dislike.
Use random password generators if possible.
3. List few steps to protect data
ANS:
Backup your data
Use encryption software
Keeping your username and password private
Registering with websites:
Do not share personal information
Secure transactions
Use antivirus and antispyware software
Do not immediately respond to mails from unknown users
Clear browser cookies frequently
Install firewalls
Never install software from unknown sources
Remove unwanted or unknown software applications
2. What are some basic falls and slips safety rules in an organization?
Falls and slips safety rules:
Workplace must be proper ventilated
Floors must be clean and dry
Oil spills, dust must be immediately cleaned.
Smoke alarms must be placed at proper intervals
Keep workplace a no-smoking zone.
3. What are some basic electrical safety rules?
Electrical safety rules:
First aid is the immediate assistance provided to the injured to save life and
minimize health loss till the proper medical aid/ facility is provided.
An accident is an unplanned event that may happen all of a sudden and may lead
to unwanted or unprecedented results/outcomes
2. What is an emergency?
5. What are some emergencies that require immediate evacuation? [write any 4]
Fire
Explosion
Floods
Earthquake
Hurricane
Tornado
Toxic material release
Civil disturbance
Workplace violence
Have windows fitted with adjustable coverings to alter the sunlight level
Be spacious enough when a workstation is shared by more than one person
6. What is evacuation?
Evacuation is the process of emptying a place in case of an emergency, disaster.