UNIT-2 WEB APPLICATIONS 5 Marks
Session: 1 Working with Accessibility Options
types of impairment that impact computer usage.
Cognitive impairments and learning disabilities, such as dyslexia, attention deficit-hyperactivity
disorder (ADHD) or autism.
Visual impairment such as low-vision, complete or partial blindness, and color blindness.
Hearing impairment including deafness.
Motor or dexterity impairment such as paralysis, cerebral palsy, or carpal tunnel syndrome and
repetitive strain injury.
Accessibility Options
Click Start > Control Panel > Accessibility Options.
Keyboard Tab:-
1) Sticky keys :- used for helping users with physical disabilities
2) Filter Keys :- It tells the keyboard to ignore repeated keystrokes.
3) Toogle Keys :- It is an accessibility function which is designed for people who
have vision impairment.
1. SoundSentry is designed to help users with auditory impairments.
(Sound Tab:- SoundSentry)
2. The High Contrast option in Microsoft Windows XP is designed to assist people
withVision impairments. (Display Tab:-High Contrast)
3. SerialKeys is designed to assist people that have difficulty using a keyboard or a mouse.
(General Tab:- SerialKeys)
4. MouseKeys is an accessibility feature that assists people who have difficulty using a
mouse. (Mouse Tab:- MouseKeys)
Session: 2 Network Fundamentals
A computer network is a collection of computers and other hardware components
interconnected by communication channels (cables or satellites) that allow sharing of
resources and information.
Types of Network
1. LAN( Local Area Network ):- Network in a small area such as in a building, office.
2. WAN (Wide Area Network):- The larger network which is probably built between states
or continents.
Category of Network
1) peer to peer (Point to point).
All computers have equal status
In this network, a computer functions as server and client
2) client server (Point to multipoint)
Providing services to other computers
Network activity is controlled by serve
1
The Internet is a global system of interconnected computer networks that use the standard
Internet protocol suite to serve billions of users worldwide
World Wide Web(WWW):- World Wide Web is a system of interlinked hypertext documents
accessed via the Internet
Advantages of Networking:-
Data Sharing
Hardware Sharing
Internet Access Sharing
Usage of network based applications
BSNL:- Bharat Sanchar Nigam Limited
Internet service provider (ISP) is an organization which provides you with access to the Internet
via a dial-up (using modem) or direct (hard wired) or wireless connection.
Á modem is a device that converts digital computer signals into a form (analog signals) that can
travel over phone lines
Internet connectivity:
Technology Type of Connectivity
Dial-Up Wired
DSL Wired
Cable Internet Access Wired
3G Wireless
WiMAX Wireless
Wi-Fi Wireless
a) Dial-up:
Internet service provider (ISP) via telephone lines using a device called MODEM
b) DSL: Digital subscriber line (DSL)
Internet access by transmitting digital data over wires of a local telephone network.
c) 3G(3rd Generation)
3G is a set of standards used for mobile devices andmobile telecommunication
services and networks.
d) WiMAX(Worldwide Interoperability for Microwave Access)
connectivity across cities and countries through a variety of devices
e) Wi-Fi: (Wireless Fidelity Wireless internet )
exchange data wirelessly over a network
Wi-Fi devices such as personal computer, smartphones, video game etc.
The data is broken up into bits of same sized pieces called packets.
2
Session 3:INTRODUCTION TO INSTANT MESSAGING (IM)
communication over the Internet
performing Text Message, file transfers, audio chat, video calling and
conferencing,
Features of an instant messaging (IM):
Text Messages can be sent to one or more person (Similar to SMS)
Audio calling and conferencing.
Video calling and conferencing.
File transfers.
Message history (Save messages for future reference).
Instant messaging software
1. Application based: Software is downloaded and installed on user’s computer
Ex: Google Talk, Yahoo! Messenger, Skype, Windows Live Messenger,
Facebook, Whats App, Hike etc.
2. Web based: Software is accessed using browsers
EX: Meebo, Gmail, Yahoo! Messenger for the Web, MSN Web Messenger, IMO,
etc.
SESSION 4: CHATTING WITH A CONTACT – GOOGLE TALK
1. Sate any 03 rules and etiquettes to be followed while chatting on the Internet.
Messages should be short and to the point.
Always introduce yourself by name if your screen name doesn't reflect it.
Always ask if the other person has time to chat first
In a business environment
TYPING YOUR MESSAGES IN UPPERCASE is extremely rude
Give people time to respond
SESSION 4: CREATING AND PUBLISHING WEB PAGES – BLOG
A blog is a discussion style site used by non-technical (and technical users) users for creating
personal web pages.
List any 5 websites that provide blog service.
www.WordPress.com
www.blogger.com
www.blog.com
www.weebly.com
www.blogsome.com
SESSION 5: ONLINE TRANSACTIONS
Online shopping is a form of electronic commerce where customers can buy or sell goods
over the Internet
3
Online shopping could be useful in situations when
A customer does not have sufficient time to visit stores.
Visiting a store is more expensive than purchasing a product online.
A product or service that is not available in the local market is available online
(Ex: Motorola Mobile ).
EX: E-bay, Snap deal, Flip kart, Amazon, OLX.
List any 5 websites that allow online transactions.
IRCTC, an online portal for booking flight and train tickets.
Indian Railway Catering and Tourism Corporation (IRCTC)
Flipkart, an online shopping portal for buying consumer products.
EBay, an online portal for buying and selling goods.
Redbus, an online portal for booking bus tickets.
Session 6: INTERNET SECURITY
Internet security is a branch of computer security specifically related to the Internet
Online Threats: Phishing, downloading software’s/songs/ videos, email attachments, chatting etc.
Best Practices for Security
1. Use strong passwords
combination of alphanumeric and special characters
Keep the length of the password at least 12-14 characters if permitted.
Avoid keeping passwords based on repetition, dictionary words, letter or number
sequences, usernames, relative or pet names, etc.
Including numbers, and symbols in passwords if allowed
Use capital and lower-case letters.
Avoid using the same password for multiple sites or purposes.
Use random password generators if possible
Change your password frequently at least 2 or 3 weeks
password effectiveness (password meter displaying the strength of your password)
Example of a strong password: pRN12@_1990
2. Backup your data
3. Useencryption software:
4. Secure transactions:
5. Use antivirus and antispyware software.
6. Remove unwanted or unknown software applications;