Professional Documents
Culture Documents
Web Application
1
Web Application
Accessibility Option
Computer Accessibility
Computer accessibility refers to the accessibility of a computer system to all
people, regardless of disabilities or severity of impairment. Combination of
hardware and software enables a person with a disability or impairment to use a
computer. Such technologies are referred to as Assistive Technology.
There are many disabilities or impairments that can be a barrier to effective computer use. These impairments include:
Cognitive impairments and learning disabilities, such as dyslexia, attention deficit- hyperactivity disorder
(ADHD) or autism.
Visual impairment such as low-vision, complete or partial blindness, and colour blindness.
Hearing disabilities including deafness or hard of hearing.
Motor or dexterity impairment such as paralysis, cerebral palsy, or carpal tunnel syndrome and repetitive strain
injury.
Accessibility Options in Control Panel are used to customize the way your keyboard, display or mouse function. Many
of these features are useful for people with disabilities as discussed above.
2
Web Application
Networking Fundamentals
Computer Network
A computer network is a set of computers connected together for the purpose of
sharing resources by communication channels (cables or signals).The shared resource
includes Internet, Printer, or a file server.
Network Architecture
Network Architecture refers to how computers are organized in a system and how tasks are allocated between these
computers.
Types of Network Architecture-
Peer-to-peer (P2P) Architecture: In P2P network, tasks are allocated to every device on the network. In this
network all computers are considered equal and all have the same abilities to use
the resources available on this network.
Advantages of a peer-to-peer network:
Does not require a dedicated server which means it is less costly.
If one computer stops working, the other computers connected to the network will not
get affected.
Installation and setup is quite painless because of the built-in support in modern
operating systems.
Disadvantages of a peer-to-peer network:
Security and data backups are to be done to each individual computer.
As the numbers of computers increases, performance, security, and access becomes a major problem.
3
Web Application
Client-Server Architecture: Networks in which certain computers have special dedicated tasks, providing
services to other computers (in the network) are called client service networks. The computers which provide
services are called servers and the one that use these services are called clients.
Advantages of a client-server network:
Resources and data security are controlled through the server.
Not restricted to a small number of computers.
Server can be accessed anywhere and across multiple platforms.
Disadvantages of a client-server network:
Can become very costly due to the need of a server as well as networking devices
such as hubs, routers, and switches.
If and when the server goes down, the entire network will be affected.
Technical staff needed to maintain and ensure network functions efficiently.
Types of Networks:
Local Area Network (LAN): A local area network (LAN) is one which connects computers and devices in a
limited geographical area such as home, school, computer laboratory, office building, or closely positioned
group of buildings. It ranges 0-10 km.
Advantages of LAN:
Computer hardware resources like printers, modems, scanners etc. can be shared with the help of LAN.
It offer very high speed data transfer.
Disadvantages of LAN:
It covers very small geographical area.
Security issues are big concern as it is easy to have access to programs and data of peers.
Wide Area Network (WAN): A wide area network is one which covers a broad area (i.e., any network that
links across metropolitan, regional, or national boundaries). The Internet is the most
popular WAN, and is used by businesses, governments, non-profit organizations,
individual consumers, artists, entertainers, and many others.
Advantages of WAN:
Covers large geographical area.
It helps in the expand of business globally.
Disadvantages of WAN:
The set up cost is high.
Security is the measure issue of WAN.
Internet
The Internet is the global system of interconnected computer networks that use the Internet protocol suite (TCP/IP)
to link devices worldwide. It is a network of networks that consists of private, public, academic, business, and
government networks of local to global scope, linked by a broad array of electronic, wireless, and optical networking
technologies. It carries a vast range of information resources and services.
World Wide Web
The World Wide Web (WWW), also known as the Web, is an information system where documents and other web
resources are identified by URLs which may be interlinked by hypertext, and are accessible over the Internet. With a
web browser, one can view web pages that may contain text, images, videos, and other multimedia, and navigate
between them via hyperlinks.
The information stored on web servers referred to as web pages can be accessed by the users by a software
application called a web browser. It acts as an interface between the user and the WWW. A Web server is a
computer that stores web sites and their related files for viewing on the Internet.
Q. What are the advantages of networking?
Ans. The advantages of networking are:
Data Sharing: One of the most important uses of networking is to allow the sharing of data. Users can send
text files, spread sheets, documents, presentations, audio files, video files, etc. to other users.
Hardware Sharing: Hardware components such as printers, scanners, etc. can also be shared. For E.g. Instead
of purchasing 10 printers, one printer can be shared among all users thus reducing cost.
Internet Access Sharing: A single Internet connection can be purchased and shared among other computers in a
network instead of purchasing multiple Internet connection for each computer. Used in Café, schools, offices.
Usage of network based applications: Such as web browsers, email clients, chat application, audio and video
calling etc. are other advantages.
4
Web Application
5
Web Application
Instant Messaging
Instant messaging (IM) technology is a type of online chat that offers real-
time text transmission over the Internet between sender and receiver. More
advanced instant messaging can add file transfer, clickable hyperlinks, Voice
over IP, or video chat. Instant messaging software is widely used for
personal and commercial use.
Some instant messaging software allows users to view messages
received when they are not logged on. These are called “Offline Messages”.
For utilizing audio and video chat or conferencing, users need to have microphones and headsets or
speakers and web cameras so that users can talk or see each other.
Key Features of Instant Messaging
Real-time messaging.
Audio calling and conferencing.
Video calling and conferencing.
File transfers (Not limited to documents, spread sheets, audio files, video files, etc.)
Instant Messaging Account
Participants messaging to each other need to be signed in to the same instant messaging software. To use instant
messaging software, a user must have a valid instant messaging account.
Instant messaging accounts differ in formats; some instant messaging software such as Yahoo! Messenger, use
email addresses for managing the account and software such as Skype use standard names.
Instant Messaging Services
There are two kinds of instant messaging software – application based and Web based.
Application based instant messaging software is downloaded and installed on user’s computer. Some of
the popular instant messaging software are:
WhatsApp Messenger
Viber
Skype
Hike
WeChat, etc.
Web based instant messaging software is accessed using browsers such as Internet Explorer, Mozilla
Firefox, Google Chrome, etc. Some of the popular web based instant messaging software are:
Meebo
eBuddy
Yahoo! Web Messenger
IMO, etc.
Creating an instant messaging account
Steps to create account on Skype:
Open Skype Website. To open go to https://www.skype.com/en/.
Click Sign in.
Click Sign up.
Click on Use E-mail instead.
Enter E-mail ID and Next.
Enter Password and Next.
Enter First and Last Name. Click Next
Verify E-mail and click on Next.
Human Verification and Click on Next.
Account is created.
6
Web Application
Chatting
Chatting is a kind of communication over the Internet that offers a real-time
transmission of text messages from sender to receiver. Chat messages are generally
short in order to enable other participants to respond quickly. Thereby, a feeling
similar to a spoken conversation is created, which distinguishes chatting from
other text-based online communication forms such as Internet forums and email.
Rules and protocol to be followed while chatting:
Messages should be short and to the point.
Always introduce yourself if another person does not know you.
Always ask if the other person has time to chat first.
In business purpose, discuss to the point.
Typing messages in Upper case is extremely rude as it is considered shouting and very aggressive.
Give people time to respond because multiple questions sent to a recipient before they had a chance to answer
can seem interrogation rather than a conversation.
Chat with single person at a time because multiple conversations may lead to exchange of message, which may
cause problem.
Always end the IM conversation properly as the other may be sitting for further communication from you.
Basic requirement for chatting:
E-mail account / phone number (for creating IM account),
Internet connection,
An operating device.
Steps for chatting on IM Account
Create an IM Account (if new) / Sign in.
Open the contact list.
Double- Click on the contact to whom you want to chat.
Blog
A blog is a discussion or informational website published on the World Wide
Web consisting of discrete, often informal diary-style text entries (posts). It is used by
non- technical (or technical users) for creating personal web pages.
Blogs are similar to an online personal diary and simple to use.
Blog can be used to convey messages about events, announcements, news,
reviews, etc. Blogs are usually managed using a web browser which requires active internet connection. Offline blog
software can also be used to create content when offline and publish later when an active internet connection is
available.
Some free blog service providers:
www.wordpress.org
www.wix.com
www.weebly.com
www.medium.com
www.ghost.org
www.blogger.com
www.tumblr.com
www.joomla.org
www.jimdo.com
Requirements for creating a Blog Account:
E-mail Account
Web Browser
Internet Connection
Operating Device
Steps for creating a Blog Account:
Open Web Browser.
Type www.blogger.com in address bar.
Click on Create your Blog.
7
Web Application
8
Web Application
Though Internet provides valuable information and entertainment, it may leave your computer unsecure due to many
online threats. You need to ensure that your usernames, passwords, credit card or online banking information secure
as they are prone to be tracked and used by unauthorized users. Some websites can also install Malware on the
computer without user consent thereby leaving the computer damaged or insecure.
Online threats such as Phishing, email spoofing, chat spoofing, etc. can increase the chances of users getting
compromised.
Phishing: It is the method which targets online users for extraction of
their sensitive information such as username, password and credit card
information. Phishing occurs when the attacker pretends to be a
trustworthy entity, either via email or web page. Victims are directed to
fake web pages, which seems to look reasonable, via spoof emails, instant
messenger/social media or other avenues.
Email Spoofing: It is the trick in which fake web pages, which seems
reasonable, is spread through Email in order to get username, password
and credit card and other information of the user.
An internet user can be tricked or forced into downloading software that is of malicious intent onto a computer. Such
software comes in many forms, such as viruses, Trojan horses, spyware, and worms.
Malware: Malware, short for malicious software, is any software used to disrupt computer operation, gather
sensitive information, or gain access to private computer systems. Malware is defined by its malicious intent,
acting against the requirements of the computer user, and does not include software
that causes unintentional harm due to some deficiency. The term badware is
sometimes used, and applied to both true (malicious) malware and unintentionally
harmful software.
Worms: Worms are programs that can replicate themselves throughout a computer
network, performing malicious tasks throughout.
Trojan horses: Trojan horses, commonly known as a Trojan, are a general term for
malicious software that pretends to be harmless, so that a user willingly allows it to
be downloaded onto the computer.
Spyware: It refers to programs that secretly monitor activity on a computer system and report that information
to others without the user's consent.
Such risks can be reduced using Antivirus Software, Antispyware Software, Firewalls, strong passwords, etc. in
addition to spreading awareness of the best practices.
9
Web Application
A combination of alphanumeric and special characters could be used for creating a password that is not so easy to
crack or guessed by other users. Passwords should not be like your favourite colour, friends or relatives name, bike
number, mobile number either as single or combined option. These passwords are easy to guess if a user knows you
personally.
Using strong passwords can lower the risk of a security breach; effectiveness of a password depends on the security
mechanism of the software and users involvement in generating a strong password.
Backup your data: One of the most basic data protection tip is backing up
your data. Basically, this creates a duplicate copy of your data so that if a
device is lost, stolen, or compromised, you don't lose your important
information. It's best to create a backup on a different device, such as an
external hard drive, so that you can easily recover your information when
the original device becomes compromised.
Use encryption software: Encryption software can be used to protect your
data from unauthorized users. If encryption software is not available
within the operating system, use 3rd party software.
Keep username and password private: Never save your username and password on the computers that often
shared. Don’t save the password on Browser as other user can use that to open your account.
Registering with Websites: Read the policy before registering to the website. These policy include how your data
will be used by website.
Don’t share personal information: Protecting your personal information can help reduce your risk of identity
theft. There are four main ways to do it: know who you share information with; store and dispose of your
personal information securely, especially your Social Security number; ask questions before deciding to share your
personal information; and maintain appropriate security on your computers and other electronic devices. And
don’t share your information to the unauthorized websites.
Secure Transactions: If you are using online shopping or transactions, websites even store your credit card or
online banking personal information such as your credit card number, account details, etc. This information can
be tracked and used by un-authorized users often known as hackers to misuse this information. Verify if the
website uses secure transaction; usually it is indicated through a golden lock in the browser’s address bar.
10
Web Application
11