0% found this document useful (0 votes)
37 views

notes of ch-2 web applications (basic) CLASS X

The document provides an overview of computer accessibility, assistive technologies, and various impairments affecting computer usage. It also covers network types, architecture, internet connectivity options, instant messaging, blogging, online transactions, and internet security threats along with best practices for security. Key terms related to web applications and security are defined, emphasizing the importance of user-friendly technology for individuals with disabilities.

Uploaded by

Poonam Wason
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
37 views

notes of ch-2 web applications (basic) CLASS X

The document provides an overview of computer accessibility, assistive technologies, and various impairments affecting computer usage. It also covers network types, architecture, internet connectivity options, instant messaging, blogging, online transactions, and internet security threats along with best practices for security. Key terms related to web applications and security are defined, emphasizing the importance of user-friendly technology for individuals with disabilities.

Uploaded by

Poonam Wason
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

CH- WEB APPLICATIONS AND SECURITY

CLASS X
NOTES
Computer Accessibility :- It refers to the user friendliness of a computer
system for all, regardless of their disability.
Assistive Technology :- When a combination of hardware and software, it
enables a person with a disability or impairment to use a computer. It is
known as Assistive Technology.
Q:- What are the different impairments that impact computer usage ?
There are numerous types of impairment that impact computer usage.
These include:
• Cognitive impairments and learning disabilities, such as dyslexia,
attention deficithyperactivity disorder (ADHD) or autism.
• Visual impairment such as low-vision, complete or partial blindness, and
color blindness.
• Hearing impairment including deafness.
• Motor or dexterity impairment such as paralysis, cerebral palsy, or
carpal tunnel syndrome and repetitive strain injury.

KEYBOARD ACCESSIBILITY OPTIONS


1. Sticky Keys:- StickyKeys is an accessibility feature to help computer
users with physical disabilities, but it is also used by others as a means to
reduce repetitive strain.
StickyKeys allows the user to press and release a modifier key, such as Shift,
Ctrl, Alt, or the Windows key, and have it remain active until any other key
is pressed.

2. FilterKeys:- FilterKeys is a feature of Microsoft Windows. It is an


accessibility function that tells the keyboard to ignore brief or repeated
keystrokes, making typing easier for people with hand tremors.

3. ToggleKeys:- ToggleKeys is also a feature of Microsoft Windows. It is


an accessibility function which is designed for people who have vision
impairment or cognitive disabilities. When ToggleKeys is turned on,
computer emits sound cues when the locking keys (Caps Lock, Num
Lock, or Scroll Lock) are pressed. A high sound is emitted when the keys
are switched on and a low sound is emitted when they are switched off.
SOUND ACCESIBILITY OPTIONS

1. SoundSentry:- SoundSentry is designed to help users with auditory


impairments. SoundSentry generates visual warnings, such as a
blinking title bar or a flashing border, whenever the computer
generates a sound.
2. ShowSounds:- ShowSounds instructs applications that convey
information by sound, to also provide information visually, through
text captions or informative icons.

DISPLAY ACCESSIBILITY OPTIONS


1. High Contrast :- High Contrast is an accessibility feature to assist
people with vision impairment. You can change the size and color of
fonts and the background for ease of viewing.
2. Cursor Options :- Cursor Options is also an accessibility feature that
assists people with vision impairment by changing the blink rate and
width of the cursor.
MOUSE ACCESSIBILITY OPTIONS
1. MouseKeys :- MouseKeys is an accessibility feature that assists people
who have difficulty using a mouse. This option uses the keyboard
(especially numeric keypad) as a pointing device instead of a mouse.

2. SerialKeys:- SerialKeys is an accessibility feature that assists people that


have difficulty using a keyboard or a mouse (or both). They can use
special devices such as Sip, Puff and Breath Switches to provide input to
the computer through Serial Ports

NETWORK :- A Network is defined as a connection between computers


for the purpose of sharing data and resources . data includes the files and
resources include the hardware resources like printer , scanner , hard disk
etc .
Types of network :-
It is of 2 types :-
LAN ( LOCAL AREA NETWORK) WAN ( WIDE AREA
NETWORK )
A LAN is a network that connects A WAN is a network that
computers and devices in a small area connects computers and devices
up to a maximum distance of 10 km. in a broad area across cities
countries and continents.
For eg a within an office , building , For eg INTERNET is the largest
school campus etc WAN.

Network Architecture :
1. Peer-to-peer (P2P) Architecture: Networks in which all computers
have an equal status are called peer to peer networks. Generally in
such a network each terminal has an equally competent CPU.
2. Client-Server Architecture: networks in which certain computers
have special dedicated tasks, providing services to other computers
(in the network) are called client server networks. the computer(s)
which provide services are called servers and the ones that use these
services are called clients.

IMPORTANT TERMS :-

Protocol :- Protocols are the standard rules and regulations that govern
the transfer of data on the Internet .
WWW:- World Wide Web . It is a system of interlinked hypertext
documents accessed via the Internet .
Web browser :- it is a software used to view web sites and acts as an
interface between the user and the World wide Web .for eg – Chrome ,
Firefox , Explorer
Web Server :- A web server is a computer that stores websites and their
related files for viewing on the internet . for eg Apache , IIS
ISP – Internet Service Provider . It is an organization which provides you
with access to the Internet through a dial up connection ( using modem) or
direct (hard wired ) or wireless connection . for eg :- MTNL , Airtel , BSNL
, Reliance etc
Modem :- Modem stands for Modulation / Demodulation . It is a hardware
device that converts analog signals to digital and vice versa .
TYPES OF COMMON INTERNET CONNECTIVITY
Technology Type of connectivity
Dial up Wired
DSL Wired
Cable Internet Access Wired
3G Wireless
WiMAX Wireless
Wi-Fi Wireless
1. Dial-up: Dial-up is a form of internet access that uses the facilities of
the public switched telephone network (PStn) to establish a
connection to an internet service provider (iSP) via telephone lines
using a device called MODEM. Users dial a particular number
provided by the iSP and gain access to the internet.
Dial-up connections are extremely slow
2. DSL: Digital subscriber line(DSL) provide internet access by
transmitting digital data over wires of a local telephone network.
DSL service is delivered along with wired telephone service on the
same telephone line.
3. Cable internet Access: Cable internet Access is a form of broadband
internet access that uses the cable television infrastructure. Cable
internet Access is provided through existing cable tV networks; this
is similar to DSL that is provided over existing telephone lines.
4. 3G, short for 3rd Generation is a set of standards used for mobile
devices and mobile telecommunication services and networks. High-
Speed Downlink Packet Access (HSDPA) is 3G mobile telephony
communications protocol that allows higher data transfer speeds and
capacity
5. WimAx: WiMAX (Worldwide interoperability for Microwave
Access) is a wireless communications standard designed to provide
mobile broadband connectivity across cities and countries through a
variety of devices. WiMAX is a long range system, covering many
kilometres
6. Wi-Fi: Wi-Fi is a popular technology that allows computers or
mobile phones to exchange data wirelessly over a network, including
high-speed internet connections. Wi-Fi devices such as personal
computer, smartphones, video game console, etc. can connect to a
network resource such as internet through a device called the
Wireless Access Point (WAP). Wi- Fi is used where cables cannot be
run (such as old buildings, outdoor areas)

How is data transferred on the Internet ?


• Data is broken into bits of same sized pieces called packets .
• A header is attached to each packet that contains the address of the
sender computer , the receiver computer and where it fits with the
rest of the packets .
• The packets are then transmitted from computer to computer until it
finds its destination
• At the destination the packets are examined and then they are
resembled into their original form .
Instant Messaging – it is a form of communication over the internet that
offers an instantaneous transmission of text based messages from sender to
receiver . Features of an IM are as follows :
• Audio calling and conferencing
• Video calling and conferencing
• File transfers( spreadsheets , audio files , video files )
• Message history
• Text messages can be sent to more than 1 person
Types of Instant messaging software :-
It is of 2 types – application based and web based
Application based is downloaded and installed on user’s computer . for eg –
Google talk , Yahoo messenger , Skype , Windows Live messenger
Web based is accessed using browsers such as explorer , Firefox . for
egMeebo , MSN wen messenger etc
BLOG – a blog is a discussion style site used by non technical users for
creating personal web pages . Blogs are similar to an online personal diary
and simple to use . you van blog to convey messages about events ,
announcements, news .
The most popular websites offering blog service are :-
www.wordpress.com
www.blog.com
www.weebly.com
www.blogsome.com
Online transactions :- online shopping is a form of electronic commerce
where customers van buy or sell goods over the internet . some of the
popular online websites are :-
1. IRCTC
2. Flipkart
3. Ebay
4. Redbus

Internet security – There are various online threats :-


Phishing -
Phishing is the fraudulent attempt to obtain sensitive information such as
usernames, password and credit card details (and money), often
for malicious reasons, by disguising as a trustworthy entity in an electronic
communication.
Phishing is typically carried out by email spoofing[4] or instant messaging,[5] and
it often directs users to enter personal information at a fake website, which
looks like a real website
Spam

Spam may refer to unsolicited or undesired electronic or illegal email messages

Adware

Adware is a type of malware software that displays unwanted ads when a user is
surfing the internet. The ads often redirect your searches to advertising websites
and collect marketing-type data about you, behind your back, which is
considered malicious.

Trojan

Trojans leave your computer completely unprotected, which can mean that
hackers can steal any data from your system. Trojans often present themselves
as harmless computer programmes so that hackers can penetrate your computer
without being detected.

Virus

Viruses usually attach themselves covertly to downloads as they are designed to


spread at an alarming rate. Viruses are often attached to files for download,
shared via CDs, DVDs, and USB sticks, or loaded on to computers by opening
infected email attachments.

Worms

Worms usually make their way on to a computer via a malicious email


attachment or USB stick. Once your computer has been infected by a worm, it
will likely send itself to every email address logged in your system.

Spyware

Spyware is usually attached to pop-ups of downloadable files. Once installed on


your computer, spyware can monitor your keystrokes, read and delete your files,
reformat your hard drive, and access your applications.

Best Practices for security


1. Use strong passwords – a combination of alphanumeric and
special characters could be used for creating a password that is
not so easy to be guessed or cracked by any hacker .
2. Back up your Data
3. Use encryption software
4. Keep your username and password private
5. Do not share personal information
6. Use antivirus and anti spyware software
7. Do not immediately respond to mails from unknown users
8. Clear browser cookies immediately
9. Install firewalls
10.Never install software from unknown sources
11.Remove unwanted or unknown software applications

You might also like