0% found this document useful (0 votes)
409 views

Web Application and Security

The document discusses various topics related to computer and internet skills including: 1. Keyboard accessibility features such as Sticky Keys, Filter Keys, and Toggle Keys that help users with disabilities. 2. Networking fundamentals covering peer-to-peer and client-server architectures, different types of networks based on span including PAN, LAN, MAN, and WAN, and advantages of networking like data sharing and hardware sharing. 3. Internet security best practices such as using strong passwords, backing up data, using encryption, and securing online transactions.

Uploaded by

Prathmesh Chavan
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
409 views

Web Application and Security

The document discusses various topics related to computer and internet skills including: 1. Keyboard accessibility features such as Sticky Keys, Filter Keys, and Toggle Keys that help users with disabilities. 2. Networking fundamentals covering peer-to-peer and client-server architectures, different types of networks based on span including PAN, LAN, MAN, and WAN, and advantages of networking like data sharing and hardware sharing. 3. Internet security best practices such as using strong passwords, backing up data, using encryption, and securing online transactions.

Uploaded by

Prathmesh Chavan
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

(Subject Specific Skill)

Unit 4- Web Applications Security


Session 1- KEYBOARD TAB

Computer Accessibility – It refers to the user friendliness of a


computer system for all, regardless of their disability. It is known as
Assistive Technology

KEYBOARD TABS-

 Sticky Keys- Sticky Keys is an accessibility feature to help


computer users with physical disabilities, but it is also used by
others as a means to reduce repetitive strain.
 Filter Keys – Filter Keys is a feature of Microsoft Windows. It is
an accessibility function that tells the keyboard to ignore brief
or repeated keystrokes, making typing easier for people with
hand tremors.
 Toggle Keys- It is an accessibility function which is designed for
people who have vision impairment or cognitive disabilities.
When ToggleKeys is turned on, computer emits sound cues
when the locking keys (Caps Lock, Num Lock, or Scroll Lock) are
pressed.
 Mouse Keys- This option uses the keyboard (especially numeric
keypad) as a pointing device instead of a mouse.
 Serial Keys- Serial Keys is an accessibility feature that assists
people that have difficulty using a keyboard or a mouse (or
both).
Session 2- NETWORKING FUNDAMENTALS

PEER-TO-PEER (P2P) ARCHITECTURE: Networks in which all


computers have an equal status are called peer to peer networks.
Generally in such a network each terminal has an equally competent
CPU.

CLIENT-SERVER ARCHITECTURE: Networks in which certain


computers have special dedicated tasks, providing services to other
computers (in the network) are called client server networks. The
computer(s) which provide services are called servers and the ones
that use these services are called clients.

TYPES OF NETWORKS on the basis of Span

PAN ( Personal Area Network)-


 The smallest computer network
 Devices may be connected through Bluetooth or other infra-red
enables devices
 It has a connectivity range of upto 10 metres

LAN (Local Area Network) –


 Small network like in a building or a small office
 It is inexpensive
 Transfer of data is fast and is highly score
MAN(Metropolitan Area Network)

 A network that can be connected within a city, for example, cable


TV Connection
 It has a higher range.

WAN (Wide Area Network)

 A network which covers over a country or a larger range of people


 Telephonic lines are also connected through WAN
 Internet is the biggest WAN in the world

INTERNET –

The Internet is a global , network of networks that consists of


millions of private, public, academic, business, and government
networks

WORLD WIDE WEB (WWW)- World Wide Web (abbreviated as


WWW or W3, commonly known as the Web), is a system of
interlinked hypertext documents accessed via the Internet.

Advantages associated with networking are:

 Data Sharing: One of the most important uses of networking is


to allow the sharing of data.
 Files transfer : Users can send text files, spread sheets,
documents, presentations, audio files, video files, etc. to other
users
 Hardware Sharing: Hardware components such as printers,
scanners, etc. can also be shared.
 Internet Access Sharing: You can purchase a single Internet
connection and share it among other computers in a network
instead of purchasing multiple Internet connection for each
computer

INTERNET SERVICE PROVIDER(ISP)- An Internet service provider


(ISP) is an organization which provides you with access to the
Internet via a dial-up (using modem) or direct (hard wired) or
wireless connection.

MODEM - Á modem is a device that converts digital computer signals


into a form (analog signals) that can travel over phone lines. It also
reconverts the analog signals back into digital signals.

TYPES OF COMMON INTERNET CONNECTIVITY

1) Dial-up:- Users dial a number and get access to internet. Dial-


up connections are extremely slow
2) ) DSL: DSL is Digital Subscriber Line provides internet
connectivity by transmitting digital data over wires of a local
telephone network.
3) Cable Internet Access:- - It is a form of broadband Internet
access that uses the cable TV infrastructure

DATA TRANSFER ON THE INTERNET

 The data is broken up same sized pieces called packets.

 A header is added to each packet explaining where the data has


come from, where it should end up and where it fits in with the rest
of the packets.

 Each packet is sent from computer to computer until it finds its


destination. All packets may not take the same route

 At the destination, the packets are examined. If any packets are


missing or damaged, a message is sent asking for them to be resent.
This continues until all packets have been received intact.
SESSION 3: INTRODUCTION TO INSTANT MESSAGING

Instant messaging (IM) - is a form of communication over the


Internet that offers an instantaneous transmission of text-based
messages from sender to receiver.

1) Application Based IM:- These software are downloaded and


installed on user’s computer. Eg. Google Talk , Yahoo!
Messenger , Skype , Window Live Messenger , Rediff Bol etc.
2) Web Based IM:- They are accessed using browsers such as
Internet Explorer etc. Eg. MSN Web Messenger , Yahoo!
Messenger for the Web , Meebo , IMO etc.

SESSION 4: CHATTING WITH A CONTACT

Chat Etiquities-

• Whenever your friend in the contact list is online you can see the
person along with a green dot.

• You can start sending text chat message instantly by doubleclicking


on a contact. There are some general rules and etiquettes to be
followed while chatting.

•Messages should be short and to the point.

• Always introduce yourself by name if your screen name doesn’t


reflect it.

• Always ask if the other person has time to chat first - regardless of
how important you think what you have to say is, it’s not going to be
well received if the recipient is busy.

• Give people time to respond - Multiple questions sent to a


recipient before they’ve had a chance to answer can seem more like
an interrogation rather than a conversation.
WEB BLOG – A blog is a discussion style site used by non-technical
users for creating personal web pages. Blog is similar to an online
personal diary and similar to use. A blog is used to convey messages,
events, news, announcements etc.

Examples of Websites that offer blog services:-

www.blogger.com
www.wordpress.com
www.weebly.com
www.blog.com

Session 6- OFFLINE BLOG EDITORS


If you do not have an active internet connection, you can create
blogs using a blog application and publish the blog whenever
internet connectivity is available

Exampls- Qumana • Windows Live Writer • Blogdesk

SESSION 7: ONLINE TRANSACTIONS

Payments tools to use Online transaction For completing an online


transaction we must need:- 1) Valid Debit Card 2) Valid Credit Card 3)
Net Banking Subscription

SESSION 8: INTERNET SECURITY

Online Threats –
1) Phishing :- The act of acquiring personal / private and
sensitive data from personal computers for use in
fraudulent activities. For eg. Mails from unknown persons
that ask for your credit / debit card details. 2) Email
spoofing :- It is the creation of email messages with a
forged sender address. For eg. Sending an email with a
forged email address which appears to be original. These
mails are infected mails which contain worms.
2) Chat Spoofing:- Spoofing means hoax, trick, or deceive
which contains false information. Hiding / Faking the
identity of another person over the internet is called chat
spoofing

Best practices for security over Internet-


1. Use strong passwords: A combination of alphanumeric
and special characters could be used for creating a
password that is not so easy to crack or guessed by other
users.
2. Backup your data: Always keep copies of data in CD,
pendrives etc, so it could be helpful in situation when
there is a loss of data.
3. Use Encryption software: Use encrypted software
available within the operating software to protect data
from unauthorized users.
4. Keep username and password private: Never save
passwords or usernames on computers that are used in
shared environments like net café.
5. Do not share personal information: Be cautious when
filling out forms on internet. Because your personal
information or emails could be used by unauthorized
users to send fake or unwanted emails.
6. . Secure transactions: Always use only secure websites
for online shopping or transactions
7. Use Antivirus and antispyware software: These
softwares protect your computer .

SESSION 9 : Maintain workplace safety

Basic Fire safety rules in an organization are :

- Fire escape plans must be installed at proper levels -


Conduct regular drills - Maintenance of safety equipment
must be taken care of regularly

Falls and Slips Safety rules - Workplace must be proper


ventilated - Floors must be clean and dry - Oil spills, dust
must be immediately cleaned.

Electrical safety rules: - Electrical equipment approved by a


recognised organization. - Take care that the outlets/ circuits
should not be overloaded

Session 10 : Prevent Accidents and Emergencies

Handling accidents: - Safety measures must be placed to


prevent workplace accident

 Immediately call the medical team for any injury


 Stay alert
 Pay attention to and follow emergency drills

Session 11: Protect Health and Safety at work


Checklist for Workstations :

● provide sufficient space for the user to alter position


comfortably

● provide adequate lighting

● have windows fitted with adjustable coverings to alter the


sunlight level

● be spacious enough when a workstation is shared by more


than one person

Healthy Living

‘A healthy body has a healthy mind’ - a very popular saying is


true ‘Healthy Lifestyle leads to a healthy being.

a healthy lifestyle includes : - healthy eating habits - physical


activities - stress management - healthy mind - sound sleep

You might also like