You are on page 1of 11

Web Application

Web Application

1
Web Application

Accessibility Option
Computer Accessibility
Computer accessibility refers to the accessibility of a computer system to all
people, regardless of disabilities or severity of impairment. Combination of
hardware and software enables a person with a disability or impairment to use a
computer. Such technologies are referred to as Assistive Technology.
There are many disabilities or impairments that can be a barrier to effective computer use. These impairments include:

Cognitive impairments and learning disabilities, such as dyslexia, attention deficit- hyperactivity disorder
(ADHD) or autism.
Visual impairment such as low-vision, complete or partial blindness, and colour blindness.
Hearing disabilities including deafness or hard of hearing.
Motor or dexterity impairment such as paralysis, cerebral palsy, or carpal tunnel syndrome and repetitive strain
injury.
Accessibility Options in Control Panel are used to customize the way your keyboard, display or mouse function. Many
of these features are useful for people with disabilities as discussed above.

Q. What are the steps for launching accessibility option?


Ans. Steps to launch accessibility options in Windows 7 are:-
Start > Control Panel > Ease to Access > Ease to Access Center

Q. What are the different Accessibility Options?


Ans. Different types of accessibility options are:
StickyKeys- It is an accessibility feature to assist users having physical disabilities or help users to reduce
repetitive strain. It allows the user to press and release a modifier key, such as Shift, Ctrl, Alt, or
the Windows key, and have it remain active until any other key is pressed.
Steps to enable StickyKeys:
Ease to Access Center > Make the keyboard easier to use> Turn on StickyKeys > Apply > OK
Steps to disable StickyKeys:
Uncheck StickyKeys > Apply > OK
FilterKeys- It is an accessibility function that tells the keyboard to ignore brief or repeated keystrokes, making
typing easier for people with hand tremors.
Steps to enable FilterKeys:
Ease to Access Center > Make the keyboard easier to use> Turn on FilterKeys > Apply > OK
Steps to disable FilterKeys:
Uncheck FilterKeys > Apply > OK
ToggleKeys- It is an accessibility function which is designed for people having vision impairment or cognitive
disabilities. When it is turned on, computer will provide sound cues when the locking keys (Caps
Lock , Num Lock , or Scroll Lock) are pressed. A high-pitched sound plays when the keys are
switched on and a low-pitched sound plays when they are switched off.
Steps to enable ToggleKeys:
Ease to Access Center > Make the keyboard easier to use> Turn on ToggleKeys > Apply > OK
Steps to disable ToggleKeys:
Uncheck ToggleKeys > Apply > OK
SoundSentry- It is designed to help users with auditory impairments. It generates visual warnings, such as a
blink title bar or a flashing border, whenever the computer generates a sound.
Steps to enable SoundSentry:
Ease to Access Center > Use text or visual alternatives for sound > Turn on SoundSentry > Apply > OK
Steps to disable SoundSentry:
Uncheck SoundSentry > Apply > OK
ShowSounds- It instructs applications that convey information by sound, to also provide information visually,
through text captions or informative icons.

2
Web Application

Steps to enable ShowSounds:


Ease to Access Center > Use text or visual alternatives for sound > Turn on ShowSounds > Apply > OK
Steps to disable Show Sounds:
Uncheck ShowSounds > Apply > OK
High Contrast- It is an accessibility feature to assist people with vision impairment. The size and colour of fonts
and the background can be changed for ease of viewing using this option.
Steps to enable High Contrast:
Ease to Access Center > Make the computer easier to see > Turn on High Contrast > Apply > OK
Steps to disable High Contrast:
Uncheck High Contrast > Apply > OK
Cursor Options- It is also an accessibility feature that assists people with vision impairment by changing the
blink rate and width of the cursor.
Steps to change blink rate:
Ease to Access Center> Make the mouse easier to use> Set up mouse keys>Move slider to select>Apply>OK
Steps to change width of cursor:
Ease to Access Center > Make the computer easier to see > Select Cursor Width > Apply > OK
MouseKeys- It is an accessibility feature that assists people who have difficulty in using mouse. This option uses
the keyboard (especially numeric keypad) as a pointing device instead of a mouse.
Steps to enable MouseKeys:
Ease to Access Center > Make the mouse easier to use > Turn on mouse keys > Apply> OK
Steps to disable MouseKeys:
Uncheck MouseKeys > Apply > OK
Speech Recognition- It is an accessibility feature that assists people that have difficulty using a keyboard and
mouse. This feature enables the user to control the computer with voice commands and
convert speech to text.
Steps to enable Speech Recognition:
Ease to Access > Speech Recognition > Start Speech Recognition
Steps to disable Speech Recognition:
Speech Recognition > Advanced Speech Options > Uncheck Speech Recognition > Apply > OK

Networking Fundamentals
Computer Network
A computer network is a set of computers connected together for the purpose of
sharing resources by communication channels (cables or signals).The shared resource
includes Internet, Printer, or a file server.
Network Architecture
Network Architecture refers to how computers are organized in a system and how tasks are allocated between these
computers.
Types of Network Architecture-
Peer-to-peer (P2P) Architecture: In P2P network, tasks are allocated to every device on the network. In this
network all computers are considered equal and all have the same abilities to use
the resources available on this network.
Advantages of a peer-to-peer network:
 Does not require a dedicated server which means it is less costly.
 If one computer stops working, the other computers connected to the network will not
get affected.
 Installation and setup is quite painless because of the built-in support in modern
operating systems.
Disadvantages of a peer-to-peer network:
 Security and data backups are to be done to each individual computer.
 As the numbers of computers increases, performance, security, and access becomes a major problem.

3
Web Application

Client-Server Architecture: Networks in which certain computers have special dedicated tasks, providing
services to other computers (in the network) are called client service networks. The computers which provide
services are called servers and the one that use these services are called clients.
Advantages of a client-server network:
 Resources and data security are controlled through the server.
 Not restricted to a small number of computers.
 Server can be accessed anywhere and across multiple platforms.
Disadvantages of a client-server network:
 Can become very costly due to the need of a server as well as networking devices
such as hubs, routers, and switches.
 If and when the server goes down, the entire network will be affected.
 Technical staff needed to maintain and ensure network functions efficiently.
Types of Networks:
Local Area Network (LAN): A local area network (LAN) is one which connects computers and devices in a
limited geographical area such as home, school, computer laboratory, office building, or closely positioned
group of buildings. It ranges 0-10 km.
Advantages of LAN:
 Computer hardware resources like printers, modems, scanners etc. can be shared with the help of LAN.
 It offer very high speed data transfer.
Disadvantages of LAN:
 It covers very small geographical area.
 Security issues are big concern as it is easy to have access to programs and data of peers.
Wide Area Network (WAN): A wide area network is one which covers a broad area (i.e., any network that
links across metropolitan, regional, or national boundaries). The Internet is the most
popular WAN, and is used by businesses, governments, non-profit organizations,
individual consumers, artists, entertainers, and many others.
Advantages of WAN:
 Covers large geographical area.
 It helps in the expand of business globally.
Disadvantages of WAN:
 The set up cost is high.
 Security is the measure issue of WAN.
Internet
The Internet is the global system of interconnected computer networks that use the Internet protocol suite (TCP/IP)
to link devices worldwide. It is a network of networks that consists of private, public, academic, business, and
government networks of local to global scope, linked by a broad array of electronic, wireless, and optical networking
technologies. It carries a vast range of information resources and services.
World Wide Web
The World Wide Web (WWW), also known as the Web, is an information system where documents and other web
resources are identified by URLs which may be interlinked by hypertext, and are accessible over the Internet. With a
web browser, one can view web pages that may contain text, images, videos, and other multimedia, and navigate
between them via hyperlinks.
The information stored on web servers referred to as web pages can be accessed by the users by a software
application called a web browser. It acts as an interface between the user and the WWW. A Web server is a
computer that stores web sites and their related files for viewing on the Internet.
Q. What are the advantages of networking?
Ans. The advantages of networking are:
Data Sharing: One of the most important uses of networking is to allow the sharing of data. Users can send
text files, spread sheets, documents, presentations, audio files, video files, etc. to other users.
Hardware Sharing: Hardware components such as printers, scanners, etc. can also be shared. For E.g. Instead
of purchasing 10 printers, one printer can be shared among all users thus reducing cost.
Internet Access Sharing: A single Internet connection can be purchased and shared among other computers in a
network instead of purchasing multiple Internet connection for each computer. Used in Café, schools, offices.
Usage of network based applications: Such as web browsers, email clients, chat application, audio and video
calling etc. are other advantages.

4
Web Application

Getting Access to the Internet


To use the Internet, users need an Internet connection. Internet connections are provided by
the Internet Service Providers such as BSNL, Airtel, Idea, Reliance Jio, Vodafone, etc.
Internet Service Provider (ISP)
An Internet service provider (ISP) is an organization that provides services for accessing or using Internet via a dial-
up (using modem) or direct or wireless connection. Internet service providers may be organized in various forms, such
as commercial, community-owned, non-profit, or otherwise privately owned.
Internet services typically provided by ISPs include Internet access, Internet transit, domain name registration, web
hosting, Usenet service, and co-location.
Modem
A modem is a device that converts digital computer signals into a form (analog signals) that can
travel over phone lines. It also re-converts the analog signals back into digital signals. The word
modem is derived from its function MOdulator / DEModulator.
Types of Internet Connectivity
There are different types of Internet Connectivity available today; it can be widely categorized into wired and
wireless access. Some of the commonly used Internet connectivity are:
Dial-Up: Dial-up Internet access is a form of Internet access that uses the facilities of the public switched
telephone network (PSTN) to establish a connection to an Internet service provider (ISP) by dialling
a telephone number on a conventional telephone line. The user's computer or router uses an
attached modem to encode and decode information into and from audio frequency signals, respectively.
Dial-up connections are extremely slow.
DSL: Digital subscriber line is a family of technologies that are used to transmit digital data over telephone
lines. DSL service can be delivered simultaneously with wired telephone service on the same telephone line
since DSL uses higher frequency bands for data. On the customer premises, a DSL filter on each non-DSL
outlet blocks any high-frequency interference to enable simultaneous use of the voice and DSL services.
Cable Internet Access: It is a form of broadband Internet access which uses the cable television infrastructure.
It is integrated into the cable television infrastructure, similar to DSL which uses the existing telephone
network.
3G: 3G, short for 3rd Generation is a set of standards used for mobile devices and mobile telecommunication
services and networks. High-Speed Downlink Packet Access (HSDPA) is 3G mobile telephony
communications protocol that allows higher data transfer speeds and capacity.
WiMAX: WiMAX (Worldwide Interoperability for Microwave Access) is a wireless communications standard
designed to provide mobile broadband connectivity across cities and countries through a variety of devices.
WiMAX is a long range system, covering many kilometres and is typically used where DSL or
Cable Internet Access cannot be used; and there is need of access to the internet.
Wi-Fi: Wi-Fi is a popular technology that allows an electronic device such as computers or mobile
phones to exchange data wirelessly over a network, including high-speed Internet connections.
Wi-Fi devices such as personal computer, smart phones, video game console, etc. can connect to
a network resource such as Internet through a device called the Wireless Access Point (WAP).
Wi-Fi is used where cables cannot be run to provide network and Internet access. Wi-Fi can
also be used where users require mobile connectivity.
Wi-Fi connectivity is used in home & offices, hotels, college & school campus typically
for Internet Access. Shopping malls, coffee shops, resorts mostly offer free or paid Wi-Fi access to
the Internet for their customers.
Q. What happens during the data transfer on the Internet?
 The data is broken up into bits of same sized pieces called packets.
 A header is added to each packet explaining where the data has come from, where it should end up
and where it fits in with the rest of the packets.
 Each packet is sent from computer to computer until it finds its destination. Each computer on the
way decides where next to send the packet. All packets may not take the same route.
 At the destination, the packets are examined. If any packets are missing or damaged, a message is
sent asking for them to be re-sent. This continues until all packets have been received intact.
 The packets are now reassembled into their original form. All these processes are done in seconds.
Q. What are the steps to connect with wireless networks?
Ans. Click on Network icon in Taskbar> Double Click on the Network available> Enter Password (if required)> Ok

5
Web Application

Instant Messaging

Instant messaging (IM) technology is a type of online chat that offers real-
time text transmission over the Internet between sender and receiver. More
advanced instant messaging can add file transfer, clickable hyperlinks, Voice
over IP, or video chat. Instant messaging software is widely used for
personal and commercial use.
Some instant messaging software allows users to view messages
received when they are not logged on. These are called “Offline Messages”.
For utilizing audio and video chat or conferencing, users need to have microphones and headsets or
speakers and web cameras so that users can talk or see each other.
Key Features of Instant Messaging
 Real-time messaging.
 Audio calling and conferencing.
 Video calling and conferencing.
 File transfers (Not limited to documents, spread sheets, audio files, video files, etc.)
Instant Messaging Account
Participants messaging to each other need to be signed in to the same instant messaging software. To use instant
messaging software, a user must have a valid instant messaging account.
Instant messaging accounts differ in formats; some instant messaging software such as Yahoo! Messenger, use
email addresses for managing the account and software such as Skype use standard names.
Instant Messaging Services
There are two kinds of instant messaging software – application based and Web based.
Application based instant messaging software is downloaded and installed on user’s computer. Some of
the popular instant messaging software are:
 WhatsApp Messenger
 Viber
 Skype
 Hike
 WeChat, etc.
Web based instant messaging software is accessed using browsers such as Internet Explorer, Mozilla
Firefox, Google Chrome, etc. Some of the popular web based instant messaging software are:
 Meebo
 eBuddy
 Yahoo! Web Messenger
 IMO, etc.
Creating an instant messaging account
Steps to create account on Skype:
 Open Skype Website. To open go to https://www.skype.com/en/.
 Click Sign in.
 Click Sign up.
 Click on Use E-mail instead.
 Enter E-mail ID and Next.
 Enter Password and Next.
 Enter First and Last Name. Click Next
 Verify E-mail and click on Next.
 Human Verification and Click on Next.
Account is created.

6
Web Application

Chatting
Chatting is a kind of communication over the Internet that offers a real-time
transmission of text messages from sender to receiver. Chat messages are generally
short in order to enable other participants to respond quickly. Thereby, a feeling
similar to a spoken conversation is created, which distinguishes chatting from
other text-based online communication forms such as Internet forums and email.
Rules and protocol to be followed while chatting:
Messages should be short and to the point.
Always introduce yourself if another person does not know you.
Always ask if the other person has time to chat first.
In business purpose, discuss to the point.
Typing messages in Upper case is extremely rude as it is considered shouting and very aggressive.
Give people time to respond because multiple questions sent to a recipient before they had a chance to answer
can seem interrogation rather than a conversation.
Chat with single person at a time because multiple conversations may lead to exchange of message, which may
cause problem.
Always end the IM conversation properly as the other may be sitting for further communication from you.
Basic requirement for chatting:
E-mail account / phone number (for creating IM account),
Internet connection,
An operating device.
Steps for chatting on IM Account
Create an IM Account (if new) / Sign in.
Open the contact list.
Double- Click on the contact to whom you want to chat.
Blog
A blog is a discussion or informational website published on the World Wide
Web consisting of discrete, often informal diary-style text entries (posts). It is used by
non- technical (or technical users) for creating personal web pages.
Blogs are similar to an online personal diary and simple to use.
Blog can be used to convey messages about events, announcements, news,
reviews, etc. Blogs are usually managed using a web browser which requires active internet connection. Offline blog
software can also be used to create content when offline and publish later when an active internet connection is
available.
Some free blog service providers:
www.wordpress.org
www.wix.com
www.weebly.com
www.medium.com
www.ghost.org
www.blogger.com
www.tumblr.com
www.joomla.org
www.jimdo.com
Requirements for creating a Blog Account:
E-mail Account
Web Browser
Internet Connection
Operating Device
Steps for creating a Blog Account:
Open Web Browser.
Type www.blogger.com in address bar.
Click on Create your Blog.

7
Web Application

Choose an E-mail Account.


Enter Password to verify E-mail.
Enter Display Name.
Click on Continue to Blogger.
Steps to Create a New Blog:
Sign in to the Account.
Click on Create New Blog.
Type Blog’s Title.
Type the Blog’s Address.
Click on Create blog.
Steps to create and publish new post:
Click on New Post.
Type the text you want others to read.
Click on Publish. Figure: Different Formatting Options
Offline Blog Editors:
Offline Blogs Editors are the applications which are used to create blogs in the absence of active internet
connections. The blogs created on these editors can be published later when internet connection is available.
List of some offline blog editors:
Windows Live Writer
Qumana
BlogDesk
Bleezer
W.Bloggar
Features of offline blog editors:
It is used to create blog and publish when internet connection is available.
It uses computer storage.
It does not require access to web browser.
It is application based i.e. it is installed on computer.
Online Transactions
An online transaction, also known as a PIN-debit transaction, is a password-protected payment method that
authorizes a transfer of funds over an electronic funds transfer (EFT) in the presence of active internet connection.
Online Shopping
Online shopping is a form of electronic commerce which allows consumers to
directly buy goods or services from a seller over the Internet using a web browser.
Consumers find a product of interest by visiting the website of the retailer
directly or by searching among alternative vendors using a shopping search
engine, which displays the same product's availability and pricing at different e-
retailers. Customers can pay online for the purchased goods using a credit, debit card or by internet banking.
Situations when Online Shopping could be useful:
When customer has no time to visit the store.
Visiting stores becomes more expensive than purchasing a product online.
A product or service that is not available in the local market is available online.
When visiting to the shop is inconvenient.
When customer wants more variety of product.
When customer hates crowd especially during festivals.
List of websites that offers Online Transaction:
IRCTC, an online portal for booking flight and train tickets.
Flipkart, an online shopping portal for buying consumer products.
EBay, an online portal for buying and selling goods.
Redbus, an online portal for booking bus tickets.
SBPDCL, an online portal for paying electricity bill.

8
Web Application

Payment tools to use online transaction


Debit Card
Credit Card
Money transfer from one account to another
Application software like Paytm, PayPal etc.
Steps to perform Online Transaction:
Open the browser and type website that offers online transaction in the address bar.
Open the website and Sign up to do transaction.
Select the things you want to buy.
Click on Buy/Pay or any other Payment button.
Select the payment method.
Enter the details of the payment method and proceed.
After proceeding, transaction will be completed.
Internet Security
Internet security is a branch of computer security specifically related to not only
the Internet, often involving browser security and the World Wide Web, but
also network security as it applies to other applications or operating systems as a
whole. Its objective is to establish rules and measures to use against attacks over
the Internet. The Internet represents an insecure channel for exchanging
information, which leads to a high risk of intrusion or fraud, such
as phishing, online viruses, Trojans, worms and more.

Though Internet provides valuable information and entertainment, it may leave your computer unsecure due to many
online threats. You need to ensure that your usernames, passwords, credit card or online banking information secure
as they are prone to be tracked and used by unauthorized users. Some websites can also install Malware on the
computer without user consent thereby leaving the computer damaged or insecure.
Online threats such as Phishing, email spoofing, chat spoofing, etc. can increase the chances of users getting
compromised.
Phishing: It is the method which targets online users for extraction of
their sensitive information such as username, password and credit card
information. Phishing occurs when the attacker pretends to be a
trustworthy entity, either via email or web page. Victims are directed to
fake web pages, which seems to look reasonable, via spoof emails, instant
messenger/social media or other avenues.
Email Spoofing: It is the trick in which fake web pages, which seems
reasonable, is spread through Email in order to get username, password
and credit card and other information of the user.

An internet user can be tricked or forced into downloading software that is of malicious intent onto a computer. Such
software comes in many forms, such as viruses, Trojan horses, spyware, and worms.
Malware: Malware, short for malicious software, is any software used to disrupt computer operation, gather
sensitive information, or gain access to private computer systems. Malware is defined by its malicious intent,
acting against the requirements of the computer user, and does not include software
that causes unintentional harm due to some deficiency. The term badware is
sometimes used, and applied to both true (malicious) malware and unintentionally
harmful software.
Worms: Worms are programs that can replicate themselves throughout a computer
network, performing malicious tasks throughout.
Trojan horses: Trojan horses, commonly known as a Trojan, are a general term for
malicious software that pretends to be harmless, so that a user willingly allows it to
be downloaded onto the computer.
Spyware: It refers to programs that secretly monitor activity on a computer system and report that information
to others without the user's consent.
Such risks can be reduced using Antivirus Software, Antispyware Software, Firewalls, strong passwords, etc. in
addition to spreading awareness of the best practices.

9
Web Application

Practices for Security


Good Password Management: There are too many passwords to manage - and it's easy to
take short-cuts, like reusing the same password. A password management program can
help you to maintain strong unique passwords for all of your accounts. These programs
can generate strong passwords for you, enter credentials automatically, and remind you to
update your passwords periodically.

A combination of alphanumeric and special characters could be used for creating a password that is not so easy to
crack or guessed by other users. Passwords should not be like your favourite colour, friends or relatives name, bike
number, mobile number either as single or combined option. These passwords are easy to guess if a user knows you
personally.

Using strong passwords can lower the risk of a security breach; effectiveness of a password depends on the security
mechanism of the software and users involvement in generating a strong password.

General Tips for managing Password:


 Use long passwords of 12-14 characters.
 Avoid using obvious personal information.
 Include Numbers, Symbols, Uppercase and Lowercase letters in password.
 Make the password meaningless.
 Do not use same password again and again.
 Use password manager to auto-generate and store strong passwords.
 Change your password regularly.

Backup your data: One of the most basic data protection tip is backing up
your data. Basically, this creates a duplicate copy of your data so that if a
device is lost, stolen, or compromised, you don't lose your important
information. It's best to create a backup on a different device, such as an
external hard drive, so that you can easily recover your information when
the original device becomes compromised.
Use encryption software: Encryption software can be used to protect your
data from unauthorized users. If encryption software is not available
within the operating system, use 3rd party software.
Keep username and password private: Never save your username and password on the computers that often
shared. Don’t save the password on Browser as other user can use that to open your account.
Registering with Websites: Read the policy before registering to the website. These policy include how your data
will be used by website.
Don’t share personal information: Protecting your personal information can help reduce your risk of identity
theft. There are four main ways to do it: know who you share information with; store and dispose of your
personal information securely, especially your Social Security number; ask questions before deciding to share your
personal information; and maintain appropriate security on your computers and other electronic devices. And
don’t share your information to the unauthorized websites.
Secure Transactions: If you are using online shopping or transactions, websites even store your credit card or
online banking personal information such as your credit card number, account details, etc. This information can
be tracked and used by un-authorized users often known as hackers to misuse this information. Verify if the
website uses secure transaction; usually it is indicated through a golden lock in the browser’s address bar.

10
Web Application

Use antivirus and antispyware software: Computers are prone to attacks


from software known as Malware that could harm your computer.
Programs such as key loggers could be installed on your computer to track
and transmit every key that is pressed on a keyboard to unauthorized users.
Antivirus and Antispyware programs also offer real-time protection
monitoring your computer for any changes by malware software. Keep your Antivirus and Antispyware
software always up to date, this can help in protecting your computer from recent threats.
Do not respond to mails from unknown users: Don’t respond to the E-mails coming from the unknown users
because many such e-mails contain unauthorized website which contains virus and that virus enter the computer
to steal data.
Never install software from unknown sources: As they might not be trustworthy; download only from well-
known or reputed websites. Verify the source if it is legitimate by searching the internet or referring to comments
from other users before downloading them; understand the nature and the purpose of the software before
attempting to download and install them.
Use Firewalls: A computer firewall controls access between networks. It generally consists of gateways and
filters which vary from one firewall to another. Firewalls also screen network traffic and are able to block
traffic that is dangerous. Firewalls act as the intermediate server between SMTP and Hypertext Transfer
Protocol (HTTP) connections. Firewalls impose restrictions on incoming and outgoing Network packets to and
from private networks. Incoming or outgoing traffic must pass through the firewall; only authorized traffic is
allowed to pass through it. Firewalls create checkpoints between an internal private network and the public
Internet, also known as choke points (borrowed from the identical military term of a combat limiting
geographical feature). Firewalls can create choke points based on IP source and TCP port number. They can also
serve as the platform for IPSec. Using tunnel mode capability, firewall can be used to implement VPNs.
Firewalls can also limit network exposure by hiding the internal network system and information from the
public Internet.

11

You might also like