IMPORTANT NOTES For - Web Applications and Security
IMPORTANT NOTES For - Web Applications and Security
Important Notes
Sticky Keys
FilterKeys
SoundSentry
ShowSounds
Display Tab
Select the Display Tab. A window with options to
configure accessibility options for display is displayed.
High Contrast
Cursor Options
MOUSE TAB
MouseKeys
This tab enables you to configure accessibility options for all users.
Select the General Tab, a window to configure
additional accessibility options will be displayed
SerialKeys
Networks in which all computers have an equal status are called peer
to peer networks. Generally in such a network each terminal has an
equally competent CPU.
CLIENT-SERVER ARCHITECTURE:
There are two major types of network Local Area Network (LAN)
and Wide Area Network (WAN).
Usually local area networks offer very high speeds and are used for
connecting computers and peripherals such as printers, scanners, etc.
WIDE AREA NETWORK
A wide area network (WAN) is one which covers a broad area (i.e.,
any network that links across metropolitan, regional, or national
boundaries). The Internet is the most popular WAN, and is used by
businesses, governments, non-profit organizations, individual
consumers, artists, entertainers, and many others.
INTERNET
MODEM
∙ The data is broken up into bits of same sized pieces called packets.
∙ A header is added to each packet explaining where the data has
come from, where it should end up and where it fits in with the rest
of the packets.
∙ Each packet is sent from computer to computer until it finds its
destination. All packets may not take the same route. ∙ At the
destination, the packets are examined. If any packets are missing or
damaged, a message is sent asking for them to be resent. This
continues until all packets have been received intact.
∙ The packets are now reassembled into their original form. All this
done in seconds!
.
If you don’t have a Gmail account already you can create a new
Gmail account.
• Whenever your friend in the contact list is online you can see the
person along with a green dot.
There are several free offline blog editors available that can be
downloaded and installed on the local computer such as:
• Qumana
• Blogdesk
Examples
Online Threats
Workplace Evacuation
In case of emergency there should be provision for
evacuation. Evacuation is the process of emptying a place in
case of an emergency, disaster.
Every company must ensure following points for evacuation
in case of any emergency: