Class - X, Session 2021-22
Subject- Information and Technology (6th Optional)
Unit -4 Web Applications (Basic)
Different special keys
Sticky keys,
Filter keys,
toggle keys,
Sound sentry
Network Fundamentals
Advantages of networking
Different types of network
Types of Common Internet Connectivity
Data transfer process on Internet
Different types of Network Architecture
Instant messaging
General rules and etiquettes to be followed while
chatting
Online transaction
Internet security
1. Sticky keys -Sticky keys allow the user to press and release a modifier key, such
as Shift, Ctrl, and Alt
2. Filter keys-It is an accessibility function that tells the keyboard to ignore brief or
repeated keystrokes, Making typing easier for people with hand tremors.
3. Toggle keys - It is designed for people who have vision impairment. When these
keys turned on, computer emits sound cues
4. Sound sentry-. It is designed to help people with auditory impairments. Sound sentry
produces visual warnings, such as blinking title bar.
5. High contrast feature- This feature is used to assist the people with vision impairment.
You can change the size and color of fonts and back ground for ease viewing.
6. Cursor Option- This feature assist the vision impairment people by changing the blink
rate and width of the cursor.
7. Serial keys-This key is used to design to assist people with difficulty in using keyboard
or mouse
Networking Fundamentals
Networking. It is collection of computers and other hardware components interconnected
by communication channels to share information and resources.
Advantages of networking:-
a) Data sharing –It allows the sharing of data, User can send text, audio, video
files.
b) Hardware sharing:-Hardware components such as printers, scanners etc.
can be share among the users in the network.
c) Internet access sharing:-You can purchase a single internet connection and
share it among other computers in a network.
2. Different types of networks: - Different types of networks are-LAN, WAN, MAN
a) LAN-Local area network is one which connects computers and devices in a small area
like a school, buildings. Usually LAN offer high speed access.
• LAN’s can be either wired or wireless. Twisted pair, coax or fiber optic cable can be used
in wired LAN’s.
• Has lower cost compared to MAN’s or WAN’s.
b) MAN- Metropolitan area network is a computer networks that is used to connect multiple
LAN within a city.
• A MAN might be owned and operated by a single organization, but it usually will be used
by many individuals and organizations.
• A MAN typically covers an area of between 5 and 50 km diameter .
c) WAN-Wide area network is a network that relatively covers a border geographic area. Any
network that links across metropolitan, regional areas.
• To cover great distances, WANs may transmit data over leased high-speed phone lines or
wireless links such as satellites.
3. Internet:-It is global system of interconnected computer networks that uses the standard
internet protocol suite to serve billions of users worldwide.
4. World wide web (www or W3):-is a system of interlinked hypertext documents accessed
via the internet.
5. Internet service provider (ISP)-These are organization which provides you with access to
the internet via dialup (using modem) or direct (hard wired) or wireless connection. There
are some internet service providers like BSNL, Airtel, and Vodafone.
6. MODEM-Modulator Demodulator It is a device that converts digital signals into an analog
signals and vice versa that can travel over phone lines.
7. Types of Common Internet Connectivity:-
a) Dial up-This is form of internet access that use public switched telephone
network (PSTN) it uses MODEM. Users dial particular number provided by
ISP and access internet. These are extremely slow.
b) DSL-Digital subscriber line-Provide access by transmitting digital data over
wires of local telephone network. DSL service is delivered along with wired
telephone service on the same telephone line. In this there is a
simultaneous use of the telephone and data transmission.
c) Cable Internet Access:-This is form of broadband internet access that uses
the cable television infrastructure.
Wireless internet connectivity
a) 3G:-3rd generations is a set of standards used for mobile devices. High
speed downlink packet access. It provides high speed data transfer.
b) WiMAX:-Worldwide Interoperability for microwave access is a wireless
communication standard designed to provide mobile broadband
connectivity across cities and countries.
c) WI -Fi:-It allows an electronic device such as computers or mobile phones
to exchange data wirelessly.
8. Data transfer process on Internet
The data is broken up into bits of same sized pieces called packets.
A header is added to each packet explaining where the data has come from, where it
should end up and where it fits in with the rest of the packets.
Each packet is sent from computer to computer until it finds its destination. Each
computer on the way decides where next to send the packet. All packets may not take
the same route.
At the destination, the packets are examined. If any packets are missing or damaged, a
message is sent asking for them to be re-sent. This continues until all packets have been
received intact.
The packets are now reassembled into their original form. All this done in seconds!
9. Different types of Network Architecture
Peer to peer:-Network in which all computers is having equal status. In
a P2P network, the "peers" are computer systems which are connected to
each other via the Internet. Files can be shared directly between systems
on the network without the need of a central server.
Client-Server-Network in which certain computers have special dedicated
task, providing services to other computers in the network.
Client server
Peer to peer
10. Instant messaging
Instant messaging (IM) technology is a type of online chat that offers real-
time text transmission over the Internet. There are 2 kinds of instant messaging
software-Application based, Web based.
Application based software can be downloaded and installed on users computer Examples-
a) Google Talk
b) Yahoo! Messenger
c) Skype
d) Windows Live Messenger
Web based instant messaging software is accessed using browsers such as Internet Explorer,
Mozilla Firefox, Google Chrome. Examples-
a) Yahoo! Messenger for the Web
b) MSN Web Messenger
c) IMO
11. General rules and etiquettes to be followed while chatting.
a) Messages should be short and to the point.
b) Always introduce yourself by name if your screen name doesn’t reflect it.
c) Always ask if the other person has time to chat first - regardless of how important you
think
What you have to say is, it’s not going to be well received if the recipient is busy.
d) In a business environment, know exactly what you want to discuss.
e) Typing your messages in uppercase is extremely rude - it’s considered shouting and very
Aggressive.
f) Give people time to respond - Multiple questions sent to a recipient before they’ve had
a
Chance to answer can seem more like an interrogation rather than a conversation.
12. Blog
A blog is a discussion style site used by non-technical (or technical users) users for creating
Personal web pages. Blogs are similar to an online personal diary and simple to use.
There are hundreds of websites that offer blog service for free. Some of the popular blogs
Include:
a) www.WordPress.com
b) www.blogger.com
c) www.blog.com
d) www.weebly.com
e) www.blogsome.com
Offline blog editors:
a) Qumana
b) Windows Live Writer
c) Blog desk
13. Online transaction
Online shopping is a form of electronic commerce where customers can buy or sell goods over
internet. You will need a valid credit card, debit card or online banking support referred to as
Net Banking Subscription. Some websites even allow COD (Cash on delivery)
Some of the popular online transaction websites are:
a) IRCTC, an online portal for booking flight and train tickets.
b) Flip kart, an online shopping portal for buying consumer products.
c) EBay, an online portal for buying and selling goods.
d) Red bus, an online portal for booking bus tickets.
Shopping websites
Online payment app
14. Internet security
Its objective is to establish rules and measures to use against attacks over the Internet. Online
threats such as Phishing, email spoofing, chat spoofing, etc. can increase the chances of users
getting compromised. You can reduce the risks by using best practices such as using Antivirus
Software, Antispyware Software, Firewalls, strong passwords, etc. in addition to spreading
awareness of the best practices. Following steps can be taken to protect from online threat.
Backup your data
Use encryption software
Keeping your username and password private
Do not share personal information:
Use antivirus and antispyware software
Do not immediately respond to mails from unknown users.
Clear browser cookies frequently
MAINTAIN WORKPLACE SAFETY
1. Enlist any three basic safety rules to follow at workplace.
Basic safety rules to follow at workplace – Fire safety, Falls and slips, Electrical safety,
Use of first aid.
Basic Fire safety rules in an organization are-
Smoke alarms must be placed at proper intervals
Keep workplace a no-smoking zone
Maintenance of safety equipment must be taken care of regularly
2. Give any two basic safety rules for ensuring fall and Slips safety.
Falls and Slips Safety rules
Keep the moving area clean and clutter free.
Workplace must be proper ventilated receive light.
3. Give any two electrical safety rules in any organization.
Electrical Safety Rules:
Workers should be trained to handle the electric equipment safely
- Damaged and hazardous electrical equipment should be immediately replaced.
All old and workout and frayed switches and wires should be changed.
- Heat emanating equipment should be kept away from the electrical equipment.
4. Explain any two first aid rules.
Use of First Aid
Assure the injured to remain calm and not to panic
Keep them warm if they are under shock
Do not move the victim in case of back/neck injury.
5. What do you mean by occupational hazards?
An occupational hazard is the Illness one may acquire due to his occupation. Like people
working in a chemical factory may get affected due to presence of certain chemicals.
Some types of occupational hazards are : Physical hazards, chemical hazards, biological
hazards, , behavioral hazards, radiological hazards, ergonomic hazards etc.
PREVENT ACCIDENTS AND EMERGENCIES
1. Explain the terms accident and emergency.
Accident: an accident is an unplanned event that may happen all of a sudden and may
lead to unwanted or unprecedented results/outcomes.
An emergency situation is one that:
● threatens the employees, customers or the public
● disrupts or shuts down the operations
● causes physical or environmental damage
2. Enlist any four types of accidents.
- Accidents at workplace : Slips and fall accidents, fire
- Industrial disease/illness
- Road traffic accidents
- Clinical Accidents
- Sports related accidents
3. Give any two ways to handle accidents.
- Safety measures must be placed to prevent workplace accidents
- Immediately call the medical team for any injury
4. Give any three situations of emergency that require evacuation.
● Fire
● Explosion
● Floods
● Earthquake
PROTECT HEALTH AND SAFETY AT WORK
1. Give any four points of a healthy lifestyle
o healthy eating habits
o physical activities
o stress management
o healthy mind
o sound sleep
2. What is the importance of a healthy lifestyle?
A healthy lifestyle helps to keep and improve people’s health and wellbeing. Happy and
healthy worker will always perform best to his ability.
3. List any three types of hazards.
Hazards can be of different types depending on the industry and the environment in
which the employees work.
● Physical
● Chemical
● Biological
● Mechanical
4. Explain Buddy System to implement evacuation efficiently in case of emergency
A ‘buddy system’ for individuals with special needs or disabilities must be designated.
This system ensures that differently-abled are assisted and guided out of the premises
or the impacted area properly. If you are a buddy to someone, ensure that your buddy is
safe at the assembly point with you.