0% found this document useful (0 votes)
23 views41 pages

Web Applications It 402 2023

Uploaded by

Gokul M
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
23 views41 pages

Web Applications It 402 2023

Uploaded by

Gokul M
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 41

In today's session:

Web applications and Security

• Accessibility options

• Networking Fundamentals

• Instant Messaging, Chats, Blogs, Online


Transactions

• Internet Security
UNIT RDBMS:
Data
manupulation
using SQL
Accessibility Options
Accessibility Options
They are designed for people with disabilities so that
they use technology more easily. Example Text- to-
Speech

• satisfy the needs of people

• make the business better to make profits.


Accessibility Options

• Computer accessibility refers to the user friendliness for all


the users including persons with disability.

• Enabling the person with disability to use a computer with


the help of software and hardware is known as Assistive
Technology.
Accessibility Options

Types of Impairments
• Cognitive impairments & learning disabilities – dyslexia,
attention deficit hyperactivity disorder (ADHD) or autism
• Visual impairments – low-vision, complete or
partial blindness, and colour blindness
• Hearing impairments – deafness or problem with hearing
• Motor or dexterity impairments – paralysis, cerebral palsy,
or carpal tunnel syndrome
Accessibility Options
Accessibility Options

Magnifier a display utility that makes the computer


screen more readable by creating a separate window that
displays a magnified portion of the screen.

Narrator a text-to-speech utility that reads what is


displayed on the screen–the contents of the active window.

On-Screen Keyboard displays a virtual keyboard on


the computer screen that allows people to type data by using
a pointing device.

High Contrast a window showing settings for color


and contrast of display.
Make computer Easier to see

High Contrast : This allows you to set a high-


contrast color scheme that heightens the color contrast of
some text and images on your computer screen.

Remove Background Images : This turns off all


unimportant, overlapped content and background images to
help make the screen easier to use.
Make mouse Easier to use

Change the Color and Size of Mouse Pointer : You can


use these options to make the mouse pointer larger or
change the color to make it easier to see.

Turn on Mouse Keys : You can use this option to


control the movement of the mouse pointer by using
the numeric keypad.
Make keyboard Easier to use

Sticky Keys This option sets Sticky Keys to


run when you log on to windows. Instead of having to
press three keys at once (Ctrl, Alt, Delete), you can use
one key by turning on Sticky Keys and adjust settings.

Toggle Keys This option sets Toggle Keys to


run when you log on to windows. These keys can play
an alert each time you press the Caps Lock, Num Lock
or Scroll Lock Keys.
Visual alternatives to Sound

Visual Notifications for Sounds : This option


sets sound notifications to run when you log on the
Windows. You can also choose how you want sound
notifications to warn you.

Text Captions for Spoken Dialog: This option


causes windows to display text captions in place of
sounds to indicate that activity is happening on your
computer.
Networking Fundamentals
Networking Fundamentals

Advantages:

• File Sharing Networking of computers helps the users to


share data files.

• Hardware Sharing Users can share devices such as printers,


scanners, CD-ROM drives, hard drives, etc.

• Application Sharing Applications can be shared over the


network and this allows to implement
client/server applications.

• User Communication This allows users to communicate using


E-mail, newsgroups, video conferencing within the network.
Networking Fundamentals
Networks are designed using the following architecture:

PEER-TO-PEER (P2P) ARCHITECTURE:

• Networks in which all computers have an equal status are


called peer to peer networks.

• Generally in such a network each terminal has an equally


competent CPU.
Networking Fundamentals
Networks are designed using the following architecture:

CLIENT-SERVER ARCHITECTURE:

• Networks in which certain computers have special dedicated


tasks, providing services to other computers (in the network)
are called client server networks.

• The computer(s) which provide services are called servers and


the ones that use these services are called clients.
Types of Network

LOCAL AREA NETWORK:

• Connects computers and devices in a limited geographical


area such as home, school, computer laboratory, office
building, or closely positioned group of buildings.

WIDE AREA NETWORK:

• Covers a broad area (i.e., any network that links across


metropolitan, regional, or national boundaries).

• The Internet is the most popular WAN, and is used by


businesses, governments, non-profit organizations, individual
consumers, artists, entertainers, and many others
What is a modem?

• A modem is a device that converts digital computer signals into


a form (analog signals) that can travel over phone lines.

• It also re-converts the analog signals back into digital signals.

• The word modem is derived


from its function MOdulator/DEModulator.
Common internet Connectivity
• Dial-up: Uses the facilities of the public telephone network to establish a
connection to an Internet service provider (ISP) via telephone lines using
a MODEM.

• DSL: Digital subscriber line(DSL) provide Internet access by transmitting


digital data over wires of a local telephone network.

• Cable Internet Access: Uses the cable television infrastructure.

• 3G/4G/5G

• WiMAX: (Worldwide Interoperability for Microwave Access) is designed to


provide mobile broadband connectivity.

• WI-Fi: Allows an electronic device such as computers or mobile phones to


exchange data wirelessly over a network, including high-speed Internet
connections.
How does data travel through the
internet?

• Dial-up: Uses the facilities of the public telephone network to establish a


connection to an Internet service provider (ISP) via telephone lines using
a MODEM.
Instant Messaging

Key Features:

• Video calling

• Going invisible (Your status can be shown as offline to your IM


contact list).

• Encrypted messages

• Save messages for future reference.


Blogs

• Discussion style web pages that allows users to create


personal webpages

• Similar to an online personal diary and are easy to use

• Offline Blog Editors allow users to create blogs even when they
are not connected to the internet
Online Transactions

• Online Transaction: Method of payment where the transfer


of funds happens online.
Threats on the Internet :
Threats on the Internet : Phishing

Phishing (pronounced: fishing)

• Attack that attempts to steal your money, or your identity

• By getting you to reveal personal information -- such as


credit card numbers, bank information, or passwords --
on websites that pretend to be legitimate.
Threats on the Internet : Spoofing

Spoofing:

• When someone or something pretends to be something


else in an attempt to gain a victim's confidence, get
access to a system, steal data, or spread malware.
Security on the Internet

• Use Secure Password

• Install anti-virus

• Keep firewall active


Online Transactions and Online
Shopping

• Online Shopping: Process of buying goods and services from


merchants over the internet.

• Benefits:
• Convenient. You can get products at home.
• Millions of choices of products.
• Offer huge discount on goods and services.
• Online shops give us the opportunity to shop 24×7
• Sending gifts to relatives and friends is easy
Thank you!

You might also like