Tuesday, 22 December 2020

UNIT-4 WEB APPLICATIONS AND SECURITY / Class 10th IT 402 / Solved Exercise

 

INFORMATION TECHNOLOGY-402

CLASS-X

SESSION-2020-21

UNIT-4 WEB APPLICATIONS AND SECURITY


Book Exercise

SESSION 1: WORKING WITH ACCESSIBILITY OPTIONS

Fill in the blanks

1. The option in Microsoft Windows XP used for helping users with physical disabilities and to reduce repetitive strain is StickyKeys .

2. Sound Sentry is designed to help users with auditory impairments.

3. The High Contrast option in Microsoft Windows XP is designed to assist people with vision impairments.

4. Serial Keys is designed to assist people that have difficulty using a keyboard or a mouse.



SESSION 2 : NETWORKING FUNDAMENTALS


    Fill in the blanks:

1. The acronym for LAN is local area network .

2. Three types of Wired Internet Connectivity are Dial-up , DSL: & Cable Internet Access.

3. Three types of Wireless Internet Connectivity are _3G, WiMax & WiFi . 


II. Answer the following:

  1. Define networking?

    Ans: A computer network is a collection of computers and other hardware components interconnected by communication channels (cables or satellites) that allow sharing of resources and information.



  1. Give any three advantages of networking.

    Ans: Some of the advantages associated with networking are:

Data Sharing: One of the most important uses of networking is to allow the sharing of data.

Files Transfer : Users can send text files, spread sheets, documents, presentations, audio files, video files, etc. to other users.

Hardware Sharing: Hardware components such as printers, scanners, etc. can also be shared. For example, instead of purchasing 10 printers for each user, one printer can be purchased and shared among multiple users thus saving cost.

Internet Access Sharing: You can purchase a single Internet connection and share it among other computers in a network instead of purchasing multiple Internet connection for each computer. This is very commonly found in Internet café (browsing centres), schools, colleges, companies, etc.

Usage of network based applications: Such as web browsers, email clients, chat application, audio & video calling, etc. is another advantage.



  1. Explain the term packet with reference to data transfer.

Ans:Each packet is sent from computer to computer until it finds its destination. Each computer on the way decides where next to send the packet. All packets may not take the same route.

At the destination, the packets are examined. If any packets are missing or damaged, a message is sent asking for them to be re-sent. This continues until all packets have been received intact.

The packets are now reassembled into their original form. All this done in seconds!



  1. Explain Wifi and its significance.

    Ans:WI-Fi: Wi-Fi is a popular technology that allows an electronic device such as computers or mobile phones to exchange data wirelessly over a network, including high-speed Internet connections. WiFi devices such as personal computer, smartphones, video game console, etc. can connect to a network resource such as Internet through a device called the Wireless Access Point (WAP). Wi-Fi is used where cables cannot be run (such as old buildings, outdoor areas) to provide network and Internet access. Wi-Fi can also be used where users require mobile connectivity. Wi-Fi connectivity is used in home & offices, hotels, college & school campus typically for Internet Access. Shopping malls, coffee shops, resorts mostly offer free or paid Wi-Fi access to the Internet for their customers.

  1. Compare LAN with WAN

Ans:

LOCAL AREA NETWORK

WIDE AREA NETWORK

1. A local area network (LAN) is one which connects computers and devices in a limited geographical area such as home, school, computer laboratory, office building, or closely positioned group of buildings.

2. Usually local area networks offer very high speeds and are used for connecting computers and peripherals such as printers, scanners, etc.

1. A wide area network (WAN) is one which covers a broad area (i.e., any network that links across metropolitan, regional, or national boundaries).

2.The Internet is the most popular WAN, and is used by businesses, governments, non-profit organizations, individual consumers, artists, entertainers, and many others.





6. Expand the following terms :

a. DSL

Ans: Digital subscriber line(DSL) provide Internet access by transmitting digital data over wires of a local telephone network. DSL service is delivered along with wired telephone service on the same telephone line. On the customer premises, a DSL filter removes the high frequency interference, enabling simultaneous use of the telephone and data transmission. For using a DSL connection, you need a DSL modem and a subscription .



b. ISP

Ans: Internet service provider (ISP), company that provides Internet connections and services to individuals and organizations. In addition to providing access to the Internet, ISPs may also provide software packages (such as browsers), e-mail accounts, and a personal Web site or home page.



  1. Modem

Ans: Á modem is a device that converts digital computer signals into a form (analog signals) that can travel over phone lines. It also re-converts the analog signals back into digital signals. The word modem is derived from its function MOdulator/DEModulator.



  1. www

Ans: World Wide Web (abbreviated as WWW or W3, commonly known as the Web), is a system of interlinked hypertext documents accessed via the Internet. With a web browser, one can view web pages that may contain text, images, videos, and other multimedia, and navigate between them via hyperlinks. Information is stored on web servers referred to as web pages are retrieved by using a web browser such as Firefox on the local computer. A Web Browser is a software used to view Web sites and acts as an interface between the user and the World Wide Web. A Web server is a computer that stores web sites and their related files for viewing on the Internet.



e. LAN

Ans: A local area network (LAN) is one which connects computers and devices in a limited geographical area such as home, school, computer laboratory, office building, or closely positioned group of buildings. Usually local area networks offer very high speeds and are used for connecting computers and peripherals such as printers, scanners, etc.



f. MAN

Ans: metropolitan area network (MAN) is a computer network that connects computers within a metropolitan area, which could be a single large city, multiple cities and towns, or any given large area with multiple buildings. A MAN is larger than a local area network (LAN) but smaller than a wide area network (WAN).



g. WAN

Ans: A wide area network (WAN) is one which covers a broad area (i.e., any network that links across metropolitan, regional, or national boundaries). The Internet is the most popular WAN, and is used by businesses, governments, non-profit organizations, individual consumers, artists, entertainers, and many others.



h. P2P

Ans: PEER-TO-PEER (P2P) ARCHITECTURE: Networks in which all computers have an equal status are called peer to peer networks. Generally in such a network each terminal has an equally competent CPU.


  1. Explain P2P Architecture and how it is different from Client Server Architecture?.

Ans: In Client-Server Network, Centralized server is used to store the data. While in Peer-to-Peer Network, Each peer has its own data. ... In Client-Server Network, Server respond the services which is request by Client. While in Peer-to-Peer Network, Each and every node can do both request and respond for the services


SESSION 3: INTRODUCTION TO INSTANT MESSAGING


1. Fill in the blanks:

a. Instant messaging (IM) is a form of communication over the Internet that offers an instantaneous transmission of text-based messages from sender to receiver.

b. Computer , headsets or speakers & microphones & Web Camera are required for audio and video conferencing.


  1. List any five application based instant messaging software.

    Ans:Application based instant messaging software is downloaded and installed on user’s computer. Some of the popular instant messaging software are:

Google Talk

Yahoo! Messenger

Skype

Windows Live Messenger • Rediff Bol, etc

  1. What do you mean by instant messages?

    Ans: Instant messaging (IM) is a form of communication over the Internet that offers an instantaneous transmission of text-based messages from sender to receiver. Most instant messaging software include the option for performing file transfers, audio chat, video calling and conferencing, sharing desktops, etc. apart from standard text chat. Instant messaging software is widely used for personal and commercial use.

4. Give any three key features of Instant Messaging.

Ans: Key Features of an instant messaging are as follows:

Text Messages can be sent to one or more person (Similar to SMS)

Audio calling and conferencing.

Video calling and conferencing.

File transfers (Not limited to documents, spread sheets, audio files, video files, etc.)

Message history (Save messages for future reference).


SESSION 4: CHATTING WITH A CONTACT – GOOGLE TALK

Answer the following:

  1. State any 03 rules and etiquettes to be followed while chatting on the Internet.

Ans: There are some general rules and etiquettes to be followed while chatting. They are almost the same as those that apply for emails.

Messages should be short and to the point.

Always introduce yourself by name if your screen name doesn’t reflect it.

Always ask if the other person has time to chat first - regardless of how important you think what you have to say is, it’s not going to be well received if the recipient is busy.

In a business environment, know exactly what you want to discuss.

Typing your messages in uppercase is extremely rude - it’s considered shouting and very aggressive.

  1. What are the basic needs to use instant messaging (chat) software.

    Ans: The basic needs to use IM (chat) software are (a) an active Internet connection (it through/over the Internet that instant messaging is possible), (b) chat software to be downloaded (the chat software could be Watsapp, Skype, We chat, Viber, Telegram, FB messenger, Meebo, etc), and an account to be opened (in the name of the person using it) on that application.

  IM technology is a sort of online chat which offers real-time transmission of text over the Internet. Short messages are usually transmitted between 2 people/persons/individuals, wherein each user decided to finish a thought and then selects "send".


SESSION 5: CREATING AND PUBLISHING WEB PAGES – BLOG

  1. What is a blog? Explain its use.

    Ans:A blog is a discussion style site used by non-technical (or technical users) users for creating personal web pages. Blogs are similar to an online personal diary and simple to use. You can use a blog to convey messages about events, announcements, news, reviews, etc. Blogs are usually managed using a web browser and this requires active internet connection. You can also use offline blog software to create content first and later publish the content when an active internet connection is available.


  1. List any 5 websites that provide blog service.

    Ans:There are hundreds of websites that offer blog service for free. Some of the popular blogs include: • www.WordPress.com • www.blogger.com • www.blog.com • www.weebly.com • www.blogsome.com


  1. Difference between web page and website.

Ans:web page

A document which can be displayed in a web browser such as Firefox, Google Chrome, Opera, Microsoft Internet Explorer or Edge, or Apple's Safari. These are also often called just "pages."
website
A collection of web pages which are grouped together and usually connected together in various ways. Often called a "web site" or simply a "site."


  1. What do you mean by publishing a post?

Ans: To submit (content) online, as to a message board or blog: I published a comment on her blog post with examples from my own life. They publish a new webcomic once a month. to announce formally or officially; proclaim; promulgate. to make publicly or generally known.


SESSION 6: USING OFFLINE BLOG EDITORS

Answer the following:

  1. Explain the purpose of an offline blog editor.

Ans: The purpose of an offline blog editor is to create blog and publish the content whenever internet connectivity is available. They publish the blog written automatically on the internet domain when you connect to a internet connection.

  1. List any five offline blog editors.

Ans: There are several free offline blog editors available that can be downloaded and installed on the local computer such as:

Qumana

Windows Live Writer

Blogdesk


SESSION 7: ONLINE TRANSACTIONS

  1. Explain the purpose of Online transactions.

Ans: Online transactions have made transactions very convenient and simplified the workflow in many forms in a business. Online transactions deals with transfer of money over the internet. Revolution in the electronic media has made transaction handling easy .

  1. List any five websites that allow online transactions.

Ans: Some of the popular online transaction websites are:

IRCTC, an online portal for booking flight and train tickets.

Flipkart, an online shopping portal for buying consumer products.

EBay, an online portal for buying and selling goods.

Redbus, an online portal for booking bus tickets.

Amazon, an online shopping website & App.


  1. List any three payment tools to use online transactions.

    Ans: The three payment tools to use online transaction using

  • credit card

  • debit card

  • paytm

  1. Give any two benefits of online transactions.

    Ans: Benefits of online payments

As well as disadvantages, online payment methods have several advantages. Read these examples:

  • Low labour costs

    Since online payments are usually automatic, they have lower labour costs than manual payment methods, such as cheque, money order, cash and EFTPOS.

  • Convenience for online sales

    Online payment methods allow conveniently selling goods and services online.

  • Automatic

    Online payments can be automatic, which can be convenient for you and your customers.

  • Fast transaction speed

    Online transactions quickly provide feedback to you and your customers.

  • Low risk of theft

    After processing delays, online payments generally go straight into your bank account, so they have a low risk of theft.

  1. Give any two disadvantages of online transactions.

Ans:Online payment methods have several disadvantages. Check out these examples:

  • Service fees

    Payment gateways and third-party payment processors charge service fees.

  • Inconvenient for offline sales

    Online payment methods are inconvenient for offline sales.

  • Vulnerability to cybercriminals

    Cybercriminals can disable online payment methods or exploit them to steal people’s money or information. Visit the Australian Cybercrime Reporting Network’s Learn about cybercrime page to learn more about cybercrime.

  • Reliance on telecommunication infrastructure

    Internet and server problems can disable online payment methods.

  • Technical problems

    Online payment methods can go down due to technical problems.


SESSION 8: INTERNET SECURITY

  1. Explain the purpose of Internet Security.

    Ans: Internet security is a branch of computer security specifically related to the Internet, often involving browser security but also network security. Its objective is to establish rules and measures to use against attacks over the Internet. The Internet represents an insecure channel for exchanging information leading to a high risk of intrusion or fraud, such as phishing


  1. Explain different kinds of online threats.

    Ans: There are a lot of threats when it comes to online threats.

Some of the threats that one can witness online have been discussed briefly as follows

1. The main threat can be of online frauds. The era of online payment gateways has arrived and due to this a lot of payment frauds have also entered the scene.

2. Data security is another inline threat under which your personal data is under the threat of usage by third parties.

3. Many viruses and bugs have popped up with the rise in technology which again pose as a big problem when it comes to online threats.


  1. Explain the need to clear data stored in browsers.

Ans: Web browsers have built-in password management designed to store passwords used in forms on websites. Browsers often prompt to save usernames and passwords when users attempt to logon to websites. This facility is offered to users, so that they can logon to their frequently used websites without having to type the usernames or passwords. However it is not advisable to leave the web browser store this data particularly on public or shared computers. So need to clear personal data from a web browser such as Mozilla Firefox, launch the browser.

  1. Explain any five tips to manage strong passwords.

    Ans: Following is a general guideline for managing strong passwords.

Keep the length of the password at least 12-14 characters if permitted.

Avoid keeping passwords based on repetition, dictionary words, letter or number sequences, usernames, relative or pet names, etc.

Including numbers, and symbols in passwords if allowed.

Use capital and lower-case letters.

Avoid using the same password for multiple sites or purposes.

Avoid using something that the public or workmates know you strongly like or dislike.

Use random password generators if possible. Example of a strong password: u1vX:,4Hd{]$

  1. Explain any four best practices to secure data .

    Ans: best practices to secure data :

1) Keep strong passwords

2) Do not share personal information

3) Use antivirus and antispyware

4) Install firewalls

5) Never install software from unknown sources


  1. Explain use of Antivirus and Anti Spyware

    Ans:

Antivirus

Anti Spyware

1) Antivirus software is a software which is designed to detect, block and then remove a virus from our computer system.

2) Virus is a program which is loaded onto our computer without our knowledge and runs against your wishes and creates trouble to our system where this antivirus software blocks this.

3) Antivirus is a broad term, this software acts as a security for all including this spyware also.

4) At the very basic level, antivirus will scan the hard drive for existence of malicious programs on it and will trigger which happens on demand or in intervals.

5) Antivirus software uses various types of techniques for detection of any viruses which includes signature-based scanning, behavioral scanning and heuristics.

6) Some antivirus software vendors includes McAfee, AVG, Trend Micro etc.

1) Anti Spyware is a software which aims to detect specific set of malicious applications known as Spywares.


2) Spyware is software that continuously gathers user information and important data through the user’s Internet connection without his or her knowledge where this anti-spyware blocks this.

3) Now a days this anti spyware program is coming under the antivirus softwares.

4) At the very basic level, it checks for spyware. It also have features to scan other resources like registry, start-up folder etc to determine whether Spyware is already installed.

5) Anti-spyware software basically uses behavioral scanning technique/method to detect and remove spywares.


6) Some anti-spyware software vendors includes Microsoft, Webroot, McAfee etc.

SESSION 9 : MAINTAIN WORKPLACE SAFETY


  1. Enlist any three basic safety rules to follow at workplace.

    Ans:Basic safety rules to follow at workplace – Fire safety, Falls and slips, Electrical safety, Use of first aid. Timely repairs should be carried out by a competent person/ organization at workplace / home to avoid/minimize any hazards.

  1. Give any two basic safety rules for ensuring Falls and Slips safety.

    Ans:Falls and Slips Safety rules

- Keep the moving area clean and clutter free.

- Workplace must be proper ventilated receive light.

- Wear non slippery footwear.

- Floors must be clean and dry

- Oil spills, dust must be immediately cleaned.

  1. Give any two electrical safety rules in any organization.

    Ans: Following are some of the measures we should take to keep ourselves safe from electricity hazards and accidents:-

- Electrical equipment used should be approved by a recognised organization.

- Workers should be trained to handle the electric equipment safely

- Damaged and hazardous electrical equipment should be immediately replaced. All old and workout and frayed switches and wires should be changed.

- Heat emanating equipment should be kept away from the electrical equipment.

- Take care that the outlets/ circuits should not be overloaded .

- Switch off and unplug the electrical appliances before cleaning or relocating them.

  1. Explain any two first aid rules.

    Ans: Some rules of First Aid are :

- Assure the injured to remain calm and not to panic

- Keep them warm if they are under shock - Do not move the victim in case of back/neck injury

  1. What do you mean by occupational hazards?

    Ans: A worker may face Occupational hazards at workplace. : An occupational hazard is the illness one may acquire due to his occupation. Like people working in a chemical factory may get affected due to presence of certain chemicals. Some types of occupational hazards are : Physical hazards, chemical hazards, biological hazards, , behavioural hazards, radiological hazards, ergonomic hazards etc.

  1. List any three types of occupational hazards.

Ans: Some types of occupational hazards are : Physical hazards, chemical hazards, biological hazards, , behavioural hazards, radiological hazards, ergonomic hazards etc.


SESSION 10 : PREVENT ACCIDENTS AND EMERGENCIES


  1. Explain the terms accident and emergency.

    Ans: Accident: an accident is an unplanned event that may happen all of a sudden and may lead to unwanted or unprecedented results/outcomes. Or It can be defined as an unfortunate incident that occurs unintentionally causing hazardous result or injury or unwanted results.

Emergency Any unexpected situation that needs immediate attention and action. An emergency situation might pose a sudden risk to life, property health etc. and needs intervention to prevent deteriorating results/ hazards. An emergency situation is one that: ● threatens the employees, customers or the public ● disrupts or shuts down the operations ● causes physical or environmental damage

  1. Enlist any four types of accidents.

    Ans: Types of Accidents: Accidents may be of following types :

- Accidents at workplace : Slips and fall accidents, fire

- Industrial disease/illness - Road traffic accidents

- Clinical Accidents

- Sports related accidents

  1. Give any three situations of emergency that require evacuation.

    Ans: Some of the types of emergencies that require evacuation are:

Fire

Explosion

Floods

Earthquake

Hurricane

Tornado

Toxic material release

Civil disturbance

Workplace violence

  1. Give any two ways to handle accidents.

    Ans: Accidents must be handled carefully. The accident should be handled compassionately without assigning blame on others.

- Every organization must follow SOP for accident handling

- Safety measures must be placed to prevent workplace accidents

- Immediately call the medical team for any injury

- Stay alert

-Pay attention to and follow emergency drills


SESSION 11: PROTECT HEALTH AND SAFETY AT WORK

ASSESSMENT

1. An organization can face some health hazards that could put the lives of the employees in danger.

2. Hazards can be of different types depending on the industry and the environment in which the employees work.

3. Organization must have a designated assembly point for emergencies

  1. List any three types of hazards.

Ans: The different types of hazards include:

Physical

Chemical

Biological

Mechanical



5. Give a checklist for workstations to minimize the hazards.

Ans: Checklist for Workstations :

The workstation should:

provide sufficient space for the user to alter position comfortably

provide adequate lighting

have windows fitted with adjustable coverings to alter the sunlight level

be spacious enough when a workstation is shared by more than one person

The display screen should:

display well-defined characters of adequate size and spacing

have a stable image

have easily adjustable brightness and contrast

tilt and swivel easily to suit the user

be free from glare and reflections

Use a separate base for the screen or an adjustable table

The keyboard should:

be able to tilt easily and should be able to separate from the screen to allow the user to adopt a comfortable working position

have space in front to provide support for the hands or arms of the user 210

have a matt surface

have clearly legible symbols on the keys

The work surface should:

provide adequate space for the user

have a low reflective surface

be of an adequate size to allow the screen, keyboard and other peripherals to be flexibly arranged

have a stable and adjustable document holder, which should be at the same level as the screen and at the same viewing distance


  1. Explain the term ‘ Evacuation Policy’

Ans: An evacuation policy : Every organization must have an evacuation policy. All the Team Leaders are responsible for informing about the policy to their employees about it. Proper attention must be paid when the Team Leader is informing you about these details. Negligence at this time may cost lives.



  1. Explain Buddy System to implement evacuation efficiently in case of emergency

    Ans: A ‘buddy system’ for individuals with special needs or disabilities must be designated. This system ensures that differently-abled are assisted and guided out of the premises or the impacted area properly. If you are a buddy to someone, ensure that your buddy is safe at the assembly point with you.

  1. Explain the terms Floor Plans and Assembly /areas.

Ans: Floor plans with evacuation routes in work areas. Ensure that you understand these so you can use it in time of need.

Assembly areas, where you are required to assemble after evacuation, must be properly taken care of.



  1. Describe the importance of periodic evacuation drills.

    Ans: Periodic evacuation drills should be conducted. Ensure that you pay attention during these drills. You need to save your life and you can be helpful in saving someone else’s life too.

  1. Explain importance of a healthy lifestyle.

Ans: A healthy body has a healthy mind’ - a very popular saying is true . ‘Healthy Lifestyle leads to a healthy being. A healthy living has a lasting impact on an individual which ultimately yields a healthy environment at home as well as at work place. a happy and healthy worker will always perform best to his ability.



  1. Give any four points of a healthy lifestyle

    Ans: A healthy lifestyle helps to keep and improve people’s health and well being. A healthy lifestyle includes :

- healthy eating habits

- physical activities

- stress management

- healthy mind

- sound sleep

- goal setting

A healthy lifestyle takes needs practice, commitment and sincere efforts . Stay Healthy! Stay Happy!


4 comments:

L-1 Indian Heroes in IT/ 8th computer

  Class 8 th Subject : Computer Science L-1 Indian Heroes in IT Make a list of Indian Heroes in IT with their achievement S....