Class10 ICT P2U4 WebApplicationsAndSecurity
Class10 ICT P2U4 WebApplicationsAndSecurity
Computer Accessibility refers to the user friendliness of a computer system for all, regardless of their disability., it
enables a person with a disability or impairment to use a computer. It is known as Assistive Technology.
• To launch accessibility options in WindowsXP, Click Start > Control Panel > Accessibility Options.
KEYBOARD TAB
Sticky Keys
StickyKeys is an accessibility feature to help computer users with physical disabilities, but it is also used by others as a
means to reduce repetitive strain.
FilterKeys
FilterKeys is a feature of Microsoft Windows. It is an accessibility function that tells the keyboard to ignore brief or
repeated keystrokes, making typing easier for people with hand tremors.
ToggleKeys
ToggleKeys is also a feature of Microsoft Windows. It is an accessibility function which is designed for people who
have vision impairment or cognitive disabilities. When ToggleKeys is turned on, computer emits sound cues when the
locking keys (Caps Lock, Num Lock, or Scroll Lock) are pressed. A high sound is emitted when the keys are switched on
and a low sound is emitted when they are switched off.
Sound Tab
Select the Sound Tab. A window with options to configure accessibility options for sound is displayed
SoundSentry
SoundSentry generates visual warnings, such as a blinking title bar or a flashing border, whenever the computer
generates a sound.
ShowSounds
ShowSounds instructs applications that convey information by sound, o also provide information visually, through
text captions or informative icons.
Display Tab
Select the Display Tab. A window with options to configure accessibility options for display is displayed.
High Contrast
High Contrast is an accessibility feature to assist people with vision impairment. You can change the size and color of
fonts and the background for ease of viewing.
Cursor Options
Cursor Options is also an accessibility feature that assists people with vision impairment by changing the blink rate
and width of the cursor.
MOUSE TAB
MouseKeys
MouseKeys is an accessibility feature that assists people who have difficulty using a mouse. This option uses the
keyboard (especially numeric keypad) as a pointing device instead of a mouse.
General Tab
This tab enables you to configure accessibility options for all users.
Select the General Tab, a window to configure additional accessibility options will be displayed
SerialKeys
SerialKeys is an accessibility feature that assists people that have difficulty using a keyboard or a mouse (or both).
A computer network is a collection of computers and other hardware components interconnected by communication
channels (cables or satellites) that allow sharing of resources and information.
Networks in which all computers have an equal status are called peer to peer networks. Generally in such a network
each terminal has an equally competent CPU.
CLIENT-SERVER ARCHITECTURE:
Networks in which certain computers have special dedicated tasks, providing services to other computers (in the
network) are called client server networks. The computer(s) which provide services are called servers and the ones
that use these services are called clients.
TYPES OF NETWORKS
There are two major types of network Local Area Network (LAN) and Wide Area Network (WAN).
A local area network (LAN) is one which connects computers and devices in a limited geographical area such as home,
school, computer laboratory, office building, or closely positioned group of buildings.
Usually local area networks offer very high speeds and are used for connecting computers and peripherals such as
printers, scanners, etc.
A wide area network (WAN) is one which covers a broad area (i.e., any network that links across metropolitan,
regional, or national boundaries). The Internet is the most popular WAN, and is used by businesses, governments,
non-profit organizations, individual consumers, artists, entertainers, and many others.
INTERNET
The Internet is a global system of interconnected computer networks that use the standard Internet protocol suite to
serve billions of users worldwide. It is a network of networks that consists of millions of private, public, academic,
business, and government networks.
World Wide Web (abbreviated as WWW or W3, commonly known as the Web), is a system of interlinked hypertext
documents accessed via the Internet. With a web browser, one can view web pages that may contain text, images,
videos, and other multimedia, and navigate between them via hyperlinks.
•Data Sharing: One of the most important uses of networking is to allow the sharing of data.
•Files transfer : Users can send text files, spread sheets, documents, presentations, audio files, video files, etc. to
other users.
•Hardware Sharing: Hardware components such as printers, scanners, etc. can also be shared.
•Internet Access Sharing: You can purchase a single Internet connection and share it among other computers in a
network instead of purchasing multiple Internet connection for each computer
•Usage of network based applications: Such as web browsers, email clients, chat application, audio & video calling,
etc. is another advantage.
To use the Internet, you need an Internet connection. Internet connections are provided by Internet Service Providers
such as Bharat Sanchar Nigam Limited (BSNL), Airtel,Jio, Vodafone,
An Internet service provider (ISP) is an organization which provides you with access to the Internet via a dial-up (using
modem) or direct (hard wired) or wireless connection.
MODEM
Á modem is a device that converts digital computer signals into a form (analog signals) that can travel over phone
lines. It also re-converts the analog signals back into digital signals. The word modem is derived from its function
MOdulator/DEModulator.
TYPES OF COMMON INTERNET CONNECTIVITY
Types of Internet Connectivity can be broadly categorized into Wired Technology and Wireless Technology.
Wired Technology
Telephone Network (PSTN) to establish a internet connection via telephone lines using a device called MODEM. Users
dial a number and get access to internet. Dial-up connections are extremely slow.
2) DSL:- DSL is Digital Subscriber Line provides internet connectivity by transmitting digital data over wires of a local
telephone network. It enables the use of Telephone and Data Transmission on a single telephone line. For using DSL
3) Cable Internet Access:- It is a form of broadband Internet access that uses the cable TV infrastructure. It is provided
The data is broken up into bits of same sized pieces called packets.
A header is added to each packet explaining where the data has come from, where it should end up and where it
fits in with the rest of the packets.
Each packet is sent from computer to computer until it finds its destination. All packets may not take the same
route.
At the destination, the packets are examined. If any packets are missing or damaged, a message is sent asking for
them to be resent. This continues until all packets have been received intact.
The packets are now reassembled into their original form. All this done in seconds!
Instant messaging (IM) is a form of communication over the Internet that offers an instantaneous transmission of
text-based messages from sender to receiver. Most instant messaging software include the option for performing file
transfers, audio chat, video calling and conferencing, sharing desktops, etc.
There are two kinds of instant messaging software – application based and Web based.
1) Application Based:- These software are downloaded and installed on user’s computer. Eg. Google Talk , Yahoo!
2) Web Based:- They are accessed using browsers such as Internet Explorer etc. Eg. MSN Web Messenger , Yahoo!
In this exercise, you will learn to create an instant messaging account for using Google Talk.
Note: You need to download and install Google Talk application from www.google.com/talk prior to this exercise.
• To launch Google Talk, Click Start > Programs >Google Talk>Google Talk.
• You can also double-click on the Google Talk icon on the desktop if available.
You need to have a list of contacts that are available for chat. If you don’t have any contacts, you can add their
If you don’t have a Gmail account already you can create a new Gmail account.
• Whenever your friend in the contact list is online you can see the person along with a green dot.
• You can start sending text chat message instantly by double-clicking on a contact.
There are some general rules and etiquettes to be followed while chatting.
• Always introduce yourself by name if your screen name doesn’t reflect it.
• Always ask if the other person has time to chat first – regardless of how important you think what you have to say
is, it’s not going to be well received if the recipient is busy.
• Give people time to respond - Multiple questions sent to a recipient before they’ve had a chance to answer can
seem more like an interrogation rather than a conversation.
A blog is a discussion style site used by non-technical users for creating personal web pages. Blog is similar to an
online personal diary and similar to use. A blog is used to convey messages, events, news, announcements etc.
Blogs are usually managed through web browser which needs an internet connection.
A blog can also be created through Offline Blog Software and later publish the content when the internet connection
is available.
www.blogger.com
www.wordpress.com
www.weebly.com
www.blog.com
If you do not have an active internet connection, you can create blogs using a blog application and publish the blog
whenever internet connectivity is available.
There are several free offline blog editors available that can be downloaded and installed on the local computer such
as:
• Qumana
• Blogdesk
Examples
It is a branch of computer security specifically related to the internet, involving browser security and also network
security.
The main objective of internet security is to establish rules and measures to use against attacks over the internet.
Online Threats
The threats / vulnerabilities that uses World Wide Web (Internet) to facilitate crimes are called Online Threats.
Like:-
1) Phishing :- The act of acquiring personal / private and sensitive data from personal computers for use in fraudulent
activities. For eg. Mails from unknown persons that ask for your credit / debit card details.
2) Email spoofing :- It is the creation of email messages with a forged sender address. For eg. Sending an email with a
forged email address which appears to be original. These mails are infected mails which contain worms.
3) Chat Spoofing:- Spoofing means hoax, trick, or deceive which contains false information. Hiding / Faking the
identity of another person over the internet is called chat spoofing
1) Use strong passwords: A combination of alphanumeric and special characters could be used for creating a
password that is not so easy to crack or guessed by other users.
General Guidelines for strong password
b) Avoid keeping passwords based on repetition words, dictionary words, usernames, pet names etc.
f) Avoid using something that the public or workmates know you strongly like or dislikes.
2. Backup your data: Always keep copies of data in CD, pendrives etc, so it could be helpful in situation when there is
a loss of data.
3. Use Encryption software: Use encrypted software available within the operating software to protect data from
unauthorized users.
4. Keep username and password private: Never save passwords or usernames on computers that are used in
5. Registering with website: Read privacy policy whenever you register with a website, the policy will include
information about how the website use personal data.
6. Do not share personal information: Be cautious when filling out forms on internet. Because your personal
information or emails could be used by unauthorized users to send fake or unwanted emails. So, first research and
verify if it’s a trusted website or not before providing personal information to any website.
7. Secure transactions: It is always recommended to use only secure websites for online shopping or transactions,
because these websites store your credit card or online banking personal information. Verify if the website uses
secure transaction, usually it is indicated through a digital certificate represented as a golden lock in the web
browser’s address bar.
8. Use Antivirus and antispyware software: These softwares protect your computer from any changes by
malwares/threats. Keep these softwares up to date.
Some mails, that promise you jobs or announce lottery results, may contain virus or scripts or they can try to gather
your personal information. Never open the attachments from unknown persons.
10. Install firewalls: Firewalls keep your system and network secure. They could be software or hardware. So, Install
and configure your firewall.
● Basic safety rules to follow at workplace – Fire safety, Falls and slips, Electrical safety, Use of first aid.
Accident: an accident is an unplanned event that may happen all of a sudden and may lead to unwanted or
unprecedented results/outcomes.
Handling accidents:
- Stay alert
● have windows fitted with adjustable coverings to alter the sunlight level
● be able to tilt easily and should be able to separate from the screen to allow the user to adopt a comfortable
working position
● be of an adequate size to allow the screen, keyboard and other peripherals to be flexibly arranged
Workplace Evacuation
Every company must ensure following points for evacuation in case of any emergency:
An evacuation policy : Every organization must have an evacuation policy. All the Team Leaders are responsible for
informing about the policy to their employees about it. Proper attention must be paid when the Team Leader is
informing you about these details. Negligence at this time may cost lives.
Organization must have a designated assembly point for emergencies. Ensure that every employee/ worker must
know where it is.
A ‘buddy system’ for individuals with special needs or disabilities must be designated. This system ensures that
differently-abled are assisted and guided out of the premises or the impacted area properly. If you are a buddy to
someone, ensure that your buddy is safe at the assembly point with you.
Floor plans with evacuation routes in work areas. Ensure that you understand these so you can use it in time of
need.
Assembly areas, where you are required to assemble after evacuation, must be properly taken care of.
Periodic evacuation drills should be conducted. Ensure that you pay attention during these drills. You need to save
your life and you can be helpful in saving someone else’s life too.
Healthy Living
‘Healthy Lifestyle leads to a healthy being. A healthy living has a lasting impact on an individual which ultimately
yields a healthy environment at home as well as at work place. a happy and healthy worker will always perform best
to his ability.
A healthy lifestyle helps to keep and improve people’s health and well being.
- physical activities
- stress management
- healthy mind
- sound sleep