CBSE 10th Information Technology - 402 Book1 Unit 4 - Web Application and Security

 

CBSE 10th Information Technology - 402 Book1

Unit 4 - Web Application and Security

SESSION 1: WORKING WITH ACCESSIBILITY OPTIONS

(1)                Computer Accessibility refers to the user friendliness of a computer system for all, regardless of their

disability. This is mainly a software issue.

(2)                However, when a combination of hardware and software, it enables a person with a disability or impairment

to use a computer. It is known as Assistive Technology.

 

(3)                There are numerous types of impairment that impact computer usage. These include:

(i)                  Cognitive impairments and learning disabilities, such as dyslexia, attention deficit hyperactivity

disorder (ADHD) or autism.

(ii)                Visual impairment such as low-vision, complete or partial blindness, and color blindness.

(iii)               Hearing impairment including deafness.

(iv)               Motor or dexterity impairment such as paralysis, cerebral palsy, or carpal tunnel syndrome and

repetitive strain injury.

 

(4)                Accessibility Options in Control Panel are used to customize the keyboard, display, or mouse function.

(5)                Keyboard Tab: Sticky Keys, Filter Keys, Toggle Keys.

(6)                Sound Tab:  Sound Sentry, Show Sounds

(7)                Display Tab: High Contrast, Cursor Options

(8)                Mouse Tab: MouseKeys

(9)                General Tab: Serial Keys

 

(10)            Sticky Keys is an accessibility feature to help computer users with physical disabilities, but it is also used by

others as a means to reduce repetitive strain.

(11)             Sticky Keys allows the user to press and release a modifier key, such as Shift, Ctrl, Alt, or the Windows key,

and have it remain active until any other key is pressed.

 

(12)            Filter Keys It is an accessibility function that tells the keyboard to ignore brief or repeated keystrokes,

making typing easier for people with hand tremors.

(13)            The Filter Keys icon appears in the system tray.

(14)             Filter Keys the repeated characters are ignored.

 

(15)            Toggle Keys is an accessibility function which is designed for people who have vision impairment or

cognitive disabilities.

(16)             Toggle Keys is turned on, computer emits sound cues when the locking keys (Caps Lock, Num Lock, or Scroll

Lock) are pressed.

(17)             Toggle Keys : A high sound is emitted when the keys are switched on and a low sound is emitted when

they are switched off.

 

(18)             Sound Sentry is designed to help users with auditory impairments.

(19)             Sound Sentry generates visual warnings, such as a blinking title bar or a flashing border, whenever the computer generates a sound.

 

(20)            Show Sounds instructs applications that convey information by sound, to also provide information visually, through text captions or informative icons.

 

(21)            High Contrast is an accessibility feature to assist people with vision impairment.

(22)             High Contrast : You can change the size and color of fonts and the background for ease of viewing.

 

(23)             Cursor Options is also an accessibility feature that assists people with vision impairment by changing the blink rate and width of the cursor.

 

(24)            Mouse Keys is an accessibility feature that assists people who have difficulty using a mouse.

(25)             Mouse Keys option uses the keyboard (especially numeric keypad) as a pointing device instead of a mouse.

(26)            Notice the MouseKey icon in the System Tray.

(27)             Use number pad keys for moving mouse pointer instead of using mouse after enabling “Use MouseKeys”.

(28)             After enabling “Use MouseKeys” Use number key 4 to move left, 6 to move right, 2 to move down and 8 to

move up.

 

(29)            General Tab enables you to configure accessibility options for all users.

(30)             Select the General Tab, a window to configure additional accessibility options will be displayed.

(31)             Select General Tab, accessibility options displayed. “Turn off accessibility features after idle for”,                     

“Give warning message when turning a feature on” and “Make a sound when turning a feature on or off”.

 

(32)             Serial Keys is an accessibility feature that assists people that have difficulty using a keyboard or a mouse (or both). Present in General Tab.

(33)             Serial Keys users can use special devices such as Sip, Puff and Breath Switches to provide input to the computer through Serial Ports.

SESSION 2 : NETWORKING FUNDAMENTALS

(34)             A computer network is a collection of computers and other hardware components interconnected by communication channels (cables or satellites) that allow sharing of resources and information.

(35)             Networks are designed using the following architecture:

(1)    PEER-TO-PEER (P2P) ARCHITECTURE

(2)    CLIENT-SERVER ARCHITECTURE:

 

(36)             PEER-TO-PEER (P2P) ARCHITECTURE: Networks in which all computers have an equal status are called peer to peer networks. Generally in such a network each terminal has an equally competent CPU.

(37)             CLIENT-SERVER ARCHITECTURE: Networks in which certain computers have special dedicated tasks, providing services to other computers (in the network) are called client server networks.

(38)             The computer(s) which provide services are called servers and the ones that use these services are called

clients.

 

(39)             TYPES OF NETWORKS There are two major types of network:

(1)    Local Area Network (LAN) and

(2)    Wide Area Network (WAN)

 

(40)             A Local Area Network (LAN) is one which connects computers and devices in a limited geographical area such as home, school, computer laboratory, office building, or closely positioned group of buildings.

(41)             Usually local area networks offer very high speeds and are used for connecting computers and peripherals such as printers, scanners, etc.

(42)             A Wide Area Network (WAN) is one which covers a broad area (i.e., any network that links across metropolitan, regional, or national boundaries).

 

(43)             The Internet is the most popular WAN, and is used by businesses, governments, non-profit organizations, individual consumers, artists, entertainers, and many others.

(44)              The Internet is a global system of interconnected computer networks that use the standard Internet protocol suite to serve billions of users worldwide.

(45)             Internet is a network of networks that consists of millions of private, public, academic, business, and government networks.

(46)             Internet is one of the most useful technologies of modern times which help us in our daily, personal and professional life.

(47)             Internet is widely used by students, educational institutes; scientist and professionals to gather information for research and general information.

(48)             Businesses use the Internet to access complex databases such as financial database.

(49)             The Internet is the largest encyclopaedia for all age groups.

(50)             The Internet helps in maintaining contact with friends and relatives who live across different locations via Internet chatting systems and email software.

(51)             Internet is also becoming a major source of entertainment for the general public.

 

(52)             World Wide Web (abbreviated as WWW or W3, commonly known as the Web),

(53)             WWW is a system of interlinked hypertext documents accessed via the Internet.

(54)             With a web browser, one can view web pages that may contain text, images, videos, and other multimedia,

and navigate between them via hyperlinks.

(55)             Information is stored on web servers referred to as web pages are retrieved by using a web browser such as

Firefox on the local computer.

(56)             A Web Browser is a software used to view Web sites and acts as an interface between the user and the

World Wide Web.

(57)             A Web server is a computer that stores web sites and their related files for viewing on the Internet.

 

(58)             Some of the advantages associated with networking are:

(1)    •Data Sharing: One of the most important uses of networking is to allow the sharing of data.

(2)    •Files Transfer: Users can send text files, spread sheets, documents, presentations, audio files, video files, etc. to other users.

(3)    •Hardware Sharing: Hardware components such as printers, scanners, etc. can also be shared.

(4)    •Internet Access Sharing: You can purchase a single Internet connection and share it among other computers in a network instead of purchasing multiple Internet connection for each computer. This is very commonly found in Internet café (browsing centres), schools, colleges, companies, etc.

(5)    •Usage of network based applications: Such as web browsers, email clients, chat application, audio & video calling, etc. is another advantage.

 

(59)             Internet connections are provided by Internet Service Providers (ISP) such as Bharat Sanchar Nigam Limited (BSNL), Airtel, MTS, Vodafone, Tata Docomo, etc

(60)             An Internet service provider (ISP) is an organization which provides you with access to the Internet via a dial-up (using modem) or direct (hard wired) or wireless connection.

 

(61)             How to choose internet connection? Choosing connectivity depends on the availability of a particular technology, speed and connection type in your area.

 

(62)             Usually small and medium business users, home users use connectivity types such as DSL, cable modem, dial-up, broadband wireless, WiMAX or 3G.

(63)             Medium to large business users or customers with more demanding requirements may use high speed connectivity such as DSL (High Speed), ISDN, etc.

 

(64)             A modem is a device that converts digital computer signals into a form (analog signals) that can travel over phone lines.

(65)             A modem also re-converts the analog signals back into digital signals.

(66)             The word modem is derived from its function MOdulator/DEModulator.

 

(67)             Types of Internet Connectivity

(1)    Wired – Dial-up, DSL (Digital subscriber line), Cable Internet Access

(2)    Wireless – 3G, WiMAX, Wi-Fi

 

(68)             Dial-up Internet access uses the facilities of the public switched telephone network (PSTN) to establish a connection to an Internet service provider (ISP) via telephone lines using a device called MODEM.

(69)             Dial-up: Users dial a particular number provided by the ISP to gain access to the Internet.

(70)             Dial-up connections are extremely slow and in most cases,

(71)             Dial-up connections are replaced by a high speed connection such as DSL or Cable Modem.

 

(72)             Digital subscriber line (DSL)

(73)            DSL provide Internet access by transmitting digital data over wires of a local telephone network.

(74)            DSL service is delivered along with wired telephone service on the same telephone line.

(75)             DSL filter removes the high frequency interference, enabling simultaneous use of the telephone and data

transmission.

(76)             For using a DSL connection, you need a DSL modem and a subscription.

 

(77)             Cable Internet Access is a form of broadband Internet access that uses cable television infrastructure.

(78)             Cable Internet Access is provided through existing cable TV networks.

(79)             Cable Internet Access is similar to DSL that is provided over existing telephone lines.

 

(80)             3G, short for 3rd Generation

(81)             3G is a set of standards used for mobile devices and mobile telecommunication services and networks.

(82)             High-Speed Downlink Packet Access (HSDPA) is 3G mobile telephony communications protocol

(83)             HSDPA allows higher data transfer speeds and capacity.

(84)             If support for 3G is available on your mobile phone, you can subscribe to the 3G connectivity with your ISP

in order to get high speed Internet connection on your phone.

 

(85)             WiMAX (Worldwide Interoperability for Microwave Access)

(86)             WiMAX is a wireless communications standard designed to provide mobile broadband connectivity across

cities and countries through a variety of devices.

(87)             WiMAX is a long range system, covering many kilometres.

(88)             WiMAX is typically used where DSL or Cable Internet Access cannot be used.

(89)             WiMAX used where difficulty in laying out cables for home or offices located in remote locations but need access to the Internet.

 

(90)            Wi-Fi is a popular technology that allows an electronic device such as computers or mobile phones to

exchange data wirelessly over a network, including high-speed Internet connections.

(91)             WiFi devices such as personal computer, smartphones, video game console, etc. can connect to a network resource such as Internet through a device called the Wireless Access Point (WAP).

(92)             Wi-Fi is used where cables cannot be run (such as old buildings, outdoor areas) to provide network and Internet access.

(93)             Wi-Fi can also be used where users require mobile connectivity.

(94)             Wi-Fi connectivity is used in home & offices, hotels, college & school campus typically for Internet Access.

(95)             Shopping malls, coffee shops, resorts offer free or paid Wi-Fi access to the Internet for their customers.

 

(96)             DATA TRANSFER ON THE INTERNET:

(1)    When data is transferred on the internet, data is broken up into bits of same sized pieces called Packets.

(2)    Each packet is sent from computer to computer until it finds its destination. Each computer on the way decides where next to send the packet. All packets may not take the same route.

(3)    At the destination, the packets are examined. If any packets are missing or damaged, a message is sent asking for them to be re-sent. This continues until all packets have been received intact.

(4)    The packets are now reassembled into their original form. All this done in seconds!

 

 SESSION 3: INTRODUCTION TO INSTANT MESSAGING

(97)             Instant messaging (IM) is a form of communication over the Internet that offers an instantaneous

transmission of text-based messages from sender to receiver.

(98)             Most instant messaging software include the option for performing file transfers, audio chat, video calling

and conferencing, sharing desktops, etc. apart from standard text chat.

 

(99)             Instant messaging software is widely used for personal and commercial use.

 

(100)         Unlike email, instant messaging happens in real-time and the response from participants can be spontaneous.

(101)          Some instant messaging software allows users to view messages received when they are not logged on.  These are called “Offline Messages”.

(102)         For utilizing audio and video chat or conferencing, you need to have microphones and headsets or speakers and web cameras so that users can talk or see each other.

 

(103)          Key Features of an instant messaging are as follows:

(1)    • Text Messages can be sent to one or more person (Similar to SMS)

(2)    • Audio calling and conferencing.

(3)    • Video calling and conferencing.

(4)    • File transfers (Not limited to documents, spread sheets, audio files, video files, etc.)

(5)    • Message history (Save messages for future reference).

 

(104)         Instant messaging accounts differ in formats; some instant messaging software such as Yahoo! Messenger, Windows Live Messenger use email addresses for managing the account and software such as Skype use standard names.

 

(105)         There are two kinds of instant messaging softwareapplication based and Web based. 

(106)         Application based instant messaging software is downloaded and installed on user’s computer.

(107)         Some of the popular instant messaging software are:

• Google Talk • Yahoo! Messenger • Skype • Windows Live Messenger • Rediff Bol, etc.

 

(108)         Web based instant messaging software is accessed using browsers such as Internet Explorer, Mozilla Firefox, Google Chrome, etc.

(109)         Some of the popular web based instant messaging software are:

• Meebo • Yahoo! Messenger for the Web • MSN Web Messenger • IMO, etc.

 

(110)         There are some general rules and etiquettes to be followed while chatting. They are almost the same as those that apply for emails.

(1)    Messages should be short and to the point.

(2)    Always introduce yourself by name if your screen name doesn’t reflect it.

(3)    Always ask if the other person has time to chat first - regardless of how important you think what you have to say is, it’s not going to be well received if the recipient is busy.

(4)    In a business environment, know exactly what you want to discuss.

(5)    Typing your messages in uppercase is extremely rude - it’s considered shouting and very aggressive.

(6)    Give people time to respond - Multiple questions sent to a recipient before they’ve had a chance to answer can seem more like an interrogation rather than a conversation.

(7)    Give the person you are communicating with your undivided attention. It’s not just a sign of respect, but if you have multiple conversations happening or are allowing other issues to distract you, you may miss an important point in the other person’s messages or lose the gist of the conversation.

(8)    It’s important to properly end an IM conversation - you may think the chat is over, but the other person may not. While you’re off doing other things, they may be sitting there staring at the screen waiting for further communication from you!!

 

SESSION 5: CREATING AND PUBLISHING WEB PAGES – BLOG

(111)         A blog is a discussion style site used by non-technical (or technical users) users for creating personal web pages.

(112)         Blogs are similar to an online personal diary and simple to use.

(113)         You can use a blog to convey messages about events, announcements, news, reviews, etc.

(114)         Blogs are usually managed using a web browser and this requires active internet connection.

(115)         You can also use offline blog software to create content first and later publish the content when an active internet connection is available.

(116)         Some of the popular blogs include:

• www.WordPress.com • www.blogger.com • www.blog.com • www.weebly.com • www.blogsome.com

 

SESSION 6: USING OFFLINE BLOG EDITORS

(117)         If you do not have an active internet connection, you can create blogs using a blog application and publish the blog whenever internet connectivity is available.

(118)         There are several free offline blog editors available that can be downloaded and installed on the local computer such as: • Qumana • Windows Live Writer • Blogdesk

(119)         Qumana is a free offline blog editor/application that is simple and easy to use.

 

SESSION 7: ONLINE TRANSACTIONS

(120)         Online transactions have made transactions very convenient and simplified the workflow in many forms in a business.

(121)         Online transactions deals with transfer of money over the internet.

(122)         Revolution in the electronic media has made transaction handling easy.

(123)         Many protocols and security measures have been adopted to ensure the safe and secure OLTP (Online Transaction process).

(124)         We are already using online transactions when we deposit or withdraw money from an ATM machine, when we make our bill payments using our debit/ credit cards.

(125)         NEFT/ RTGS are some other examples of online funds transfer.

 

(126)         Benefits of online transactions like, fast transaction speed, convenience, low risk of theft etc.

(127)         Online shopping is a form of electronic commerce where customers can buy or sell goods over the Internet.

(128)         Customers need to have an active internet connection for viewing goods or services offered by a seller.

(129)         customers can pay online using a credit, debit card or by internet banking.

 

(130)         Online shopping could be useful in situations when:

(1)    • A customer does not have sufficient time to visit stores.

(2)    • Visiting a store is more expensive than purchasing a product online.

(3)    • A product or service that is not available in the local market is available online.

 

(131)         Some of the popular online transaction websites are:

(1)    • IRCTC, an online portal for booking flight and train tickets.

(2)    • Flipkart, an online shopping portal for buying consumer products.

(3)    • EBay, an online portal for buying and selling goods.

(4)    • Redbus, an online portal for booking bus tickets.

 

(132)         To perform an online transaction, all you need is a web browser and an active internet connection.

(133)         In some cases where purchasing is involved, you will need a valid credit card, debit card or online banking support referred to as Net Banking Subscription.

(134)         Some websites even allow COD (Cash on delivery) where the users can pay once they receive the product or service.

(135)         Indian Railway Catering and Tourism Corporation (IRCTC) is an online portal that can be used for booking travel tickets.

 

SESSION 8: INTERNET SECURITY

(136)         Internet security is a branch of computer security specifically related to the Internet, often involving browser security but also network security.

(137)         Its objective is to establish rules and measures to use against attacks over the Internet.

 

(138)         The Internet represents an insecure channel for exchanging information leading to a high risk of intrusion or fraud, such as phishing.

(139)         Though Internet provides valuable information and entertainment, it may leave your computer unsecure due to many online threats.

 

(140)         You need to ensure that your usernames, passwords, credit card or online banking information secure as they are prone to be tracked and used by unauthorized users.

(141)         Some websites can also install Malware on the computer without user consent thereby leaving the computer damaged or insecure.

 

(142)         Online threats such as Phishing, email spoofing, chat spoofing, etc. can increase the chances of users getting compromised.

(143)         You can reduce the risks by using best practices such as using Antivirus Software, Antispyware Software, Firewalls, strong passwords, etc. in addition to spreading awareness of the best practices.

 

(144)         Best Practices for Security

(1)    Use strong passwords, Using strong passwords can lower the risk of a security breach. a combination of alphanumeric and special characters could be used for creating a password that is not so easy to crack or guessed by other users. Do not keep passwords such as your favorite color, friends or relatives name, bike number, mobile number either as single or combined option.  

 

(2)    Use encryption software: (Usually available within the operating system) to protect your data from unauthorized users. If encryption software is not available within the operating system, use a 3rd party software.

 

(3)    Keeping your username and password private: Never save your username or password on computers that are used in shared environments such as internet café. Browsers may save your personal data on the local computer that can be used by another user using the same computer.

 

(4)    Do not share personal information: Websites require you to fill out forms containing fields such as name, gender, age, email address, school, etc. Be cautious when filling out such forms; research and verify if it’s a trustable website.

 

(5)    Registering with websites: Read the privacy statement or policy whenever you register with a website, the statement or policy will include information about how the website use personal data.

(6)    Secure transactions: If you are using online shopping or transactions, websites even store your credit card or online banking personal information such as your credit card number, account details, etc. This information can be tracked and used by un-authorized users often known as hackers to misuse this information. Again, ensure the website is legitimate and uses secure practices for performing and maintaining online transactions. Since information such as credit card details or personal information is sent over the network, it is always recommended to use only secure websites for such transactions. Verify if the website uses secure transaction; usually it is indicated through a digital certificate represented as a golden lock in the web browser’s address bar.

 

(7)    Use antivirus and antispyware software: Computers are prone to attacks from software known as Malware that could harm your computer. Malware track browsing behavior or transmit personal data from your computer; programs such as keyloggers could be installed on your computer track and transmit every key that is pressed on a keyboard (keystrokes) to unauthorized users. Antivirus and Antispyware programs also offer real-time protection monitoring your computer for any changes by malware software. Keep your Antivirus and Antispyware software always up to date, this can help in protecting your computer from recent threats.

 

(8)    Do not immediately respond to mails from unknown users: It may be a fake mail trying to gather personal information such as your bank account details, home address, etc. Some mails could promise you jobs or announce lottery results which in turn could compromise the user. And in some cases, virus or scripts that are dangerous could be attached to the mail; NEVER open the attachment from an unknown source.

 

(9)    Clear browser cookies frequently: Cookies are programs that are created on your local computer when you visit websites. Though cookies are meant for storing data based on your activity performed during your earlier visit such as logon details, details of a shopping cart, visited pages in a website, etc. they could also be tracked by unauthorized users and possibly gain access to your personal information.

 

(10) Keep the operating system and software applications up to date: though operating systems and applications are designed, tested and distributed, sometimes they may have security holes through which a hacker can take advantage; they may track and gather information or even damage the whole computer. In general, most vendors notify the users whenever a security hole is identified and an update is available to address that particular issue. You can also visit respective vendor’s website to check if there are any updates available, download and keep your operating system and software applications up to date, free from security holes.

(11)Install firewalls: Firewalls could be software or hardware and can assist in keeping a computer and a network secure. Firewalls analyze the network traffic and determine if the traffic should be allow   ed or not. In most cases, operating systems such as Linux, Windows or Mac include firewall software as a part of operating system thus keeping the computer secure. In rare cases, you may need to configure your firewall for additional security.

 

(12) Never install software from unknown sources: As they might not be trustworthy; download only from well-known or reputed websites. Verify the source if it is legitimate by searching the internet or referring to comments from other users before downloading them; understand the nature and the purpose of the software before attempting to download and install them.

 

(13)Remove unwanted or unknown software applications: These might have got installed without your knowledge when you have visited some websites. Unwanted software could get installed as they might have been bundled along with necessary software. Some programs such as toolbars get installed usually through bundled software and are programmed to send personal data without your consent.

 

(14)Clearing Data Stored In Browsers: Web browsers have built-in password management designed to store passwords used in forms on websites. Browsers often prompt to save usernames and passwords when users attempt to logon to websites. This facility is offered to users, so that they can logon to their frequently used websites without having to type the usernames or passwords. However, it is not advisable to leave the web browser store this data particularly on public or shared computers.

 

(145)         Following is a general guideline for managing strong passwords.

                                                              i.      a combination of alphanumeric and special characters.

                                                            ii.      Do not keep passwords such as your favorite color, friends or relatives name, bike number, mobile number either as single or combined option.

                                                          iii.      Change your password frequently at least 2 or 3 weeks

                                                          iv.      • Keep the length of the password at least 12-14 characters if permitted.

                                                            v.      • Avoid keeping passwords based on repetition, dictionary words, letter or number sequences, usernames, relative or pet names, etc.

                                                          vi.      • Including numbers, and symbols in passwords if allowed.

                                                        vii.      • Use capital and lower-case letters.

                                                      viii.      • Avoid using the same password for multiple sites or purposes.

                                                          ix.      • Avoid using something that the public or workmates know you strongly like or dislike.

                                                            x.      • Use random password generators if possible. Example of a strong password: u1vX:,4Hd{]$


SESSION 9 : MAINTAIN WORKPLACE SAFETY

(146)         Every organization must follow a standard set of safety rules and procedures.

(147)         safety rules must be stated and displayed clearly at important areas.

(148)         All the employees must be given a demonstrations and training to follow safety rules.

(149)         Basic safety rules to follow at workplace – Fire safety, Falls and slips, Electrical safety, Use of first aid.

(150)         Timely repairs should be carried out by a competent person/ organization at workplace / home to avoid/minimize any hazards.

 

(151)         Basic Fire safety rules in an organization are:

(152)         Most of the time fire can be prevented using appropriate measures. (Explain any 3)

(1)    - Fire escape plans must be installed at proper levels

(2)    - Conduct regular drills

(3)    - Smoke alarms must be placed at proper intervals

(4)    - Keep workplace a no-smoking zone

(5)    - Maintenance of safety equipment must be taken care of regularly.

 

(153)         Falls and Slips Safety rules:

(1)    - Keep the moving area clean and clutter free.

(2)    - Workplace must be proper ventilated receive light.

(3)    - Wear non slippery footwear.

(4)    - Floors must be clean and dry

(5)    - Oil spills, dust must be immediately cleaned.

 

(154)         Electrical Safety Rules:

(155)         Though use of electric equipment has helped in all our routine tasks whether it is at home or office but if precautions and safety measures are not taken daily then they might be a cause of threat to our lives.

(156)         We must take appropriate measures to ensure safety from electrical devices at home and at workplace.

 

(157)         Following are some of the measures which keep ourselves safe from electricity hazards and accidents:-

(1)    - Electrical equipment used should be approved by a recognised organization.

(2)    - Workers should be trained to handle the electric equipment safely.

(3)    - Damaged and hazardous electrical equipment should be immediately replaced.

(4)    - All old and workout and frayed switches and wires should be changed.

(5)    - Heat emanating equipment should be kept away from the electrical equipment.

(6)    - Take care that the outlets/ circuits should not be overloaded.

(7)    - Switch off and unplug the electrical appliances before cleaning or relocating them.

(158)         Use of First Aid:

(159)         Learning First Aid is the social and civic responsibility of very human being.

(160)         If First Aid provided effectively and on time then it may save life.

(161)         First Aid is the immediate assistance provided to the injured to save life and minimize health loss till the proper medical aid/ facility is provided.

(162)         Every organization must have basic First Aid Kit.

(163)         First Aid Kit must have all necessary items.

(164)         Make sure to check for the expiry of medical related items in First Aid Kit.

 

(165)         Some rules of First Aid are:

(1)    - Assure the injured to remain calm and not to panic

(2)    - Keep them warm if they are under shock

(3)    - Do not move the victim in case of back/neck injury

 

(166)         Occupational hazards

(167)         A worker may face Occupational hazards at workplace.

(168)         An occupational hazard is the illness one may acquire due to his occupation.

(169)         Like people working in a chemical factory may get affected due to presence of certain chemicals.

(170)         Some types of occupational hazards are:

(1)    Physical hazards,           (2) chemical hazards,                (3) biological hazards,

(4)    behavioural hazards,     (5) radiological hazards,             (6) ergonomic hazards

 

SESSION 10 : PREVENT ACCIDENTS AND EMERGENCIES

(171)         an accident is an unplanned event that may happen all of a sudden and may lead to unwanted or unprecedented results/outcomes.

(172)         an accident is an unfortunate incident that occurs unintentionally causing hazardous result or injury or unwanted results.

 

(173)         Types of Accidents:

(1)    - Accidents at workplace : Slips and fall accidents, fire

(2)    – Industrial: disease/illness

(3)     - Road traffic accidents

(4)    - Clinical Accidents

(5)    - Sports related accidents

 

(174)         Workplace accidents may include injuries that are caused to the workers due to falls, slips and trips.

(175)         Slip and fall accidents may occur at any working environment and the injuries may vary from minor ache to major severe accident.

(176)         Some injuries suffered might include fracture, sprain, knee/elbow injury, wrist or head injuries etc.

 

(177)         Handling Accidents: Accidents must be handled carefully.

(178)         The accident should be handled compassionately without assigning blame on others.

(1)    - Every organization must follow SOP for accident handling

(2)    - Safety measures must be placed to prevent workplace accidents

(3)    - Immediately call the medical team for any injury

(4)    - Stay alert

(5)    - Pay attention to and follow emergency drills

 

(179)         Emergency Any unexpected situation that needs immediate attention and action.

(180)         An emergency situation might pose a sudden risk to life, property health etc.

(181)         An emergency situation needs intervention to prevent deteriorating results/ hazards.

(182)         An emergency situation is one that:

(1)    ● threatens the employees, customers or the public

(2)    ● disrupts or shuts down the operations

(3)    ● causes physical or environmental damage

 

(183)         An emergency must be handled immediately to prevent further losses and to minimize the loss.

(184)         One must be alert to notice any kind of emergency.

(185)         There are various types of emergencies that may occur at home, School or workplace.

(186)         It becomes essential requirement to have an emergency plan to minimize the loss and recover from emergency.

(187)         Various types of emergencies are there and there should be an emergency management plan to handle the situation of emergency.

 

(188)         Some of the types of emergencies are as follows:

- Chemical spills       - Droughts         - Pandemics       

- Thunderstorms      - Fire                      - Floods

- Terrorist attack     - Extreme heat waves                   

- Leakage of some hazardous gas/ chemical 

 

 

(189)         Generally the situation of emergency occurs as a result of some disaster.

(190)         Disaster may be either natural or caused by some human activity.

(191)         Some of the types of emergencies that require evacuation are:

● Fire            ● Explosion         ● Floods ● Earthquake   ● Hurricane ● Tornado

● Toxic material release        ● Civil disturbance           ● Workplace violence

 

SESSION 11: PROTECT HEALTH AND SAFETY AT WORK:

Hazards and Sources Of Hazards

(192)         An organization can face some health hazards that could put the lives of the employees in danger.

(193)         A hazard is anything that is the source of any potential harm, damage or any kind of potential loss of health or life.

(194)         Hazards can be of different types depending on the industry and the environment in which the employees work.

(195)         The different types of hazards include: ● Physical ● Chemical ● Biological ● Mechanical

 

(196)         Sources of Hazards Checklist for Workstations : The workstation should:

(1)    ● provide sufficient space for the user to alter position comfortably

(2)    ● provide adequate lighting

(3)    ● have windows fitted with adjustable coverings to alter the sunlight level

(4)    ● be spacious enough when a workstation is shared by more than one person

 

(197)         The display screen should:

(1)    ● display well-defined characters of adequate size and spacing

(2)    ● have a stable image

(3)    ● have easily adjustable brightness and contrast

(4)    ● tilt and swivel easily to suit the user

(5)    ● be free from glare and reflections

(6)    ● Use a separate base for the screen or an adjustable table

 

(198)         The keyboard should:

(1)    ● be able to tilt easily and should be able to separate from the screen to allow the user to adopt a comfortable working position

(2)    ● have space in front to provide support for the hands or arms of the user

(3)    ● have a matt surface

(4)    ● have clearly legible symbols on the keys

 

(199)         The work surface should:

(1)    ● provide adequate space for the user

(2)    ● have a low reflective surface

(3)    ● be of an adequate size to allow the screen, keyboard and other peripherals to be flexibly arranged

(4)    ● have a stable and adjustable document holder, which should be at the same level as the screen and at the same viewing distance

 

(200)         Workplace Evacuation: In case of emergency there should be provision for evacuation.

(201)         Evacuation is the process of emptying a place in case of an emergency, disaster.

 

(202)         Every company must ensure following points for evacuation in case of any emergency:

• evacuation policy,        • Buddy system,               • designated assembly point for emergencies,                           • Floor plans,                     • Assembly areas,            • Periodic evacuation drills                                          

 

(1)    • An evacuation policy:

                                                            i.       Every organization must have an evacuation policy.

                                                          ii.       All the Team Leaders are responsible for informing about the policy to their employees.

                                                        iii.       Proper attention must be paid when the Team Leader is informing you about these details.

                                                         iv.      Negligence at this time may cost lives.

 

(2)    designated assembly point for emergencies

                                                              i.      Organization must have a designated assembly point for emergencies.

                                                            ii.      Ensure that every employee/ worker must know where assembly point for emergencies is.

 

(3)    Buddy system

                                                         i.      A ‘buddy system’ for individuals with special needs or disabilities must be designated.

                                                       ii.      A ‘buddy system’ system ensures that differently-abled are assisted and guided out of the premises or the impacted area properly.

                                                     iii.      If you are a buddy to someone, ensure that your buddy is safe at the assembly point with you.

 

(4)    Floor plans

                                                 i.      Floor plans with evacuation routes in work areas.

                                               ii.      Ensure that you understand Floor plans with evacuation routes so you can use it in time of need.

 

(5)    Assembly areas, where you are required to assemble after evacuation, must be properly taken care of.

(6)    Periodic evacuation drills should be conducted.

(7)    Ensure that you pay attention during Periodic evacuation drills to save your life and you can be helpful in saving someone else’s life too.

 

Healthy Living

(203)         ‘A healthy body has a healthy mind’ - a very popular saying is true.

(204)         Healthy Lifestyle leads to a healthy being.

(205)         A healthy living has a lasting impact on an individual which ultimately yields a healthy environment at home as well as at work place.

(206)         A happy and healthy worker will always perform best to his ability.

(207)         A healthy lifestyle helps to keep and improve people’s health and well being.

(208)         A healthy lifestyle takes needs practice, commitment and sincere efforts.

(209)         A healthy lifestyle includes:

(1)    - healthy eating habits

(2)    - physical activities

(3)    - stress management

(4)    - healthy mind

(5)    - sound sleep

(6)    - goal setting

 


 CBSE 10th IT-402 Book1 | Unit 4 - Web Application and Security | PYQ

S No

Question (Unit 4 - Web Application and Security | PYQ)

Marks

Year

1

Name the device that converts digital signal to analog that can travel over phone lines. 1

1

22 T2 SQP

2

key is an accessibility function which is designed for people who have vision impairment or cognitive disabilities. 1

1

22 T2 SQP

3

Networks in which certain computers have special dedicated tasks, providing services to other computers (in the network) are called networks 1

1

22 T2 SQP

4

 __________ key is used to reduce repetitive strain. a. Sticky b. Serial c. Mouse d. Toggle 1

1

23 SQP

5

__________ is designed to help users with auditory impairments. a. Sound Sentry c. Serial key b. High Contrast d. Show Sounds 1

1

23 SQP

6

State whether True or False: “It is not possible to create a default template in a Word processor”. a. True b. False 1

1

23 SQP

7

Identify the website that offers offline blog service for free. a. Blogdesk b. Qumana c. WordPress d. both a and b 1

1

23 SQP

8

A healthy lifestyle helps to keep and improve people’s health and well-being. It does not include: a. healthy eating habits c. physical activities b. stress management d. less sleep 1

1

23 SQP

9

BSNL stands for _____________________. a. Bihar Sanchar Nigam Limited b. Bharat Samachar Nigam Limited c. Bharat Sanchar Nigam Limited d. None of the above 1

1

23 SQP

10

In ________________ Networks, all computers have an equal status and each terminal has an equally competent CPU. a. MAN b. WAN c. Client Server d. P2P 1

1

23 SQP

11

Database servers are referred to as _______________. a. Front-ends b. Back-ends c. Clients d. Model 1

1

22 T1 SQP

12

_____________  is the immediate assistance provided to the injured to save life and minimize health loss till the proper medical aid/facility is provided.

1

22 T2 PYQ

13

_________, is a system of interlinked hypertext documents accessed via the internet. 1

1

22 T2 CPYQ

14

_________ is a global system of interconnected computer networks. 1

1

22 T2 CPYQ

15

_________ is an accessibility feature that assists people that have difficulty using a keyboard or a mouse (or both). 1

1

22 T2 CPYQ

16

 _______________ is not an instant messaging service. a) Skype b) Yahoo! Messenger c) Firefox d) Whatsapp 1

1

21 SQP

17

______ is the process of emptying a place in case of an emergency, disaster. a) Accident b) Evacuation c) Hazards d) Exiting 1

1

21 SQP

18

Richard needs to set up a network for his office where he wants to save all the data in a centralized system and other computers will take the services from the centralized system. Which architecture will be the best suitable for him? a) Peer to Peer b) Client-Server c) Point to Point d) Ring 1

1

21 SQP

19

A _________ is a device that converts digital computer signals into a form (analog signals) that can travel over phone lines and vice versa. a) Repeater b) Switch c) Router d) Modem 1

1

21 SQP

20

______________ uses the keyboard as a pointing device instead of a mouse. a) MouseKeys b) Toggle key c) Filter key d) Sticky key 1

1

21 SQP

21

A _____ is one which connects computers and devices in a limited geographical area such as home, school, computer laboratory, office building, or closely positioned group of buildings. a) LAN b) WAN c) MAN d) PAN 1

1

21 SQP

22

_________ is an accessibility feature that assists people that have difficulty using a keyboard or a mouse (or both). 1 (A) Toggle key (B) Filter key (C) Sticky key (D) Serial key

1

21 CPYQ

23

____________ is an accessibility function which is designed for people who have vision impairment or cognitive disabilities. 1 (A) Toggle key (B) Filter key (C) Sticky key (D) Serial key

1

21 CPYQ

24

Full form of ISP is __________ . 1

1

21 CPYQ

25

Which of the following is not a wireless technology ? 1 (A) DSL (B) 3G (C) WiMAX (D) WiFi

1

21 CPYQ

26

Mouse key is an accessibility feature that assists people who have difficulty using a mouse. (True/False) 1

1

21 CPYQ

27

To create a strong password, we should use numbers, capital and small letters and some symbols (if allowed). (True/False) 1

1

21 CPYQ

28

Define DSL. Ans DSL: Digital subscriber line (DSL) provide Internet access by transmitting digital data over wires of a local telephone network.

1

20 SQP

29

______________ in control panel are used to customize the way your keyboard, display or mouse function Ans Accessibility Options /Ease of Access

1

20 PYQ

30

www stands for ____________.   Ans :      (b)  World Wide Web

1

19 SQP

31

_____________   is designed to help users with auditory impairments.

Ans :    (c)  Sound Sentry

1

19 SQP

32

Explain the following terms :

1

19 SQP

33

a.       Internet

1

19 SQP

34

b.      LAN

1

19 SQP

35

c.       Instant Messaging

1

19 SQP

36

d.      Blog

1

19 SQP

37

e.       P2P Architecture

1

19 SQP

38

Sound Sentry is designed to help users with_____________ impairments Ans: Auditory/Hearing

1

19 PYQ

39

ISP stands for _____________ . Ans: Internet Service Provider

1

19 PYQ

40

 Web server Write short notes on the following : (a) Web server (b) Dial up (c) WiFi

1

19 PYQ

41

When data is transferred on the internet, data is broken up into bits of same sized pieces called ________. Ans: Packet

1

18 PYQ

42

LAN stands for

1

18 PYQ

43

Firewall

1

16 PYQ

44

 _____________ .is an organization which provides you with access to the Internet via a dial-up or direct or wireless connection.

1

22 T2 PYQ

45

Name the software or hardware security device that analyzes the network traffic and determine if the traffic should be allowed or not. 1

1

22 T2 PYQ

46

__________is an accessibility function that tells the keyboard to ignore brief or repeated keystrokes, making typing easier for people with hand tremors. Ans FilterKeys

1

20 SQP

47

List any 4 advantages associated with networking. 2

2

22 T2 SQP

48

Differentiate between wired and wireless access. Give one example for each type. 2

2

22 T2 SQP

49

What do you understand by ISP with respect to web applications? Name any two connection type that home users use. 2

2

22 T2 SQP

50

Differentiate between Filter keys and Toggle keys in Microsoft Windows. 2

2

23 SQP

51

In which situations Online shopping could be useful? Write any two popular e-commerce websites. 2

2

23 SQP

52

Write any four rules which is to be followed for creating strong passwords.

2

22 T2 PYQ

53

What is the special name given to the discussion style site used by nontechnical (or technical) users for creating personal web pages ? Give any two examples of websites that help us to create such discussion style sites for free.

2

22 T2 PYQ

54

Differentiate between LAN and WAN with two points only.

2

22 T2 PYQ

55

Give a list of any four types of accidents. 2

2

22 T2 CPYQ

56

What are cookies ? What details are stored by the cookies ? 2

2

22 T2 CPYQ

57

Give one point of difference between peer-to-peer architecture and client-server architecture. 2

2

22 T2 CPYQ

58

Write any two advantages of online shopping. 2

2

21 SQP

59

Define the following Hot spots:- a) WIMAX b) Wi-Fi 2

2

21 SQP

60

What is client-server architecture ? 2

2

21 CPYQ

61

What do you mean by high contrast ? 2

2

21 CPYQ

62

State the purpose of creating a Blog. Ans : A  blog  is  a  discussion  style  site  used  by  non-technical  (and  technical  users) users  for creating personal web pages. Blog is used to convey messages about events, announcements, news, reviews, etc. Blogs are usually managed using a web browser and this requires active internet connection.

2

20 SQP

63

Explain blog. Give any two websites that offer free blog services

2

20 PYQ

64

Explain Client- Server architecture and Peer to Peer architecture.

2

20 PYQ

65

Rohan’s father told him that they need to attach a modem for internet connection on their computer. Explain the meaning and function of modem to Rohan.

2

19 SQP

66

 What do you mean by P2P ?

2

19 PYQ

67

Write short notes on the following : (a) Web server (b) Dial up (c) WiFi

2

19 PYQ

68

Explain any three types of impairment that impact computer usage.

3

20 PYQ

69

Mention three features of Instant Messaging Service.

3

18 PYQ

70

Rahul and Amit are working on a school project assigned to them by their teacher. They have to send instant messages to each other and also do video conferencing after school hours in order to complete the project on time. a. Suggest any 4 good instant messaging software that they can use. b. Apart from computers, list 4 hardwares that Rahul and Amit need for videoconferencing. 4

4

22 T2 SQP

71

Rahul has purchased some stationary items from an online site. He has to make online payment for the items to complete the transaction. Help by answering his following queries. 1. Suggest any two options that he can use to make payment of his bill on the online shopping website. 2. Name any 2 situations where online shopping could be useful. 3. Name any 2 popular online transaction websites. 4. Write full form of COD in reference to online shopping. 4

4

22 T2 SQP

72

Vicky is a student of class X. He used to get the work based on internet surfing, But he is not aware of the internet and its terminology. Being a friend of Vicky, help him in finding the answers of the following questions. a. What do you mean by Internet Service Provider? b. Expand the following terms: i. WAP ii. W3 c. Mention any two advantages of Networking. d. What is a Blog? Name any two Online Blogs. 4

4

23 SQP

73

Aryan is too much worried when he came to know that someone has withdrawn all money from his uncle's bank account. He was not able to understand how this could happen when he has not given his ATM card to anyone.

4

22 T2 PYQ

74

(a)          Suggest him a way by which he can be assured that he is doing secured online transaction.

4

22 T2 PYQ

75

(b)         Which type of software he needs to install in his computer to protect his computer from malware ?

4

22 T2 PYQ

76

(c)          Help him to understand about Phishing.

4

22 T2 PYQ

77

(d)         He also thinks cookies are harmless. Explain him how cookies can also cause harm to him.

4

22 T2 PYQ

78

Due to pandemic everyone was bound to stay at home. But, due to internet the whole world was connected.

4

22 T2 PYQ

79

(a)          What is meant by World Wide Web ? Also write any two web browsers names that you know.

4

22 T2 PYQ

80

(b) Explain how data is transferred over internet.

4

22 T2 PYQ

81

Radhika is fond of cooking and wants to share her cooking tips with the world. One of her friends suggested her to start writing blogs. 4 (a) Explain the purpose of a blog. (b) List any 2 websites that provide blog service. (c) Explain the purpose of an offline blog editor. (d) Name any two free offline blog editors.

4

22 T2 CPYQ

82

Every development has advantages as well as disadvantages. With the enhanced use of internet there are many problems that all of us are facing these days. 4 (a) What do you understand by internet security ? Name and explain any one online threat. (b) Suggest any two best practices for ensuring security over internet.

4

22 T2 CPYQ

83

What precautions must be taken to improve online security? 4

4

21 SQP

84

State any four rules or etiquettes to be followed while chatting on the Internet. 4

4

21 CPYQ

85

 Rohan‟s Grandfather was wondering that how does Rohan chat on web with his father posted in California, Elaborate the steps involved while transferring data over internet. 

5

20 SQP

86

Ananya uses Internet for her School Project. Suggest any five security measure to ensure safety from online threats. 5

5

19 SQP

87

Write down the process for transferring data on the internet

5

19 PYQ

88

Riya uses Internet for her School Project. She is unaware of possible online threats. Mention two online threats and three measures she shall take to ensure safety from online threats.

5

18 PYQ

 

 

 

 

 

 

 

 

 

 

 

 

Class 10 | Information Technology Code 402 | Unit 4 - Web Application and Security | Book Solutions |

 

Fill in the blanks

1)       The option in Microsoft Windows XP used for helping users with physical disabilities and to reduce repetitive strain is Sticky Keys.

2)       Sound Sentry is designed to help users with auditory impairments

3)       The High Contrast option in Microsoft Windows XP is designed to assist people with Vision impairments.

4)       Serial Keys is designed to assist people that have difficulty using a keyboard or a mouse.

5)       The acronym for LAN is Local Area Network.

6)       Three types of Wired Internet Connectivity are Dial up , DSL Cable Internet Access.

7)       Instant Messaging is a form of communication over the Internet that offers an instantaneous transmission of text-based messages from sender to receiver.

8)       Microphone , Headsets & Speakers & Web Camera are required for audio and video conferencing.

9)       An organization can face some Health Hazards that could put the lives of the employees in danger.

10)   Hazards can be of different types depending on the Industry and the Environment in which the employees work.

11)   Organization must have a designated assembly point for emergencies

 

Questions and Answers

Q1. Define networking?

Ans. A computer network is a collection of computers that allow sharing of resources and information.

Q2. Give any three advantages of networking.     

Ans. Three advantages of networking are :

(1)    Data Sharing         (2) Files Transfer                 (3) Hardware Sharing         (4) Internet Access Sharing

 

Q3. Explain the term packet with reference to data transfer.

Ans. Data transfer over the network is divided into small segments called packet. Each packet is sent from one computer to another computer until it finds its destination.

 

Q4. Explain Wifi and its significance.                                                                                                                                                            Ans. Wi-Fi stands for wireless fidelity. Wi-Fi is a popular technology that allows an electronic device such as computers or mobile phones to exchange data wirelessly over a network. Wi-Fi is used where cables cannot be run (such as old buildings, outdoor areas) to provide network and Internet access

Q5. Compare LAN with WAN

Ans: LAN Stands for Local Area Network It covers a small geographical area. WAN It Stands for Wide Area Network and It spreads across countries.                                                                                                                                                                                                   

A Local Area Network (LAN) is one which connects computers and devices in a limited geographical area such as home, school, computer laboratory, office building, or closely positioned group of buildings.

A Wide Area Network (WAN) is one which covers a broad area (i.e., any network that links across metropolitan, regional, or national boundaries).

Q6. Expand the Following terms :

1)       DSL : Digital Subscriber Line                                             (5)  ISP : Internet Service Provider

2)       Modem : Modulator and Demodulator                         (6)  WWW : World Wide Web

3)       LAN : Local Area Network                                                 (7)  MAN : Metropolitan Area Network

4)       WAN : Wide Area Network                                              (8)  P2P : Peer to Peer

Q7. Explain P2P Architecture and how it is different from Client Server Architecture?

Ans. Networks in which all computers have an equal status are called peer to peer networks. Generally in such a network each terminal has an equally competent CPU.                                                                                                                                                            

Networks in which certain computers have special dedicated tasks, providing services to other computers (in the network) are called client server networks. The computer(s) which provide services are called servers and the ones that use these services are called clients.

Q8. List any five application based instant messaging software.

Ans. Five application based instant messaging software are :

(1)    Google Talk           (2)  Yahoo! Messenger       (3)  Skype              (4)  Windows Live Messenger          (5)  Rediff Bol

 

Q9. What do you mean by instant messages?

Ans. Instant messaging (IM) is a form of communication over the Internet that offers an instantaneous transmission of text-based messages from sender to receiver.

 

Q10. Give any three key features of Instant Messaging.

Ans. Three key features of Instant Messaging are :

(1)    Text Messages can be sent to one or more person

(2)    Audio calling and conferencing.

(3)    Video calling and conferencing.

 

Q11. State any 03 rules and etiquettes to be followed while chatting on the Internet.

Ans. Three rules and etiquettes to be followed while chatting on the Internet are :

  1. Messages should be short and to the point.
  2. Always introduce yourself by name if your screen name doesn’t reflect it.
  3. Always ask if the other person has time to chat first.

 

Q12. What are the basic needs to use instant messaging (chat) software.

Ans. The basic needs to use instant messaging (chat) software are :

  1. A valid instant messaging account.
  2. An active internet Connection.
  3. A computer and a browser

 

Q13. What is a blog? Explain its use.

Ans. A blog is a discussion style site used by non-technical (or technical users) users for creating personal web pages. Blogs are similar to an online personal diary and simple to use. We can use a blog to convey messages about events, announcements, news, reviews, etc.

 

Q14. List any 5 websites that provide blog service.

Ans. Five websites that provide blog service are :

(1)    www.WordPress.com        (3) www.blogger.com        (5) www.blog.com

(2)    www.weebly.com              (4) www.blogsome.com

 

Q15. Difference between web page and website.

Ans. A single HTML document is called a web page. A collection of web pages is called web site.

 

Q16. What do you mean by publishing a post?

Ans. Publishing a post means to make the post public. Once we finished typing the content, we need to publish the post for others to see. To view the post, you can type the blog address in the address bar of the web browser.

Q17. Explain the purpose of an offline blog editor.

Ans. When ever we do not have an active internet connection, we can create blogs using a blog application and publish the blog whenever internet connectivity is available.

 

Q18. List any five offline blog editors.

Ans. Five Offline blog editors are :

(1)    Qumana                 (2) Windows Live Writer   (3) Blogdesk          (4) MarsEdit          (5) BlogJet

 

Q19. Explain the purpose of Online transactions.

Ans. Online transactions have made transactions very convenient and simplified the workflow in many forms in a business. Online transactions deals with transfer of money over the internet.

 

Q20. List any five websites that allow online transactions.

Ans. Five websites that allow online transactions are :

(1)    • IRCTC, an online portal for booking flight and train tickets.

(2)    • Flipkart, an online shopping portal for buying consumer products.

(3)    • EBay, an online portal for buying and selling goods.

(4)    • Redbus, an online portal for booking bus tickets.

Q21. List any three payment tools to use online transactions.

Ans. Three payment tools to use online transactions are :

(1)    Credit card            (2) Debit Card       (3) Net Banking    (4) UPI  

 

Q22. Give any two benefits of online transactions.

Ans. Two benefits of online transactions are :

(1)    Money can be transferred immediately.       (2) It helps to reduce black marketing to some extent.

 

Q23. Explain the purpose of Internet Security.

Ans. Internet security is a branch of computer security specifically related to the Internet. Its objective is to establish rules and measures to use against attacks over the Internet.

 

Q24. Explain different kinds of online threats.

Ans. Different online threats are :  (1) Phishing           (2) Email spoofing               (3) Chat spoofing

 

Q25. Explain the need to clear data stored in browsers.

Ans. Browsers often prompt to save usernames and passwords when users attempt to logon to websites. Browsers can also store data such as cookies, visited websites or webpages data, browsing history, etc. However it is not advisable to leave the web browser store this data particularly on public or shared computers. So it is advisable to clear data stored in browsers particularly on public or shared computers.

 

Q26. Explain any five tips to manage strong passwords.

Ans. Following are general guidelines for managing strong passwords :

  1. Keep the length of the password at least 12-14 characters if permitted.
  2. Avoid keeping passwords based on repetition, dictionary words, letter or number sequences, usernames, relative or pet names, etc.
  3. Including numbers, and symbols in passwords if allowed.
  4. Use capital and lower-case letters.
  5. Avoid using the same password for multiple sites or purposes.

 

Q27. Explain any four best practices to secure data.

Ans. Four best practices to secure data are :

  1. Keeping your username and password private.
  2. Use updated antivirus and antispyware software.
  3. Clear browser cookies frequently.
  4. Do not click on link shared by unknown users.
  5. Never install software from unknown sources.
  6. Install firewalls

 

28. Explain use of Antivirus and Anti Spyware.

Ans. Antivirus and Antispyware programs offer real-time protection monitoring your computer for any changes by malware software. Keep your Antivirus and Antispyware software always up to date, this can help in protecting your computer from any threats.

 

Q29. Enlist any three basic safety rules to follow at workplace.

Ans. Basic safety rules to follow at workplace –          (1) Fire safety       (2) Falls and slips                 (3) Electrical safety.

 

Q30. Give any two basic safety rules for ensuring Falls and Slips safety.

Ans. Two basic safety rules for ensuring Falls and Slips safety are as follows :

(1)    Keep the moving area clean and clutter free.              (3) Workplace must be proper ventilated receive light.

(2)    Wear non slippery footwear.                                           (4) Floors must be clean and dry.

 

Q31. Give any two electrical safety rules in any organization.

Ans. Two electrical safety rules in any organization are as follows :

1)       Electrical equipment used should be approved by a recognized organization.

2)       Workers should be trained to handle the electric equipment safely.

 

Q32. Explain any two first aid rules.

Ans. Two first aid rules are :

1)       Assure the injured to remain calm and not to panic.

2)       Keep them warm if they are under shock.

 

Q33. What do you mean by occupational hazards?

Ans. An occupational hazard is the illness one may acquire due to his occupation. for example people working in a chemical factory may get affected due to presence of certain chemicals.

 

Q34. List any three types of occupational hazards.

Ans. Three types of occupational hazards are as follows :

(1)    Physical hazards                  (2) Chemical hazards          (3) Biological hazards

 

Q35. Explain the terms accident and emergency.

Ans. Accident can be defined as an unfortunate incident that occurs unintentionally causing hazardous result or injury or unwanted results. Any unexpected situation that needs immediate attention and action is called emergency.

 

Q36. Enlist any four types of accidents.

Ans. Accidents may be of following types :

(1)    Industrial disease/illness                   (4) Road traffic accidents

(2)    Clinical Accidents                                 (5) Sports related accidents

(3)    Accidents at workplace : Slips and fall accidents

 

Q37. Give any three situations of emergency that require evacuation.

Ans. Some of the types of emergencies that require evacuation are:

(1)    Fire                         (3) Explosion         (5) Floods              (7) Toxic material release

(2)    Earthquake           (4) Hurricane        (6) Tornado           (8) Civil disturbance            (9) Workplace violence

 

Q38. Give any two ways to handle accidents.

Ans. Accidents must be handled carefully. Two ways to handle accidents are : (Write any two)

(1)    Every organization must follow SOP for accident handling.

(2)    Safety measures must be placed to prevent workplace accidents.

(3)    Immediately call the medical team for any injury.     (4) Stay Alert

 

Q39. List any three types of hazards.

Ans. Different types of hazards are as follows : (Write any three)

(1)    Physical                  (2) Chemical          (3) Biological         (4) Mechanical

 

Q40. Give a checklist for workstations to minimize the hazards.

Ans. Checklist for Workstations : The workstation should:

1)       Provide sufficient space for the user to alter position comfortably.

2)       Provide adequate lighting.

3)       Have windows fitted with adjustable coverings to alter the sunlight level.

4)       Be spacious enough when a workstation is shared by more than one person.

 

Q41. Explain the term ‘Evacuation Policy’.

Ans. Evacuation Policy means a plan to evacuate a place in case of any emergency or disaster. Evacuation is the process of emptying a place in case of an emergency, disaster. Every organization must have an evacuation policy.

 

Q42. Explain Buddy System to implement evacuation efficiently in case of emergency.

Ans. This system ensures that differently-abled are assisted and guided out of the premises or the impacted area properly. If you are a buddy to someone, ensure that your buddy is safe at the assembly point with you in case of any emergency.

 

Q43. Explain the terms Floor Plans and Assembly /areas.

Ans. Floor Plans means to show evacuation routes in work area. It is the responsibility of all employees or workers to understand these plans so that they can use in case of any emergency.

Assembly areas : A space where all employees or workers are required to assemble after evacuation.

 

Q44. Describe the importance of periodic evacuation drills.

Ans. Evacuation drills are very important for all employees or workers so that they know which path they have to follow to evacuate their floor/room/office in case of any emergency.

 

Q45. Explain importance of a healthy lifestyle.

Ans. Healthy Lifestyle leads to a healthy being. A healthy living has a lasting impact on an individual at home as well as at work place. A happy and healthy worker will always perform best to his ability.

 

Q46. Give any four points of a healthy lifestyle.

Ans. Healthy lifestyle includes : (Write any four)

1)       Healthy eating habits

2)       Physical activities

3)       Stress management

4)       Healthy mind

5)       Sound sleep

6)       Goal setting


20 PYQ: A website where a person writes regularly about topics that interest them, with photograph or text

OR

Some of the popular websites that offer free blog services include:

1.      www.WordPress.com

2.      www.blogger.com

3.      www.blog.com

4.      www.weebly.com

5.      www.blogsome.com

6.      www.tumblr.com

7.      www.wix.com

8.      www.joomla.com

9.      www.medium.com

10.  www.ghost.com



Disclaimer : I tried to give you the correct Answers of “Information Technology Code 402 Class 10 Solutions of Unit 4” , but if you feel that there is/are mistakes in the Answers of “Information Technology Code 402 Class 10 Solutions of Unit 4″ given above, you can directly contact me at sa7588164@gmail.com. Also Share your feedback so that I can give better content to you.

 

Post a Comment

0 Comments