KEMBAR78
Web Application | PDF | Digital Subscriber Line | Security
0% found this document useful (0 votes)
16 views8 pages

Web Application

The document covers various topics related to web applications, including accessibility options in Windows XP, networking fundamentals, instant messaging, online transactions, and internet security. It provides definitions, advantages, types of networks, and best practices for online security, as well as specific software and tools for blogging and messaging. Additionally, it explains the purpose of online transactions and how data is transferred over the internet.

Uploaded by

chinna samy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views8 pages

Web Application

The document covers various topics related to web applications, including accessibility options in Windows XP, networking fundamentals, instant messaging, online transactions, and internet security. It provides definitions, advantages, types of networks, and best practices for online security, as well as specific software and tools for blogging and messaging. Additionally, it explains the purpose of online transactions and how data is transferred over the internet.

Uploaded by

chinna samy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

Unit 2

Web Applications (Basic)


SESSION 1: WORKING WITH ACCESSIBILITY OPTIONS
Fill in the blanks:
1. The option in Microsoft Windows XP used for helping users with physical
disabilities and to reduce repetitive strain is sticky keys.
2. Sound Sentry is designed to help users with auditory impairments.
3. The High Contrast option in Microsoft Windows XP is designed to assist
people with Vision Impairments.
4. Serial keys is designed to assist people that have difficulty using a keyboard
or a mouse.

SESSION 2: NETWORKING FUNDAMENTALS


Fill in the blanks:
1. The acronym for LAN is LOCAL AREA NETWORK
2. Three types of wired internet Connectivity are Dial up, DSL & Cable internet.
3. Three types of Wireless internet Connectivity are 3G, 4G & WIFI.

Question and answers


Q1. What is the definition of networking?
Ans1: A computer network is a collection of computers and other hardware
components interconnected by communication channels (cables or satellites)
that allow sharing of resources and information.
Q2. What are the advantages of networking?
Ans2: Some of the advantages associated with networking are:
• Data Sharing: One of the most important uses of networking is to allow the
sharing of data. Users can send text files, spread sheets, documents,
presentations, audio files, video files, etc. to other users.
• Hardware Sharing: Hardware components such as printers, scanners, etc.
can also be shared. For example, instead of purchasing 10 printers for each
user, one printer can be purchased and shared among multiple users thus
saving cost.
• Internet Access Sharing: You can purchase a single Internet connection and
share it among other computers in a network instead of purchasing multiple
Internet connection for each computer. This is very commonly found in
Internet café (browsing centres), schools, colleges, companies, etc.
• Usage of network based applications: such as web browsers, email clients,
chat application, audio & video calling, etc. is another advantage.
Q3. What are the different types of networking?
Ans3: The different types of networking are:
1) LAN 2) MAN 3) WAN

Q4. Explain LAN and WAN.


Ans4: The description of LAN and WAN are given below.
1) Local Area Network (LAN) - is one which connects computers and devices
in a limited geographical area such as home, school, computer laboratory,
office building, or closely positioned group of buildings. Usually local area
networks offer very high speeds and are used for connecting computers and
peripherals such as printers, scanners, etc.

2) Wide Area Network (WAN) - is one which covers a broad area (i.e., any
network that links across metropolitan, regional, or national boundaries).
The Internet is the most popular WAN, and is used by businesses,
governments, non-profit organizations, individual consumers, artists,
entertainers, and many others.
SESSION 3: INTRODUCTION TO INSTANT MESSAGING
Fill in the blanks:
1. Instant messaging (IM) is a form of communication over the internet that
offers an instantaneous transmission of text-based messages from sender to
receiver.
2. Microphones, Headsets, Speakers & Web Camera are required
for audio and video conferencing.
Question and answers
Q1 - List any five application based instant messaging software.
Ans1 - Application based instant messaging software is downloaded and
installed on user’s computer. Some of the popular instant messaging software
are:
1. Google Talk
2. Yahoo! Messenger
3. Skype
4. Windows Live Messenger
Q2: What is the mean of instant messages?
Ans2: Instant messages is a form of communication over the Internet that
offers an instantaneous transmission of text-based messages from sender to
receiver.

SESSION 4: CHATTING WITH A CONTACT – GOOGLE TALK


Q1. State any 03 rules and etiquettes to be followed while chatting on the
internet.
Ans1: There are some general rules and etiquettes to be followed while
chatting:
• Messages should be short and to the point.
• Always introduce yourself by name if your screen name doesn’t reflect it.
• Always ask if the other person has time to chat first - regardless of how
important you think what you have to say is, it’s not going to be well received
if the recipient is busy.
• In a business environment, know exactly what you want to discuss.
• Typing your messages in uppercase is extremely rude - it’s considered
shouting and very aggressive.
• Give people time to respond - Multiple questions sent to a recipient before
they’ve had a chance to answer can seem more like an interrogation rather
than a conversation.
Q2. What are the basic needs to use instant messaging (chat) software’s?
Ans2: The basic needs to use instant messaging (chat) software’s.
1) Active internet connection
2) Chat software to be downloaded
3) An account on that application

SESSION 5: CREATING AND PUBLISHING WEB PAGES – BLOG


Question and answers
Q1. Explain the purpose of a blog.
Ans 1: A blog is a discussion style site used by non-technical (or technical
users) users for creating personal web pages. Blogs are similar to an online
personal diary and simple to use. You can use a blog to convey messages
about events, announcements, news, reviews, etc.

Q2. List any 5 websites that provide blog service.


Ans 2: Some of the popular blogs include:
1. www.WordPress.com
2. www.blogger.com
3. www.blog.com
4. www.weebly.com
5. www.blogsome.com

Q3. Difference between web page and website.


Ans 3: Web page: one single page with information is called webpage and
collection of webpages are known as websites.

SESSION 6: USING OFFLINE BLOG EDITORS


Question and answers
Q1. 1. Explain the purpose of an offline blog editor.
Ans1: If you do not have an active internet connection, you can create blogs
using a blog application and publish the blog whenever internet connectivity
is available.
Q2. List any five offline blog editors.
Ans2: Five offline blog editors are given below
1. Qumana
2. Windows Live Writer
3. Blogdesk
4. Blogjet
5. Marsedit
SESSION 7: ONLINE TRANSACTIONS
Answer the following:

Q1: Explain the purpose of online transactions.


Ans1: The purpose of online transactions is to save time and have many
option available while doing online transactions. Online transaction is very
easy and it can be done from anywhere using devices like smartphones,
laptops etc. which is easily available to all of us. Online banking is completely
based on online transaction processing systems.

Q2. List any five websites that allow online transactions.


Ans2: five websites that allow online transactions are given below
1. IRCTC, an online portal for booking flight and train tickets.
2. Flipkart, an online shopping portal for buying consumer products.
3. EBay, an online portal for buying and selling goods.
4. Redbus, an online portal for booking bus tickets.
5. Amazon,an online shopping portal for buying consumer products

.
Q3. List any three payment tools to use online transactions.
Ans 3: customers can pay online using a credit card, debit card, cash on
delivery or by internet banking

SESSION 8: INTERNET SECURITY

Answer the following:


Q1. Explain the purpose of Internet Security.
Ans1: Internet security is a branch of computer security specifically related to
the Internet, often involving browser security but also network security. Its
objective is to establish rules and measures to use against attacks over the
Internet. The Internet represents an insecure channel for exchanging
information leading to a high risk of intrusion or fraud, such as phishing.

Q2. Explain different kinds of online threats.


Ans2: Online threats such as Phishing, email spoofing, chat spoofing, etc.
Phishing is the attempt to obtain sensitive information such as usernames,
passwords, and credit card details (and, indirectly, money), often for
malicious reasons. Phishing is typically carried out by email spoofing or
instant messaging, and it often directs users to enter personal information at
a fake website. Email spoofing is the creation of email messages with a forged
sender address. The core email protocols do not have any mechanism for
authentication, making it common for spam and phishing emails to use
such spoofing to mislead or even prank the recipient about the origin of the
message.

Miscellaneous Question and answers


Q1: What are best Practices for online Security?
Ans1: Some of the best Practices for online Security are given below.
1) Secure transactions: If you are using online shopping or transactions,
websites even store your credit card or online banking personal information
such as your credit card number, account details, etc. This information can be
tracked and used by un-authorized users often known as hackers to misuse
this information. Again, ensure the website is legitimate and uses secure
practices for performing and maintaining online transactions.
2) Install firewalls: Firewalls could be software or hardware and can assist in
keeping a computer and a network secure. Firewalls analyse the network
traffic and determine if the traffic should be allowed or not.
3) Never install software from unknown sources: As they might not be
trustworthy; download only from well-known or reputed websites. Verify the
source if it is legitimate by searching the internet or referring to comments
from other users before downloading them.
4) Use strong passwords: A combination of alphanumeric and special
characters could be used for creating a password that is not so easy to crack
or guessed by other users. Do not keep passwords such as your favourite
color, friends or relatives name, bike number, mobile number either as single
or combined option. These passwords are easy to guess if a user knows you
personally. Change your password frequently at least 2 or 3 weeks so that
your account information remains secure.
Q2 How Data is transfer over the internet? Explain it.
Ans2: When data is transferred over the internet, the protocol which are used
is given below.
• The data is broken up into bits of same sized pieces called packets.
• A header is added to each packet explaining where the data has come from,
where it should end up and where it fits in with the rest of the packets.
• Each packet is sent from computer to computer until it finds its destination.
Each computer on the way decides where next to send the packet. All packets
may not take the same route.
• At the destination, the packets are examined. If any packets are missing or
damaged, a message is sent asking for them to be re-sent. This continues
until all packets have been received intact.
• The packets are now reassembled into their original form. All this done in
seconds!
Q3: What is internet Service Provider?
Ans3: An Internet service provider (ISP) is an organization which provides you
with access to the Internet via a dial-up (using modem) or direct (hard wired)
or wireless connection.
Q4: What is modem?
Ans 4: Á modem is a device that converts digital computer signals into a form
(analog signals) that can travel over phone lines. It also re-converts the
analog signals back into digital signals. The word modem is derived from its
function Modulator/Demodulator.
Q5: What is DSL?
Ans5: Digital subscriber line (DSL) provide internet access by transmitting
digital data over wires of a local telephone network. DSL service is delivered
along with wired telephone service on the same telephone line. On the
customer premises, a DSL filter removes the high frequency interference,
enabling simultaneous use of the telephone and data transmission. For using
a DSL connection, you need a DSL modem and a subscription.

You might also like