CBSE 10th Information Technology - 402
Book1
Unit 4 - Web Application and
Security
SESSION
1: WORKING WITH ACCESSIBILITY OPTIONS
(1)
Computer Accessibility
refers to the user friendliness of a computer system for all, regardless of
their
disability. This is
mainly a software issue.
(2)
However, when a combination of
hardware and software, it enables a person with a disability or impairment
to use a computer. It is
known as Assistive
Technology.
(3)
There are numerous types of
impairment that impact computer usage. These include:
(i)
Cognitive impairments
and learning
disabilities, such as dyslexia, attention deficit
hyperactivity
disorder (ADHD) or autism.
(ii)
Visual impairment such
as low-vision, complete or partial blindness, and color blindness.
(iii)
Hearing impairment including deafness.
(iv)
Motor or dexterity impairment such as paralysis,
cerebral palsy,
or carpal tunnel syndrome and
repetitive strain injury.
(4)
Accessibility Options
in Control
Panel are used to customize the keyboard, display, or mouse
function.
(5)
Keyboard Tab: Sticky Keys, Filter Keys, Toggle Keys.
(6)
Sound Tab: Sound
Sentry, Show Sounds
(7)
Display Tab: High Contrast, Cursor Options
(8)
Mouse Tab: MouseKeys
(9)
General Tab: Serial Keys
(10)
Sticky Keys is an accessibility feature to help computer users with physical disabilities,
but it is also used by
others as a means to reduce
repetitive strain.
(11)
Sticky Keys allows the user to press and release a modifier key, such as Shift, Ctrl, Alt, or the Windows key,
and have it remain active
until any other key is pressed.
(12)
Filter Keys It is an
accessibility function that tells the keyboard to ignore brief or repeated keystrokes,
making typing easier for
people with hand tremors.
(13)
The Filter Keys icon appears in the system tray.
(14)
Filter Keys the repeated characters are ignored.
(15)
Toggle Keys is an accessibility function which is designed for people who have vision impairment
or
cognitive disabilities.
(16)
Toggle Keys is turned on, computer emits sound cues
when the locking keys
(Caps Lock, Num Lock, or Scroll
Lock) are pressed.
(17)
Toggle Keys : A high sound is emitted
when the keys are switched on
and a low sound is emitted
when
they are switched
off.
(18)
Sound Sentry is designed to help users with auditory impairments.
(19)
Sound Sentry generates visual
warnings, such as a blinking
title bar or a flashing
border, whenever the computer generates a sound.
(20)
Show Sounds instructs
applications that convey information by
sound,
to also provide information visually, through text captions or informative
icons.
(21)
High Contrast is an
accessibility feature to assist people with vision impairment.
(22)
High Contrast : You can change the
size
and color
of
fonts
and the background for ease of viewing.
(23)
Cursor Options is also an accessibility feature that
assists people with vision impairment by changing the blink rate
and width
of
the
cursor.
(24)
Mouse Keys is an
accessibility feature that assists people who have difficulty using a mouse.
(25)
Mouse Keys option uses the keyboard (especially
numeric keypad) as a pointing device instead of a mouse.
(26)
Notice the MouseKey icon in the
System
Tray.
(27)
Use number pad keys for moving mouse pointer
instead of using mouse after enabling “Use MouseKeys”.
(28)
After enabling “Use MouseKeys” Use number key 4 to move
left, 6 to move right, 2 to move down and 8 to
move up.
(29)
General Tab enables you
to configure accessibility options for all users.
(30)
Select the General Tab, a
window to configure additional accessibility
options
will be displayed.
(31)
Select General Tab, accessibility
options displayed. “Turn off accessibility features after
idle for”,
“Give warning message
when turning a feature on” and “Make
a sound when turning a feature on or off”.
(32)
Serial Keys is an accessibility feature that assists
people that have difficulty using a keyboard or a mouse
(or both). Present in General Tab.
(33)
Serial Keys users can use special devices such as Sip,
Puff
and Breath
Switches
to provide input to the computer through Serial Ports.
SESSION 2 : NETWORKING FUNDAMENTALS
(34)
A computer network is a collection of computers and
other hardware components interconnected by communication channels (cables or
satellites) that allow sharing of resources and information.
(35)
Networks are designed using the following
architecture:
(1) PEER-TO-PEER (P2P) ARCHITECTURE
(2) CLIENT-SERVER ARCHITECTURE:
(36)
PEER-TO-PEER (P2P) ARCHITECTURE:
Networks in which all computers have an equal status are called peer to peer
networks. Generally in such a network each terminal has an equally competent
CPU.
(37)
CLIENT-SERVER ARCHITECTURE:
Networks in which certain computers have special dedicated tasks, providing
services to other computers (in the network) are called client server networks.
(38)
The computer(s) which provide services are
called servers and the ones that use these services are called
clients.
(39)
TYPES OF NETWORKS There are two major types of network:
(1) Local Area Network (LAN) and
(2) Wide Area Network (WAN)
(40)
A Local Area Network (LAN) is
one which connects computers and devices in a limited geographical area such as
home, school, computer laboratory, office building, or closely positioned group
of buildings.
(41)
Usually local area networks offer
very high speeds and are used for connecting computers and peripherals such as
printers, scanners, etc.
(42)
A Wide Area Network (WAN) is
one which covers a broad area (i.e., any network that links across
metropolitan, regional, or national boundaries).
(43)
The Internet is the most
popular WAN, and is used by businesses, governments, non-profit
organizations, individual consumers, artists, entertainers, and many others.
(44)
The Internet is a global system
of interconnected computer networks that use the standard Internet protocol
suite to serve billions of users worldwide.
(45)
Internet is a network of
networks that consists of millions of private, public, academic, business, and
government networks.
(46)
Internet is one of the most
useful technologies of modern times which help us in our daily, personal and
professional life.
(47)
Internet is widely used by
students, educational institutes; scientist and professionals to gather
information for research and general information.
(48)
Businesses use the Internet to access
complex databases such as financial database.
(49)
The Internet is the largest encyclopaedia
for all age groups.
(50)
The Internet helps in maintaining
contact with friends and relatives who live across different locations via
Internet chatting systems and email software.
(51)
Internet is also becoming a
major source of entertainment for the general public.
(52)
World Wide Web (abbreviated
as WWW
or W3, commonly known as the Web),
(53)
WWW is a system of
interlinked hypertext documents accessed via the Internet.
(54)
With a web browser, one can view web
pages that may contain text, images, videos, and other multimedia,
and navigate between them
via hyperlinks.
(55)
Information is stored on web servers
referred to as web pages are retrieved by using a web browser such
as
Firefox on the local computer.
(56)
A Web Browser is a software
used to view Web sites and acts as an interface between the user and
the
World Wide Web.
(57)
A Web server is a computer that
stores web sites and their related files for viewing on the Internet.
(58)
Some of the advantages associated with
networking are:
(1) •Data Sharing: One of the most important uses of networking is to allow the
sharing of data.
(2) •Files Transfer: Users can send
text files, spread sheets, documents, presentations, audio files, video files,
etc. to other users.
(3) •Hardware Sharing: Hardware
components such as printers, scanners, etc. can also be shared.
(4) •Internet Access Sharing: You
can purchase a single Internet connection and share it among other computers in
a network instead of purchasing multiple Internet connection for each computer.
This is very commonly found in Internet café (browsing centres), schools,
colleges, companies, etc.
(5) •Usage of network based applications: Such as web browsers, email clients, chat application, audio &
video calling, etc. is another advantage.
(59)
Internet connections are
provided by Internet Service Providers (ISP) such as Bharat
Sanchar Nigam Limited (BSNL), Airtel, MTS, Vodafone, Tata Docomo,
etc
(60)
An Internet
service provider (ISP) is an organization which provides you with
access to the Internet via a dial-up (using modem) or direct (hard wired) or
wireless connection.
(61)
How to choose internet connection?
Choosing connectivity depends on the availability of a particular technology,
speed and connection type in your area.
(62)
Usually small and medium business users, home
users use connectivity types such as DSL, cable modem, dial-up,
broadband wireless, WiMAX or 3G.
(63)
Medium to large business
users or customers with more demanding requirements
may use high speed connectivity such as DSL (High Speed), ISDN,
etc.
(64)
A modem is a device that converts
digital computer signals into a form (analog signals)
that can travel over phone lines.
(65)
A modem also re-converts
the analog
signals back into digital signals.
(66)
The word modem is derived from
its function MOdulator/DEModulator.
(67)
Types of Internet Connectivity
(1) Wired – Dial-up, DSL (Digital subscriber line), Cable Internet
Access
(2) Wireless – 3G, WiMAX, Wi-Fi
(68)
Dial-up Internet access uses
the facilities of the public switched telephone network (PSTN)
to establish a connection to an Internet service provider (ISP) via telephone
lines using a device called MODEM.
(69)
Dial-up: Users dial
a particular number provided by the ISP to gain access to the Internet.
(70)
Dial-up connections are extremely
slow and in most cases,
(71)
Dial-up connections are replaced
by a high speed connection such as DSL or
Cable Modem.
(72)
Digital subscriber line (DSL)
(73)
DSL provide Internet access by transmitting digital data over wires of
a local telephone network.
(74)
DSL service is delivered along with wired telephone service
on the same telephone line.
(75)
DSL filter removes the high
frequency interference, enabling simultaneous use of the telephone and
data
transmission.
(76)
For using a DSL connection,
you need
a DSL modem and a subscription.
(77)
Cable Internet Access is a
form of broadband Internet access that uses cable television
infrastructure.
(78)
Cable Internet Access is provided through existing cable TV networks.
(79)
Cable Internet Access is similar
to DSL
that is provided over existing telephone lines.
(80)
3G, short for 3rd Generation
(81)
3G is a set of standards
used for
mobile devices and mobile telecommunication services and
networks.
(82)
High-Speed Downlink Packet Access (HSDPA)
is 3G
mobile telephony communications protocol
(83)
HSDPA allows
higher data transfer speeds and capacity.
(84)
If support for 3G is available on your mobile
phone, you can subscribe to the 3G connectivity
with your ISP
in order to get high
speed Internet connection on your phone.
(85)
WiMAX (Worldwide Interoperability for
Microwave Access)
(86)
WiMAX is a wireless
communications standard designed to provide mobile broadband connectivity
across
cities and countries
through a variety of devices.
(87)
WiMAX is a long range system,
covering many kilometres.
(88)
WiMAX is
typically used where DSL or Cable Internet Access cannot be used.
(89)
WiMAX used
where difficulty in laying out cables for home or offices located in remote
locations but need access to the Internet.
(90)
Wi-Fi is a popular technology that allows an electronic device such as
computers or mobile phones to
exchange data wirelessly
over a network, including high-speed Internet connections.
(91)
WiFi devices such as personal
computer, smartphones, video game console, etc. can connect to a network
resource such as Internet through a device called the Wireless Access Point (WAP).
(92)
Wi-Fi is used where cables
cannot be run (such as old buildings, outdoor areas) to provide
network and Internet access.
(93)
Wi-Fi can also be used
where users require mobile connectivity.
(94)
Wi-Fi connectivity is used
in home & offices, hotels, college & school campus typically for Internet
Access.
(95)
Shopping malls, coffee shops, resorts offer free
or paid Wi-Fi access to the Internet for their customers.
(96)
DATA TRANSFER ON THE INTERNET:
(1) When data is transferred on the
internet, data is broken up into bits of same sized pieces called Packets.
(2) Each packet is sent from computer to computer until it finds its
destination. Each computer on the way decides where next to send the packet.
All packets may not take the same route.
(3) At the destination, the packets are examined. If any packets are
missing or damaged, a message is sent asking for them to be re-sent. This
continues until all packets have been received intact.
(4) The packets are now reassembled into their original form. All this
done in seconds!
SESSION 3: INTRODUCTION TO INSTANT
MESSAGING
(97)
Instant messaging (IM) is a form
of communication over the Internet that offers an instantaneous
transmission of
text-based messages from sender to receiver.
(98)
Most instant messaging software
include the option for performing file transfers, audio
chat,
video
calling
and conferencing, sharing
desktops, etc. apart from standard text chat.
(99)
Instant messaging software is
widely used for personal and commercial use.
(100)
Unlike email, instant messaging happens in real-time and the response
from participants can be spontaneous.
(101)
Some instant messaging software allows
users to view messages received when they are not
logged on.
These are
called “Offline Messages”.
(102)
For utilizing audio
and video chat or conferencing, you need to have microphones
and headsets
or speakers
and web
cameras
so that users can talk or see each other.
(103)
Key Features of an instant messaging are as
follows:
(1) • Text Messages can be sent to one or more person (Similar to SMS)
(2) • Audio calling and conferencing.
(3) • Video calling and conferencing.
(4) • File transfers (Not limited to documents, spread sheets, audio
files, video files, etc.)
(5) • Message history (Save messages for future reference).
(104)
Instant messaging
accounts differ in formats; some instant
messaging software such as Yahoo! Messenger, Windows Live Messenger
use email addresses for managing the account and software such as Skype
use standard names.
(105)
There are two kinds of instant messaging
software – application based and Web
based.
(106)
Application based
instant messaging software is downloaded
and installed
on user’s computer.
(107)
Some of the popular instant
messaging software are:
• Google Talk • Yahoo! Messenger • Skype •
Windows Live Messenger • Rediff Bol, etc.
(108)
Web based instant
messaging software is accessed using browsers
such as Internet Explorer, Mozilla Firefox, Google Chrome, etc.
(109)
Some of the popular web based
instant messaging software are:
• Meebo • Yahoo! Messenger for the Web • MSN
Web Messenger • IMO, etc.
(110)
There are some general
rules and etiquettes to be followed while chatting. They are almost
the same as those that apply for emails.
(1) Messages should be short and to the point.
(2) Always introduce yourself by name if your screen name doesn’t
reflect it.
(3) Always ask if the other person has time to chat first - regardless
of how important you think what you have to say is, it’s not going to be well
received if the recipient is busy.
(4) In a business environment, know exactly what you want to discuss.
(5) Typing your messages in uppercase is extremely rude - it’s
considered shouting and very aggressive.
(6) Give people time to respond - Multiple questions sent to a recipient
before they’ve had a chance to answer can seem more like an interrogation
rather than a conversation.
(7) Give the person you are communicating with your undivided attention.
It’s not just a sign of respect, but if you have multiple conversations
happening or are allowing other issues to distract you, you may miss an
important point in the other person’s messages or lose the gist of the
conversation.
(8) It’s important to properly end an IM conversation - you may think
the chat is over, but the other person may not. While you’re off doing other
things, they may be sitting there staring at the screen waiting for further
communication from you!!
SESSION 5: CREATING AND PUBLISHING WEB PAGES – BLOG
(111)
A blog is a discussion
style
site
used by non-technical (or technical
users)
users
for creating personal web pages.
(112)
Blogs are similar to an online
personal
diary
and simple to use.
(113)
You can use a blog to convey
messages
about events, announcements, news,
reviews,
etc.
(114)
Blogs are usually managed using a web browser and this requires
active
internet
connection.
(115)
You can also use
offline blog software to create content first and later
publish the content when an active internet connection is available.
(116)
Some of the popular blogs
include:
• www.WordPress.com • www.blogger.com •
www.blog.com • www.weebly.com • www.blogsome.com
SESSION 6: USING OFFLINE BLOG EDITORS
(117)
If you do not have an active internet
connection, you can create blogs using a blog
application and publish the blog whenever internet connectivity is
available.
(118)
There are several free
offline blog editors available that can be downloaded and installed
on the local computer such as: • Qumana • Windows Live Writer • Blogdesk
(119)
Qumana is a free offline blog editor/application that is simple and
easy to use.
SESSION 7: ONLINE TRANSACTIONS
(120)
Online transactions have made transactions very convenient and simplified the workflow
in many forms in a business.
(121)
Online transactions deals with transfer of money over the internet.
(122)
Revolution in the electronic
media has made transaction handling easy.
(123)
Many protocols and security
measures have been adopted to ensure the safe and secure OLTP (Online
Transaction process).
(124)
We are already using online
transactions when we deposit or withdraw money from an ATM
machine, when we make our bill payments using our debit/
credit
cards.
(125)
NEFT/ RTGS are some other examples of online funds transfer.
(126)
Benefits of online
transactions like, fast transaction speed,
convenience,
low
risk
of
theft
etc.
(127)
Online shopping is a form of electronic commerce where customers can buy
or sell goods over the Internet.
(128)
Customers need to have an
active internet connection for viewing goods or services offered by a seller.
(129)
customers can pay
online using a credit, debit card
or by internet banking.
(130)
Online shopping could be
useful in situations when:
(1) • A customer does not have sufficient time to visit stores.
(2) • Visiting a store is more expensive than purchasing a product
online.
(3) • A product or service that is not available in the local market is
available online.
(131)
Some of the popular online
transaction websites are:
(1) • IRCTC, an online portal for booking flight and train tickets.
(2) • Flipkart, an online shopping portal for buying consumer products.
(3) • EBay, an online portal for buying and selling goods.
(4) • Redbus, an online portal for booking bus tickets.
(132)
To perform an online
transaction, all you need is a web
browser
and an active internet connection.
(133)
In some cases where purchasing
is involved, you will need a valid credit card,
debit
card
or online
banking
support
referred to as Net Banking Subscription.
(134)
Some websites even allow COD
(Cash on delivery) where the users can pay once they receive
the
product
or service.
(135)
Indian Railway Catering
and Tourism Corporation (IRCTC) is an online
portal that can be used for booking travel tickets.
SESSION 8: INTERNET SECURITY
(136)
Internet security is a branch of computer
security
specifically related to the Internet, often involving browser security
but also network security.
(137)
Its objective is to establish
rules
and measures
to use against attacks over the Internet.
(138)
The Internet
represents an insecure channel for exchanging
information
leading to a high risk of intrusion or fraud,
such as phishing.
(139)
Though Internet provides
valuable information and entertainment, it may leave your computer unsecure due
to many online threats.
(140)
You need to ensure
that your usernames, passwords, credit
card
or online
banking
information
secure
as they are prone to be tracked and used by unauthorized
users.
(141)
Some websites can also install
Malware on the computer without user consent thereby leaving the computer
damaged or insecure.
(142)
Online threats such as Phishing, email spoofing, chat
spoofing,
etc. can increase the chances of users getting compromised.
(143)
You can reduce the risks
by using best practices such as using Antivirus Software,
Antispyware
Software,
Firewalls,
strong
passwords,
etc. in addition to spreading awareness of the best
practices.
(144)
Best Practices for Security
(1) Use strong passwords, Using
strong passwords can lower the risk of a security breach. a
combination of alphanumeric and special characters could be used for creating a
password that is not so easy to crack or guessed by other users. Do not keep
passwords such as your favorite color, friends or relatives name, bike number,
mobile number either as single or combined option.
(2) Use encryption software:
(Usually available within the operating system) to protect your data from
unauthorized users. If encryption software is not available within the
operating system, use a 3rd party software.
(3) Keeping your username and password private: Never save your username or password on computers that are used in
shared environments such as internet café. Browsers may save your personal data
on the local computer that can be used by another user using the same computer.
(4) Do not share personal information: Websites require you to fill out forms containing fields such as
name, gender, age, email address, school, etc. Be cautious when filling out
such forms; research and verify if it’s a trustable website.
(5) Registering with websites: Read
the privacy statement or policy whenever you register with a website, the
statement or policy will include information about how the website use personal
data.
(6) Secure transactions: If you are
using online shopping or transactions, websites even store your credit card or
online banking personal information such as your credit card number, account
details, etc. This information can be tracked and used by un-authorized users
often known as hackers to misuse this information. Again, ensure the website is
legitimate and uses secure practices for performing and maintaining online
transactions. Since information such as credit card details or personal
information is sent over the network, it is always recommended to use only
secure websites for such transactions. Verify if the website uses secure
transaction; usually it is indicated through a digital certificate represented
as a
golden lock in the web browser’s address bar.
(7) Use antivirus and antispyware software: Computers are prone to attacks from software known as Malware that
could harm your computer. Malware track browsing behavior or transmit personal
data from your computer; programs such as keyloggers could be installed on your
computer track and transmit every key that is pressed on a keyboard
(keystrokes) to unauthorized users. Antivirus and Antispyware programs also
offer real-time protection monitoring your computer for any changes by malware
software. Keep your Antivirus and Antispyware software always up to date, this
can help in protecting your computer from recent threats.
(8) Do not immediately respond to mails from unknown users: It may be a fake mail trying to gather personal information such as
your bank account details, home address, etc. Some mails could promise you jobs
or announce lottery results which in turn could compromise the user. And
in some cases, virus or scripts that are dangerous could be attached to the
mail; NEVER open the attachment from an unknown source.
(9) Clear browser cookies frequently: Cookies are programs that are created on your local computer when
you visit websites. Though cookies are meant for storing data based
on your activity performed during your earlier visit such as logon details,
details of a shopping cart, visited pages in a website, etc. they could also be
tracked by unauthorized users and possibly gain access to your personal
information.
(10) Keep the operating system and software applications up to date: though operating systems and applications are designed, tested and
distributed, sometimes they may have security holes through which a hacker can
take advantage; they may track and gather information or even damage the whole
computer. In general, most vendors notify the users whenever a security hole is
identified and an update is available to address that particular issue. You can
also visit respective vendor’s website to check if there are any updates
available, download and keep your operating system and software applications up
to date, free from security holes.
(11)Install firewalls: Firewalls
could be software or hardware and can assist in keeping a computer and a
network secure. Firewalls analyze the network traffic and determine if the
traffic should be allow ed or not. In
most cases, operating systems such as Linux, Windows or Mac include firewall
software as a part of operating system thus keeping the computer secure. In
rare cases, you may need to configure your firewall for additional security.
(12) Never install software from unknown sources: As they might not be trustworthy; download only from well-known or
reputed websites. Verify the source if it is legitimate by searching the
internet or referring to comments from other users before downloading them;
understand the nature and the purpose of the software before attempting to
download and install them.
(13)Remove unwanted or unknown software applications: These might have got installed without your knowledge when you have
visited some websites. Unwanted software could get installed as they might have
been bundled along with necessary software. Some programs such as toolbars get
installed usually through bundled software and are programmed to send personal
data without your consent.
(14)Clearing Data Stored In Browsers:
Web browsers have built-in password management designed to store passwords used
in forms on websites. Browsers often prompt to save usernames and passwords
when users attempt to logon to websites. This facility is offered to users, so
that they can logon to their frequently used websites without having to type
the usernames or passwords. However, it is not advisable to leave the web
browser store this data particularly on public or shared computers.
(145)
Following is a general
guideline for managing strong passwords.
i.
a combination of
alphanumeric and special characters.
ii.
Do not keep passwords such
as your favorite color, friends or relatives name, bike number, mobile number
either as single or combined option.
iii.
Change your password
frequently at least 2 or 3 weeks
iv.
• Keep the length of the
password at least 12-14 characters if permitted.
v.
• Avoid keeping passwords
based on repetition, dictionary words, letter or number sequences, usernames,
relative or pet names, etc.
vi.
• Including numbers, and
symbols in passwords if allowed.
vii.
• Use capital and
lower-case letters.
viii.
• Avoid using the same
password for multiple sites or purposes.
ix.
• Avoid using something
that the public or workmates know you strongly like or dislike.
x.
• Use random password
generators if possible. Example of a strong password: u1vX:,4Hd{]$
SESSION 9 : MAINTAIN WORKPLACE SAFETY
(146)
Every organization must follow
a standard set of safety rules and procedures.
(147)
safety rules must be stated and displayed clearly at important areas.
(148)
All the employees must be given
a demonstrations
and training
to follow safety rules.
(149)
Basic safety rules to follow at workplace – Fire
safety,
Falls
and slips, Electrical safety,
Use of first aid.
(150)
Timely repairs should be
carried out by a competent person/ organization at workplace / home to
avoid/minimize any hazards.
(151)
Basic Fire safety rules in an organization are:
(152)
Most of the time fire can be
prevented using appropriate measures. (Explain any 3)
(1) - Fire escape plans must be installed at proper levels
(2) - Conduct regular drills
(3) - Smoke alarms must be placed at proper intervals
(4) - Keep workplace a no-smoking zone
(5) - Maintenance of safety equipment must be taken care of regularly.
(153)
Falls and Slips Safety
rules:
(1) - Keep the moving area clean and clutter free.
(2) - Workplace must be proper ventilated receive light.
(3) - Wear non slippery footwear.
(4) - Floors must be clean and dry
(5) - Oil spills, dust must be immediately cleaned.
(154)
Electrical Safety Rules:
(155)
Though use of electric
equipment has helped in all our routine tasks whether it is at home or office
but if precautions and safety measures are not
taken daily then they might be a cause of threat to our lives.
(156)
We must take appropriate
measures to ensure safety from electrical
devices
at home and at workplace.
(157)
Following are some of
the measures which keep ourselves safe from electricity hazards and accidents:-
(1) - Electrical equipment used should be approved by a recognised
organization.
(2) - Workers should be trained to handle the electric equipment safely.
(3) - Damaged and hazardous electrical equipment should be immediately
replaced.
(4) - All old and workout and frayed switches and wires should be
changed.
(5) - Heat emanating equipment should be kept away from the electrical
equipment.
(6) - Take care that the outlets/ circuits should not be overloaded.
(7) - Switch off and unplug the electrical appliances before cleaning or
relocating them.
(158)
Use of First Aid:
(159)
Learning First Aid is the social
and civic responsibility of very human being.
(160)
If First Aid provided
effectively and on time then it may save life.
(161)
First Aid is the immediate assistance provided to the injured to save
life and minimize health loss till the proper medical aid/ facility is
provided.
(162)
Every organization must have basic
First Aid Kit.
(163)
First Aid Kit must have all necessary items.
(164)
Make sure to check
for the expiry of medical related items
in First
Aid Kit.
(165)
Some rules of First Aid are:
(1) - Assure the injured to remain calm and not to panic
(2) - Keep them warm if they are under shock
(3) - Do not move the victim in case of back/neck injury
(166)
Occupational hazards
(167)
A worker may face Occupational
hazards at workplace.
(168)
An occupational hazard
is the illness one may acquire due to his occupation.
(169)
Like people working in a chemical
factory may get affected due to presence of certain chemicals.
(170)
Some types of occupational hazards
are:
(1) Physical hazards, (2)
chemical hazards, (3)
biological hazards,
(4) behavioural hazards, (5)
radiological hazards, (6)
ergonomic hazards
SESSION 10 : PREVENT ACCIDENTS AND EMERGENCIES
(171)
an accident is an unplanned
event that may happen all of a sudden and may lead to unwanted
or unprecedented results/outcomes.
(172)
an accident is an unfortunate
incident that occurs unintentionally causing hazardous
result or injury or unwanted
results.
(173)
Types of Accidents:
(1) - Accidents at workplace : Slips and fall accidents, fire
(2) – Industrial: disease/illness
(3) - Road traffic accidents
(4) - Clinical Accidents
(5) - Sports related accidents
(174)
Workplace accidents may include injuries that are caused to the workers due
to falls, slips and trips.
(175)
Slip and fall accidents may occur at any working environment and the injuries may vary
from minor
ache to major severe accident.
(176)
Some injuries suffered might include fracture, sprain,
knee/elbow
injury, wrist or head injuries etc.
(177)
Handling Accidents: Accidents must be handled carefully.
(178)
The accident should be
handled compassionately without assigning blame
on others.
(1) - Every organization must follow SOP for accident
handling
(2) - Safety measures must be placed to prevent workplace accidents
(3) - Immediately call the medical team for any injury
(4) - Stay alert
(5) - Pay attention to and follow emergency drills
(179)
Emergency Any unexpected situation that needs immediate attention
and action.
(180)
An emergency situation
might pose a sudden risk to life, property health etc.
(181)
An emergency situation
needs intervention to prevent deteriorating results/ hazards.
(182)
An emergency situation is one
that:
(1) ● threatens the employees, customers or the public
(2) ● disrupts or shuts down the operations
(3) ● causes physical or environmental damage
(183)
An emergency must be handled
immediately to prevent further losses and to minimize the loss.
(184)
One must be alert to
notice any kind of emergency.
(185)
There are various types
of emergencies that may occur at home, School or workplace.
(186)
It becomes essential
requirement to have an emergency plan to minimize
the loss and recover from emergency.
(187)
Various types of emergencies
are there and there should be an emergency management plan to
handle the situation of emergency.
(188)
Some of the types
of emergencies are as follows:
-
Chemical spills - Droughts - Pandemics
-
Thunderstorms - Fire -
Floods
-
Terrorist attack - Extreme heat
waves
-
Leakage of some hazardous gas/ chemical
(189)
Generally the situation of emergency
occurs as a result of some disaster.
(190)
Disaster may be either natural or caused by some human
activity.
(191)
Some of the types
of emergencies that require evacuation are:
● Fire ●
Explosion ● Floods ● Earthquake ● Hurricane ● Tornado
● Toxic material release ● Civil disturbance ● Workplace violence
SESSION 11: PROTECT HEALTH AND SAFETY AT WORK:
Hazards and Sources Of Hazards
(192)
An organization can face some health
hazards that could put the lives of the employees in danger.
(193)
A hazard is anything
that is the source of any potential harm, damage or any kind of potential loss
of health or life.
(194)
Hazards can be of different types
depending
on the industry and the environment in which the
employees work.
(195)
The different types
of hazards include: ● Physical ● Chemical ● Biological ● Mechanical
(196)
Sources of Hazards
Checklist for Workstations : The
workstation should:
(1) ● provide sufficient space for the user to alter position
comfortably
(2) ● provide adequate lighting
(3) ● have windows fitted with adjustable coverings to alter the
sunlight level
(4) ● be spacious enough when a workstation is shared by more than one
person
(197)
The display screen
should:
(1) ● display well-defined characters of adequate size and spacing
(2) ● have a stable image
(3) ● have easily adjustable brightness and contrast
(4) ● tilt and swivel easily to suit the user
(5) ● be free from glare and reflections
(6) ● Use a separate base for the screen or an adjustable table
(198)
The keyboard should:
(1) ● be able to tilt easily and should be able to separate from the
screen to allow the user to adopt a comfortable working position
(2) ● have space in front to provide support for the hands or arms of
the user
(3) ● have a matt surface
(4) ● have clearly legible symbols on the keys
(199)
The work surface should:
(1) ● provide adequate space for the user
(2) ● have a low reflective surface
(3) ● be of an adequate size to allow the screen, keyboard and other
peripherals to be flexibly arranged
(4) ● have a stable and adjustable document holder, which should be at
the same level as the screen and at the same viewing distance
(200)
Workplace Evacuation: In case of emergency there should be provision for evacuation.
(201)
Evacuation is the process of emptying a place in case of an emergency,
disaster.
(202)
Every company must
ensure following points for evacuation in case of any emergency:
• evacuation policy, • Buddy system, •
designated assembly point for emergencies, • Floor plans, • Assembly areas, • Periodic evacuation drills
(1) • An evacuation policy:
i.
Every organization must
have an evacuation policy.
ii.
All the Team
Leaders are responsible for informing
about the policy to their employees.
iii.
Proper attention must be paid when the Team Leader is informing you
about these details.
iv.
Negligence at this time may cost lives.
(2) • designated assembly point for emergencies
i.
Organization must have a designated
assembly point for emergencies.
ii.
Ensure that every employee/
worker must know where assembly point for emergencies
is.
(3) • Buddy system
i.
A ‘buddy system’ for
individuals with special needs or disabilities must be designated.
ii.
A ‘buddy system’ system
ensures that differently-abled are assisted and guided
out of the premises or the impacted area properly.
iii.
If you are a buddy
to someone, ensure that your buddy is safe at the assembly
point with you.
(4) • Floor plans
i.
Floor plans with evacuation routes in work areas.
ii.
Ensure that you understand Floor
plans with evacuation routes so you can
use it in time of need.
(5) • Assembly areas, where you are required to assemble after
evacuation, must be properly taken care of.
(6) • Periodic evacuation drills should be conducted.
(7) Ensure that you pay attention during Periodic evacuation drills
to save your life and you can be helpful in saving someone else’s life too.
Healthy Living
(203)
‘A healthy body has a
healthy
mind’
- a very popular saying is true.
(204)
‘Healthy Lifestyle
leads to a healthy being.
(205)
A healthy living has
a lasting impact on an individual which ultimately yields a healthy environment
at home as well as at work place.
(206)
A happy and healthy worker
will always perform best to his ability.
(207)
A healthy lifestyle
helps to keep and improve people’s health and well being.
(208)
A healthy lifestyle
takes needs practice, commitment and sincere
efforts.
(209)
A healthy lifestyle includes:
(1) - healthy eating habits
(2) - physical activities
(3) - stress management
(4) - healthy mind
(5) - sound sleep
(6) - goal setting
S No |
Question (Unit 4 - Web Application
and Security | PYQ) |
Marks |
Year |
1 |
Name the device that converts digital signal to analog that can travel
over phone lines. 1 |
1 |
22 T2 SQP |
2 |
key is an accessibility function which is designed for people who have
vision impairment or cognitive disabilities. 1 |
1 |
22 T2 SQP |
3 |
Networks in which certain computers have special dedicated tasks,
providing services to other computers (in the network) are called networks 1 |
1 |
22 T2 SQP |
4 |
__________ key is used to
reduce repetitive strain. a. Sticky b. Serial c. Mouse d. Toggle 1 |
1 |
23 SQP |
5 |
__________ is designed to help users with auditory impairments. a.
Sound Sentry c. Serial key b. High Contrast d. Show Sounds 1 |
1 |
23 SQP |
6 |
State whether True or False: “It is not possible to create a default
template in a Word processor”. a. True b. False 1 |
1 |
23 SQP |
7 |
Identify the website that offers offline blog service for free. a.
Blogdesk b. Qumana c. WordPress d. both a and b 1 |
1 |
23 SQP |
8 |
A healthy lifestyle helps to keep and improve people’s health and
well-being. It does not include: a. healthy eating habits c. physical
activities b. stress management d. less sleep 1 |
1 |
23 SQP |
9 |
BSNL stands for _____________________. a. Bihar Sanchar Nigam Limited
b. Bharat Samachar Nigam Limited c. Bharat Sanchar Nigam Limited d. None of
the above 1 |
1 |
23 SQP |
10 |
In ________________ Networks, all computers have an equal status and
each terminal has an equally competent CPU. a. MAN b. WAN c. Client Server d.
P2P 1 |
1 |
23 SQP |
11 |
Database servers are referred to as _______________. a. Front-ends b.
Back-ends c. Clients d. Model 1 |
1 |
22 T1 SQP |
12 |
_____________ is the immediate
assistance provided to the injured to save life and minimize health loss till
the proper medical aid/facility is provided. |
1 |
22 T2 PYQ |
13 |
_________, is a system of interlinked hypertext documents accessed via
the internet. 1 |
1 |
22 T2 CPYQ |
14 |
_________ is a global system of interconnected computer networks. 1 |
1 |
22 T2 CPYQ |
15 |
_________ is an accessibility feature that assists people that have
difficulty using a keyboard or a mouse (or both). 1 |
1 |
22 T2 CPYQ |
16 |
_______________ is not an
instant messaging service. a) Skype b) Yahoo! Messenger c) Firefox d)
Whatsapp 1 |
1 |
21 SQP |
17 |
______ is the process of emptying a place in case of an emergency,
disaster. a) Accident b) Evacuation c) Hazards d) Exiting 1 |
1 |
21 SQP |
18 |
Richard needs to set up a network for his office where he wants to
save all the data in a centralized system and other computers will take the
services from the centralized system. Which architecture will be the best
suitable for him? a) Peer to Peer b) Client-Server c) Point to Point d) Ring
1 |
1 |
21 SQP |
19 |
A _________ is a device that converts digital computer signals into a
form (analog signals) that can travel over phone lines and vice versa. a)
Repeater b) Switch c) Router d) Modem 1 |
1 |
21 SQP |
20 |
______________ uses the keyboard as a pointing device instead of a
mouse. a) MouseKeys b) Toggle key c) Filter key d) Sticky key 1 |
1 |
21 SQP |
21 |
A _____ is one which connects computers and devices in a limited
geographical area such as home, school, computer laboratory, office building,
or closely positioned group of buildings. a) LAN b) WAN c) MAN d) PAN 1 |
1 |
21 SQP |
22 |
_________ is an accessibility feature that assists people that have
difficulty using a keyboard or a mouse (or both). 1 (A) Toggle key (B) Filter
key (C) Sticky key (D) Serial key |
1 |
21 CPYQ |
23 |
____________ is an accessibility function which is designed for people
who have vision impairment or cognitive disabilities. 1 (A) Toggle key (B)
Filter key (C) Sticky key (D) Serial key |
1 |
21 CPYQ |
24 |
Full form of ISP is __________ . 1 |
1 |
21 CPYQ |
25 |
Which of the following is not a wireless technology ? 1 (A) DSL (B) 3G
(C) WiMAX (D) WiFi |
1 |
21 CPYQ |
26 |
Mouse key is an accessibility feature that assists people who have
difficulty using a mouse. (True/False) 1 |
1 |
21 CPYQ |
27 |
To create a strong password, we should use numbers, capital and small
letters and some symbols (if allowed). (True/False) 1 |
1 |
21 CPYQ |
28 |
Define DSL. Ans DSL: Digital subscriber line (DSL) provide Internet
access by transmitting digital data over wires of a local telephone network. |
1 |
20 SQP |
29 |
______________ in control panel are used to customize the way your
keyboard, display or mouse function Ans Accessibility Options /Ease of Access |
1 |
20 PYQ |
30 |
www stands for ____________.
Ans : (b) World Wide Web |
1 |
19 SQP |
31 |
_____________ is designed to
help users with auditory impairments. Ans : (c) Sound Sentry |
1 |
19 SQP |
32 |
Explain the following terms : |
1 |
19 SQP |
33 |
a. Internet |
1 |
19 SQP |
34 |
b. LAN |
1 |
19 SQP |
35 |
c. Instant Messaging |
1 |
19 SQP |
36 |
d. Blog |
1 |
19 SQP |
37 |
e. P2P Architecture |
1 |
19 SQP |
38 |
Sound Sentry is designed to help users with_____________ impairments
Ans: Auditory/Hearing |
1 |
19 PYQ |
39 |
ISP stands for _____________ . Ans: Internet Service Provider |
1 |
19 PYQ |
40 |
Web server Write short notes on
the following : (a) Web server (b) Dial up (c) WiFi |
1 |
19 PYQ |
41 |
When data is transferred on the internet, data is broken up into bits
of same sized pieces called ________. Ans: Packet |
1 |
18 PYQ |
42 |
LAN stands for |
1 |
18 PYQ |
43 |
Firewall |
1 |
16 PYQ |
44 |
_____________ .is an organization which provides you with access
to the Internet via a dial-up or direct or wireless connection. |
1 |
22 T2 PYQ |
45 |
Name the software or hardware security device that analyzes the
network traffic and determine if the traffic should be allowed or not. 1 |
1 |
22 T2 PYQ |
46 |
__________is an accessibility function that tells the keyboard to
ignore brief or repeated keystrokes, making typing easier for people with
hand tremors. Ans FilterKeys |
1 |
20 SQP |
47 |
List any 4 advantages associated with networking. 2 |
2 |
22 T2 SQP |
48 |
Differentiate between wired and wireless access. Give one example for
each type. 2 |
2 |
22 T2 SQP |
49 |
What do you understand by ISP with respect to web applications? Name
any two connection type that home users use. 2 |
2 |
22 T2 SQP |
50 |
Differentiate between Filter keys and Toggle keys in Microsoft
Windows. 2 |
2 |
23 SQP |
51 |
In which situations Online shopping could be useful? Write any two
popular e-commerce websites. 2 |
2 |
23 SQP |
52 |
Write any four rules which is to be followed for creating strong
passwords. |
2 |
22 T2 PYQ |
53 |
What is the special name given to the discussion style site used by
nontechnical (or technical) users for creating personal web pages ? Give any
two examples of websites that help us to create such discussion style sites
for free. |
2 |
22 T2 PYQ |
54 |
Differentiate between LAN and WAN with two points only. |
2 |
22 T2 PYQ |
55 |
Give a list of any four types of accidents. 2 |
2 |
22 T2 CPYQ |
56 |
What are cookies ? What details are stored by the cookies ? 2 |
2 |
22 T2 CPYQ |
57 |
Give one point of difference between peer-to-peer architecture and
client-server architecture. 2 |
2 |
22 T2 CPYQ |
58 |
Write any two advantages of online shopping. 2 |
2 |
21 SQP |
59 |
Define the following Hot spots:- a) WIMAX b) Wi-Fi 2 |
2 |
21 SQP |
60 |
What is client-server architecture ? 2 |
2 |
21 CPYQ |
61 |
What do you mean by high contrast ? 2 |
2 |
21 CPYQ |
62 |
State the purpose of creating a Blog. Ans : A blog
is a discussion
style site used
by non-technical (and
technical users) users for creating personal web pages. Blog is
used to convey messages about events, announcements, news, reviews, etc.
Blogs are usually managed using a web browser and this requires active
internet connection. |
2 |
20 SQP |
63 |
Explain blog. Give any two websites that offer free blog services |
2 |
20 PYQ |
64 |
Explain Client- Server architecture and Peer to Peer architecture. |
2 |
20 PYQ |
65 |
Rohan’s father told him that they need to attach a modem for internet
connection on their computer. Explain the meaning and function of modem to
Rohan. |
2 |
19 SQP |
66 |
What do you mean by P2P ? |
2 |
19 PYQ |
67 |
Write short notes on the following : (a) Web server (b) Dial up (c)
WiFi |
2 |
19 PYQ |
68 |
Explain any three types of impairment that impact computer usage. |
3 |
20 PYQ |
69 |
Mention three features of Instant Messaging Service. |
3 |
18 PYQ |
70 |
Rahul and Amit are working on a school project assigned to them by
their teacher. They have to send instant messages to each other and also do
video conferencing after school hours in order to complete the project on
time. a. Suggest any 4 good instant messaging software that they can use. b.
Apart from computers, list 4 hardwares that Rahul and Amit need for
videoconferencing. 4 |
4 |
22 T2 SQP |
71 |
Rahul has purchased some stationary items from an online site. He has
to make online payment for the items to complete the transaction. Help by
answering his following queries. 1. Suggest any two options that he can use
to make payment of his bill on the online shopping website. 2. Name any 2
situations where online shopping could be useful. 3. Name any 2 popular
online transaction websites. 4. Write full form of COD in reference to online
shopping. 4 |
4 |
22 T2 SQP |
72 |
Vicky is a student of class X. He used to get the work based on
internet surfing, But he is not aware of the internet and its terminology.
Being a friend of Vicky, help him in finding the answers of the following
questions. a. What do you mean by Internet Service Provider? b. Expand the
following terms: i. WAP ii. W3 c. Mention any two advantages of Networking.
d. What is a Blog? Name any two Online Blogs. 4 |
4 |
23 SQP |
73 |
Aryan is too much worried when he came to know that someone has
withdrawn all money from his uncle's bank account. He was not able to
understand how this could happen when he has not given his ATM card to
anyone. |
4 |
22 T2 PYQ |
74 |
(a) Suggest him
a way by which he can be assured that he is doing secured online transaction. |
4 |
22 T2 PYQ |
75 |
(b) Which type of
software he needs to install in his computer to protect his computer from
malware ? |
4 |
22 T2 PYQ |
76 |
(c) Help him to
understand about Phishing. |
4 |
22 T2 PYQ |
77 |
(d) He also thinks
cookies are harmless. Explain him how cookies can also cause harm to him. |
4 |
22 T2 PYQ |
78 |
Due to pandemic everyone was bound to stay at home. But, due to
internet the whole world was connected. |
4 |
22 T2 PYQ |
79 |
(a) What is
meant by World Wide Web ? Also write any two web browsers names that you
know. |
4 |
22 T2 PYQ |
80 |
(b) Explain how data is transferred over internet. |
4 |
22 T2 PYQ |
81 |
Radhika is fond of cooking and wants to share her cooking tips with
the world. One of her friends suggested her to start writing blogs. 4 (a)
Explain the purpose of a blog. (b) List any 2 websites that provide blog
service. (c) Explain the purpose of an offline blog editor. (d) Name any two
free offline blog editors. |
4 |
22 T2 CPYQ |
82 |
Every development has advantages as well as disadvantages. With the
enhanced use of internet there are many problems that all of us are facing
these days. 4 (a) What do you understand by internet security ? Name and
explain any one online threat. (b) Suggest any two best practices for
ensuring security over internet. |
4 |
22 T2 CPYQ |
83 |
What precautions must be taken to improve online security? 4 |
4 |
21 SQP |
84 |
State any four rules or etiquettes to be followed while chatting on
the Internet. 4 |
4 |
21 CPYQ |
85 |
Rohan‟s Grandfather was
wondering that how does Rohan chat on web with his father posted in
California, Elaborate the steps involved while transferring data over
internet. |
5 |
20 SQP |
86 |
Ananya uses Internet for her School Project. Suggest any five security
measure to ensure safety from online threats. 5 |
5 |
19 SQP |
87 |
Write down the process for transferring data on the internet |
5 |
19 PYQ |
88 |
Riya uses Internet for her School Project. She is unaware of possible
online threats. Mention two online threats and three measures she shall take
to ensure safety from online threats. |
5 |
18 PYQ |
Class 10 | Information Technology Code 402 | Unit 4 - Web Application
and Security | Book Solutions |
Fill in the blanks
1) The option in Microsoft Windows XP
used for helping users with physical disabilities and to reduce repetitive
strain is Sticky
Keys.
2) Sound Sentry is designed to help
users with auditory impairments
3) The High Contrast option in
Microsoft Windows XP is designed to assist people with Vision impairments.
4) Serial Keys is designed to assist people
that have difficulty using a keyboard or a mouse.
5) The acronym for LAN is Local Area Network.
6) Three types of Wired Internet
Connectivity are Dial
up , DSL & Cable Internet Access.
7) Instant Messaging is a form of communication
over the Internet that offers an instantaneous transmission of text-based
messages from sender to receiver.
8) Microphone , Headsets & Speakers & Web Camera are required for
audio and video conferencing.
9) An organization can face some Health Hazards that could put the lives of
the employees in danger.
10) Hazards can be of different types
depending on the Industry and the Environment in which the employees work.
11) Organization must have a
designated assembly point for emergencies
Questions
and Answers
Q1. Define networking?
Ans. A computer network is a
collection of computers that allow sharing of resources and information.
Q2. Give any three advantages of networking.
Ans. Three advantages of networking
are :
(1)
Data Sharing (2) Files Transfer (3) Hardware Sharing (4) Internet Access Sharing
Q3. Explain the term packet with reference to data transfer.
Ans.
Data transfer over the network is divided into small segments called packet.
Each packet is sent from one computer to another computer until it finds its
destination.
Q4. Explain Wifi and its significance. Ans. Wi-Fi stands for wireless
fidelity. Wi-Fi is a popular technology that allows an electronic device such
as computers or mobile phones to exchange data wirelessly over a network. Wi-Fi
is used where cables cannot be run (such as old buildings, outdoor areas) to
provide network and Internet access
Q5. Compare LAN with WAN
Ans: LAN Stands for Local Area Network It
covers a small geographical area. WAN It Stands for Wide Area Network and It
spreads across countries.
A Local
Area Network (LAN) is one which connects computers and devices in a
limited geographical area such as home, school, computer laboratory, office
building, or closely positioned group of buildings.
A Wide
Area Network (WAN) is one which covers a broad area (i.e., any network
that links across metropolitan, regional, or national boundaries).
Q6. Expand the Following terms :
1)
DSL : Digital Subscriber Line (5) ISP : Internet Service Provider
2)
Modem : Modulator and Demodulator (6) WWW : World Wide Web
3)
LAN : Local Area Network (7) MAN : Metropolitan Area Network
4) WAN : Wide Area Network (8) P2P : Peer to Peer
Q7. Explain P2P Architecture and how it is different from Client Server Architecture?
Ans. Networks in which all computers have
an equal status are called peer to
peer networks. Generally in such a network each terminal has an equally
competent CPU.
Networks in which certain computers have
special dedicated tasks, providing services to other computers (in the network)
are called client server networks.
The computer(s) which provide services are called servers and the ones that use
these services are called clients.
Q8. List any five application based instant messaging
software.
Ans.
Five application based instant messaging software are :
(1)
Google
Talk (2) Yahoo! Messenger (3)
Skype (4) Windows Live Messenger (5)
Rediff
Bol
Q9. What do you mean by instant messages?
Ans.
Instant messaging (IM) is a form of communication over the Internet that offers
an instantaneous transmission of text-based messages from sender to receiver.
Q10. Give any three key features of Instant Messaging.
Ans.
Three key features of Instant Messaging are :
(1)
Text
Messages can be sent to one or more person
(2)
Audio
calling and conferencing.
(3)
Video
calling and conferencing.
Q11. State any 03 rules and etiquettes to be followed while chatting on the Internet.
Ans.
Three rules and etiquettes to be followed while chatting on the Internet are :
- Messages
should be short and to the point.
- Always
introduce yourself by name if your screen name doesn’t reflect it.
- Always
ask if the other person has time to chat first.
Q12. What are the basic needs to use instant messaging (chat) software.
Ans.
The basic needs to use instant messaging (chat) software are :
- A valid instant messaging account.
- An active internet Connection.
- A computer and a browser
Q13. What is a blog? Explain its use.
Ans.
A blog is a discussion style site used by non-technical (or technical users)
users for creating personal web pages. Blogs are similar to an online personal
diary and simple to use. We can use a blog to convey messages about events,
announcements, news, reviews, etc.
Q14. List any 5 websites that provide blog service.
Ans.
Five websites that provide blog service are :
(1)
www.WordPress.com (3) www.blogger.com (5) www.blog.com
(2)
www.weebly.com (4)
www.blogsome.com
Q15. Difference between web page and website.
Ans.
A single HTML document is called a web page. A collection of web pages is
called web site.
Q16. What do you mean by publishing a
post?
Ans.
Publishing a post means to make the post public. Once we finished typing the
content, we need to publish the post for others to see. To view the post, you
can type the blog address in the address bar of the web browser.
Q17. Explain the purpose of an offline blog editor.
Ans.
When ever we do not have an active internet connection, we can create blogs
using a blog application and publish the blog whenever internet connectivity is
available.
Q18. List any five offline blog editors.
Ans.
Five Offline blog editors are :
(1)
Qumana (2) Windows Live Writer (3) Blogdesk (4)
MarsEdit (5) BlogJet
Q19. Explain the purpose of Online transactions.
Ans.
Online transactions have made transactions very convenient and simplified the
workflow in many forms in a business. Online transactions deals with transfer
of money over the internet.
Q20. List any five websites that allow online transactions.
Ans. Five websites that allow online transactions are :
(1) •
IRCTC, an online portal for booking flight and train tickets.
(2) •
Flipkart, an online shopping portal for buying consumer products.
(3) •
EBay, an online portal for buying and selling goods.
(4) •
Redbus, an online portal for booking bus tickets.
Q21. List any three payment tools to use online transactions.
Ans.
Three payment tools to use online transactions are :
(1)
Credit
card (2) Debit
Card (3) Net
Banking (4) UPI
Q22. Give any two benefits of online transactions.
Ans.
Two benefits of online transactions are :
(1)
Money can be transferred immediately. (2) It helps to reduce black marketing to
some extent.
Q23. Explain the purpose of Internet Security.
Ans.
Internet security is a branch of computer security specifically related to the
Internet. Its objective is to establish rules and measures to use against
attacks over the Internet.
Q24. Explain different kinds of online threats.
Ans.
Different online threats are : (1) Phishing (2) Email spoofing (3) Chat spoofing
Q25. Explain the need to clear data stored in browsers.
Ans.
Browsers often prompt to save usernames and passwords when users attempt to
logon to websites. Browsers can also store data such as cookies, visited
websites or webpages data, browsing history, etc. However it is not advisable
to leave the web browser store this data particularly on public or shared
computers. So it is advisable to clear data stored in browsers particularly on
public or shared computers.
Q26. Explain any five tips to manage strong passwords.
Ans.
Following are general guidelines for managing strong passwords :
- Keep
the length of the password at least 12-14 characters if permitted.
- Avoid
keeping passwords based on repetition, dictionary words, letter or number
sequences, usernames, relative or pet names, etc.
- Including
numbers, and symbols in passwords if allowed.
- Use
capital and lower-case letters.
- Avoid
using the same password for multiple sites or purposes.
Q27. Explain any four best practices to secure data.
Ans.
Four best practices to secure data are :
- Keeping
your username and password private.
- Use
updated antivirus and antispyware software.
- Clear
browser cookies frequently.
- Do
not click on link shared by unknown users.
- Never
install software from unknown sources.
- Install
firewalls
28. Explain use of Antivirus and Anti Spyware.
Ans. Antivirus and Antispyware programs offer real-time protection
monitoring your computer for any changes by malware software. Keep your
Antivirus and Antispyware software always up to date, this can help in
protecting your computer from any threats.
Q29. Enlist any three
basic safety rules to follow at workplace.
Ans. Basic
safety rules to
follow at workplace – (1) Fire
safety (2) Falls
and slips (3) Electrical
safety.
Q30. Give any two basic
safety rules for ensuring Falls and Slips safety.
Ans.
Two basic safety rules for ensuring Falls and Slips
safety are
as follows :
(1) Keep the moving area clean and clutter
free. (3) Workplace
must be proper ventilated receive light.
(2) Wear non slippery footwear. (4) Floors
must be clean and dry.
Q31. Give any two electrical safety rules in any organization.
Ans.
Two electrical
safety rules in
any organization are as follows :
1)
Electrical equipment used should be approved by a
recognized organization.
2)
Workers should be trained to handle the electric
equipment safely.
Q32. Explain any two first aid
rules.
Ans.
Two first aid rules are :
1)
Assure the injured to remain calm and not to panic.
2)
Keep them warm if they are under shock.
Q33. What do you mean by occupational hazards?
Ans.
An occupational
hazard is
the illness one may acquire due to his occupation. for example people working
in a chemical factory may get affected due to presence of certain chemicals.
Q34. List any three types of occupational
hazards.
Ans. Three
types
of occupational hazards are as follows :
(1) Physical hazards (2) Chemical
hazards (3) Biological
hazards
Q35. Explain the terms accident and emergency.
Ans. Accident can be defined as an unfortunate
incident that occurs unintentionally causing hazardous result or injury or
unwanted results. Any unexpected situation that needs immediate
attention and action is called emergency.
Q36. Enlist any four types of
accidents.
Ans.
Accidents may be of following types :
(1) Industrial disease/illness (4) Road
traffic accidents
(2) Clinical Accidents (5) Sports
related accidents
(3) Accidents at workplace : Slips and fall
accidents
Q37. Give any three situations of
emergency that require evacuation.
Ans.
Some of the types of emergencies that require evacuation are:
(1)
Fire (3) Explosion (5) Floods (7) Toxic
material release
(2)
Earthquake (4) Hurricane (6) Tornado (8) Civil
disturbance (9) Workplace violence
Q38. Give any two ways to
handle accidents.
Ans.
Accidents must be handled carefully. Two ways to handle accidents are : (Write
any two)
(1) Every organization must follow SOP for
accident handling.
(2) Safety measures must be placed to
prevent workplace accidents.
(3) Immediately call the medical team for
any injury. (4) Stay
Alert
Q39. List any three types of hazards.
Ans.
Different types
of hazards are
as follows : (Write any three)
(1) Physical (2)
Chemical (3) Biological (4) Mechanical
Q40. Give a checklist
for workstations to minimize the hazards.
Ans. Checklist
for Workstations : The workstation should:
1)
Provide sufficient space for the user to alter
position comfortably.
2)
Provide adequate lighting.
3)
Have windows fitted with adjustable coverings to
alter the sunlight level.
4)
Be spacious enough when a workstation is shared by
more than one person.
Q41. Explain the term ‘Evacuation Policy’.
Ans. Evacuation Policy means a plan to evacuate a place in
case of any emergency or disaster. Evacuation is the process of emptying a
place in case of an emergency, disaster. Every organization must have an
evacuation policy.
Q42. Explain Buddy System to implement evacuation efficiently in
case of emergency.
Ans.
This system ensures that differently-abled are assisted and guided out of the
premises or the impacted area properly. If you are a buddy to someone, ensure
that your buddy is safe at the assembly point with you in case of any
emergency.
Q43. Explain the terms Floor Plans and Assembly /areas.
Ans. Floor
Plans
means to show evacuation routes in work area. It is the responsibility of all
employees or workers to understand these plans so that they can use in case of
any emergency.
Assembly
areas : A space where all employees or workers are required to assemble
after evacuation.
Q44. Describe the importance of periodic evacuation drills.
Ans. Evacuation
drills are
very important for all employees or workers so that they know which path they
have to follow to evacuate their floor/room/office in case of any emergency.
Q45. Explain importance of a healthy lifestyle.
Ans. Healthy
Lifestyle
leads to a healthy being. A healthy living has a lasting impact on an
individual at home as well as at work place. A happy and healthy worker will
always perform best to his ability.
Q46. Give any four points of a healthy
lifestyle.
Ans.
Healthy lifestyle includes : (Write any four)
1)
Healthy eating habits
2)
Physical activities
3)
Stress management
4)
Healthy mind
5)
Sound sleep
6)
Goal setting
20 PYQ: A website where a person writes
regularly about topics that interest them, with photograph or text
OR
Some of the popular websites
that offer free blog services include:
1. www.WordPress.com
2. www.blogger.com
3. www.blog.com
4. www.weebly.com
7. www.wix.com
10.
www.ghost.com
Disclaimer : I tried to give you the
correct Answers of “Information Technology Code 402 Class 10 Solutions of Unit 4” , but if you feel
that there is/are mistakes in the Answers of “Information Technology Code
402 Class 10 Solutions of Unit 4″ given above, you can directly
contact me at sa7588164@gmail.com. Also
Share your feedback so that I can give better content to you.
0 Comments