0% found this document useful (0 votes)
9 views14 pages

Web Application and Security

Class 12

Uploaded by

gupta34355
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views14 pages

Web Application and Security

Class 12

Uploaded by

gupta34355
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 14

Web Application and Security

Lesson – 5 Networking Fundamentals


Q1: What is a Computer Network?
Answer: A computer network is a system for communication among two or more
computers. These Network may be wired or wireless.
Q2- Differentiate between a Campus Area Network and A Local Area Network.
Answer: A Campus Area Network is a network spanning multiple LANs but is smaller
than MAN while A Local Area Network is small networks in which the computer and
other network device share the resources of a single processor or a server within a
small area.
Q3- What is a Wireless Network?
Answer: Wireless Network utilize radio waves and/or microwaves to maintain
communication channels between computers.
Q4- What is Wi-Fi?
Answer: Wi-Fi, which stands for Wireless Fidelity, is most popular wireless
communication protocol used for home, private business LANs, and Public Hotspots.
Q5- What is Bluetooth?
Answer: Bluetooth is a wireless protocol used to wirelessly link phones, computers,
and other network over short distance, typically up to 30 feet (10 meters).
Bluetooth devices generally communicate at less than 1 Mbps speed.
Q6- What is the Internet?
Answer: The Internet is a network of the computers spanning the globe. A network
simply means two or more computer connected together. It is a network of
interconnected computers, enabling users to share information along multiple
channels.
Q7- Name the types of networks on the basis of the area covered by them.
Answer:
• LAN ( Range – small area or office)
• MAN ( Range – small town or a city)
• WAN ( Range – up to 200 km
Q8- Name the categories of the networks on the basis of their functionality.
Answer: Peer-to-peer
• Client server
Q9- Name the categories of the network on the basis of their connection method.
Answer: Wired Network
• Wireless Network
Q10- Name the communication medium used in wireless networks.
Answer: Wi-Fi and Bluetooth
Q11- Name the devices required to set-up a Wireless LAN.
Answer: LAN card Access Point
Q12- How far can Bluetooth devices send signals?
Answer: 30 feet or 10 meters.
Q13- What is the distance range of a Wi-Fi enabled device in open areas?
Answer: 100ft or 305 meters.
Q14- Write the following terms in their full form.
Answer: LAN : Local Area Network
a) CAN : Campus Area Network
b) GAN : Global Area Network
c) Wi-Fi : Wireless Fidelity
d) Mbps : Megabytes Per Second
e) WLAN : Wireless Local Area Network
Q15- What is the need of the computer networks?
Answer: Computer network need to be established at places where a large number
of people have to work on computers and they need to share information and costly
hardware and software.
Q16- List any three advantages of creating computer network.
Answer: Resource sharing
a) Reliability
b) Reduction of installation cost
Q17- List any two advantages of wireless networks.
Answer: It is easier to add or remove computers.
It is easier to provide connectivity in the areas where it is difficult to lay cables.
Q18- List any two limitations of wireless network.
Answer:
a) Data transfer rates drop as distance increase or if the number of the computer
using the network increase.
b) As standard change, it may be necessary to replace wireless cards or access
points.
Q19- What is client-server networks.
Answer: A Client-server is a central computer acts as the storage locations for files
and applications shared on the network.
Q20- Write the differences between LAN and WAN.
Answer: A Local Area Network is small networks in which the computer and other
network device share the resources of a single processor or a server within a small
area while A wide Area Network is a computer network that spans a relatively large
geographical area, with a diameter of about 200km.
LESSON 6 INTRODUCTION TO INSTANT MESSAGING
1. List any five-application based instant messaging software?

Ans. Some of the popular instant messaging software’s are: -

• Google talk
• Yahoo! Messenger
• Skype
• Windows live messenger
• Rediffbol

2. What is instant messaging?

Ans. Instant messaging (IM) is a form of communication over the internet that offers an
instantaneous transmission of text-based messages from sender to receiver.

3. State any 3 rules and etiquettes you should follow while chatting in the internet?

Ans. There are some general rules and etiquettes to be followed while chatting: -

• Messages should be short and to the point.


• Always introduce yourself by name if your screen name doesn’t reflect it.
• Always ask if the other person has time to chat first – regardless of how important you
think what you have to say is
It’s not going to be well received if the recipient is busy.

4. What are the basic needs to use instant messaging software?

Ans. To use instant messaging software, a user must have a valid instant messaging account.
instant messaging accounts differ in formats; some instant messaging software such as google
talk, yahoo Messenger use email addresses for managing the account and software such as
skype use standard mode names.

5. How web based IM software is different from application based software?

Ans. Application based instant messaging software i s downloaded and installed on user’s
computer whereas web based instant messaging software is accessed using browsers such as
internet explorer, Mozilla Firefox, google chrome.

6. What is google talk?


Ans. Google talk is integrated with Gmail, and it launches a mail notifier that alert you when you
have new email messages. Messages pop up out of the system tray at the bottom of your screen,
alerting you to any mail in your Gmail inbox.

LESSON 7 CREATING AND PUBLISHING WEB PAGES – BLOG


1. Define blog and its use.

Ans. Blog is a short form of the word weblog.it is frequently updated online personal
journal or diary. It is a place to express yourself to the world. A place to share your
thoughts and your passions.

2. Name any 5 blog sites that are commonly used by bloggers.

Ans. Some commonly used websites used by bloggers are: -

www.wordpress.com

www.blogger.com

www.blog.com

www.weebly.com

www.blogsome.com

3. Differentiate between blog and website.

Ans. Blog is a short form of the word weblog.it is frequently updated online personal
journal or diary. While a website is any organization, government body or an
individual can create and publish their content in the form of a website or in any
other form on the www. Websites have many functions and can be used in various
ways.

4.Name 3 free blog editing software?

Ans. Thingamablog, Windows liver writer, Blogdesk, Qumana

5.Explain the use of an offline blog editor?


Ans. The use of an offline blog editor is to create blog and publish the content
whenever internet connectivity is available. They publish the blog written
automatically on the internet domain when you connect to a internet connection.

6. Write detailed steps to create a new blog account.

Ans. Follow these steps to create a new blog account:-

Open the web browser

On the address bar type https://wordpress.com

Enter blog address: you must provide a unique address to your WordPress blog.

Enter username and password.

Provide your email address. An activation link will be send to you from WordPress
after you click “continue”.

Open your email and click on the activation link. Once you click activate blog, you
will be redirected to your WordPress blog account.

…….now your blog is ready to use.

LESSON 8 ONLUINE TRANSACTIONS AND INTERNET


SECURITY
1. Explain the purpose of online transactions.
Ans. Online transactions provide convenience for both consumers and business
owners. This is because online transaction payment systems such as briva and direct
debit allow an instant process of payment verification. Consumers don't need to
manually send their proof of payment.

2. List any three advantages of online transactions.

Ans.Providing a sense of security for consumers

• Reaching a wider range of consumers


• Providing fast and easy integration
• Doing easier promotion
3. List any five websites that allow online transactions.

Ans. Websites that allow online transaction:

• Amazon
• Google
• Paypal
• Square
• Stripe
4. List any three payment tools to use the online transactions.

Ans. There are several tools for making use of online transactions: -

• Debit card
• Credit card
• Net banking
• Paytm
5. Explain the purpose of internet security.

Ans. Internet security is a branch of computer security specially related to the


internet. It involves browser security but also network security on a more general
level, as it applies to other applications or operating systems as a whole.

6.Explain different kinds of online threats.

Ans. Online threats are malware programs that can target you when you're using the
internet. It is designed to affect the computer of the victim.

• Trojan: - it is a type of malicious code or software that looks legitimate but can
take control of your computer
• worms: -a computer worm is a standalone malware computer program that
replicates itself in order to spread to other computers
• virus: - it is a malicious program where it replicates itself and aims to only
destroy a computer.
• Spyware: - it is a malware which is designed to spy on the victim’s computer.
• Phishing: - a fake website which is designed to look almost like the actual
website is a form of phishing attack. The idea of this is to trick the user into
entering their username and password into the fake login form which servers
the purpose of stealing the identity of the victim.
• Cookies: - it is not really a malware. It is just something used by most websites
to store something into your computer.
7. Explain the use of data encryption.

Ans. Encryption uses cybersecurity to defend against brute-force and cyber-attacks,


including malware and ransomware. Data encryption works by securing transmitted
digital data on the cloud and computer systems. There are two kinds of digital data,
transmitted data or in-flight data and stored digital data or data at rest.

8.what is firewall.

Ans. A computer firewall controls access between networks. It generally consists of


gateways and filters which vary from one firewall to another. Firewalls also screen
network traffic and are able to block traffic that is dangerous. Firewall acts as the
intermediate server between smtp and hypertext transfer protocol(http)
connections.

9. What do you mean by taking backup of data? Why is it required?

Ans. The purpose of the backup is to create a copy of data that can be recovered in
the event of a primary data failure. Primary data failures can be the result of
hardware or software failure, data corruption, or a human-caused event, such as a
malicious attack (virus or malware), or accidental deletion of data.

10. What are cookies?

Ans. It is just something used by most websites to store something into your
computer. It is here because it has ability to store thigns into your computer and
track your activities within the site.

11. What is a digital certificate? What is its significance?


Ans. A digital certificate is used to encrypt online data/information
communications between an end - users browser and a website. After verifying
that a company owns a website, the certificate authority will sign their certificate so
it is trusted by internet browsers.

12. What are the characteristics of a strong password?

Ans. A strong password consists of at least six characters (and the more characters,
the stronger the password) that are a combination of letters, numbers and symbols
(@, #, $, %, etc.) If allowed. Password are typically case-sensitive, so strong
password contains letters in both uppercase and lowercase.

13. List any three ways to protect your data from online threats?

Ans.

• Use strong passwords


• Look for encryption
• Hide your personal information
• Install security suites
• Turn on web browser blacklisting
14.what is the difference between an antivirus and antispyware software?

Ans. Antivirus software is primarily utilized to scan a hard disk for viruses, worms,
and trojan horses, and removes, fixes, or isolates any threats that are found. While
antispyware software scans your hard disk and registry for traces of spyware and
adware and then either removes them or prompts the user to remove them.

15.list any three ways to ensure secure online transactions.

Ans. Use advanced anti-malware program

• Make sure you are using a secure connection


• Use credit cards for online shopping
• Do not use public computers
• Set a strong and complex password
LESSON- 9 MAINTAING WORKPLACE SAFETY
Q1- What do you understand by the term ‘Occupation Health and Safety’?

Answer- Occupational health and safety (OHS) relates to health, safety, and welfare
issue in the workplace. It includes the laws, standards, and programs that are aimed
at making the workplace better and ensuring health and safety for workers,
customers, and other stakeholders.

Q2- Differentiate between class A and Class C fires?

Answer- Class A Fires: These are the fires caused by combustible materials or
flammable solids, such as wood, paper, and fabric.

Class C Fires: Fires that are caused by faulty electrical circuit and equipment are
classified as the electrical fires. Once the electrical item is removed, the fire changes
class to A or B.

Q3- How does carbon dioxide based fire extinguisher work?

Answer- We know that oxygen is essential to start and sustain a fire. The CO2
extinguisher works by cutting off oxygen from the fire. Spray of Carbon dioxide from
the extinguisher covers the fire and suffocates it of oxygen. It also removes heat with
a very cold discharge.

Q4- List some general rules that companies ask its employees to follow in case of
fire.

Answer-Don’t smoke in the office.

• Don’t carry matches and lighter into the office.


• Don’t light a fire or burn waste/garbage inside an office to dispose it off. Use
a safe method for garbage disposal instead.
• Don’t use elevator during a fire. Always use the staircase in the case of a fire
emergency.
• Keep fire exit routes in the workplace, free of any obstruction.
• Get trained in the use of the fire extinguishers to put out a fire.

Q5- What is first aid? How will you give first aid in case of minor burns?

Answer- When we provide basic medical care to someone experiencing a sudden


injury or illness; it’s known as first aid.

To treat a minor burn, run cool water over the affected area for up to 15
minutes. If that’s not possible, apply a cool compress to area instead. Avoid
applying ice to burned tissue.

LESSON 10 PREVENTING ACCIDENTS AND


EMERGENCIES
1. What do you understand by the term ‘workplace accidents?

Ans. A workplace accident is one that happens in one’s workplace. We can define it
as an unplanned event that results in personal injury or damage to the property.

2. Explain the following types of accidents?

Ans. Repetitive strain injury: - repetitive strain injury (RSI) is another program that
has become increasingly commonplace at work over the years, though even some
employees don’t seem to take it seriously.

• Cuts and lacerations: - the most common causes of these cuts and
lacerations include poor training, inadequate safety procedures and
feeling to wear the proper protection.
• Slips, trips and falls: - slip and fall related accidents are among the most
common type of workplace accidents. They are a leading cause of
occupational injury to senior workers who are 55 years or more of age.
These accidents can happen in any work environment and the injuries
sustained can range in severity.

3. What is a workplace emergency? Name any five workplace emergencies?


Ans. A workplace emergency is an unforeseen situation that threatens your
employees, customers, or the public, disrupts or shuts down your operations; or
causes physical or environment damage.

4. How would you handle a workplace emergencies? Explain.

Ans. A preferred method for reporting fires and other emergencies like installing fire
or weather alarms.

• An evacuation policy and procedure


• Emergency escape procedures and route assignments, such as floor plans,
workplace maps, and safe or refuge areas.

5. What do you understand by ‘emergency action plan’?

Ans. An emergency action plan is a written set of instructions that outlines what
workers and others at the workplace should do in an emergency. In other words, an
emergency action plan covers designated actions employers and employees must
take to ensure employee safety from fire and other emergencies.

6. What is an emergency procedure map?

Ans. Emergency procedure maps or diagrams are located within buildings/s through
the workplace. These diagrams provide floor plans showing the locations of
emergency exits and emergency equipment and maps for evacuation routes and
emergency assembly areas.

Lesson – 11 Health and safety at work


Q1- What do you understand by the term ‘Workplace hazards’?

Answer- A hazards is any source or thing that can cause potential damage, harm or
adverse health effects on something or someone.

Q2- Give some examples of the workplace hazards.

Ans. Examples of physical hazards include slips, trips, falls, exposure to loud noises,
working from heights, vibrations, and unguarded machinery.
Q3- List five general precautions that you should take to maintain safety at the
workplace?

Ans. Some general precaution that you should observe while working: -

• Your safety is your personal responsibility. Always follow the correct


procedures.
• Take responsibility and clean up if you made a mess. Clean and organize your
workplace.
• Ensure a clear and easy route to emergency exits and equipment.
• Be alert and awake on the job. Be attentive at all times to your work
surroundings.
• When in doubt, contact your supervisor or manager for instructions, guidane,
or traning.

Q4- Differentiate between the physical and chemical hazards.

Ans. A physical hazard is in a factor in the environment that can harm our body
without necessarily touching it.

A chemical hazards: - Dangerous chemical can cause a hazard in the work area.
Chemical hazards are very common in apparel and textile industry while at the time
of dyeing and printing

Q5- What do you understand by biological hads?

Ans. Biological hazards include things of biological origin that pose a risk to the
workers. Sources of biological hazard may include bacteria, viruses, insect plants,
birds, animals and human themselves.

Q6- What is meant by the psychological hazards?

Ans. Psychosocial hazard or work stressor is any Occupational hazard that affect the
Psychological and physical wellbeing of workers, including their ability to participate
in a work environment, among other peoples.

Q7- List three things that one should do to maintain a healthy lifestyle.
Ans. To maintain a healthy living: -

• Eat sensible
• Drink plenty of water
• Keep clean and exercise regularly
• Maintain good posture
• Take frequent breaks
• Keep your workstation clean
• Learn to manage stress

You might also like