0% found this document useful (0 votes)
43 views

Class 10 Unit-4 It Notes

Uploaded by

jhumadey2412
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
43 views

Class 10 Unit-4 It Notes

Uploaded by

jhumadey2412
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

Object 3

1
2

UNIT-4

Object 4

UNIT -4

Web Application and Security

Session 1 : Working with Accessibility Options


Computer Accessibility means making computer systems user-friendly for everyone,
including individuals with disabilities, with the help of Assistive Technology.
To launch accessibility options in Windows XP Click on Start > Control
Panel > Accessibility Option
Keyboard Tab

Sticky Keys : Sticky Keys makes it easier for people with disabilities to use keyboard
shortcuts and commands Sticky Keys allowing them to push one key at a time rather
than many keys at once. For those who have trouble pushing many keys at once or
have motor disabilities.
Filter Keys : People with motor disabilities or who have difficulty typing quickly.
When Filter Keys is enabled, the computer will ignore brief or repeated keystrokes,
which can reduce accidental keystrokes and improve typing accuracy.
Toggle Keys : Toggle Keys makes an audible sound whenever the Caps Lock, Num
Lock, or Scroll Lock keys are depressed. This feature is useful for people with visual
impairments or who have difficulty recognizing when these keys are pressed.

Serial Keys : Serial keys is an accessibility feature that allows users to control a
computer using special input devices that can be connected to the computer’s serial
port.

Session 2 : Networking Fundamentals


A network is a group of computers or other devices that are connected together to
enable resource sharing, information sharing and communication with the help of
communcation channels between the devices in a network.
Network are designed based on following architectures –

1.Peer-to-Peer Architecture: This type of architecture enables devices to


communicate and share resources directly with each other, without the need for a
central server. This type of network has an equal status and competent CPU.
2.Client-Server Architecture: This type of architecture uses servers to manage
resources and provide services to clients. Clients send requests to the server, and
the server responds with the requested information.
Types of Network
1.Local Area Network (LAN): A network that covers a small area, such as a home or
office, and connects devices together to enable communication and resource
sharing.
2.Wide Area Network (WAN): A network that spans a large geographic area, such
as a country or the world, and connects different LANs and other networks together.
3.Metropolitan Area Network (MAN): A network that covers a geographic area
larger than a LAN but smaller than a WAN, such as a city or region.
Advantages of using Network

•Resource Sharing: Networks allow to share resources, such as printers, scanners,


and storage devices, among multiple users.
•Communication: Networks allow users to communicate and collaborate with each
other through email, chat, video conferencing, and other tools.
•Data Transfer: Networks enable high-speed data transfer and sharing to multiple
users.

Internet:The Internet is a global system of interconnected computer networks


which connect billions of people world wide using a internet porotocol.

World Wide Web: The World Wide Web, also referred to as the Web or W3, is a
collection of connected hypertext pages that may be accessed online.
Web Browser: A web browser is a software application that allows users to access
and view web pages on the World Wide Web. Some of the popular web browsers
include Chrome, Firefox, Safari, and Edge.

c) Web Server: A web server is a computer system that stores websites and their
associated files for access over the internet.
d) Internet Service Provider: An Internet Service Provider (ISP) is a company that
provides internet access to customers. ISPs connect users to the internet via various
technologies such as dial-up, DSL, cable, fiber-optic, or wireless connections. I
Example – Bharat Sanchar Nigam Limited (BSNL), Airtel, MTS, Vodafone, Tata
Docomo, etc.
e) Modem: A modem is a device that enables computers to transmit data over
telephone lines or cable lines. It converts digital signals generated by computers into
analog signals that can be transmitted over a telephone or cable line, and vice
versa. Its is also known MOdulator/DEModulator.
f) Types of Common Internet Connectivity: The many types of Internet
connectivity that are currently accessible can be broadly divided into wired and
wireless access. The table below provides a summary of several Internet access
options, divided into wired and wireless:
Technology Type of Connectivity
Dial-up Wired
DSL Wired
Cable Internet
Wired
Access
3G Wireless
WiMax Wireless
Wi-Fi Wireless

3G: Third-generation cellular network that offers mobile internet access.


WiMAX: WiMAX (World Wide Interoperability for Microwave Access) is a wireless
broadband technology that offers high-speed data transmission over a wide area.
Wi-Fi: Wi-Fi (Wireless Fidelity) is a wireless networking technology that allows
devices to connect to the internet using radio waves.
Session 3 : Introduction to Instant Messaging
Instant Messaging: Instant messaging (IM) is a real-time or online communication
method that enables users to send and receive text messages and other digital files
through a network or the internet.
Features of an instant messaging are as follows:

•Quick and easy communication between individuals or groups.


•It is a cost-effective communication method as it does not require expensive phone
calls or postage.
•Instant messaging allows for real-time collaboration and decision-making.
Type of Instant Messaging : There are two Types of Instance Messaging (IM)
Application Based and Web Based.
a) Application Based: Application based instant messaging software can download
and installed in Computer and mobile phone. Some of the popular Instance
Messaging Software are –
•Google Talk
•Yahoo! Messanger
•Skype
b) Web Based: Web based instant messaging software can open in web browsers
Some of the popular web based Instant messaging software are –
•Yahoo! Messenger (Support Application and Web both)
•Meebo
•MSN Web Messanger
Session 4 : Chatting With A Contact – Google Talk
Google Talk: A free instant messaging service offered by Google was called Google
Talk. Users could make audio calls, send files, and chat with other Google Talk users
on a computer or mobile device.

Google Talk was officially discontinued by Google in 2017, and its


features have been merged into Google Hangouts.
There are some general rules and etiquettes to be followed while chatting.

•Use appropriate language and tone


•Respect other people’s privacy and personal information
•Do not share sensitive or confidential information
•Be polite and courteous in all communications.
Session 5 : Creating and Publishing Web Pages – Blog
Blog: A blog is a type of website or online platform where an individual or group of
individuals can share their thoughts, opinions, experiences, or knowledge.
Some of the popular Website provide blog services are –

•www.WordPress.com
•www.blogger.com
•www.blog.com

Session 6 : Using Offline Blog Editors


Offline blog editors are software tools that allow users to create and edit blog posts
offline, without the need for an internet connection.
Free offline blog editors are –

•Qumana
•Windows Live Writer
•Blogdesk
Session 7 : Online Transactions
Online transactions have made transactions very convenient and simplified the
workflow in many forms in a business. Online transactions deals with transfer of
money over the internet. Revolution in the electronic media has made transaction
handling easy .
Some of the popular online transaction websites are:

•IRCTC, an online portal for booking flight and train tickets.


•Flipkart, an online shopping portal for buying consumer products.
•EBay, an online portal for buying and selling goods.
•Redbus, an online portal for booking bus tickets.
Session 8 : Internet Security
Internet security is a branch of computer security specifically related to the Internet,
often involving browser security but also network security.
Following is a general guideline for managing strong passwords.

1.Length: Make sure the password is at least 12-14 characters long if possible.
2.Avoid sequences: Do not use letter or number sequences such as “abcdefg” or
“123456”.
3.Avoid personal information: Do not use usernames, pet names, relatives’ names,
or something that the public or workmates know you strongly like or dislike.
4.Include numbers and symbols: If allowed, include numbers and symbols in the
password.
5.Use both upper and lower case letters: Use a mix of upper and lower case letters
in the password.
Firewalls:A firewall, which could be hardware or software, can help keep a network
and computer secure. Firewalls examine network traffic to decide whether or not it
should be permitted.

THREATS ON INTERNET:

Malware: Malware is malicious software that is designed to disrupt or damage


computer systems.

Phishing: Phishing is often done by sending emails or messages that appear to be


from a legitimate source, but are actually designed to trick the recipient into giving
up their information.

Cyberbullying :is when someone, typically a teenager, bullies or harasses others on


the internet and other digital spaces, particularly on social media sites.

You might also like