Web Applications
Web Applications
Web Applications
Includes school qb answers+ textbook JUST GO THRU THE 2ND AND 5th page cuz theyre mcq q’s
QNA
(blue text -definitions) (star marked, imp. Ones ⭐
)(red text- mcq,
to rote 👎🏿
violet- both mcq and def.) (thumbs down means read once nicely, no need
) (nothing means more imp than thumbs down, less than star)
3) What are accessibility options? List the different tabs one can find on the
accessibility options window.
Accessibility Options in the Control Panel are used to customise the way your keyboard,
display, or mouse function. These features are useful for people with disabilities.
The tabs found on the accessibility options window are:
- Keyboard tab.
- Sound tab.
- Display tab.
- Mouse tab.
- General tab.
👎🏿👎🏿
4) List and explain ALL the features of each and every tab in the accessibility
options window. (Except in mcq v. imp)
Keyboard tab:
- Sticky keys: It is a feature to help people with physical disabilities, but is also used
by users to reduce repetitive strain. It allows the user to press and release keys like
ctrl, alt, shift, and let it remain active until other keys are pressed.
- Filter keys: It tells the keyboard to ignore brief or repeated keystrokes, making
typing easy for people with hand tremors.
- Toggle keys: It is designed for people who have vision impairment or cognitive
disabilities. It makes the computer emit a sound when the locking keys (Caps Lock,
Num Lock, or Scroll Lock) are pressed. (High sound: turn on, low sound: turn off)
Sound tab:
- SoundSentry: SoundSentry is designed to help users with auditory impairments.
SoundSentry generates visual warnings, such as a blinking title bar or a flashing
border, whenever the computer generates a sound.
- ShowSounds: ShowSounds instructs applications that convey information by
sound, to also provide information visually, through text captions or informative
icons.
Display Tab: (both the features are for people with vision impairments)
- High contrast:allows changing the size & color of fonts & the background for ease
- Cursor options: allows the change of the width and blink rate of the cursor
Mouse Tab:
- MouseKeys:MouseKeys is an accessibility feature that assists people who have
difficulty using a mouse. This option uses the keyboard (especially a numeric
keypad (with the number 4 for left, 6 for right, 2 for down and 8 for up.) as a
pointing device instead of a mouse.
General tab: (enables accessibility for all users) has the following options : turn off
accessibility features after idle for ___, make a sound when turning a feature on/off, give
warning message when turning a feature on
- Serial keys: assists people that have difficulty using a keyboard or a mouse (or
both). They can use special devices to provide input to the computer through
Serial Ports. For example, sipping on the tube activates one device, while puffing
on the same tube activates another.
5) What is a network? Explain the types of network architecture ⭐⭐
A computer network is a collection of computers and other hardware components
interconnected by communication channels (cables or satellites) that allow sharing of
resources and information.
Network Architecture are as follows :
- Peer-to-peer (P2P) Architecture: Networks in which all computers have an equal
status are called peer to peer networks. Generally in such a network each terminal
has an equally competent CPU.
- Client-Server Architecture: Networks in which certain computers have special
dedicated tasks, providing services to other computers (in the network) are called
client server networks. The computer(s) which provide services are called servers
and the ones that use these services are called clients.
6) What are the types of network/ differentiate between LAN and WAN. ⭐⭐
- i) Local Area Network (LAN) : LAN is one which connects computers and devices
in a limited geographical area such as home, school, computer laboratory, office
building, or closely positioned group of buildings.
ii) Usually LANs offer very high speeds and connects computers and peripherals
like printers, scanners etc.
- i) Wide Area Network (WAN): WAN is one which covers a broad area (i.e., any
network that links across metropolitan, regional, or national boundaries).
ii) The Internet is the most popular WAN, and is used by businesses, governments,
non-profit organizations, individual consumers, artists, entertainers, and many
others.
WIRED CONNECTIONS:
Dial Up: It is a form of internet access which uses the help of a public switched telephone
network (PTSN) to connect to an ISP via telephone lines using a modem. The users have
to dial a particular number on the telephone given by ISP to access the internet. These
are very slow and usually are replaced by high speed connections like DSL.
DSL: Digital Subscriber Line (DSL) provides internet access by transmitting data over
wires of a local telephone network. It is delivered along with telephone service on the
same line, allowing both telephone and data transmission to happen together, as there is
a DSL filter with the customer, which removes high frequency interference. For this, you
need a DSL modem and subscription
Cable internet access: Cable Internet Access is a form of broadband Internet access that
uses the cable television infrastructure. Cable Internet Access is provided through
existing cable TV networks; this is similar to DSL that is provided over existing telephone
lines.
WIRELESS CONNECTIONS:
3G: It is a set of standards used for mobile devices and mobile telecommunication
services and networks. High-Speed Downlink Packet Access (HSDPA) is 3G mobile
telephony communications protocol that allows higher data transfer speeds and capacity.
If support for 3G is available on your mobile phone, you can subscribe to the 3G
connectivity with your ISP in order to get high speed Internet connection on your phone.
WiMAX: WiMAX (Worldwide Interoperability for Microwave Access) is a wireless
communications standard designed to provide mobile broadband connectivity across
cities and countries through a variety of devices. WiMAX is a long range system,
covering many kilometres and is typically used where DSL or Cable Internet Access
cannot be used, like rural areas
WI-Fi: IT that allows an electronic device such as computers or mobile phones to
exchange data wirelessly over a network, including high-speed Internet connections.
WiFi devices such as PC’S, phones etc. can connect to a network resource such as the
Internet through a device called the Wireless Access Point (WAP). Wi-Fi is used where
cables cannot be run (such as old buildings, outdoor areas) to provide network and
Internet access. Wi-Fi can also be used where users require mobile connectivity. Wifi
⭐⭐
connectivity is used in homes, offices, hotels etc. and is provided for free by cafes, etc.
12)What is a modem?
Á modem is a device that converts digital computer signals into a form (analog signals)
that can travel over phone lines. It also re-converts the analog signals back into digital
signals. The word modem is derived from its function MOdulator/DEModulator.
⭐
19) What is a blog? How can one use it? Give examples of some websites that offer
blog services for free
- A blog is a discussion style site used by non-technical (or technical) users for
creating personal web pages. Blogs are like online diaries and are simple to use.
- You can use a blog to convey messages about events, news, reviews, etc.
- Blogs are usually managed via a web browser and need active internet connection.
- Some websites offering blog services for free are:
www.WordPress.com, www.blogger.com, www.blog.com, www.weebly.com
⭐
22)What are online transactions? How is the safety of a person guaranteed in such
transactions? Why did it get famous?
- Online transactions are transactions or money transfers that are done over the
internet. They have made transactions very convenient and simplified the
workflow in many forms
- Many protocols and security measures have been adopted to ensure the safe and
secure OLTP ( Online Transaction process ). We are already using online
transactions when we withdraw money from an ATM machine or use credit cards
- Numerous benefits of online transactions like, fast transaction speed, convenience,
low risk of theft etc has exponentially increased its use among people.
👎🏿
• Redbus, an online portal for booking bus tickets.
25)What is flipkart?
Flipkart is an online store where you can purchase a variety of electronic goods, books,
accessories etc. Flipkart offers multiple payment methods like credit card, debit card, net
banking, e-gift voucher, and Cash on Delivery. It has a variety of products organized as
categories. You can either look for a product in the appropriate category or you can use
the search feature to locate a particular item.
27)What are the best practices for internet security? (unlikely to come) 👎🏿👎🏿
- We should use strong passwords. (i) A strong password is a combination of
alphanumeric and special characters, and could be used for creating a password
that is not so easy to crack or guessed by other users. (ii) We should not keep
guessable passwords such as mobile no. etc. (iii) We should also change
passwords frequently and (iv) use different passwords for different sites
- Secondly, we should use encryption softwares to protect our data from
unauthorized users. If encryption software is not available within the operating
system, we should use a 3rd party software.
- Thirdly, websites on the internet can store our information. This can lead to the
leaking of our personal information. If we are using online shopping, websites
even store our account details, and credit card numbers, which can be tracked and
used by unauthorized users known as hackers. We should thus use secure and
legitimate sites for online transactions, as well as giving out personal information.
Secure sites are marked with a golden lock symbol in the address bar
- We should use antivirus and antispyware software as computers are prone to
attacks from software known as Malware that track browsing behavior or send
data from computers (eg: keylogger, sends info of each pressed key to hackers).
Antivirus and Antispyware programs also offer real-time protection monitoring the
computer for changes by malware, and keeping the softwares updated can protect
the computer from even the latest threats
( the above answer is so big that from its answer, questions can be made) (that's
⭐⭐
why above ans is unlikely) (instead a question like this can come ⬇)
28)List best practices for security
i.Use strong passwords
ii. Backup your data
iii. Use encryption software
iv. Do not share personal information
v. Use antivirus and antispyware software
vi. Clear browser cookies frequently
vii. Install firewalls
⭐
⭐
31)Nobody should immediately respond to emails from unknown users. Why?
Nobody should immediately respond to emails from unknown users because it may be a
fake mail trying to gather personal information such as your bank account details, home
address, etc. Some mails could promise you jobs or announce lottery results which in turn
could compromise the user. And in some cases, virus or scripts that are dangerous could
be attached to the mail.
32)What are cookies? Why is it necessary to clear browser cookies? ⭐⭐
- Cookies are programs that are created on your local computer when you visit
websites. Though cookies are meant for storing data based on your activity
performed during your earlier visit such as login details, details of a shopping
cart, visited pages in a website, etc.
- They could also be tracked by unauthorised users and possibly gain access to your
personal information.
⭐⭐
37)What are the falls and slips safety rules?
The rules for falls and slips safety rules are –
a. Keep the moving are clean and dry
b. Workplace must be proper ventilated
c. Wear non slippery footwear
d. Oil spills, dust must be cleaned immediately.
⭐
38)What are the electrical safety rules? (came in exam)
- Though use of electric equipment has helped in all our routine tasks whether it is
at home or office but if precautions and safety measures are not taken daily then
they might be a cause of threat to our lives.
- The electrical safety rules are
a. Electrical equipment used should be approved by a recognised organisation.
b.Workers should be trained to handle the electric equipment safely.
c.Damaged and hazardous electrical equipment should be immediately replaced.
All old and workout and frayed switches and wires should be changed.
d. Heat emanating equipment should be kept away from the electrical equipment.
e. Take care that the outlets/ circuits should not be overloaded .
f. Switch off and unplug the electrical appliances before cleaning or relocating
them.
⭐⭐
● be spacious enough when a workstation is shared by more than one person
48)Give a checklist for display screens to minimise the hazards.(any 4-5)
The display screen should:
● display well-defined characters of adequate size and spacing
● have a stable image
● have easily adjustable brightness and contrast
● tilt and swivel easily to suit the user
● be free from glare and reflections
● Use a separate base for the screen or an adjustable table
⭐⭐
52)What does a healthy lifestyle include. (came in exam)
A healthy lifestyle includes :
- healthy eating habits
- physical activities
- stress management
- healthy mind
- sound sleep
- goal setting