WEB APPLICATIONS AND SECURITY

 1. What is Computer Accessibility?

Computer Accessibility refers to the user friendliness of a computer system for all regardless of their disability.

 2. Name the numerous types of impairment that impact computer usage.

The numerous types of impairment that impact computer usage are

  • Cognitive impairments and learning disabilities, such as dyslexia, attention deficit-hyperactivity disorder (ADHD) or autism.
  • Visual impairment such as low-vision, complete or partial blindness, and color blindness.
  • Hearing impairment including deafness.
  • Motor or dexterity impairment such as paralysis, cerebral palsy, or carpal tunnel syndrome and repetitive strain injury.

3. What is the function of Sticky Keys?

StickyKeys is an accessibility feature to help computer users with physical disabilities, but it is also used by others as a means to reduce repetitive strain

 4. What is the use of Filter Keys?

FilterKeys is an accessibility function that tells the keyboard to ignore brief or repeated keystrokes, making typing easier for people with hand tremors.

 5.  What is the use of Toggle Keys?

ToggleKeys is an accessibility function which is designed for people who have vision impairment or cognitive disabilities. When ToggleKeys is turned on, computer emits sound cues when Caps Lock, Num Lock or Scroll Lock keys are pressed. A high sound is emitted when the keys are switched on and a low sound is emitted when they are switched off.

 6. What is the use of Sound Sentry option?

SoundSentry is designed to help users with auditory impairments. SoundSentry generates visual warnings, such as a blinking title bar or a flashing border, whenever the computer generates a sound.

 7. What is the use of ShowSounds option?

ShowSounds instructs applications that convey information by sound, to also provide information visually, through text captions or informative icons.

 

8. What is the use of High Contrast option?

High Contrast is an accessibility feature to assist people with vision impairment. The size and color of fonts and the background can be changed for ease of viewing.

 9. What is the use of Cursor Options?

Cursor Options is also an accessibility feature that assists people with vision impairment by changing the blink rate and width of the cursor.

10. What is the use of MouseKeys?

MouseKeys is an accessibility feature that assists people who have difficulty using a mouse. This option uses the numeric keypad of the keyboard as a pointing device instead of a mouse.

 11. What is Serial Keys?

SerialKeys is an accessibility feature that assists people that have difficulty using a keyboard or a mouse or both by using special devices such as Sip, Puff and Breath Switches to provide input to the computer through Serial Ports.

12. What is Computer Network?

A computer network is a collection of computers and other hardware components interconnected by communication channels that allow sharing of resources and information.

13. Explain Network Architecture.

Networks are designed using the following architecture:

Peer-to-peer (P2P) Architecture: Networks in which all computers have an equal status are called peer to peer networks. Generally in such a network each terminal has an equally competent CPU.

Client-Server Architecture: Networks in which certain computers have special dedicated tasks, providing services to other computers (in the network) are called client server networks. The computer(s) which provide services are called servers and the ones that use these services are called clients.

 14.  Name and explain the different types of Networks.

There are two major types of network Local Area Network (LAN) and Wide Area Network (WAN).

 Local Area Network: A LAN is one which connects computers and devices in a limited geographical area such as home, school, computer laboratory, office building, or closely positioned group of buildings. Usually LAN offer very high speeds and are used for connecting computers and peripherals such as printers, scanners, etc.

Wide Area Network: A WAN is one which covers a broad area i.e. any network that links across metropolitan, regional, or national boundaries. The Internet is the most popular WAN, and is used by businesses, governments, non-profit organizations, individual consumers, artists, entertainers, and many others.

 15. What is the Internet?

The Internet is a global system of interconnected computer networks that use the standard Internet protocol suite to serve billions of users worldwide. It is a network of networks that consists of millions of private, public, academic, business, and government networks.

 16. What is World Wide Web?

World Wide Web abbreviated as WWW or W3, commonly known as the Web, is a system of interlinked hypertext documents accessed via the Internet with the help of a web browser.

 17. What is a Web Browser?

A Web Browser is software used to view Web sites. It acts as an interface between the user and the World Wide Web.

 18. What is Web Server?

A Web server is a computer that stores web sites and their related files for viewing on the Internet.

 19. Explain the advantages of Networking.

The advantages of networking are:

 Data Sharing: One of the most important uses of networking is to allow the sharing of data.

 Files transfer: Users can send text files, spread sheets, documents, presentations, audio files, video files, etc. to other users.

 Hardware Sharing: Hardware components such as printers, scanners, etc. can also be shared thus saving cost.

Internet Access Sharing: A single Internet connection can be shared among other computers in a network instead of purchasing multiple Internet connection for each computer.

Usage of network based applications: Usage of network based applications like web browsers, email clients, chat application, audio & video calling is another advantage.

 20. What is the function of Internet Service Provider?

An Internet service provider (ISP) is an organization which provides the users access to the Internet via a dial-up (using modem) or direct (hard wired) or wireless connection.

 21. What is a Modem?

Á modem is a device that converts digital computer signals into a form (analog signals) that can travel over phone lines. It also re-converts the analog signals back into digital signals. The word modem is derived from its function MOdulator/DEModulator.

 22. Name some of the commonly used Internet connectivity used.

Some of the commonly used Internet connectivity are:

Dial-up: Dial-up Internet access is a form of Internet access that uses the facilities of the public switched telephone network to establish a connection to an Internet service provider via telephone lines using a device called MODEM.

DSL: Digital subscriber line (DSL) provides Internet access by transmitting digital data over wires of a local telephone network. DSL service is delivered along with wired telephone service on the same telephone line. For using a DSL connection, you need a DSL modem and a subscription.

 Cable Internet Access: Cable Internet Access is a form of broadband Internet access that uses the cable television infrastructure.

WiMAX: WiMAX (Worldwide Interoperability for Microwave Access) is a wireless communications standard designed to provide mobile broadband connectivity across cities and countries through a variety of devices.

WI-Fi: Wi-Fi is a popular technology that allows an electronic device such as computers or mobile phones to exchange data wirelessly over a network, including high-speed Internet connections.

 23. What is Instant Messaging?

Instant messaging (IM) is a form of communication over the Internet that offers an instantaneous transmission of text-based messages from sender to receiver.

 24. Name the Key Features of an instant messaging.

The Key Features of an instant messaging are as follows:

                      Text Messages can be sent to one or more person

                      Audio calling and conferencing.

                      Video calling and conferencing.

                      File transfers

                      Message history

 25. Name the different types of IM software.

There are two kinds of instant messaging software – application based and Web based.

 26. What is Application based instant messaging software? Give examples.

Application based instant messaging software is downloaded and installed on user’s computer. Some of the popular instant messaging software are:

                      Google Talk

                      Yahoo! Messenger

                      Skype

                      Windows Live Messenger

                      Rediff Bol, etc.

 27. What is Web based instant messaging software? Give examples.

Web based instant messaging software is accessed using browsers such as Internet Explorer, Mozilla Firefox, Google Chrome, etc. Some of the popular web based instant messaging software are:

                      Meebo

                      Yahoo! Messenger for the Web

                      MSN Web Messenger

                      IMO, etc.

 

28. What is Google Talk?

Google Talk is an instant messaging service that provides both text and voice communication developed by Google Inc. Google Talk can also be used for making video calls and to view updates from GMAIL mailbox.

 29. Name some general rules and etiquettes to be followed while chatting

The general rules and etiquettes to be followed while chatting are

                      Messages should be short and to the point.

                      Always introduce yourself by name if your screen name doesn’t reflect it.

                      Always ask if the other person has time to chat first - regardless of how important you think what you have to say is

                      In a business environment, know exactly what you want to discuss.

                      Typing your messages in uppercase is extremely rude - it’s considered shouting and very aggressive.

                      Give people time to respond - Multiple questions sent to a recipient before they’ve had a chance to answer can seem more like an interrogation rather than a conversation.

                      Wherever possible, give the person you are communicating with your undivided attention. .

                      It’s important to properly end an IM conversation - you may think the chat is over, but the other person may not.

 30.  What is a Blog?

A blog is a discussion style site used by non-technical or technical users for creating personal web pages. Blogs are similar to an online personal diary and simple to use.

 31. Name some Blogging Websites

Some of the popular blogging websites are:

                      www.WordPress.com

                      www.blogger.com

                      www.blog.com

                      www.weebly.com

                      www.blogsome.com

 32. Name some offline blog editors.

Some of the offline blog editors are

                      Qumana

                      Windows Live Writer

                      Blogdesk

 33. What is online shopping?

Online shopping is a form of electronic commerce where customers can buy or sell goods over the Internet. Customers need to have an active internet connection for viewing goods or services offered by a seller and have a credit, debit card or by internet banking to pay online.

 34. When is online shopping useful?

Online shopping could be useful in situations when:

  • A customer does not have sufficient time to visit stores.
  • Visiting a store is more expensive than purchasing a product online.
  • A product or service that is not available in the local market is available online.

35. Name some of the popular online transaction websites.  

Some of the popular online transaction websites are:

                      IRCTC: It is an online portal for booking flight and train tickets.

                      Flipkart: It is an online shopping portal for buying consumer products.

                      EBay: It is an online portal for buying and selling goods.

                      Redbus: It is an online portal for booking bus tickets.

 36. What are the requirements to perform an Online Transaction?

To perform an online transaction we need is a web browser, an active internet connection and a valid credit card, debit card or Net Banking for payment. Some websites even allow COD (Cash on delivery) where the users can pay once they receive the product or service.

 37. What is Internet Security?

Internet security is a branch of computer security specifically related to the Internet often involving browser security but also network security. Its objective is to establish rules and measures to use against attacks over the Internet.

 38. Name some online threats. How can we reduce the risks from online threats?

Some of the Online threats are Phishing, email spoofing, chat spoofing.

We can reduce the risks from online threats by using Antivirus Software, Antispyware Software, Firewalls and strong passwords.

 39. Name few best practices for Internet Security.

Few best practices for Internet Security are

                      Using strong passwords

                      Using encryption software

                      Keeping our username and password private

                      Not sharing our personal information

                      Using antivirus and antispyware software

                      Clearing browser cookies frequently

                      Installing firewalls

 40.  Name the basic safety rules to be followed at workplace?

The basic safety rules to follow at workplace are Fire safety, Falls and slips, Electrical safety and use of first aid.

 41. Name the basic Fire safety rules to be followed in an organization.

The Basic Fire safety rules to be followed in an organization are:

                      Fire escape plans must be installed at proper levels

                      Conduct regular drills

                      Maintenance of safety equipment must be taken care of regularly

 42. Name the Falls and Slips Safety rules to be followed in an organization

The Falls and Slips Safety rules to be followed in an organization

                      Workplace must be proper ventilated

                      Floors must be clean and dry

                      Oil spills, dust must be immediately cleaned.

                      Smoke alarms must be placed at proper intervals

                      Keep workplace a no-smoking zone.

43. Name the Electrical safety rules to be followed in an organization

The Electrical Safety rules to be followed in an organization are

                      Electrical equipment approved by a recognised organization.

                      Damaged and hazardous electrical equipment should be immediately replaced. All old and workout and frayed switches and wires should be changed.

                      Heat emanating equipment should be kept away from the electrical equipment.

                      The outlets/circuits should not be overloaded

 44. What is First Aid?

First Aid is the immediate assistance provided to the injured to save life and minimize health loss till the proper medical aid/ facility is provided.

 45. What is an Accident?

Accident is an unplanned event that may happen all of a sudden and may lead to unwanted or unprecedented results/outcomes

46. What is an Emergency?

An Emergency is any unexpected situation that needs immediate attention and action.

47. Name the different types of Accidents.

Accidents may be of following types:

                      Accidents at workplace

                      Industrial disease/illness

                      Road traffic accidents

                      Clinical Accidents

                      Sports related accidents

 48. What is an emergency situation?

An emergency situation is the one that:

  • ·        Threatens the employees, customers or the public
  • ·        Disrupts or shuts down the operations
  • ·        Causes physical or environmental damage

 49. Name the Emergencies that require evacuation.

Emergencies that require evacuation are

  • ·        Fire
  • ·        Explosion
  • ·        Floods
  • ·        Earthquake
  • ·        Hurricane
  • ·        Tornado
  • ·        Toxic material release
  • ·        Civil disturbance
  • ·        Workplace violence

 50. What is a Hazard? Name the different types of hazards.

The different types of hazards include:

  • ·        Physical
  • ·        Chemical
  • ·        Biological
  • ·        Mechanical

 51. What is Evacuation?

Evacuation is the process of emptying a place in case of an emergency, disaster.

 52. Name the points which an organization should ensure for evacuation in case of any emergency.

An organization must ensure following points for evacuation in case of any emergency:

  • ·        Every organization must have an evacuation policy.  All the Team Leaders are responsible for informing about the policy to their employees about it.
  • ·        Organization must have a designated assembly point for emergencies and every employee/worker must know where it is.
  • ·        A ‘buddy system’ for individuals with special needs or disabilities must be designated.
  • ·        Floor plans with evacuation routes in work areas should be pasted on the walls.
  • ·        Assembly areas, where employees are required to assemble after evacuation must be properly taken care of.
  • ·        Periodic evacuation drills should be conducted.

 53. What does a healthy lifestyle include?

A healthy lifestyle includes the following:

  • ·        Healthy eating habits
  • ·        Physical activities
  • ·        Stress management
  • ·        Healthy mind
  • ·        Sound sleep
  • ·        Goal setting

 

Popular posts from this blog

ENTREPRENEURSHIP SKILLS - II

SELF MANAGEMENT SKILLS - II