0% found this document useful (0 votes)
18 views107 pages

Typed Notes - Web Applications and Security

The document covers topics related to computer accessibility, networking fundamentals, instant messaging, and blogging. It explains various accessibility options for users with disabilities, types of networks, and the importance of the Internet and instant messaging services. Additionally, it provides guidelines for creating and managing blogs, including popular blogging platforms.

Uploaded by

kirti.trikha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views107 pages

Typed Notes - Web Applications and Security

The document covers topics related to computer accessibility, networking fundamentals, instant messaging, and blogging. It explains various accessibility options for users with disabilities, types of networks, and the importance of the Internet and instant messaging services. Additionally, it provides guidelines for creating and managing blogs, including popular blogging platforms.

Uploaded by

kirti.trikha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 107

IT 402 Class 10

Web Applications
and Security
Complete Chapter
Notes & Imp. Ques.
Topic 1
Working with
Accessibility
Options
Computer Accessibility

● Computer Accessibility refers to the user friendliness


of a computer system for all, regardless of their
disability.
Types of Impairments
● Cognitive impairments and learning disabilities, such as
dyslexia, attention deficit hyperactivity disorder (ADHD) or
autism.
● Visual impairment such as low-vision, complete or partial
blindness, and color blindness.
● Hearing impairment including deafness.
● Motor or dexterity impairment such as paralysis, cerebral palsy,
or carpal tunnel syndrome and repetitive strain injury.
Launching Accessibility Options

● To launch accessibility options in Windows XP :


● Click Start > Control Panel > Accessibility Options. The
Accessibility Options window appears.
Keyboard Tab

● Sticky Keys
● Filter Keys
● Toggle Keys
Sticky Keys
● Sticky Keys is an accessibility feature to help computer users
with physical disabilities, but it is also used by others as a
means to reduce repetitive strain.
● Sticky Keys allows the user to press and release a modifier key,
such as Shift, Ctrl, Alt, or the Windows key, and have it remain
active until any other key is pressed.
● To enable Sticky Keys, select Use Sticky Keys > Click Apply >
Click OK.
Filter Keys
● It is an accessibility function that tells the keyboard to ignore
brief or repeated keystrokes, making typing easier for people
with hand tremors.
● To enable Filter Keys, check Use Filter Keys.
● Click Settings under Filter Keys and check “Ignore Repeated
Keystrokes”.
● Click Apply.
● Click OK.
Toggle Keys
● It is an accessibility function which is designed for people who
have vision impairment or cognitive disabilities. When
ToggleKeys is turned on, computer emits sound cues when the
locking keys (Caps Lock, Num Lock, or Scroll Lock) are pressed.
● A high sound is emitted when the keys are switched on and a
low sound is emitted when they are switched off.
● To enable ToggleKeys, Check Use ToggleKeys > Settings >
Apply > Click OK.
Sound Tab

● Sound Sentry
● Show Sounds
Sound Sentry
● SoundSentry is designed to help users with auditory
impairments.
● SoundSentry generates visual warnings, such as a blinking title
bar or a flashing border, whenever the computer generates a
sound.
● To enable SoundSentry, Check Use SoundSentry under Sound
Tab. Doing so activates a drop down list wherefrom you can
choose the type of visual warning desired.
● Click Apply.
● Click OK.
Show Sounds
● ShowSounds instructs applications that convey information by
sound, to also provide information visually, through text
captions or informative icons.
● To enable ShowSounds, Check Use ShowSounds under Sound
Tab.
● Click Apply.
● Click OK
Display Tab

● High Contrast
● Cursor Options
High Contrast

● High Contrast is an accessibility feature to assist people with


vision impairment. You can change the size and color of fonts
and the background for ease of viewing.
● To enable High Contrast, check Use High Contrast > Apply >
OK.
Cursor Options
● Cursor Options is also an accessibility feature that assists
people with vision impairment by changing the blink rate and
width of the cursor.
● To change the speed of the cursor blink, move the Blink Rate
slider back and forth. Notice the cursor blinking at various
speeds.
● To change the width of the cursor, move the Width slider back
and forth. Notice the with of the cursor changing.
Mouse Tab
● Mouse Keys
● MouseKeys is an accessibility feature that assists people who
have difficulty using a mouse. This option uses the keyboard
(especially numeric keypad) as a pointing device instead of a
mouse.
● To enable MouseKeys, Check Use MouseKeys. • Click Apply. •
Click OK.
General Tab

● Serial Keys
● Serial Keys is an accessibility feature that assists people that
have difficulty using a keyboard or a mouse (or both).
● They can use special devices such as Sip, Puff and Breath
Switches to provide input to the computer through Serial Ports.
Topic 2

Networking
Fundamentals
Computer Network

● A computer network is a collection of computers and other


hardware components interconnected by communication
channels (cables or satellites) that allow sharing of resources
and information.
Network Architectures
● Peer-to-Peer Architecture
● Networks in which all computers have an equal status are called
peer to peer networks. Generally in such a network each terminal
has an equally competent CPU.
● Client-Server Architecture
● Networks in which certain computers have special dedicated tasks,
providing services to other computers (in the network) are called
client server networks. The computer(s) which provide services are
called servers and the ones that use these services are called clients.
Types of Networks
● Local Area Network (LAN)
● A local area network (LAN) is one which connects computers
and devices in a limited geographical area such as home,
school, computer laboratory, office building, or closely
positioned group of buildings.
● Usually local area networks offer very high speeds and are
used for connecting computers and peripherals such as
printers, scanners, etc.
Types of Networks
● Wide Area Network (WAN)
● A wide area network (WAN) is one which covers a broad area
(i.e., any network that links across metropolitan, regional, or
national boundaries).
● The Internet is the most popular WAN, and is used by
businesses, governments, non-profit organizations, individual
consumers, artists, entertainers, and many others.
Internet

● The Internet is a global system of interconnected computer


networks that use the standard Internet protocol suite to serve
billions of users worldwide.
● It is a network of networks that consists of millions of private,
public, academic, business, and government networks.
Internet
● Use - Internet is one of the most useful technologies of modern times
which help us in our daily, personal and professional life. Internet is widely
used by students, educational institutes; scientist and professionals to
gather information for research and general information. Businesses use
the Internet to access complex databases such as financial database.
● The Internet is the largest encyclopaedia for all age groups. The Internet
helps in maintaining contact with friends and relatives who live across
different locations via Internet chatting systems and email software. Internet
is also becoming a major source of entertainment for the general public.
World Wide Web
● World Wide Web is a system of interlinked hypertext documents
accessed via the Internet. With a web browser, one can view web
pages that may contain text, images, videos, and other multimedia,
and navigate between them via hyperlinks.
● Information is stored on web servers referred to as web pages are
retrieved by using a web browser such as Firefox on the local
computer.
● A Web Browser is a software used to view Web sites and acts as an
interface between the user and the World Wide Web. A Web server
is a computer that stores web sites and their related files for viewing
on the Internet.
Advantages of Network
● Data Sharing: One of the most important uses of networking is
to allow the sharing of data.
● Files Transfer : Users can send text files, spread sheets,
documents, presentations, audio files, video files, etc. to other
users.
● Hardware Sharing: Hardware components such as printers,
scanners, etc. can also be shared.
Advantages of Network
● Internet Access Sharing: You can purchase a single Internet
connection and share it among other computers in a network
instead of purchasing multiple Internet connection for each
computer.
● Usage of network based applications: Such as web browsers,
email clients, chat application, audio & video calling, etc. is
another advantage.
Getting Access to Internet
● Internet Service Provider
● An Internet service provider (ISP) is an organization which provides
you with access to the Internet via a dial-up (using modem) or direct
(hard wired) or wireless connection.
● MODEM
● A modem is a device that converts digital computer signals into a
form (analog signals) that can travel over phone lines. It also re-
converts the analog signals back into digital signals. The word
modem is derived from its function MOdulator/DEModulator.
Types of Common
Internet Connectivity
Technology Type of Connectivity

Dial Up Wired

DSL Wired

Cable Internet Access Wired

3G Wireless

WiMax Wireless

WiFi Wireless
Dial Up
● Dial-up Internet access is a form of Internet access that uses the
facilities of the public switched telephone network (PSTN) to
establish a connection to an Internet service provider (ISP) via
telephone lines using a device called MODEM. Dial-up
connections are extremely slow and in most cases, it is
replaced by a high speed connection such as DSL or Cable
Modem.
DSL

● Digital subscriber line(DSL) provide Internet access by


transmitting digital data over wires of a local telephone
network. DSL service is delivered along with wired telephone
service on the same telephone line. For using a DSL
connection, you need a DSL modem and a subscription.
Cable Internet Access

● Cable Internet Access is a form of broadband Internet access


that uses the cable television infrastructure. Cable Internet
Access is provided through existing cable TV networks.
3G

● 3G, short for 3rd Generation is a set of standards used for


mobile devices and mobile telecommunication services and
networks. High-Speed Downlink Packet Access (HSDPA) is 3G
mobile telephony communications protocol that allows higher
data transfer speeds and capacity.
WiMax
● WiMAX (Worldwide Interoperability for Microwave Access) is a
wireless communications standard designed to provide mobile
broadband connectivity across cities and countries through a
variety of devices. WiMAX is a long range system, covering
many kilometres and is typically used where DSL or Cable
Internet Access cannot be used; this could be difficulty in
laying out cables for home or offices located in remote
locations but need access to the Internet.
WiFi
● Wi-Fi is a popular technology that allows an electronic device
such as computers or mobile phones to exchange data
wirelessly over a network, including high-speed Internet
connections. Wi-Fi is used where cables cannot be run (such as
old buildings, outdoor areas) to provide network and Internet
access. Wi-Fi can also be used where users require mobile
connectivity.
Data Transfer on Internet
● Each packet is sent from computer to computer until it finds its
destination. Each computer on the way decides where next to
send the packet. All packets may not take the same route.
● At the destination, the packets are examined. If any packets are
missing or damaged, a message is sent asking for them to be
re-sent. This continues until all packets have been received
intact.
● The packets are now reassembled into their original form. All
this done in seconds!
Topic 3
Introduction
to Instant
Messaging
Instant Messaging
● Instant messaging (IM) is a form of communication over the
Internet that offers an instantaneous transmission of text-based
messages from sender to receiver. Most instant messaging
software include the option for performing file transfers, audio
chat, video calling and conferencing, sharing desktops, etc.
apart from standard text chat. Instant messaging software is
widely used for personal and commercial use.
Features of Instant Messaging
● Participants messaging to each other need to be signed in to
the same instant messaging software.
● To use instant messaging software, a user must have a valid
instant messaging account.
● Instant messaging accounts differ in formats; some instant
messaging software such as Yahoo! Messenger, Windows Live
Messenger use email addresses for managing the account and
software such as Skype use standard names.
Instant Messaging Services
● Application based instant messaging software is downloaded
and installed on user‟s computer. Some of the popular instant
messaging software are:
● Google Talk
● Yahoo! Messenger
● Skype
● Windows Live Messenger
● Rediff Bol
Instant Messaging Services
● Web based instant messaging software is accessed using
browsers such as Internet Explorer, Mozilla Firefox, Google
Chrome, etc. Some of the popular web based instant
messaging software are:
● Meebo
● Yahoo! Messenger for the Web
● MSN Web Messenger
● IMO
Creating Instant Messaging Account

● Google Talk is an instant messaging service that provides both


text and voice communication developed by Google Inc.
● Google Talk can also be used for making video calls and to
view updates from GMAIL mailbox.
● Google Talk is free and is available as application based and
web based.
● Before you start using Google Talk, a Gmail account is
required.
● We can download it from www.google.com/talk
Topic 4
Chatting with
a Contact –
Google Talk
Google Talk
● Whenever your friend in the contact list is online you can see
the person along with a green dot.
● You can start sending text chat message instantly by double-
clicking on a contact. A window will pop up.
● You can type the text in the text box and press enter; the other
person will see the text message and respond to your message.
Rules & Etiquettes
● Messages should be short and to the point.
● Always introduce yourself by name if your screen name doesn‟t
reflect it.
● Always ask if the other person has time to chat first.
● In a business environment, know exactly what you want to discuss.
● Typing your messages in uppercase is extremely rude.
● Give people time to respond.
● Wherever possible, give the person you are communicating with
your undivided attention.
● It‟s important to properly end an IM conversation.
Chatting on Gmail
● Once you sign into your Gmail account, a contact window will
be displayed either on the left side or the right side within the
browser.
● If you would like to chat with a contact, double click on the
contact‟s name. You will see a pop-up.
● Now you can start typing the message you want to send and
the other contact should be able to respond to your chat
message.
Chatting on Yahoo
● Before you start using Yahoo! Messenger, a Yahoo Mail account is
required.
● If you don‟t have a Yahoo! Mail Account already you can use the
built in option for creating a new Yahoo! Mail Account.
● You should have a list of contacts that are available for chat. If you
don‟t have any contacts, you can add their Yahoo Mail account to
your contact list by sending an invite.
● Note: If you would like to import your contacts from other sources
such as Microsoft Outlook, Gmail, Hotmail, etc., you can use the
import option.
Topic 5
Creating &
Publishing Web
Pages - Blog
Blog
● A blog is a discussion style site used by non-technical (or
technical users) users for creating personal web pages. Blogs
are similar to an online personal diary and simple to use.
● Use of Blog - We can use a blog to convey messages about
events, announcements, news, reviews, etc.
Blog
● Management of Blog - Blogs are usually managed using a web
browser and this requires active internet connection. You can also
use offline blog software to create content first and later publish the
content when an active internet connection is available.
● Free blog services are provided by :
● www.WordPress.com
www.blogger.com
www.blog.com
www.weebly.com
www.blogsome.com
Creating a Post
● To create a post, click New Post.
● Title: You must provide a title for your post; choose a tile that this
post will focus on. For example, “School Annual Day Function
2012”.
● Using the rich text box, you can type content that you want others
to read.
● Once you have finished typing the content, you need to publish the
post for others to see.
● Click Publish Post to publish your content.
● To view the post, you can type the blog address in the address bar
of the web browser, you should see your blog along with the post
Commenting on a Post
● You can comment on posts published by others. Usually, the comment
option is available towards the end of the post.
● In the Enter your comment here… text box, type your comments about the
post
● In the Email (required) field, type your email address.
● In the Name (required) field, type your name.
● In the Website filed, you may type your blog address (Optional).
● Once you have typed the content in the comment area, review carefully
and Click Post Comment.
● Once you click the Post Comment, you will see the blog along with your
comment.
Topic 6

Using Offline
Blog Editors
Offline Blog Editors
● If you do not have an active internet connection, you can
create blogs using a blog application and publish the blog
whenever internet connectivity is available.
● There are several free offline blog editors available that can be
downloaded and installed on the local computer such as:
● Qumana
● Windows Live Writer
● Blogdesk
Qumana

● You need to download and Install Qumana. Qumana can be


downloaded from www.qumana.com.
● Once installed, you can use the program to manage blogs.
Launching Qumana
● To launch Qumana, Click Start > Programs > Qumana >
Qumana.
● You need an existing blog account to use with Qumana.
● Enter your blog address and Click Next.
● A login window appears. You need to provide details of your
blog account.
● Give the blog address in the Web address field.
● Enter the Username and password of the blogaccount.
● Click Next > Finish.
Creating a Post
● Click New Post.
● Enter the title for the post in the Title field and the post content in the area
given below the page title.
● Click Publish Post. Once you click Publish Post, the post will get
automatically updated to your blog whenever the internet connectivity is
available.
● To view the published content, open the web browser and type your blog
address. You can include photos or pictures in your blog to make it
attractive.
Creating a Post
● To insert a picture
● Click on the image icon on the right hand side of the
application
● Click Browse to locate the image that you want to publish in
the blog.
● Once you click “Browse”, the OS browse window appears,
enabling you to locate the image to be loaded.
● When you have chosen the image click Upload & Insert.
● Click Publish Post.
Topic 7

Online
Transactions
Online Transactions
● Online transactions have made transactions very convenient
and simplified the workflow in many forms in a business.
Online transactions deals with transfer of money over the
internet. Revolution in the electronic media has made
transaction handling easy.
● Online shopping is a form of electronic commerce where
customers can buy or sell goods over the Internet. Customers
need to have an active internet connection for viewing goods
or services offered by a seller; customers can pay online using a
credit, debit card or by internet banking.
Online Transactions
● Online shopping could be useful in situations when:
● A customer does not have sufficient time to visit stores.
● Visiting a store is more expensive than purchasing a product online.
● A product or service that is not available in the local market is
available online.
● Some of the popular online transaction websites are:
● IRCTC, an online portal for booking flight and train tickets.
● Flipkart, an online shopping portal for buying consumer products.
● EBay, an online portal for buying and selling goods.
● Redbus, an online portal for booking bus tickets.
Flipkart
● Flipkart is an online store where you can purchase a variety of electronic
goods, books, accessories, digital cameras, mobile phones and peripherals
such as printers, etc.
● Flipkart offers multiple payment methods like credit card, debit card, net
banking, e-gift voucher, and Cash on Delivery.
● To work with Flipkart, you need to use a web browser and an active
internet connection.
● Open any Browser such as Firefox, Chrome or Internet Explorer
● Type www.flipkart.com in the address bar and Press Enter.
● To perform transactions using Flipkart, you need to sign up for a Flipkart
account.
● Locate and click on the Sign Up link at the top of the web page.
Flipkart

● To buy a product,
● Find the products
● Add all the items to the cart
● Click on buy now
● Enter the address
● Choose a payment method
IRCTC
● Indian Railway Catering and Tourism Corporation is an online portal that
can be used for booking travel tickets.
● To work with IRCTC, you need to use a web browser and an active internet
connection.
● Open any Browser such as Firefox, Chrome or Internet Explorer
● Type www.irctc.co.in in the address bar and Press Enter.
● To perform transactions using IRCTC, you need to sign up for an IRCTC
account.
● Once you logon to IRCTC, you can use the website for booking tickets.
● Go ahead and fill in the details. The ones marked with an asterisk (*) are
mandatory fields.
Topic 8

Internet
Security
Internet Security
● Internet security is a branch of computer security specifically
related to the Internet, often involving browser security but
also network security. Its objective is to establish rules and
measures to use against attacks over the Internet.
● The Internet represents an insecure channel for exchanging
information leading to a high risk of intrusion or fraud, such as
phishing.
Internet Security

● Online threats such as Phishing, email spoofing, chat spoofing,


etc. can increase the chances of users getting compromised.
● You can reduce the risks by using best practices such as using
Antivirus Software, Antispyware Software, Firewalls, strong
passwords, etc. in addition to spreading awareness of the best
practices.
Strong Password
● Following is a general guideline for managing strong
passwords :
● Keep the length of the password at least 12-14 characters if
permitted.
● Avoid keeping passwords based on repetition, dictionary
words, letter or number sequences, usernames, relative or pet
names, etc.
● Including numbers, and symbols in passwords if allowed.
Strong Password
● Use capital and lower-case letters.
● Avoid using the same password for multiple sites or purposes.
● Avoid using something that the public or workmates know
you strongly like or dislike.
● Use random password generators if possible.
● Example of a strong password: v4p$y&hw]b
Best Practices for Security
● Use encryption software: (Usually available within the
operating system) to protect your data from unauthorized
users. If encryption software is not available within the
operating system, use a 3rd party software.
● Keeping your username and password private: Never save
your username or password on computers that are used in
shared environments such as internet café. Browsers may save
your personal data on the local computer that can be used by
another user using the same computer.
Best Practices for Security
● Registering with websites: Read the privacy statement or policy
whenever you register with a website, the statement or policy
will include information about how the website use personal
data.
● Do not share personal information: Websites require you to fill
out forms containing fields such as name, gender, age, email
address, school, etc. Be cautious when filling out such forms.
Best Practices for Security
● Secure Transactions - If you are using online shopping or
transactions, websites even store your credit card or online banking
personal information such as your credit card number, account
details, etc.
● Antivirus and Antispyware programs also offer real-time protection
monitoring your computer for any changes by malware software.
Keep your Antivirus and Antispyware software always up to date.
● Do not immediately respond to mails from unknown users: It may be
a fake mail trying to gather personal information such as your bank
account details, home address, etc.
Best Practices for Security
● Clear browser cookies frequently: Cookies are programs that
are created on your local computer when you visit websites.
Though cookies are meant for storing data based on your
activity performed during your earlier visit such as log-on
details, details of a shopping cart, visited pages in a website,
etc. they could also be tracked by unauthorized users and
possibly gain access to your personal information.
Clearing Data Stored in Browsers
● Web browsers have built-in password management designed to store
passwords used in forms on websites. Browsers often prompt to save
usernames and passwords when users attempt to logon to websites.
● However it is not advisable to leave the web browser store this data
particularly on public or shared computers.
● To clear personal data from a web browser such as Mozilla Firefox,
launch the browser.
● Click Tools Menu, click Options.
● Click Security Tab.
● Notice that under Passwords section, Remember password for sites is
checked.
Clearing Data Stored in Browsers
● This means the browser is configured to save passwords for websites
automatically.
● You can uncheck Remember password for sites option, if you prefer
NOT to store passwords.
● Mozilla Firefox can also store data such as cookies, visited websites
or webpages data, browsing history, etc.
● To clear this stored data, click General tab > Option.
● Click Privacy Tab > History
● Click Clear Now and then click OK.
Topic 9
Maintain
Workplace
Safety
Fire Safety Rules
● Fire escape plans must be installed at proper levels
● Conduct regular drills
● Smoke alarms must be placed at proper intervals
● Keep workplace a no-smoking zone
● Maintenance of safety equipment must be taken care of
regularly
Falls & Slips Safety Rules
● Keep the moving area clean and clutter free.
● Workplace must be proper ventilated receive light.
● Wear non slippery footwear.
● Floors must be clean and dry
● Oil spills, dust must be immediately cleaned.
Electrical Safety Rules
● Electrical equipment used should be approved by a recognised
organization.
● Workers should be trained to handle the electric equipment safely.
● Damaged and hazardous electrical equipment should be
immediately replaced. All old and workout and frayed switches and
wires should be changed.
● Heat emanating equipment should be kept away from the electrical
equipment.
● Take care that the outlets/ circuits should not be overloaded .
● Switch off and unplug the electrical appliances before cleaning or
relocating them.
Use of First Aid
● First Aid is the immediate assistance provided to the injured to
save life and minimize health loss till the proper medical aid/
facility is provided.
● Assure the injured to remain calm and not to panic
● Keep them warm if they are under shock
● Do not move the victim in case of back/neck injury
Occupational Hazards
● An occupational hazard is the illness one may acquire due to
his occupation.
● Like people working in a chemical factory may get affected
due to presence of certain chemicals.
● Some types of occupational hazards are : Physical hazards,
chemical hazards, biological hazards, , behavioural hazards,
radiological hazards, ergonomic hazards etc.
Topic 10
Prevent
Accidents &
Emergencies
Accident
● An accident is an unplanned event that may happen all of a sudden
and may lead to unwanted or unprecedented results/outcomes.
● Types of Accidents:
● Accidents may be of following types :
● Accidents at workplace : Slips and fall accidents, fire
● Industrial disease/illness
● Road traffic accidents
● Clinical Accidents
● Sports related accidents
Handling Accidents
● Every organization must follow SOP for accident handling
● Safety measures must be placed to prevent workplace
accidents
● Immediately call the medical team for any injury
● Stay alert
● Pay attention to and follow emergency drills
Emergency
● An emergency is any unexpected situation that needs
immediate attention and action.
● An emergency situation might pose a sudden risk to life,
property health etc. and needs intervention to prevent
deteriorating results/ hazards.
● An emergency situation is one that:
● threatens the employees, customers or the public
● disrupts or shuts down the operations
● causes physical or environmental damage
Emergency
● Types of Emergencies
● Chemical spills, Extreme heat waves, Droughts, Pandemics,
Terrorist attack, Fire, Floods, Thunderstorms, Leakage of some
hazardous gas/ chemical.
● Emergencies that require evacuation
● Fire, Explosion, Floods, Earthquake, Hurricane, Tornado, Toxic
material release, Civil disturbance, Workplace violence
Topic 11
Protect Health
& Safety at
Work
Hazards
● An organization can face some health hazards that could put
the lives of the employees in danger. A hazard is anything that
is the source of any potential harm, damage or any kind of
potential loss of health or life.
● Hazards can be of different types depending on the industry
and the environment in which the employees work.
● The different types of hazards include:
● Physical, Chemical, Biological, Mechanical
Checklist for Workstations
● The workstation should:
● provide sufficient space for the user to alter position
comfortably
● provide adequate lighting
● have windows fitted with adjustable coverings to alter the
sunlight level
● be spacious enough when a workstation is shared by more
than one person
Checklist for Workstations
● The display screen should:
● display well-defined characters of adequate size and spacing
● have a stable image
● have easily adjustable brightness and contrast
● tilt and swivel easily to suit the user
● be free from glare and reflections
● Use a separate base for the screen or an adjustable table
Checklist for Workstations
● The keyboard should:
● be able to tilt easily and should be able to separate from the
screen to allow the user to adopt a comfortable working
position
● have space in front to provide support for the hands or arms of
the user
● have a matt surface
● have clearly legible symbols on the keys
Checklist for Workstations
● The work surface should:
● provide adequate space for the user
● have a low reflective surface
● be of an adequate size to allow the screen, keyboard and other
peripherals to be flexibly arranged
● have a stable and adjustable document holder, which should
be at the same level as the screen and at the same viewing
distance
Workplace Evacuation
● Evacuation is the process of emptying a place in case of an
emergency, disaster.
● Every company must ensure following points for evacuation in
case of any emergency:
● An evacuation policy : Every organization must have an
evacuation policy. All the Team Leaders are responsible for
informing about the policy to their employees about it.
Workplace Evacuation
● Organization must have a designated assembly point for
emergencies. Ensure that every employee/ worker must know
where it is.
● A „buddy system‟ for individuals with special needs or
disabilities must be designated. This system ensures that
differently-abled are assisted and guided out of the premises or
the impacted area properly.
Workplace Evacuation
● Floor plans with evacuation routes in work areas. Ensure that
you understand these so you can use it in time of need.
● Assembly areas, where you are required to assemble after
evacuation, must be properly taken care of.
● Periodic evacuation drills should be conducted. Ensure that
you pay attention during these drills. You need to save your life
and you can be helpful in saving someone else‟s life too.
Healthy Living
● „A healthy body has a healthy mind‟ - a very popular saying is
true .
● Healthy Lifestyle leads to a healthy being.
● A healthy living has a lasting impact on an individual which
ultimately yields a healthy environment at home as well as at
work place.
● A happy and healthy worker will always perform best to his
ability. A healthy lifestyle helps to keep and improve people‟s
health and well being.
Healthy Living
● A healthy lifestyle includes :
● healthy eating habits
● physical activities
● stress management
● healthy mind
● sound sleep
● goal setting
● A healthy lifestyle takes needs practice, commitment and
sincere efforts .
IMPORTANT QUESTIONS
1. What is meant by Computer Accessibility?
2. Mention any 4 types of impairments a person can have.
3. Write the definition and steps for the following:
a) Sticky Keys
b) Filter Keys
c) Toggle Keys
d) Sound Sentry
e) Mouse Keys
f) Show Sounds
g) Serial Keys
h) High Contrast
i) Cursor Options
4. Which accessibility options are available under Sound
Tab and Display Tab?
5. How can we disable Mouse Keys?
IMPORTANT QUESTIONS
6. What is a computer network?
OR
What is networking?
7. What do you understand by peer-to-peer
architecture?
8. What is Client-Server Architecture?
9. Differentiate between LAN and WAN.
10.Write a short note on „Internet‟.
11.Write a short note on World Wide Web.
IMPORTANT QUESTIONS
12. What are the advantages of a network?
13.What is an ISP?
14.Explain the need for a modem.
15.Write three examples of wired connectivity
and explain them. [Important]
16.Write three examples of wireless connectivity
and explain them. [Important]
17.Explain how is data transferred on the
Internet.
IMPORTANT QUESTIONS
18. What is Instant Messaging?
19.What are the features/advantages of instant messaging?
20.What are application based instant messaging software?
Explain with examples.
21.What are web based instant messaging software?
Explain with examples.
22.Write a short note on Google Talk.
23.Write the steps to chat with a contact on Google Talk.
24.Mention any five rules and etiquettes to follow while
chatting on the internet.
25.How can we chat on Gmail?
26.How can we chat on Yahoo?
IMPORTANT QUESTIONS
27. What is a blog?
28.What is the use of blog?
29.How can we create and manage blog?
30.How can we create a post in blog?
31.How can we comment on a post in blog?
32.Explain the purpose of an offline blog editor.
33.List any five offline blog editors.
34.Write the Steps to Launch Qumana.
35.How can we create a post in Qumana?
36.How can we insert an image in the post?
IMPORTANT QUESTIONS
37. Explain the purpose of Online transactions.
38.List any five websites that allow online
transactions.
39.List any three payment tools to use online
transactions.
40.Give any two benefits of online transactions.
41.Write a short note on Flipkart.
42.Write the full form of IRCTC.
43.Why is IRCTC used?
IMPORTANT QUESTIONS
44. Explain the purpose of Internet Security.
45.Explain different kinds of online threats.
46.Explain the need to clear data stored in
browsers.
47.Explain any five tips to manage strong
passwords.
48.Explain any four best practices to secure data .
49.Explain use of Antivirus and Anti Spyware
IMPORTANT QUESTIONS
50. Enlist any three basic safety rules to follow at
workplace.
51.Give any two basic safety rules for ensuring
Falls and Slips safety.
52.Give any two electrical safety rules in any
organization.
53.Explain any two first aid rules.
54.What do you mean by occupational hazards?
55.List any three types of occupational hazards.
IMPORTANT QUESTIONS
56. Explain the terms accident and emergency.
57.Enlist any four types of accidents.
58.Give any three situations of emergency that
require evacuation.
59.Give any two ways to handle accidents.
60. Give a checklist for workstations to minimize
the hazards.
61.List any three types of hazards.
62.Explain the term „ Evacuation Policy‟
63.Explain Buddy System to implement
evacuation efficiently in case of emergency
IMPORTANT QUESTIONS
64. Explain the terms Floor Plans and Assembly /areas.
65.Describe the importance of periodic evacuation
drills.
66.Explain importance of a healthy lifestyle.
67.Give any four points of a healthy lifestyle
68.An organization can face some __________ that
could put the lives of the employees in danger.
69.Hazards can be of different types depending on
the ________ and the ______________ in which the
employees work.
70.Organization must have a designated
______________ for emergencies

You might also like