Web Applications Basics-1

Download as pdf or txt
Download as pdf or txt
You are on page 1of 32

Web

Applications
( Basics
)¢•
SESSION 1: WORKING WITH
ACCESSIBILITY OPTIONS

Computer Accessibility refers to the user friendliness of a


computer system for all, regardless of their disability. it
enables a person with a disability or impairment to use a
computer. It is known as Assistive Technology. There are
numerous types of impairment that impact computer usage.
These include:

1. Cognitive impairments and learning disabilities


2. Attention Deficit Hyperactivity Disorder (ADHD) or
autism.

3. Visual impairment.

4. Hearing impairment

5. Motor impairment

Launching Accessibility Options :

To launch accessibility options in Windows XP, Click Start >


Control Panel > Accessibility Options.

Various tabs in Accessibility Option Window :

Keyboard Tab to configure accessibility options for


Keyboard is displayed

1) Sticky Keys : Sticky Keys is an accessibility feature to


help computer users with physical disabilities, but it is also
used by others as a means to reduce repetitive strain.

2) Filter Keys : Filter Keys is a feature of Microsoft


Windows. It is an accessibility function that tells the
keyboard to ignore brief or repeated keystrokes, making
typing easier for people with hand tremors.

3) ToggleKeys : ToggleKeys is an accessibility function which


is designed for people who have vision impairment or
cognitive disabilities. When ToggleKeys is turned on,
computer emits sound cues when the locking keys (Caps
Lock, Num Lock, or Scroll Lock) are pressed.

Sound Tab to configure accessibility options for sound is


displayed.

1) SoundSentry : Sound Sentry is designed to help users with


auditory impairments. SoundSentry generates visual
warnings, such as a blinking title bar or a flashing border,
whenever the computer generates a sound.

2) Show Sounds : Show Sounds instructs applications that


convey information by sound, to also provide information
visually, through text captions or informative icons.

Display Tab to configure accessibility options for Display is


displayed.
1) High Contrast : High Contrast is an accessibility feature to
assist people with vision impairment. You can change the
size and color of fonts and the background for ease of
viewing.

2) Cursor Options : Cursor Options is also an accessibility


feature that assists people with vision impairment by
changing the blink rate and width of the cursor.

Mouse Tab to configure accessibility options for Mouse is


displayed.

1) Mouse Keys : Mouse Keys is an accessibility feature that


assists people who have difficulty using a mouse. This option
uses the keyboard (especially numeric keypad) as a pointing
device instead of a mouse.

General Tab : enables you to configure accessibility options


for all users.

1) SerialKeys : Serial Keys is an accessibility feature that


assists people that have difficulty using a keyboard or a
mouse (or both). They can use special devices such as Sip,
Puff and Breath Switches to provide input to the computer
through Serial Ports.
SESSION 2 : NETWORKING
FUNDAMENTALS

A computer network is a collection of computers and other


hardware components interconnected by communication
channels (cables or satellites) that allow sharing of resources
and information.

Networks are designed using the following architecture:

1) Peer-to-Peer
(P2P) Architecture : Networks in which all
computers have an equal status are called peer to peer
networks. Generally in such a network each terminal has an
equally competent CPU.

2) Client-Server Architecture : Networks in which certain


computers have special dedicated tasks, providing services
to other computers (in the network) are called client server
networks. The computer(s) which provide services are called
servers and the ones that use these services are called clients.

TYPES OF NETWORKS :

1) Local
Area Network : A local area network (LAN) is one
which connects computers and devices in a limited
geographical area such as home, school, computer
laboratory, office building.

2) Metropolitan Area Network : A Metropolitan Area


Network (MAN) is one which connects computers and
devices in a single city or a town.

3) Wide Area Network : A wide area network (WAN) is one


which covers a broad area (i.e., any network that links
across metropolitan, regional, or national boundaries).

Advantages of Networking :

1) Data Sharing : Networking allow the sharing of data .

2) Files Transfer : One User can send text files, spread sheets
etc. to other users.

3) Hardware Sharing: Hardware components such as


printers, scanners, etc. can also be shared.

4) InternetAccess Sharing: You can purchase a single


Internet connection and share it among other computers in a
network
Internet :

The Internet is a global system of interconnected computer


networks that use the standard Internet protocol suite to
serve billions of users worldwide. It is a network of
networks.

Uses of Internet : There are various uses of Internet. Some


of them are listed below

1. Internetis used by students, educational institutes to


gather information for research.

2. It is used for online shopping.

3. It is used for sending and receiving mail.

4. It is used for playing games.

5. It is used for Online Transaction.


World Wide Web : World Wide Web (abbreviated as WWW
or W3, commonly known as the Web), is a
system of interlinked hypertext documents accessed via the
Internet.
Web Browser : A Web Browser is a software used to view
Web sites and acts as an interface between the user and the
World Wide Web.

Web Server : Web server is a computer that stores web sites


and their related files for viewing on the Internet.

Internet Service Provider : An Internet service provider


(ISP) is an organization which provides you with access to
the Internet via a dial-up (using modem) or direct (hard
wired) or wireless connection. for example Bharat Sanchar
Nigam Limited (BSNL), Airtel, MTS, Vodafone, Tata
Docomo, etc.

Modem : It stands for MOdulator/DEModulator. It is a


device that converts digital computer signals into a form
analog signals and vice versa.

Types Of Common Internet Connectivity : There are


different types of Internet Connectivity available today; it
can be widely categorized into wired and wireless access.

Technology Type of Connectivity


Dial-up Wired
DSL Wired
Cable Internet Access Wired
3G Wireless
WiMAX Wireless
Wi-Fi Wireless

Some of the commonly used Internet connectivity are:

1) Dial-up connections are extremely slow and in most cases,


it is replaced by a high speed connection such as DSL or
Cable Modem.

2) DSL: Digital subscriber line(DSL) provide Internet access


by transmitting digital data over wires of a local telephone
network.

3) Cable Internet Access: Cable Internet Access is a form of


broadband Internet access that uses the cable television
infrastructure.

4) 3G:3G, short for 3rd Generation is a set of standards used


for mobile devices.

5) WiMAX: WiMAX (Worldwide Interoperability for


Microwave Access) is a wireless communications standard
designed to provide mobile broadband connectivity across
cities.

6) WI-Fi : Wi-Fi (Wireless Fidelity) is a popular technology


that allows an electronic device such as computers or mobile
phones to exchange data wirelessly over a network.

SESSION 3: INTRODUCTION TO
INSTANT MESSAGING

Instant messaging (IM) is a form of communication over the


Internet that offers an instantaneous transmission of text-
based messages from sender to receiver.

Types of Instant Messaging Software : There are two kinds


of instant messaging software – application based and Web
based.

A) Applicationbased : Application based instant messaging


software is downloaded and installed on user’s computer.
Some of the popular instant messaging software are:

1. Google Talk

2. Yahoo! Messenger

3. Skype

4. Windows Live Messenger

5. Rediff Bol, etc.

B) Web based : Web based instant messaging software is


accessed using browsers such as Internet Explorer, Mozilla
Firefox, Google Chrome, etc. Some of the popular web based
instant messaging software are:

1. Meebo

2. Yahoo! Messenger for the Web

3. MSN Web Messenger

4. IMO, etc.

Key Features of an instant messaging are as follows:

1. TextMessages can be sent to one or more person


(Similar to SMS)

2. Audio calling and conferencing.

3. Video calling and conferencing.

4. File
transfers (Not limited to documents, spread sheets,
audio files, video files, etc.)

5. Message history (Save messages for future reference).

NOTE : To use instant messaging software, a user must have


a valid instant messaging account.
SESSION 4: CHATTING WITH A
CONTACT – GOOGLE TALK

Google Talk : Google Talk is an instant messaging service


that provides both text and voice communication developed
by Google Inc. Google Talk can also be used for making
video calls. Google Talk is free and is available as application
based as well as web based. A Gmail account is required to
use Google Talk.

Steps to Chat with a contact that is already added to


your contact list.

a) Whenever your friend in the contact list is online you can


see the person along with a green dot.

b) Youcan start sending text chat message instantly by


double-clicking on a contact the other person will see the
text message and respond to your message.

General rules and etiquettes to be followed while


chatting :
1) Messages should be short and to the point.

2) Always introduce yourself by name if your screen name


doesn’t reflect it.

3) Always ask if the other person has time to chat first.

4) Don’t
Type your messages in uppercase as it seems to be
extremely rude.

5) Give people time to respond.

SESSION 5: CREATING AND


PUBLISHING WEB PAGES –
BLOG

Blog : A blog is a discussion style site used by non-technical


(or technical users) users for creating personal web pages.
Blogs are similar to an online personal diary and simple to
use.
Some of the popular websites that offer blog service for free
are:

• www.WordPress.com

• www.blogger.com

• www.blog.com

• www.weebly.com

• www.blogsome.com

WordPress : WordPress is free web service that you can use


to create a beautiful website or blog. WordPress has support
for “themes” which can make the blog or the webpage look
attractive.

How to create account in WordPress?

1) Open the Web Browser and type


https://signup.WordPress.com/signup/.
2) Entera unique address to your WordPress Blog. This is
the address which others will use to view your blog.

3) Enter username and password to manage your blog.

4) Enter your Email Address and click on create blog.

5) An email will be sent (above mentioned email) for


activating your blog account. Open your email and click on
the activation link.

6) Now the blog is ready for use.

How to create post in WordPress?

1) Login to your WordPress Account.

2) To create a post, click New Post.

3) Type the title for your post.


5) Typethe content which you want others to read. You can
also add photos, videos, etc. to the blog using the options
available in WordPress

6) Once you have finished typing the content, Click Publish


Post to publish your content. This process is called posting
content.

SESSION 6: USING OFFLINE


BLOG EDITORS

Offline Blog Editors :

Those Editors in which we can create blog when we do not


have an active internet connection and publish the blog
whenever internet connectivity is available are called Offline
Blog Editors.
There are several free offline blog editors available such as :

1. Qumana

2. Windows Live Writer

3. Blogdesk

4. BlogJet

5. MarsEdit

SESSION 7: ONLINE
TRANSACTIONS

Online transactions : Online transactions deals with transfer


of money over the internet. There are many benefits of
online transactions like, fast transaction speed, convenience,
low risk of theft etc.

Some of the popular online transaction websites are:

1) IRCTC(Indian Railway Catering and Tourism


Corporation), an online portal for booking flight and train
tickets.

2) Flipkart,an online shopping portal for buying consumer


products. Flipkart offers multiple payment methods like
credit card, debit card, net banking, e-gift voucher, and
Cash on Delivery.

3) EBay, an online portal for buying and selling goods.

4) Redbus, an online portal for booking bus tickets.

Online shopping : Online shopping is a form of electronic


commerce where customers can buy or sell goods over the
Internet.

Online shopping could be useful in situations when:

1) A customer does not have sufficient time to visit stores.

2) Visiting
a store is more expensive than purchasing a
product online.

3) A product or service that is not available in the local


market is available online.

SESSION 8: INTERNET
SECURITY

Internet security : Internet security is a branch of computer


security specifically related to the Internet. Its objective is to
establish rules and measures to use against attacks over the
Internet.

Best Practices for Security :

1) Use
strong password and keep on changing after every 2 -3
weeks.

2) Use
encryption software to protect your data from
unauthorized users.

3) Never
save your username or password on shared
computers.

4) Do not share personal information.


5) Use updated antivirus and antispyware software.

6) Clear browser cookies frequently.

7) Keep the operating system and software applications up to


date.

8) Install
Firewall : Firewalls analyse the network traffic and
determine if the traffic should be allowed or not.

9) Never install software from unknown sources.

10) Removeunwanted or unknown software applications:


These might have got installed without your knowledge
when you have visited some websites.

11) ClearData Stored In Browsers : It is not advisable to


leave the web browser store data(username, password,
credit card detail) particularly on public or shared
computers.

General guidelines for managing strong passwords


are :
1. Keep the length of the password at least 12-14 characters
if permitted.

2. Avoidkeeping passwords based on repetition, dictionary


words, letter or number sequences, usernames, relative
or pet names, etc.

3. Including numbers, and symbols in passwords if allowed.

4. Use capital and lower-case letters.

5. Avoid
using the same password for multiple sites or
purposes.

6. Avoid
using something that the public or workmates
know you strongly like or dislike.

NOTE :

1. www.strongpasswordgenerator.com help to generate


strong password.

2. Example of Online threats are Phishing, email spoofing,


chat spoofing, etc.

3. Combination of alphanumeric and special characters


could be used for creating a password that is not so easy
to crack.

4. Programs such as keyloggers track and transmit every


key that is pressed on a keyboard (keystrokes) to
unauthorized users

SESSION 9 : MAINTAIN
WORKPLACE SAFETY

Every organization must follow a standard set of safety rules


and procedures. These rules must be stated and displayed
clearly at important areas . All the employees must be given
a demonstrations and training to follow safety rules.
BASIC SAFETY RULES ARE
GIVEN BELOW

A) Basic Fire safety rules in an organization are :

1) Fire escape plans must be installed at proper levels

2) Conduct regular drills

3) Smoke alarms must be placed at proper intervals

4) Keep workplace a no-smoking zone

5) Maintenance of safety equipment must be taken care of


regularly

B) Falls and Slips Safety rules

1) Keep the moving area clean and clutter free.


2) Workplace must be proper ventilated receive light.

3) Wear non slippery footwear.

4) Floors must be clean and dry

5) Oil spills, dust must be immediately cleaned.

C) Electrical Safety Rules:

1) Electrical
equipment used should be approved by a
recognised organization.

2) Workersshould be trained to handle the electric


equipment safely.

3) Damaged and hazardous electrical equipment should be


immediately replaced.
4) Heat emanating equipment should be kept away from the
electrical equipment.

What is First Aid?


t
First Aid is the immediate assistance provided to the injured
to save life and minimize health loss till the proper medical
aid/ facility is provided.

Some rules of First Aid are :


1. Assure the injured to remain calm and not to panic.

2. Keep them warm if they are under shock

3. Do not move the victim in case of back/neck injury

Occupational hazard : An occupational hazard is the illness


one may acquire due to his occupation. Some types of
occupational hazards are : Physical hazards, chemical
hazards, biological hazards, , behavioural hazards,
radiological hazards, ergonomic hazards etc.
SESSION 10 : PREVENT
ACCIDENTS AND
EMERGENCIES

Accident : an accident is an unplanned event that may


happen all of a sudden and may lead to unwanted or
unprecedented results/outcomes.

Types of Accidents: Accidents may be of following types :

1. Accidents at workplace : Slips and fall accidents, fire

2. Industrial disease/illness

3. Road traffic accidents

4. Clinical Accidents

5. Sports related accidents

Handling Accidents:

Accidents must be handled carefully. The accident should be


handled compassionately without assigning blame on others.
1. Everyorganization must follow SOP for accident
handling

2. Safetymeasures must be placed to prevent workplace


accidents

3. Immediately call the medical team for any injury

4. Stay alert

5. Pay attention to and follow emergency drills

Emergency : Any unexpected situation that needs immediate


attention and action is called emergency.

An emergency situation is one that:

1. threatens the employees, customers or the public

2. disrupts or shuts down the operations

3. causes physical or environmental damage


Types of Emergency :

Various types of emergencies are there and there should be


an emergency management plan to handle the situation of
emergency. Some of the types of emergencies are as follows :

1. Chemical spills

2. Extreme heat waves

3. Droughts
4. Pandemics

5. Terrorist attack

6. Fire

7. Floods

8. Thunderstorms

9. Leakage of some hazardous gas/ chemical

Some of the types of emergencies that require evacuation


are:
1. Fire

2. Explosion

3. Floods

4. Earthquake

5. Hurricane

6. Tornado

7. Toxic material release

8. Civil disturbance

9. Workplace violence

SESSION 11: PROTECT HEALTH


AND SAFETY AT WORK

Hazards And Sources Of Hazards :

A hazard is anything that is the source of any potential


harm, damage or any kind of potential loss of health or life.
The different types of hazards include:

1. Physical

2. Chemical

3. Biological

4. Mechanical

Evacuation : Evacuation is the process of emptying a place


in case of an emergency, disaster. Every company must
ensure following points for evacuation in case of any
emergency:

1. Anevacuation policy.
2. Organization must have a designated assembly point for
emergencies.

3. Floor plans with evacuation routes pasted in work areas

4. Periodic evacuation drills should be conducted

Healthy Living :
A healthy living has a lasting impact on an individual which
ultimately yields a healthy environment at home as well as at
work place.

A healthy lifestyle helps to keep and improve people’s health


and well being.

A healthy lifestyle includes :

1. healthy eating habits

2. physical activities
3. stress management

4. healthy mind

5. sound sleep
6. goal setting

You might also like