0% found this document useful (0 votes)
11 views10 pages

10th Web Applicationa

Uploaded by

gsssshahzadpur
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views10 pages

10th Web Applicationa

Uploaded by

gsssshahzadpur
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

SESSION 1: Working with accessibility options Sticky keys is an accessible feature that makes modifier keys such as Shift,

feature that makes modifier keys such as Shift, Ctrl, Alt



or Window key to remain active until any other key is pressed.
What is Computer Accessibility?  Sticky Keys help users with physical disabilities to reduce repetitive strain as they
need not to press multiple keys together at same time.
Computer Accessibility refers to accessing and using both hardware and software How to enable Sticky Keys?
resources of computer system easily and conveniently by everyone regardless of their
disability or impairment. 1. Click start → Control Panel → Easy of Access → Easy of Access Center
2. Select ‘Make the keyboard easier to use’
What is Assistive Technology? 3. Check ‘Turn On Sticky Keys’ check box
4. Click on Apply → OK
Combining hardware and software in such a way that anyone with disability or To disable Sticky key uncheck ‘Turn on Sticky Keys’ and Click Apply → OK.
impairment can use computer easily and conveniently.
Filter Keys
Types of Impairment
Filter key is an accessible feature that restricts repeated keystrokes in order to
Cognitive Impairment and Learning disabilities: it refers to disability of remembering, make typing easier.
learning and taking decisions such as dyslexia, Attention Deficit Hyperactivity disorder  Filter keys help user with disabilities like hand tremors
(ADHD) or autism. How to enable Filter Keys?

Visual Impairment: it refers to low vision that can be corrected to normal vision, 1. Click start → Control Panel → Easy of Access → Easy of Access Center
complete or partial blindness and color blindness. 2. Select ‘Make the keyboard easier to use’
3. Check ‘Turn On Filter Keys’ check box
Hearing Impairment: it refers to disability in hearing whether permanent or 4. Click on Setup Filter Keys
fluctuating. 5. Ensure that Turn on Repeat keys and Slow key is selected
6. Click on Apply → OK
Motor or Dexterity Impairment: it refers to partial or complete loss of body part Toggle Keys
movement such as paralysis, cerebral palsy, or carpel tunnel syndrome and repetitive
strain injury. Toggle keys is an accessible feature that emits each time you press locking keys
such as Caps Lock, Scroll Lock, Insert, Num Lock.
Launching Accessibility Options  Toggle keys help user with disabilities like vision impairment or cognitive
impairment.
Click start → Control Panel → Easy of Access → Easy of Access Center How to enable Toggle Keys

Keyboard Tab (How to use Keyboard) 1. Click start → Control Panel → Easy of Access → Easy of Access Center
2. Select ‘Make the keyboard easier to use’
Sticky Keys 3. Check ‘Turn On Toggle Keys’ check box
4. Click on Apply → OK
Sound Sentry
Sound Sentry is designed to help users with hearing impairments. How to change width of the cursor?
Sound Sentry generates visual warnings, such as a blinking title bar or a flashing
border, whenever the computer generates a sound. 1. Click start → Control Panel → Easy of Access → Easy of Access Center
How to enable Sound Sentry? 2. Select ‘Make the computer easier to see’
3. ‘Set the thickness of the blinking cursor’ from drop down list under ‘Make things
1. Click start → Control Panel → Easy of Access → Easy of Access Center on the scree easier to see’
2. Select ‘Use text or visual alternatives for sounds’ 4. Click on Apply → OK
3. Check ‘Turn on visual notification for sounds (Sound Sentry)’ check box How to change blink rate of the cursor?
4. Click on Apply → OK
ShowSound 1.Click start → Control Panel → Easy of Access → Easy of Access Center
2.Select ‘Make the keyboard easier to use’
ShowSound is accessibility feature that instruct application uses sound to present 3.Click Keyboard Setting
information, to also provide information visually like text captions or informative 4.Under ‘Cursor blink rate’ move the slider back or forth to increase or decrease
icons. rate
 ShowSound is designed to help users with hearing impairments. 5. Click on Apply → OK
How to enable ShowSound? 6. Click on OK
Mouse Tab (How to use Mouse)
1. Click start → Control Panel → Easy of Access → Easy of Access Center
2. Select ‘Use text or visual alternatives for sounds’ Mouse Keys
3. Check ‘Turn on caption for spoken dialog (when available)’ check box
4. Click on Apply → OK Mouse Keys is an accessible feature that enables a keyboard as a pointing device
High Contrast instead of mouse.
 Mouse Keys uses numeric keypad of keyboard as pointing device.
High Contrast is an accessibility feature to assist people with vision impairment.  In Numeric Pad, Number key 4 is used to move left, 6 to move right, 2 to move
You can change the size and color of fonts and the background for ease of down and 8 to move up.
viewing. How to enable Mouse Keys?
How to enable High Contrast?
1. Click start → Control Panel → Easy of Access → Easy of Access Center
1. Click start → Control Panel → Easy of Access → Easy of Access Center 2. Select ‘Make the keyboard easier to use’
2. Select ‘Make the computer easier to see’ 3. Check ‘Turn On Mouse Keys’ checkbox
3. Check ‘Turn on or off High Contrast’ check box 4. Click on Apply → OK
4. Click on Apply → OK To disable Mouse Keys uncheck ‘Turn on Mouse Keys’ option.
To disable High Contrast uncheck Turn on or off High Contrast check box
Serial Keys
Cursor Options
Serial Keys is an accessibility feature that assists people that have difficulty using a
Cursor Options is also an accessibility feature that assists people with vision impairment keyboard or a mouse (or both). They can use special devices such as Sip, Puff and
by changing the blink rate and width of the cursor. Breath Switches to provide input to the computer through Serial Ports.
SESSION 2: Networking fundamentals Types of Network

What is Computer Network?  Local Area Network


 Metropolitan Area Network
“A computer Network is group of connected devices such as Computer, Laptop,  Wide Area Network
Printers, and Scanners, Mobiles devices, which can communicate with each other and  Personal Area Network
share hardware and software resources.” Local Area Network

Advantages of Computer Network  A Local Area Network is a collection of interconnected Computers and its
associated devices that are located in a close proximity.
 Hardware Resources sharing: Printer, Scanner, Photocopier, CD Drive etc.  LAN Occupies small area not more than 1-5kms.
 Software Resources Sharing: ERPs Open Source Software etc.  Speed of data transfer is high as compare to other networks.
 Information Sharing: File sharing like documents, sheets, reports etc.
Metropolitan Area Network
 Increase Storage Capacity: Usually Server of Computer Network have large
storage capacity. Total Storage capacity of each node of Computer Network also  A Metropolitan Area Network is a collection of interconnected Computers and its
increases storage capacity. associated devices that are located at one Geographic location such as multiple
 Cost Efficient: Computer Networks are cost effective as we can share one
office building in a city.
resource to many.  MAN Occupies area between 5 to 50 kilometers.
 Collective User Interaction (Multi User Environment) : Computer Network allows
 It often acts as high speed network.
many user to work together simultaneously in a project and as a result a lot of  Examples- Municipal Offices network, Police Station network etc.
time and effort is saved. Wide Area Network
Network architecture
 A Wide Area Network is a collection of interconnected Computers and its
Networks are designed using the following architecture associated devices that are located at different Geographic location such as
different cities, states or countries.
 Peer to Peer (P2P) Architecture  Comparatively low speed network to LAN and MAN.
 Client Server Architecture  Examples- National Banks, Railways, INTERNET etc.
Peer to Peer Architecture Personal Area Network

Networks in which all computers have an equal status are called peer to peer networks.  A Personal Area Network is collection of various interconnected devices such as
Generally in such a network each terminal has an equally competent CPU computers, mobile devices, fax machines and printers available closely to an
individual user.
Client Server Architecture  Mostly it uses Wi-Fi connectivity.
 Usually operated or owned by individuals.
Networks in which certain computers have special dedicated tasks, providing services  It covers distance of maximum 10-30mtr.
to other computers (in the network) are called client server networks. The computer(s) INTERNET
which provide services are called servers and the ones that use these services are called
clients.
Internet is independent global network system of countless computers and electronic DSL Wired
devices scattered around the globe connected to each other wirelessly or wirely with
the help of various devices such as satellite, routers, wires and modems, for sharing Cable Internet Access Wired
information and communicating with each other. 3G Wireless

WORLD WIDE WEB WiMAX Wireless

`Wi-Fi Wireless
World Wide Web popularly called ‘Web’ is a leading information sharing service of the
Internet, which was developed by Tim Berners Lee in 1989 to give user access to wide Dial-up:
range of documents that are connected to each other by hyperlink and written in
HTML.  Dial-up Internet access is a form of Internet access that uses the facilities of the
public switched telephone network (PSTN) to establish a connection to an
 Content of HTML documents can be any text, graphics, audio or video. Internet service provider (ISP) via telephone lines using a device called MODEM.
 Every HTML Document is can be accessed by its unique address known as URL  Users dial a particular number provided by the ISP and gain access to the
 To read HTML Documents Web Browser is used.
Internet.
What is Web Browser?  Dial-up connections are extremely slow and in most cases, it is replaced by a high
speed connection such as DSL or Cable Modem.
DSL:
A Web Browser is software used to view Web sites and acts as an interface between the
user and the World Wide Web.
Digital subscriber line(DSL) provide Internet access by transmitting digital data

over wires of a local telephone network.
What is Web Server?
 DSL service is delivered along with wired telephone service on the same
telephone line.
A Web server is a computer that stores web sites and their related files for viewing on
 For using a DSL connection, you need a DSL modem and a subscription.
the Internet.
Cable Internet Access:
Internet Service Provider
 Cable Internet Access is a form of broadband Internet access that uses the cable
television infrastructure.
 An Internet service provider (ISP) is an organization which provides you with
 Cable Internet Access is provided through existing cable TV networks.
access to the Internet via a dial-up (using modem) or direct (hard wired) or
3G:
wireless connection.
 There are different types of internet connectivity technology such DSL, cable
 3G, short for 3rd Generation is a set of standards used for mobile devices and
modem, dial-up, broadband wireless, WiMAX or 172 3G offered by ISPs.
mobile telecommunication services and networks.
Types of Internet connectivity
 High-Speed Downlink Packet Access (HSDPA) is 3G mobile telephony
communications protocol that allows higher data transfer speeds and capacity.
Technology Type of connectivity

Dial-Up Wired WiMAX:


 WiMAX (Worldwide Interoperability for Microwave Access) is a wireless  Message history (Save messages for future reference).
communications standard designed to provide mobile broadband connectivity Instant Messaging Services
across cities and countries through a variety of devices.
 WiMAX is a long range system, covering many kilometres and is typically used Application Based:
where DSL or Cable Internet Access cannot be used;
WI-Fi: Yahoo messenger
Window live messenger
Wi-Fi is a popular technology that allows an electronic device such as computers  Skype
or mobile phones to exchange data wirelessly over a network, including high-  Google Talk
speed Internet connections.  Rediff Bol
 WiFi devices such as personal computer, smartphones, video game console, etc. Web Based
can connect to a network resource such as Internet through a device called the
Wireless Access Point (WAP).  Meebo
 Wi-Fi connectivity is used in home & offices, hotels, college & school campus  MSN web Messenger
typically for Internet Access.  Imo
MODEM  Yahoo Web Messenger
Difference between Instant Messaging and Email
 Modem refers to MOdulator DEModulator.
 It converts Internet Signals (Analog) into digital signals (computer signals) and Instant messaging Email
vice versa.
 To connect with Internet Modem plays the most important role. Recipients must be online to receive Recipients may not be online when
SESSION 3: Introduction to Instant Messaging message. the message is sent or received

Instant Messaging requires the users to Email does not require to use same
What is Instant Messaging?
use the same application email service application

 Instant messaging (IM) is a form of communication over the Internet that offers In Instant Messaging, recipient can view In Emails, receiver can view
an instantaneous transmission of text-based messages from sender to receiver. message instantly when delivered message at a later time.
 Most instant messaging software include the option for performing file transfers, What is Google Talk
audio chat, video calling and conferencing, sharing desktops, etc.
 apart from standard text chat. Instant messaging software is widely used for  Google Talk is an instant messaging service that provides both text and audio
personal and commercial use. communication.
Features of Instant Messaging  It is available in form of both application based and web based.
 It is free to use and developed by Google Inc.
 Text Messages can be sent to one or more person (Similar to SMS)  To use Google Talk one must require Gmail account.
 Audio calling and conferencing. SESSION 4: Chatting with a Contact in Google Talk
 Video calling and conferencing.
 File transfers (Not limited to documents, spread sheets, audio files, video files, Etiquettes to be followed while Chatting
etc.)
 Messages should be short and to the point.
 Always introduce yourself by name if your screen name doesn’t reflect it. Blog presents all posts in reverse chronological order.
 Always ask if the other person has time to chat first regardless of how important Blogs can be run by an individual, group or organization.
chat could be What is blog post?
 Matter of discussion or topic of chat should be well known.
 Avoid typing in capitals as it indicates aggressiveness or rudeness. Blog post are individual web pages used to write articles on a regular time period and
 Wait for the response from other side. published on blog. Blog post content can include text, images, audio and videos.
 respect to whom we are chatting by paying attention
 It’s important to properly end an IM conversation Websites that offer blog services:
Chatting on GMail
www.wordpress.com
 Gmail also facilitate chatting services. The same procedure will be followed while www.blogger.com
making voice chats, text chats etc. using the Gmail.  www.blog.com
How to do chatting in Gmail? (steps to chat using Gmail)  www.weebly.com
 www.blogsome.com
 Sign in to gmail and go to contact window displayed on the either side of  www.wix.com
browser.  www.tumblr.com
 Double click on the contact name from contact list to whom to chat. How to create a blog account?
 One popup will appear where you can start typing message to send and receive
from other side. Open www.wordpress.com
Chatting on Yahoo The homepage of wordpress contains blog address, username, password, emails
etc. fields.
 To chat with Yahoo we need to install Yahoo messenger application.  First of all provide a unique address for your blog in blog address field
 To chat in Yahoo! We should have yahoo mail account  Now enter username, password, and email in their respective fields
How to chat in Yahoo?  Click on create blog and your blog will be ready to use.
How to create and publish post?
 Prepare contact list by adding yahoo mail accounts of others by sending them
invitation. Open your blog dashboard by entering username, password in
 Now sign in to Yahoo Messenger and click on smily displayed at top left side www.wordpress.com
 A popup will be opened, click on pencil icon and a message window appears at  From left panel click on ‘post’ and select ‘new’, A new window will be opened.
bottom of popup  Here you first provide title of your post.
 Select the contact and start chatting by typing message in message window.  Type content below title box, you can type text, insert images, audio and videos
SESSION 5: Creating and Publishing Web Pages as per your requirement.
 After finalizing content click on ‘publish’ to publish your post to make it live for
What is blog?
all.
What do you mean by publishing a post?
 Blogs is similar to online personal diary in which someone can share information
or their thoughts on a variety of topics.
Publishing a post refers to creating new content for users and make it live and available
 Blog is an informational website, contains different posts or pages.
for them in Internet.
SESSION 6: Using Offline Blog Editor  ATM
 Debit card
Purpose of offline blog editor  Credit Card
 NEFT
 It lets you create post without Internet connectivity  IMPS
 Uploading images and videos become easier  UPI
 Easy to publish blogs
 PAYTM
 Creating post takes less time
 PHONEPE
 Easy to work with multiple blogs
SESSION 8: Internet Security
Free Offline blogger
Internet security refers to security related to Internet. It involves Internet browsing
 Qumana security and computer network security. Its main objective is to establish rules and
 Window Live Writer measures to protect your data, computer system, and computer network from
 Blogdesk malicious activities and attack over internet.
 Blogjet
 Post2blog Best Practices for Internet Security
SESSION 7: Online Transactions
 Use strong password
Online Transaction refers to transfer of money over the Internet.  Use encryption software to protect your data from unauthorized users.
 Never save your username, password on computers that are used in share
Examples of Online transaction environments.
 Read privacy statement or policy carefully while registering with a website.
 Deposit or Withdraw money from an ATM machine  Be cautious when filling out forms asking for personal information. Research and
 Payments using debit/credit card verify the authenticity of website.
 NEFT/RTGS
 Use secure practices for performing and maintaining online transactions. Make
Benefits of Online Transaction sure that website is legitimate.
 Use antivirus and antispyware to protect your system from different types of
 Fast transaction speed malwares.
 Convenient  Never respond to mails from unknown users.
 Low risk of theft  Clear browser cookies frequently.
List of popular online transaction websites  Keep the operating system and application softwares updated.
 Install firewalls in your system
 Flipcart  Never install software from unknown sources.
 Amazon Tips to manage strong password
 IRCTC
 EBay  Keep the length of the password at least 12-14 characters if permitted.
 SBI  Avoid keeping passwords based on repetition, dictionary words, letter or number
Online transaction Tools sequences, usernames, relative or pet names, etc.
 Including numbers, and symbols in passwords if allowed.  Conduct regular drills
 Use capital and lower-case letters.  Smoke alarms must be placed at proper intervals
 Avoid using the same password for multiple sites or purposes.  Keep workplace a no-smoking zone
 Avoid using something that the public or workmates know you strongly like or  Maintenance of safety equipment must be taken care of regularly
dislike. Falls and slip safety rules
Clear browsing data and cookies
 Keep the moving area clean and clutter free.
In Mozilla Firefox  Workplace must be proper ventilated receive light.
 Wear non slippery footwear.
 Click ‘menu’ from top right corner  Floors must be clean and dry
 From drop down select ‘settings’.  Oil spills, dust must be immediately cleaned.
 now from the left pan select Privacy and Security. Electrical safety rules
 Under ‘Cookies and Site Data’ click on ‘Clear data’ option
 Check ‘cookies and site data’ and ‘cached web content’ option  Electrical equipment used should be approved by a recognized organization.
 Click on ‘clear’ button.  Workers should be trained to handle the electric equipment safely
In Google Chrome  Damaged and hazardous electrical equipment should be immediately replaced.
All old and workout and frayed switches and wires should be changed.
 Click ‘menu’ from top right corner  Heat emanating equipment should be kept away from the electrical equipment.
 From drop down select ‘settings’.  Take care that the outlets/ circuits should not be overloaded.
 now from the left pan select Privacy and Security.  Switch off and unplug the electrical appliances before cleaning or relocating
 Under ‘Privacy and Security’ click on ‘Clear browsing data’ option them.
 Check ‘browsing history’, ‘cookies and other site data’ and ‘cached image and Use of First Aid
files’ option
 Click on ‘clear data’ button.  First aid is the instant assistance provided to injured to save life and reduce
SESSION 9: Maintain Workplace Safety health loss till the proper medical facility is provided.
 Every human being must aware of First Aid use, as it may save life if provided
There are some basic safety rules and procedures that every organization must follow. effectively on time to injured.
All the employees must also be trained to follow these safety rules.  Every organization must have basic First Aid Kit.
First Aid Rules
Safety rules to follow at workplace:
Assure the injured to remain calm and not to panic
 Fire safety Keep them warm if they are under shock
 Falls and slip
 Do not move the victim in case of back/neck injury
 Electrical safety
What is occupational hazard?
 Use of first aid
Basic Fire safety rules An occupational hazard is the illness one may acquire due to his occupation. Like
people working in a chemical factory may get affected due to presence of certain
 Fire escape plans must be installed at proper levels chemicals.
Types of occupational hazards are :  Pandemics
 Terrorist attack
 Physical hazards  Fire
 Chemical hazards  Floods
 Biological hazards  Thunderstorms
 Behavioral hazards  Leakage of some hazardous gas/ chemical
 Radiological hazards Emergencies that require evacuation
 Ergonomic hazards
SESSION 10: prevent accidents and emergencies  Fire
 Explosion
What do you mean by accident?  Floods
 Earthquake
An unplanned event that may happen suddenly and may lead to unwanted and  Hurricane
unprecedented results is called an accident.  Tornado
 Toxic material release
Types of Accidents  Civil disturbance
 Workplace violence
Slips and fall accidents SESSION 11: Protect Health and Safety at Work
Fire – Industrial disease/illness
 Road traffic accidents A hazard is anything that is the source of any potential harm, damage or any kind of
 Clinical Accidents potential loss of health or life.
 Sports related accidents
Handling Emergencies Types of Hazard

Every organization must follow SOP for accident handling  Physical


Safety measures must be placed to prevent workplace accidents  Chemical
 Immediately call the medical team for any injury  Biological
 Stay alert  Mechanical
 Pay attention to and follow emergency drills How to reduce hazard for workstations
Emergency
 Provide sufficient space for the user to alter position comfortably
Any unexpected situation that needs immediate attention and action  Provide adequate lighting
 Have windows fitted with adjustable coverings to alter the sunlight level

Types of Emergency  Be spacious enough when a workstation is shared by more than one person
How to reduce hazard for display screen
 Chemical spills
 Extreme heat waves  display well-defined characters of adequate size and spacing
 Droughts  have a stable image
 have easily adjustable brightness and contrast
 tilt and swivel easily to suit the user
 be free from glare and reflections
 Use a separate base for the screen or an adjustable table
How to reduce hazard for keyboard

 be able to tilt easily and should be able to separate from the screen to allow the
user to adopt a comfortable working position
 have space in front to provide support for the hands or arms of the user
 have a matt surface
 have clearly legible symbols on the keys
how to reduce hazard at work surface

 Provide adequate space for the user


 have a low reflective surface
 be of an adequate size to allow the screen, keyboard and other peripherals to be
flexibly arranged
 have a stable and adjustable document holder, which should be at the same level
as the screen and at the same viewing distance
Workplace evacuation

 Organization must have a designated assembly point for emergencies. Ensure


that every employee/ worker must know where it is.
 A ‘buddy system’ for individuals with special needs or disabilities must be
designated. This system ensures that differently-abled are assisted and guided
out of the premises or the impacted area properly.
 If you are a buddy to someone, ensure that your buddy is safe at the assembly
point with you.
 Floor plans with evacuation routes in work areas. Ensure that you understand
these so you can use it in time of need.
 Assembly areas, where you are required to assemble after evacuation, must be
properly taken care of.
 Periodic evacuation drills should be conducted. Ensure that you pay attention
during these drills. You need to save your life and you can be helpful in saving
someone else’s life too.

You might also like