WEB APPLICATIONS AND SECURITY
Computer Accessibility refers to the user friendliness of a computer
system for all regardless of their disability.
The numerous types of impairment that impact computer usage are
- Cognitive impairments and learning disabilities, such as dyslexia, attention deficit-hyperactivity disorder (ADHD) or autism.
- Visual impairment such as low-vision, complete or partial blindness, and color blindness.
- Hearing impairment including deafness.
- Motor or dexterity impairment such as paralysis, cerebral palsy, or carpal tunnel syndrome and repetitive strain injury.
3. What is the function of Sticky Keys?
StickyKeys is an accessibility feature to help computer users with
physical disabilities, but it is also used by others as a means to reduce
repetitive strain
FilterKeys is an accessibility function that tells the keyboard to
ignore brief or repeated keystrokes, making typing easier for people with hand
tremors.
ToggleKeys is an accessibility function which is designed for people
who have vision impairment or cognitive disabilities. When ToggleKeys is turned
on, computer emits sound cues when Caps Lock, Num Lock or Scroll Lock keys are
pressed. A high sound is emitted when the keys are switched on and a low sound
is emitted when they are switched off.
SoundSentry is designed to help users with auditory impairments.
SoundSentry generates visual warnings, such as a blinking title bar or a
flashing border, whenever the computer generates a sound.
ShowSounds instructs applications that convey information by sound, to
also provide information visually, through text captions or informative icons.
8. What is the use of High
Contrast option?
High Contrast is an accessibility feature to assist people with vision impairment.
The size and color of fonts and the background can be changed for ease of
viewing.
Cursor Options is also an accessibility feature that assists people
with vision impairment by changing the blink rate and width of the cursor.
10. What is the use of MouseKeys?
MouseKeys is an accessibility feature that assists people who have
difficulty using a mouse. This option uses the numeric keypad of the keyboard
as a pointing device instead of a mouse.
SerialKeys is an accessibility feature that assists people that have
difficulty using a keyboard or a mouse or both by using special devices such as
Sip, Puff and Breath Switches to provide input to the computer through Serial
Ports.
12. What is Computer Network?
A computer network is a collection of computers and other hardware
components interconnected by communication channels that allow sharing of
resources and information.
13. Explain Network Architecture.
Networks are designed using the following architecture:
Peer-to-peer (P2P) Architecture: Networks in which all computers have
an equal status are called peer to peer networks. Generally in such a network
each terminal has an equally competent CPU.
Client-Server Architecture: Networks in which certain computers have
special dedicated tasks, providing services to other computers (in the network)
are called client server networks. The computer(s) which provide services are
called servers and the ones that use these services are called clients.
There are two major types of network Local Area Network (LAN) and Wide
Area Network (WAN).
Wide Area Network: A WAN is one which covers a broad area i.e. any network that links across metropolitan, regional, or national boundaries. The Internet is the most popular WAN, and is used by businesses, governments, non-profit organizations, individual consumers, artists, entertainers, and many others.
The Internet is a global system of interconnected computer networks
that use the standard Internet protocol suite to serve billions of users
worldwide. It is a network of networks that consists of millions of private,
public, academic, business, and government networks.
World Wide Web abbreviated as WWW or W3, commonly known as the Web, is
a system of interlinked hypertext documents accessed via the Internet with the
help of a web browser.
A Web Browser is software used to view Web sites. It acts as an
interface between the user and the World Wide Web.
A Web server is a computer that stores web sites and their related
files for viewing on the Internet.
The advantages of networking are:
Internet Access Sharing: A single Internet connection can be shared among other computers in a network instead of purchasing multiple Internet connection for each computer.
Usage of network based applications: Usage of network based applications like web browsers, email clients, chat application, audio & video calling is another advantage.
An Internet service provider (ISP) is an organization which provides the
users access to the Internet via a dial-up (using modem) or direct (hard wired)
or wireless connection.
Á modem is a device that converts digital computer signals into a form
(analog signals) that can travel over phone lines. It also re-converts the
analog signals back into digital signals. The word modem is derived from its
function MOdulator/DEModulator.
Some of the commonly used Internet connectivity are:
Dial-up: Dial-up Internet access is a form of Internet access that uses
the facilities of the public switched telephone network to establish a
connection to an Internet service provider via telephone lines using a device
called MODEM.
DSL: Digital subscriber line (DSL) provides Internet access by transmitting digital data over wires of a local telephone network. DSL service is delivered along with wired telephone service on the same telephone line. For using a DSL connection, you need a DSL modem and a subscription.
WiMAX: WiMAX (Worldwide Interoperability for Microwave Access) is a wireless communications standard designed to provide mobile broadband connectivity across cities and countries through a variety of devices.
WI-Fi: Wi-Fi is a popular technology that allows an electronic device such as computers or mobile phones to exchange data wirelessly over a network, including high-speed Internet connections.
Instant messaging (IM) is a form of communication over the Internet
that offers an instantaneous transmission of text-based messages from sender to
receiver.
The Key Features of an instant messaging are as follows:
•
Text Messages can be sent to one or more person
•
Audio calling and conferencing.
•
Video calling and conferencing.
•
File transfers
•
Message history
There are two kinds of instant messaging software – application based
and Web based.
Application based instant messaging software is downloaded and
installed on user’s computer. Some of the popular instant messaging software
are:
•
Google Talk
•
Yahoo! Messenger
•
Skype
•
Windows Live Messenger
•
Rediff Bol, etc.
Web based instant messaging software is accessed using browsers such as
Internet Explorer, Mozilla Firefox, Google Chrome, etc. Some of the popular web
based instant messaging software are:
•
Meebo
•
Yahoo! Messenger for the Web
•
MSN Web Messenger
•
IMO, etc.
28. What is Google Talk?
Google Talk is an instant messaging service that provides both text and
voice communication developed by Google Inc. Google Talk can also be used for
making video calls and to view updates from GMAIL mailbox.
The general rules and etiquettes to be followed while chatting are
•
Messages should be short and to the point.
•
Always introduce yourself by name if your screen name doesn’t reflect
it.
•
Always ask if the other person has time to chat first - regardless of
how important you think what you have to say is
•
In a business environment, know exactly what you want to discuss.
•
Typing your messages in uppercase is extremely rude - it’s considered
shouting and very aggressive.
•
Give people time to respond - Multiple questions sent to a recipient
before they’ve had a chance to answer can seem more like an interrogation
rather than a conversation.
•
Wherever possible, give the person you are communicating with your
undivided attention. .
•
It’s important to properly end an IM conversation - you may think the
chat is over, but the other person may not.
A blog is a discussion style site used by non-technical or technical
users for creating personal web pages. Blogs are similar to an online personal
diary and simple to use.
Some of the popular blogging websites are:
•
www.WordPress.com
•
www.blogger.com
•
www.blog.com
•
www.weebly.com
•
www.blogsome.com
Some of the offline blog editors are
•
Qumana
•
Windows Live Writer
•
Blogdesk
Online shopping is a form of electronic commerce where customers can
buy or sell goods over the Internet. Customers need to have an active internet
connection for viewing goods or services offered by a seller and have a credit,
debit card or by internet banking to pay online.
Online shopping could be useful in situations when:
- A customer does not have sufficient time to visit stores.
- Visiting a store is more expensive than purchasing a product online.
- A product or service that is not available in the local market is available online.
35. Name some of the popular online transaction
websites.
Some of the popular online transaction websites are:
•
IRCTC: It is an online portal for booking flight and train tickets.
•
Flipkart: It is an online shopping portal for buying consumer products.
•
EBay: It is an online portal for buying and selling goods.
•
Redbus: It is an online portal for booking bus tickets.
To perform an online transaction we need is a web browser, an active
internet connection and a valid credit card, debit card or Net Banking for
payment. Some websites even allow COD (Cash on delivery) where the users can
pay once they receive the product or service.
Internet security is a branch of computer security specifically related
to the Internet often involving browser security but also network security. Its
objective is to establish rules and measures to use against attacks over the
Internet.
Some of the Online threats are Phishing, email spoofing, chat spoofing.
We can reduce the risks from online threats by using Antivirus
Software, Antispyware Software, Firewalls and strong passwords.
Few best practices for Internet Security are
•
Using strong passwords
•
Using encryption software
•
Keeping our username and password private
•
Not sharing our personal information
•
Using antivirus and antispyware software
•
Clearing browser cookies frequently
•
Installing firewalls
The basic safety rules to follow at workplace are Fire safety, Falls
and slips, Electrical safety and use of first aid.
The Basic Fire safety rules to be followed in an organization are:
•
Fire escape plans must be installed at proper levels
•
Conduct regular drills
•
Maintenance of safety equipment must be taken care of regularly
The Falls and Slips Safety rules to be followed in an organization
•
Workplace must be proper ventilated
•
Floors must be clean and dry
•
Oil spills, dust must be immediately cleaned.
•
Smoke alarms must be placed at proper intervals
•
Keep workplace a no-smoking zone.
43. Name the Electrical safety rules to be followed in an organization
The Electrical Safety rules to be followed in an organization are
•
Electrical equipment approved by a recognised organization.
•
Damaged and hazardous electrical equipment should be immediately
replaced. All old and workout and frayed switches and wires should be changed.
•
Heat emanating equipment should be kept away from the electrical
equipment.
•
The outlets/circuits should not be overloaded
First Aid is the immediate assistance provided to the injured to save
life and minimize health loss till the proper medical aid/ facility is
provided.
Accident is an unplanned event that may happen all of a sudden and may
lead to unwanted or unprecedented results/outcomes
46. What is an Emergency?
An Emergency is any unexpected situation that needs immediate attention
and action.
47. Name the different types of Accidents.
Accidents may be of following types:
•
Accidents at workplace
•
Industrial disease/illness
•
Road traffic accidents
•
Clinical Accidents
•
Sports related accidents
An emergency situation is the one that:
- ·
Threatens the employees, customers or the public
- ·
Disrupts or shuts down the operations
- ·
Causes physical or environmental damage
Emergencies that require evacuation are
- ·
Fire
- ·
Explosion
- ·
Floods
- ·
Earthquake
- ·
Hurricane
- ·
Tornado
- ·
Toxic material release
- ·
Civil disturbance
- ·
Workplace violence
The different types of hazards include:
- ·
Physical
- ·
Chemical
- ·
Biological
- ·
Mechanical
Evacuation is the process of emptying a place in case of an emergency,
disaster.
An organization must ensure following points for evacuation in case of
any emergency:
- ·
Every organization must have an evacuation policy. All the Team
Leaders are responsible for informing about the policy to their employees about
it.
- ·
Organization must have a designated assembly point for emergencies and
every employee/worker must know where it is.
- ·
A ‘buddy system’ for individuals with special needs or disabilities
must be designated.
- ·
Floor plans with evacuation routes in work areas should be pasted on
the walls.
- ·
Assembly areas, where employees are required to assemble after
evacuation must be properly taken care of.
- ·
Periodic evacuation drills should be conducted.
A healthy lifestyle includes the following:
- ·
Healthy eating habits
- ·
Physical activities
- ·
Stress management
- ·
Healthy mind
- ·
Sound sleep
- ·
Goal setting