Unit - 4 WEB APPLICATION
Unit - 4 WEB APPLICATION
1 Mark:
1. The option in Microsoft windows XP used for helping users with physical disabilities and to reduce
repetitive strain is Sticky Keys. (BB)
2. SoundSentry is designed to help users with auditory impairments. (BB)
3. The High Contrast option in Microsoft Windows XP is designed to assist people with Vision impairments.
(BB)
4. Serial Keys is designed to assist people that have difficulty using a keyboard or a mouse. (BB)
5. Computer Accessibility refers to the user friendliness of a computer system for all, regardless of their
disability.
6. A combination of hardware and software, it enables a person with a disability or impairment to use
a computer is called Assistive Technology.
7. Cognitive impairments and learning disabilities, as dyslexia, attention deficit-hyperactivity disorder
(ADHD) or autism.
8. Cerebral palsy is a type of motor impairment.
9. Accessibility Options in Control Panel are used to customize the way your keyboard, display, or mouse
function.
10. Sticky Keys allows the user to press and release a modifier key.
11. To disable Sticky Keys, uncheck Use StickyKeys and then click on Apply>OK.
12. The acronym of ADHD Attention deficit-hyperactivity disorder.
13. To ignore brief or repeated keystrokes use the Filter Keys.
14. Toggle key used for people who have vision impairment or cognitive disabilities.
15. Visual warnings, such as a blinking title bar or a flashing border, whenever the computer generates a
sound sentry.
16. Show Sounds instructs applications that convey information by sound, to also provide information
visually, through text captions or informative icons.
17. High Contrast is an accessibility feature to assist people with vision impairment.
18. Cursor Options is also an accessibility feature that assists people with vision impairment by changing the
blink rate and width of the cursor.
19. Sip, Puff are examples of Serial key.
20. The acronym for LAN is Local Area Network.
21. Three types of Wired Internet Connectivity are Dail up, DSL, & Cable Internet Access
22. Three types of Wireless Internet Connectivity are 3G ,Wimax, &Wifi.
23. A computer network is a collection of computers and other hardware components interconnected
by communication channels (cables or satellites) that allow sharing of resources and information.
24. In peer to peer all computers have an equal status and equally Competent CPU.
25. Networks in which certain computers have special dedicated tasks, providing services to other computers
(in the network) are called client server networks.
26. Local area networks offer very high speeds and are used for connecting computers and peripherals such
as printers, scanners, etc.
27. Wide area network is one which covers a broad area.
28. Internet is one of the most useful technologies of modern times which help us in our daily, personal and
professional life.
29. The acronym for WAN isWide Area Network.
30. Information is stored on web servers referred to as web pages are retrieved by using a web browser such
as Firefox on the local computer.
31. The acronym for ISP is Internet Service Provider.
32. The word modem is derived from MOdulator/DEModulator.
1
33. The acronym for DSL is Digital Subscriber line.
34. Cable Internet Access is a form of broadband Internet access that uses the cable television
infrastructure.
35. The acronym for 3G is3rd Generation.
36. The acronym for WiMAX is Worldwide Interoperability for Microwave Access.
37. The acronym for Wifi is Wireless Fidelity.
38. A header is added to each packet where the data has come from, where it should end up.
39. The acronym for HSDPA is High-Speed Downlink Packet Access.
40. The acronym for WAP is Wireless Access Point.
41. Instant Messaging is a form of communication over the Internet that offers an instantaneous transmission
of text-based messages from sender to receiver.
42. Microphone , Headset & Speaker Web Camera are required for audio and video conferencing.
43. Instant messaging software is widely used for personal and commercial use.
44. Instant messaging is two types Application & Web Based.
45. Application based instant messaging software is downloaded and installed on user’s computer.
46. Web based instant messaging software is accessed using browsers.
47. Google Talk is an instant messaging service that provides both text and voice communication
developed by Google.
48. Google Talk can also be used for making video calls and to view updates from GMAIL mailbox.
49. The contact list is online we can see the person along with a green dot.
50. A blog is a discussion style site used by non-technical and technical users for creating personal web
pages.
51. WordPress has support for themes for customizing the design of a blog.
52. Themes can make the blog or the webpage look attractive.
53. Blog Address provide a unique address to your WordPress Blog.
54. Offline blog editors available that can be downloaded and installed on the local computer.
55. Online shopping is a form of electronic commerce where customers can buy or sell goods over the
Internet.
56. The acronym for IRCTC is Indian Railway Catering and Tourism Corporation.
57. The acronym for E-Commerce is Electronic Commerce.
58. Internet security is a branch of computer security specifically related to the Internet, often
involving browser security but also network security.
59. Keep the data away from unauthorized users.
60. Use encryption software to protect your data from unauthorized users.
61. Computers are prone to attacks from software Malware that could harm your computer.
62. Malware track browsing behaviour or transmit personal data from your computer.
63. Cookies are programs that are created on your local computer when you visit websites.
64. Firewalls could be software or hardware and can assist in keeping a computer and a network
secure.
65. Web browsers have built-in password management designed to store passwords used in forms on
websites.
66. General tab you to configure accessibility options for all users.
67. The acronym of BSNL Bharat Sanchar Nigam Limited
SESSION 1: WORKING WITH ACCESSIBILITY OPTIONS
2Mark:
1. What is Computer Accessibility?
Computer Accessibility refers to the user friendliness of a computer system for all, regardless of their
disability.
2
2. What is Assistive Technology?
When a combination of hardware and Software, it enables a person with a disability or impairment to use a
computer. It is known as Assistive Technology
3. What are the types of Impairment that impact computer usage?
Cognitive impairments and learning disabilities, such as dyslexia, attention deficit-hyperactivity
disorder (ADHD) or autism.
Visual impairment such as low-vision, complete or partial blindness, and color blindness.
Hearing impairment including deafness.
Motor or dexterity impairment such as paralysis, cerebral palsy, or carpal tunnel syndrome
and repetitive strain injury.
4. What is purpose of Accessibility option?
Accessibility Option in Control Panel are used to customize the way your keyboard, display, or mouse
function. Many of these features are useful for people with disabilities.
5. What is Sticky keys and state its function?
Sticky Keys is an accessibility feature to help computer users with physical disabilities, but
it is also used by others as a means to reduce repetitive strain. Sticky Keys allows the user to press and
release a modifier key, such as Shift, Ctrl, Alt, or the Windows key, and have it remain active until any
other key is pressed.
6. Explain the steps used to activate the Sticky Keys option and also its effects?
After having enabled Sticky Keys, Start Notepad.To do so, click Start > All Programs > Accessories >
Notepad.
Type some text (3 - 4 lines at least) and place the cursor at the beginning of the text.
Press CTRL key on your keyboard.
Press letter A on your keyboard
Notice the entire text gets selected.
This action is equivalent to pressing CTRL+A simultaneously!
7. What is Filter keys and its effect?
FilterKeys is a feature of Microsoft Windows. It is an accessibility function that tells the keyboard to
ignore brief or repeated keystrokes, making typing easier for people with hand tremors.
After having enabled Filter Keys,
Start Notepad and type some repeated characters
Notice that the repeated characters are ignored.
8. Explain the steps used to activate the Filter Keys option and also its effects?
To enable FilterKeys, checkUse FilterKeys.
Click Settings under FilterKeys and check "Ignore Repeated Keystrokes".
Click Apply.
Click OK.
The FilterKeys icon appears in the system tray
After having enabled Filter Keys,
Start Notepad and type some repeated characters
Notice that the repeated characters are ignored.
3
9. Explain Toggle keys and its effect?
ToggleKeys is also a feature of Microsoft Windows. It is an accessibility function which is designed for
people who have vision impairment or cognitive disabilities. When ToggleKeys is turned on, computer
emits sound cues when the locking keys (Caps Lock, Num Lock, or Scroll Lock) are pressed. A high sound
is emitted when the keys are switched on and a low sound is emitted when they are switched off.
Having enabled ToggleKeys, you can see its effect by any one of the following keys NUM LOCK,
CAPSLOCK or SCROLL LOCK. Notice that on doing so, we can hear a beep.
<
To disable ToggleKeys, uncheck Use Toggle Keys and then click on Apply> OK.
10. Explain general tab and its effects?
This tab enables you to configure accessibility options for all users.
Select the General Tab, a window to configure additional accessibility options will be displayed
“Turn off accessibility features after idle for”, “Give warning message when turning a feature on”and
“Make a sound when turning a feature on or off”.
Now check these features one by one and see what happens.
11. Define Sound Tab.
Options in sound Tab are Sound Sentry & Show Sounds
Sound Sentry:
SoundSentry is designed to help users with auditory impairments. Sound Sentry generates visual warnings,
such as a blinking title bar or a flashing border, whenever the computer generates a sound.
Type some repeated characters in the notepad. Notice that the desktop will flash for a fraction of second
along with visual error sound code.
To enable SoundSentry, Check Use SoundSentry under Sound Tab. Doing so activates a drop down list
wherefrom you can choose the type of visual warning desired.
• Click Apply.
• Click OK.
For understanding SoundSentry, you need to create an error!
• Click Start> Run. Type note instead of notepad and press Enter.
• Type some repeated characters in the notepad. Notice that the desktop will fl ash for a fraction of second
along with visual error sound code.
To disable SoundSentry, uncheck Use SoundSentry and then click on Apply > OK.
Show Sounds:
ShowSounds instructs applications that convey information by sound, to also provide information visually,
through text captions or informative icons.
To enable ShowSounds, Check Use ShowSounds under Sound Tab.
• Click Apply.
• Click OK
12. Explain the options in Display Tab
Select the Display Tab. A window with options to configure accessibility options for display is displayed.
High Contrast
High Contrast is an accessibility feature to assist people with vision impairment. You can change the
size and color of fonts and the background for ease of viewing.
• To enable HighContrast, Check Use HighContrast Under Display Tab
• Click Apply.
• Click OK.
Notice the difference on your monitor as the High Contrast option is enabled.
To disable High Contrast, uncheck Use High Contrast > Apply > OK.
4
Cursor Options
Cursor Options is also an accessibility feature that assists people with vision impairment by changing the
blink rate and width of the cursor.
• To change the speed of the cursor blink, move the Blink Rate slider back and forth. Notice the
cursor blinking at various speeds.
• To change the width of the cursor, move the Width slider back and forth. Notice the with of the cursor
changing.
5
18. Explain the two types of Networks.
Local Area Network.
A local area network (LAN) is one which connects computers and devices in a limited geographical area
such as home, school, computer laboratory, office building, or closely positioned group of buildings.
Usually local area networks offer very high speeds and are used for connecting computers and peripherals
such as printers, scanners, etc
Wide Area Network.
A wide area network (WAN) is one which covers a broad area (i.e., any network that links across
metropolitan, regional, or national boundaries). The Internet is the most popular WAN, and is used by
businesses, governments, non-profit organizations, individual consumers, artists, entertainers, and many
others.
19. What is Internet? Explain its usages.
The Internet is a global system of interconnected computer networks that use the standard Internet protocol
suite to serve billions of users worldwide. It is a network of networks that consists of millions of private,
public, academic, business, and government networks.
Internet is one of the most useful technologies of modern times which help us in our daily, personal and
professional life. Internet is widely used by students, educational institutes; scientist and professionals to
gather information for research and general information. Businesses use the Internet to access complex
databases such as financial database. The Internet is the largest encyclopaedia for all age groups. The
Internet helps in maintaining contact with friends and relatives who live across different locations via
Internet chatting systems and email software. Internet is also becoming a major source of entertainment for
the general public.
20. Define World Wide Web.
World Wide Web (abbreviated as WWW or W3, commonly known as the Web), is a system of Inter linked
hypertext documents accessed via the Internet. With a web browser, one can view web pages that may
contain text, images, videos, and other multimedia, and navigate between them via hyperlinks. Information
is stored on web servers referred to as web pages are retrieved by using a web browser such as Firefox on
the local computer. A Web Browser is a software used to view Websites and acts as an interface between
the user and the World Wide Web. A Web server is a computer that stores web sites and their related files
for viewing on the Internet.
21. What are the advantages of Networking?
• Data Sharing: One of the most important uses of networking is to allow the sharing of data. Users can
send text files, spread sheets, documents, presentations, audio files, video files, etc. to other users.
• Hardware Sharing: Hardware components such as printers, scanners, etc. can also be shared. For
example, instead of purchasing 10 printers for each user, one printer can be purchased and shared among
multiple users thus saving cost.
• Internet Access Sharing: You can purchase a single Internet connection and share it among other
computers in a network instead of purchasing multiple Internet connection for each computer. This is very
commonly found in Internet café (browsing centres), schools, colleges, companies, etc.
• Usage of network based applications such as web browsers, email clients, chat application, audio &
video calling, etc is another advantage.
22. Explain Internet Service Provider (ISP) in brief
An Internet service provider (ISP) is an organization which provides you with access to the Internet via a
dial-up (using modem) or direct (hard wired) or wireless connection.
Choosing connectivity depends on the availability of a particular technology, speed and connection type in
your area. Usually small and medium business users, home users use connectivity types such as DSL, cable
modem, dial-up, broadband wireless, WiMAX or 3G. Medium to large business users or customers with
more demanding requirements may use high speed connectivity such as DSL (High Speed), ISDN, etc.
6
23. What is a Modem?
Á modem is a device that converts digital computer signals into a form (analog signals) that can travel
over phone lines. It also re-converts the analog signals back into digital signals. The word modem is
derived from its function MOdulator/DEModulator.
24. Explain the types of Common Internet Connectivity in detail
Types of Common Internet Connectivity
There are different types of Internet Connectivity available today; it can be widely categorized into wired
and wireless access. Following table is a summary of different types of Internet connectivity categorized
into wired and wireless:
Technology Type of Connectivity
Dial-Up Wired
DSL Wired
Cable Internet Access Wired
3G Wireless
WiMAX Wireless
Wi-Fi Wireless
Some of the commonly used Internet connectivity are:
Dial-up: Dial-up Internet access is a form of Internet access that uses the facilities of the public switched
telephone network (PSTN) to establish a connection to an Internet service provider (ISP) via telephone
lines using a device called MODEM. Users dial a particular number provided by the ISP and gain access to
the Internet.
Dial-up connections are extremely slow and in most cases, it is replaced by a high speed connection such
as DSL or Cable Modem.
DSL: Digital subscriber line(DSL) provide Internet access by transmitting digital data over wires of a local
telephone network. DSL service is delivered along with wired telephone service on the same telephone
line. On the customer premises, a DSL filter removes the high frequency interference, enabling
simultaneous use of the telephone and data transmission. For using a DSL connection, you need a DSL
modem and a subscription.
Cable Internet Access: Cable Internet Access is a form of broadband Internet access that uses the cable
television infrastructure. Cable Internet Access is provided through existing cable TV networks; this is
similar to DSL that is provided over existing telephone lines.
3G: 3G, short for 3rd Generation is a set of standards used for mobile devices and mobile
telecommunication services and networks. High-Speed Downlink Packet Access (HSDPA) is 3G mobile
telephony communications protocol that allows higher data transfer speeds and capacity. If support for 3G
is available on your mobile phone, you can subscribe to the 3G connectivity with your ISP in order to get
high speed Internet connection on your phone.
WiMAX: WiMAX (Worldwide Interoperability for Microwave Access) is a wireless communications
standard designed to provide mobile broadband connectivity across cities and countries through a variety of
devices. WiMAX is a long range system, covering many kilometres and is typically used where DSL or
Cable Internet Access cannot be used; this could be difficulty in laying out cables for home or offices
located in remote locations but need access to the Internet.
WI-Fi: Wi-Fi is a popular technology that allows an electronic device such as computers or mobile phones
to exchange data wirelessly over a network, including high-speed Internet connections. Wi-Fi devices such
as personal computer, smart phones, video game console, etc. can connect to a network resource such as
Internet through a device called the Wireless Access Point (WAP). Wi-Fi is used where cables cannot be
run (such as old buildings, outdoor areas) to provide network and Internet access. Wi-Fi can also be used
where users require mobile connectivity.
Wi-Fi connectivity is used in home & offices, hotels, college & school campus typically for Internet
Access. Shopping malls, coffee shops, resorts mostly offer free or paid Wi-Fi access to the Internet for their
customers.
7
25. What is Internet and How will Data transfer on the internet?
• The data is broken up into bits of same sized pieces called packets.
• A header is added to each packet explaining where the data has come from, where it should end up and
where it fits in with the rest of the packets.
• Each packet is sent from computer to computer until it finds its destination. Each computer on the way
decides where next to send the packet. All packets may not take the same route.
• At the destination, the packets are examined. If any packets are missing or damaged, a message is sent
asking for them to be re-sent. This continues until all packets have been received intact.
• The packets are now reassembled into their original form. All this done in seconds!
26. Explain MAN.
A Metropolitan area network (MAN) is a computer network that interconnects users with computer
resources in a geographic region of the size of a Metropolitan area.
9
• Give people time to respond - Multiple questions sent to a recipient before they’ve had a chance to
answer can seem more like an interrogation rather than a conversation.
• Wherever possible, give the person you are communicating with your undivided attention. It’s not just a
sign of respect, but if you have multiple conversations happening or are allowing
other issues to distract you, you may miss an important point in the other person’s messages or lose the gist
of the conversation.
• It’s important to properly end an IM conversation - you may think the chat is over, but the other person
may not. While you’re off doing other things, they may be sitting there staring at the screen waiting for
further communication from you!!
SESSION 5: CREATING AND PUBLISHING WEB PAGES – BLOG
33. List any 5 websites that offer blog service for free.
There are hundreds of websites that offer blog service for free. Some of the popular blogs
include:
• www.WordPress.com• www.blogger.com• www.blog.com• www.weebly.com • www.blogsome.com
10
On doing so, you will be sent an email for activating your blog account. Open your email and click
on the activation link. Once you click Activate Blog, you will be redirected to your WordPress Blog
Now the blog is ready for use. You will be presented with the address of your blog as displayed in
the web page above; you can either double click on the link or type the address manually in the web
browser. Either action takes you to the homepage of your blog.
Once you have created a blog, you need to submit content that you want others to view. This
process ids called posting content.
• To create a post, click New Post. A Window similar to the one displayed below appears.
• Title: You must provide a title for your post; choose a tile that this post will focus on. For example,
“School Annual Day Function 2012”.
Using the rich text box, you can type content that you want others to read.
Once you have finished typing the content, you need to publish the post for others to see.
Click Publish Post to publish your content. To view the post, you can type the blog address in the address
bar of the web browser, you should see your blog along with the post.
We can also add photos, videos, etc. to the blog using the options available in WordPress. We can
comment on posts published by others. Usually, the comment option is available towards the end of the
post. Look for options such as Leave a comment, Leave a reply, etc. in the blog to comment. For example,
in WordPress the comment box is located below the post and labelled as Leave a reply.
• In the Enter your comment here… text box, type your comments about the post.
• In the Email (required) field, type your email address.
• In the Name (required) field, type your name.
• In the Website filed, you may type your blog address (Optional).
• Once you have typed the content in the comment area, review carefully and Click Post Comment.
Once you click the Post Comment, you will see the blog along with your comment.
11
36. Difference between Web page AND website.
Web Page:
A document which can be displayed in a web browser such as Fire Fox, Google Chrome, Opera etc.
these are also often called Just Pages.
By a Unique URL.
There is No extension used in the URL of a Web Page.
Requires less time to develop a webpage.
Web Site:
A collection of web Pages which are grouped together and usually connected together in various
way.
Multiple web pages can have same name if they are reside in different document.
The webpage URL has an extension
Usually take more time as compared to a webpage.
SESSION 6: USING OFFLINE BLOG EDITORS
37. Explain the purpose of an offline blog editor?
If you do not have an active internet connection, you can create blogs using a blog application and publish
the blog whenever internet connectivity is available. This is called an offline blog editor.
38. List few Offline blog editors which can be downloaded from internet.
There are several free offline blog editors available that can be downloaded and installed on the local
computer such as:
Qumana
Windows Live Writer
Blogdesk
Bits
Blogo
Blogjet
12
You need an existing blog account to use with Qumana. In this exercise, you will learn to use your existing
WordPress account with Qumana. Enter your WordPress blog address andClick Next.
• A login window appears. You need to provide details of your WordPress account. However, if you wish
to use it for other blog services, you need to enter appropriate details. Give the WordPress blog address in
the Web address fi eld. Enter the Username and password of the WordPress account.
• Click Next > Finish.
A window similar to the one below appears.
If posts are already available in your blog, Qumana will download and display the existing blogs as well.
To create a post,
• Click New Post.
• A window similar to the one below will be displayed
Enter the title for the post in the Title field and the post content in the area given below the page title.
• Click Publish Post.
Once you click Publish Post, the post will get automatically updated to your WordPress blog.
To view the published content, open the web browser and type your blog address.
We can include photos or pictures in your blog to make it attractive. To insert a picture,
• Click on the image icon on the right hand side of the application.
• Once you click the image icon, the following window will be displayed.
• Click Browse to locate the image that you want to publish in the blog.
13
• Once you click “Browse”, the OS browse window appears, enabling you to locate the image to be loaded.
When you have chosen the image click Upload & Insert.
• Click Publish Post.
To view the published content along with the picture, open the web browser and type in your blog
address.
SESSION 7: ONLINE TRANSACTIONS
39. What is Online shopping?
Online shopping is a form of electronic commerce where customers can buy or sell goods over the Internet.
Customers need to have an active internet connection for viewing goods or services offered by a seller;
customers can pay online using a credit, debit card or by internet banking.
40. What are the benefits of Online transactions?
Online transactions have made transactions very convenient and simplified the workflow in many forms in
a business. Online transactions deals with transfer of money over the internet. Revolution in the electronic
media has made transaction handling easy .
Many protocols and security measures have been adopted to ensure the safe and secure OLTP ( Online
Transaction process ). We are already using online transactions when we deposit or withdraw money from
an ATM machine, when we make our bill payments using our debit/ credit cards. NEFT/ RTGS are some
other examples of online funds transfer. Numerous benefits of online transactions like, fast transaction
speed, convenience, low risk of theft etc has exponentially increased its use among people.
41. List few situations where online shopping is useful.
A customer does not have sufficient time to visit stores.
Visiting a store is more expensive than purchasing a product online.
A product or service that is not available in the local market is available online.
42. List some of the popular online transaction websites and it uses
Some of the popular online transaction websites are:
• IRCTC, an online portal for booking flight and train tickets.
• Flipkart, an online shopping portal for buying consumer products.
• EBay, an online portal for buying and selling goods.
• Redbus, an online portal for booking bus tickets.
43. What are the necessary things that are required to perform an Online Transaction?
To perform an online transaction, all you need is a web browser and an active internet connection.
In some cases where purchasing is involved, you will need a valid credit card, debit card or online
banking support referred to as Net Banking Subscription. Some websites even allow COD (Cash on
delivery) where the users can pay once they receive the product or service.
• To perform transactions using IRCTC, you need to sign up for an IRCTC account.
• Locate and Click Signup link at the top of the web page, a window similar to the one below will be
displayed for signing up with IRCTC.
• You will be redirected to a web page for signing up with IRCTC similar to the one below. Follow the
onscreen procedures for filling up the details to complete the registration.
Once you logon to IRCTC, you can use the website for booking tickets. By now, you are quite familiar
with what each field represents. Go ahead and fill in the details. The ones marked with an star (*) are
mandatory fields.
15
Once you click “Find Trains”, list of available trains with ticket availability will be displayed
We can view the status of available tickets sorted by day (displayed above); once you have fixed a date that
is convenient for travel, you can proceed to book the tickets by following the instructions provided in the
website.
Once you book the ticket, an electronic copy of the ticket will be displayed on the screen.
Additionally, the ticket will be mailed to the email address specified during registration.
47. Explain the steps how to perform online using FlipKart.
Flipkart is an online store where you can purchase a variety of electronic goods, books, accessories,
digital cameras, mobile phones and peripherals such as printers, etc.
Flipkart offers multiple payment methods like credit card, debit card, net banking, e-gift voucher, and Cash
on Delivery.
To work with Flipkart, you need to use a web browser and an active internet connection.
• Open any Browser such as Firefox, Chrome or Internet Explorer
• Type www.fl ipkart.com in the address bar and Press Enter.
A web page similar to the one below will be displayed.
• To perform transactions using Flipkart, you need to sign up for a Flipkart account.
16
• Locate and click on the Sign Up link at the top of the web page, a window similar to the one below will
be displayed for signing up with Flipkart.
• Email Address: You must provide your Email Address. The Email Address is also used for sending offer
mails, promotional mails to you. The Email Address will be used as the login name for your Flipkart
Account.
• Password: You must secure your Flipkart Account by giving a strong password. You need to
enter the password twice.
• Click Sign Up Now!
Once you have signed up successfully, a window similar to the one below will be displayed.
Flipkart has a variety of products organized as categories. We can either look for respective product in
appropriate category or We can use the search feature to locate a particular item. For example, if you would
like to buy a digital camera, you can Digital Camera in the search box and choose a model from the search
results window. You can select a model of your choice by clicking on the product image. We can browse
the catalog of products available in Flipkart; once you have decided to purchase a product, you can use
purchase the product by using the option Buy this now. We can select one or more products before you
proceed to payment. Products added to your shopping cart will be available for review prior to payments.
17
Flipkart allows a variety of methods for online payment. You can use credit card, debit card, Net Banking,
Cash on Delivery or e-gift voucher to complete the payment; you need to enter appropriate details as
required in the mentioned fields and Click Pay to initiate the payment. Depending on the method select,
additional windows may be displayed and procedures will vary to complete the online transaction.
Some vendors (websites) also offer payment to be made in installments thus making it a convenient option
for the customers. Refer to the website payment terms for information on
payment procedures and practices.
SESSION 8: INTERNET SECURITY
48. Write general guidelines for managing strong password.
Keep the length of the password at least 12-14 characters if permitted.
Avoid keeping passwords based on repetition, dictionary words, letter or number sequences,
usernames, relative or pet names, etc.
Including numbers, and symbols in passwords if allowed.
Use capital and lower-case letters.
Avoid using the same password for multiple sites or purposes.
Avoid using something that the public or workmates know you strongly like or dislike.
Use random password generators if possible.
Example of a strong password: u1vX:,4Hd{]$
Though Internet provides valuable information and entertainment, it may leave your computer unsecure
due to many online threats. You need to ensure that your usernames, passwords, credit card or online
banking information secure as they are prone to be tracked and used by unauthorized users. Some websites
can also install Malware on the computer without user consent thereby leaving the computer damaged or
insecure.
Online threats such as Phishing, email spoofing, chat spoofing, etc. can increase the chances of
users getting compromised.
50. Explain the purpose of internet security. Also, mention some of the best internet security practices.
Use strong passwords, a combination of alphanumeric and special characters could be used for creating a
password that is not so easy to crack or guessed by other users. Do not keep passwords such as your
favourite colour, friends or relatives name, bike number, mobile number either as single or combined
option. These passwords are easy to guess if a user knows you personally. Change your password
frequently at least 2 or 3 weeks so that your account information remains secure.
Using strong passwords can lower the risk of a security breach; effectiveness of a password depends on the
security mechanism of the software and users involvement in generating a strong password. Most websites
check for password effectiveness when a user attempts to register for the first time or when they change
password. For example, when you register with Gmail, you may notice a password meter displaying the
strength of your password similar to the one displayed below.
Following is a general guideline for managing strong passwords.
• Keep the length of the password at least 12-14 characters if permitted.
• Avoid keeping passwords based on repetition, dictionary words, letter or number sequences,
usernames, relative or pet names, etc.
18
• Including numbers, and symbols in passwords if allowed.
• Use capital and lower-case letters.
• Avoid using the same password for multiple sites or purposes.
• Avoid using something that the public or workmates know you strongly like or dislike.
• Use random password generators if possible.
Example of a strong password: u1vX:,4Hd{]$
You may also websites such as www.strongpasswordgenerator.com that can generate random strong
passwords. To generate a strong password using www.strongpasswordgenerator.com do the following:
• Open any web browser. Type www.strongpasswordgenerator.com in the address bar and press Enter.
• Click Generate strong password. Notice the password displayed under your new password.
Backup your data: Always keep copies of personal data in additional media such as compact discs, pen
drives, etc. This could be helpful in situation when there is a loss of data. Keep the data away from
unauthorized users.
Use encryption software: (Usually available within the operating system) to protect your data from
unauthorized users. If encryption software is not available within the operating system, use a 3rd party
software.
Keeping your username and password private: Never save your username or password on computers that
are used in shared environments such as internet café. Browsers may save your personal data on the local
computer that can be used by another user using the same computer.
Registering with websites: Read the privacy statement or policy whenever you register with a website, the
statement or policy will include information about how the website use personal data.
Do not share personal information: Websites require you to fill out forms containing fields such as name,
gender, age, email address, school, etc. Be cautious when filling out such forms; research and verify if it’s a
trustable website . Your email addressed could be used by unauthorized users to send you fake or unwanted
emails; think twice or thrice before providing information to any website and decide if it is really necessary.
Secure transactions: If you are using online shopping or transactions, websites even store your credit card or
online banking personal information such as your credit card number, account details, etc. This information
can be tracked and used by un-authorized users often known as hackers to misuse this information. Again,
ensure the website is legitimate and uses secure practices for performing and maintaining online transactions.
Since information such as credit card details or personal information is sent over the network, it is always
recommended to use only secure websites for such transactions. Verify if the website uses secure transaction;
usually it is indicated through a digital certificate represented as a golden lock in the web browser’s address
bar.
Use antivirus and antispyware software: Computers are prone to attacks from software known as Malware
that could harm your computer. Malware track browsing behaviour or transmit personal data from your
computer; programs such as key loggers could be installed on your computer track and transmit every key that
is pressed on a keyboard (keystrokes) to unauthorized users. Antivirus and Antispyware programs also offer
real-time protection monitoring your computer for any changes by malware software. Keep your Antivirus and
Antispyware software always up to date, this can help in protecting your computer from recent threats.
Do not immediately respond to mails from unknown users: It may be a fake mail trying to gather personal
information such as your bank account details, home address, etc. Some mails could promise you jobs or
announce lottery results which in turn could compromise the user. And in some cases, virus or scripts that are
dangerous could be attached to the mail; NEVER open the attachment from an unknown source.
Clear browser cookies frequently: Cookies are programs that are created on your local computer when you
visit websites. Though cookies are meant for storing data based on your activity performed during your earlier
visit such as logon details, details of a shopping cart, visited pages in a website, etc. they could also be tracked
by unauthorized users and possibly gain access to your personal information.
Keep the operating system and software applications up to date, though operating systems and
applications are designed, tested and distributed, sometimes they may have security holes through
which a hacker can take advantage; they may track and gather information or even damage the
whole computer. In general, most vendors notify the users whenever a security hole is identified
19
and an update is available to address that particular issue. You can also visit respective vendor’s
website to check if there are any updates available, download and keep your operating system
and software applications up to date, free from security holes.
Install firewalls: Firewalls could be software or hardware and can assist in keeping a computer and a network
secure. Firewalls analyze the network traffic and determine if the traffic should be allowed or not. In most
cases, operating systems such as Linux, Windows or Mac include firewall software as a part of operating
system thus keeping the computer secure. In rare cases, you may
need to configure your firewall for additional security.
Never install software from unknown sources: as they might not be trustworthy; download only from well-
known or reputed websites. Verify the source if it is legitimate by searching the internet or referring to
comments from other users before downloading them; understand the nature and the purpose of the software
before attempting to download and install them.
Remove unwanted or unknown software applications: these might have got installed without your
knowledge when you have visited some websites. Unwanted software could get installed as they might have
been bundled along with necessary software. Some programs such as toolbars get installed usually through
bundled software and are programmed to send personal data without your consent.
20
EXERCISE
4. What are the Electrical safeties rules that an Organization should follow?
Electrical equipment approved by a recognised organization.
Workers should be trained to handle the electric equipment safely
Damaged and hazardous electrical equipment should be immediately replaced. all old and workout and
frayed switches and wires should be changed.
Heat emanating equipment should be kept away from the electrical equipment.
Take care that the outlets/ circuits should not be overloaded.
Switch off and unplug the electrical appliances before cleaning or relocating them.
21
5. What is the Use of First Aid?
Learning First Aid is the social and civic responsibility of very human being. If provided effectively and on
time then it may save life.
First Aid is the immediate assistance provided to the injured to save life and minimize health loss till the
proper medical aid/ facility is provided.
Every organization must have basic First Aid Kit. Kit must have all necessary items. Make sure to check for
the expiry of medical related items.
6. Write some rules of First Aid?
Assure the injured to remain calm and not to panic
Keep them warm if they are under shock
Do not move the victim in case of back/neck injury
A worker may face Occupational hazards at workplace.
A 43 year old gardener was electrocuted and lost control over his limbs while watering the plants in a park
where he worked. After investigating, it was found that insulation of the electric wire from the night lamp was
cracked and full 220 volt current was live on the lamp pole. The park care taker had just watered the plants and
the electric current was live in water while he watered the plants
This meant the wire was not inspected regularly. Otherwise, the damaged insulated wire should have been
changed and replaced with a new safe to touch wire
CASE Study 3: Hazards due to Fire
A storekeeper was in a habit of throwing the plastic waste and packing waste in the backdoor of his store. The
housekeeping staff was in a habit of smoking cigarette during their break time.
One week the pile of plastic and packing garbage was not cleaned. One of the housekeeping staff just threw the
discarded cigarette in that garbage heap of plastics and packing material. As the day was hot and sunny, the
garbage caught fire. By the time the fire was noticed, fire flames engulfed the whole back area causing heavy
damage to the store and the backdoor area.
The fire could have been prevented if the storekeeper had taken appropriate garbage disposal measures,
restricting smoking in the premises.
22
SESSION 10 : PREVENT ACCIDENTS AND EMERGENCIES
One Marks:
1. Accident is an unplanned event that may happen all of a sudden and may lead to unwanted or
unprecedented results/outcomes.
2. Emergency is an unexpected situation that needs immediate attention and action
3. Slip and fall accidents may occur at any working environment and the injuries may vary from minor ache
to major.
Question And Answers:
1. What is an Accident ?
Accident: an accident is an unplanned event that may happen all of a sudden and may lead to unwanted or
unprecedented results/outcomes. (or)
It can be defined as an unfortunate incident that occurs unintentionally causing hazardous result or injury or
unwanted results.
23
5. List out the Types of emergency?
Chemical spills
Extreme heat waves
Droughts
Pandemics
Terrorist attack
Fire
Floods
Thunderstorms
Leakage of some hazardous gas/ chemical
6. Which type of Emergencies that require evacuation?
Fire
Explosion
Floods
Earthquake
Hurricane
Tornado
Toxic material release
Civil disturbance
Workplace violence
7. How you we can Handle accidents?
Accidents must be handled carefully. The accident should be handled compassionately without assigning
blame on others.
Every organization must follow SOP for accident handling
Safety measures must be placed to prevent workplace accidents
Immediately call the medical team for any injury
Stay alert
Pay attention to and follow emergency drills
24
2. What are the Sources of Hazards?
Checklist for Workstations:
The workstation should:
provide sufficient space for the user to alter position comfortably
provide adequate lighting
have windows fitted with adjustable coverings to alter the sunlight level
be spacious enough when a workstation is shared by more than one person
The display screen should:
display well-defined characters of adequate size and spacing
have a stable image
have easily adjustable brightness and contrast
tilt and swivel easily to suit the user
be free from glare and reflections
Use a separate base for the screen or an adjustable table
The keyboard should:
be able to tilt easily and should be able to separate from the screen to allow the user to adopt a
comfortable working position
have space in front to provide support for the hands or arms of the user
have a matt surface
have clearly legible symbols on the keys
The work surface should:
provide adequate space for the user
have a low reflective surface
be of an adequate size to allow the screen, keyboard and other peripherals to be flexibly arranged
have a stable and adjustable document holder, which should be at the same level as the screen and
at the same viewing distance
3. Explain about Workplace Evacuation
In case of emergency there should be provision for evacuation. Evacuation is the process of emptying a place
in case of an emergency, disaster.
Every company must ensure following points for evacuation in case of any emergency:
An evacuation policy: Every organization must have an evacuation policy. All the Team Leaders are
responsible for informing about the policy to their employees about it. Proper attention must be paid
when the Team Leader is informing you about these details. Negligence at this time may cost lives.
Organization must have a designated assembly point for emergencies. Ensure that every employee/
worker must know where it is.
A ‘buddy system’ for individuals with special needs or disabilities must be
designated.Thissystemensuresthatdifferently-
abledareassistedandguidedoutofthepremisesortheimpactedarea properly. If you are a buddy to someone,
ensure that your buddy is safe at the assembly point with you.
Floor plans with evacuation routes in work areas. Ensure that you understand these so you can use it in
time of need.
Assembly areas, where you are required to assemble after evacuation, must be properly taken care of.
Periodic evacuation drills should be conducted. Ensure that you pay attention during these drills. You need
to save your life and you can be helpful in saving someone else’s life too.
25
4. How we can have a Healthy Living?
‘A healthy body has a healthy mind’ - a very popular saying is true.
‘Healthy Lifestyle leads to a healthy being. A healthy living has a lasting impact on an individual which
ultimately yields a healthy environment at home as well as at work place. a happy and healthy worker will
always perform best to his ability.
A healthy lifestyle helps to keep and improve people’s health and well being. a healthy lifestyle includes :
26