Web Application and Security
Web Application and Security
• Google talk
• Yahoo! Messenger
• Skype
• Windows live messenger
• Rediffbol
Ans. Instant messaging (IM) is a form of communication over the internet that offers an
instantaneous transmission of text-based messages from sender to receiver.
3. State any 3 rules and etiquettes you should follow while chatting in the internet?
Ans. There are some general rules and etiquettes to be followed while chatting: -
Ans. To use instant messaging software, a user must have a valid instant messaging account.
instant messaging accounts differ in formats; some instant messaging software such as google
talk, yahoo Messenger use email addresses for managing the account and software such as
skype use standard mode names.
Ans. Application based instant messaging software i s downloaded and installed on user’s
computer whereas web based instant messaging software is accessed using browsers such as
internet explorer, Mozilla Firefox, google chrome.
Ans. Blog is a short form of the word weblog.it is frequently updated online personal
journal or diary. It is a place to express yourself to the world. A place to share your
thoughts and your passions.
www.wordpress.com
www.blogger.com
www.blog.com
www.weebly.com
www.blogsome.com
Ans. Blog is a short form of the word weblog.it is frequently updated online personal
journal or diary. While a website is any organization, government body or an
individual can create and publish their content in the form of a website or in any
other form on the www. Websites have many functions and can be used in various
ways.
Enter blog address: you must provide a unique address to your WordPress blog.
Provide your email address. An activation link will be send to you from WordPress
after you click “continue”.
Open your email and click on the activation link. Once you click activate blog, you
will be redirected to your WordPress blog account.
• Amazon
• Google
• Paypal
• Square
• Stripe
4. List any three payment tools to use the online transactions.
Ans. There are several tools for making use of online transactions: -
• Debit card
• Credit card
• Net banking
• Paytm
5. Explain the purpose of internet security.
Ans. Online threats are malware programs that can target you when you're using the
internet. It is designed to affect the computer of the victim.
• Trojan: - it is a type of malicious code or software that looks legitimate but can
take control of your computer
• worms: -a computer worm is a standalone malware computer program that
replicates itself in order to spread to other computers
• virus: - it is a malicious program where it replicates itself and aims to only
destroy a computer.
• Spyware: - it is a malware which is designed to spy on the victim’s computer.
• Phishing: - a fake website which is designed to look almost like the actual
website is a form of phishing attack. The idea of this is to trick the user into
entering their username and password into the fake login form which servers
the purpose of stealing the identity of the victim.
• Cookies: - it is not really a malware. It is just something used by most websites
to store something into your computer.
7. Explain the use of data encryption.
8.what is firewall.
Ans. The purpose of the backup is to create a copy of data that can be recovered in
the event of a primary data failure. Primary data failures can be the result of
hardware or software failure, data corruption, or a human-caused event, such as a
malicious attack (virus or malware), or accidental deletion of data.
Ans. It is just something used by most websites to store something into your
computer. It is here because it has ability to store thigns into your computer and
track your activities within the site.
Ans. A strong password consists of at least six characters (and the more characters,
the stronger the password) that are a combination of letters, numbers and symbols
(@, #, $, %, etc.) If allowed. Password are typically case-sensitive, so strong
password contains letters in both uppercase and lowercase.
13. List any three ways to protect your data from online threats?
Ans.
Ans. Antivirus software is primarily utilized to scan a hard disk for viruses, worms,
and trojan horses, and removes, fixes, or isolates any threats that are found. While
antispyware software scans your hard disk and registry for traces of spyware and
adware and then either removes them or prompts the user to remove them.
Answer- Occupational health and safety (OHS) relates to health, safety, and welfare
issue in the workplace. It includes the laws, standards, and programs that are aimed
at making the workplace better and ensuring health and safety for workers,
customers, and other stakeholders.
Answer- Class A Fires: These are the fires caused by combustible materials or
flammable solids, such as wood, paper, and fabric.
Class C Fires: Fires that are caused by faulty electrical circuit and equipment are
classified as the electrical fires. Once the electrical item is removed, the fire changes
class to A or B.
Answer- We know that oxygen is essential to start and sustain a fire. The CO2
extinguisher works by cutting off oxygen from the fire. Spray of Carbon dioxide from
the extinguisher covers the fire and suffocates it of oxygen. It also removes heat with
a very cold discharge.
Q4- List some general rules that companies ask its employees to follow in case of
fire.
Q5- What is first aid? How will you give first aid in case of minor burns?
To treat a minor burn, run cool water over the affected area for up to 15
minutes. If that’s not possible, apply a cool compress to area instead. Avoid
applying ice to burned tissue.
Ans. A workplace accident is one that happens in one’s workplace. We can define it
as an unplanned event that results in personal injury or damage to the property.
Ans. Repetitive strain injury: - repetitive strain injury (RSI) is another program that
has become increasingly commonplace at work over the years, though even some
employees don’t seem to take it seriously.
• Cuts and lacerations: - the most common causes of these cuts and
lacerations include poor training, inadequate safety procedures and
feeling to wear the proper protection.
• Slips, trips and falls: - slip and fall related accidents are among the most
common type of workplace accidents. They are a leading cause of
occupational injury to senior workers who are 55 years or more of age.
These accidents can happen in any work environment and the injuries
sustained can range in severity.
Ans. A preferred method for reporting fires and other emergencies like installing fire
or weather alarms.
Ans. An emergency action plan is a written set of instructions that outlines what
workers and others at the workplace should do in an emergency. In other words, an
emergency action plan covers designated actions employers and employees must
take to ensure employee safety from fire and other emergencies.
Ans. Emergency procedure maps or diagrams are located within buildings/s through
the workplace. These diagrams provide floor plans showing the locations of
emergency exits and emergency equipment and maps for evacuation routes and
emergency assembly areas.
Answer- A hazards is any source or thing that can cause potential damage, harm or
adverse health effects on something or someone.
Ans. Examples of physical hazards include slips, trips, falls, exposure to loud noises,
working from heights, vibrations, and unguarded machinery.
Q3- List five general precautions that you should take to maintain safety at the
workplace?
Ans. Some general precaution that you should observe while working: -
Ans. A physical hazard is in a factor in the environment that can harm our body
without necessarily touching it.
A chemical hazards: - Dangerous chemical can cause a hazard in the work area.
Chemical hazards are very common in apparel and textile industry while at the time
of dyeing and printing
Ans. Biological hazards include things of biological origin that pose a risk to the
workers. Sources of biological hazard may include bacteria, viruses, insect plants,
birds, animals and human themselves.
Ans. Psychosocial hazard or work stressor is any Occupational hazard that affect the
Psychological and physical wellbeing of workers, including their ability to participate
in a work environment, among other peoples.
Q7- List three things that one should do to maintain a healthy lifestyle.
Ans. To maintain a healthy living: -
• Eat sensible
• Drink plenty of water
• Keep clean and exercise regularly
• Maintain good posture
• Take frequent breaks
• Keep your workstation clean
• Learn to manage stress