Web Application and Safety Notez
Web Application and Safety Notez
MOUSE TAB
MouseKeys
MouseKeys is an accessibility feature that assists people who have difficulty using a mouse. This
option uses the keyboard (especially numeric keypad) as a pointing device instead of a mouse.
General Tab
This tab enables you to configure accessibility options for all users. Select the General Tab, a
window to configure additional accessibility options will be displayed
Serial Keys
Serial Keys is an accessibility feature that assists people that have difficulty using a keyboard or
a mouse (or both).
CLIENT-SERVER ARCHITECTURE:
Networks in which certain computers have special dedicated tasks, providing services to other
computers (in the network) are called client server networks. The computer(s) which provide
services are called servers and the ones that use these services are called clients.
TYPES OF NETWORKS
There are two major types of network Local Area Network (LAN) and Wide Area Network
(WAN).
LOCAL AREA NETWORK
A local area network (LAN) is one which connects computers and devices in a limited
geographical area such as home, school, computer laboratory, office building, or closely
positioned group of buildings. Usually local area networks offer very high speeds and are used
for connecting computers and peripherals such as printers, scanners,etc.
WIDE AREA NETWORK
A wide area network (WAN) is one which covers a broad area (i.e., any network that links across
metropolitan, regional, or national boundaries). The Internet is the most popular WAN, and is
used by businesses, governments, non-profit organizations, individual consumers, artists,
entertainers, and many others.
INTERNET
The Internet is a global system of interconnected computer networks that use the standard
Internet protocol suite to serve billions of users worldwide. It is a network of networks that
consists of millions of private, public, academic, business, and government networks.
WORLD WIDE WEB
World Wide Web (abbreviated as WWW or W3, commonly known as the Web), is a system of
interlinked hypertext documents accessed via the Internet. With a web browser, one can view
web pages that may contain text, images, videos, and other multimedia, and navigate between
them via hyperlinks.
Some of the advantages associated with networking are:
•Data Sharing: One of the most important uses of networking is to allow the sharing of data.
•Files transfer : Users can send text files, spread sheets, documents, presentations, audio files,
video files, etc. to other users.
•Hardware Sharing: Hardware components such as printers, scanners, etc. can also be shared.
•Internet Access Sharing: You can purchase a single Internet connection and share it among
other computers in a network instead of purchasing multiple Internet connection for each
computer
•Usage of network based applications: Such as web browsers, email clients, chat application,
audio & video calling, etc. is another advantage.
Wired Technology
1) Dial-up:- It uses the facilities of the Public Switched Telephone Network (PSTN) to establish
a internet connection via telephone lines using a device called MODEM. Users dial a number
and get access to internet. Dial-up connections are extremely slow.
2) DSL:- DSL is Digital Subscriber Line provides internet connectivity by transmitting digital
data over wires of a local telephone network. It enables the use of Telephone and Data
Transmission on a single telephone line. For using DSL Connection, we need a DSL modem and
a subscription.
3) Cable Internet Access:- It is a form of broadband Internet access that uses the cable TV
infrastructure. It is provided through existing cable TV networks and it is similar to DSL.
The data is broken up into bits of same sized pieces called packets.
A header is added to each packet explaining where the data has come from, where it should
end up and where it fits in with the rest of the packets.
Each packet is sent from computer to computer until it finds its destination. All packets may
not take the same route.
At the destination, the packets are examined. If any packets are missing or damaged, a
message is sent asking for them to be resent. This continues until all packets have been received
intact.
The packets are now reassembled into their original form. All this done in seconds!
• Whenever your friend in the contact list is online you can see the person along with a green dot.
• You can start sending text chat message instantly by double- clicking on a contact.
There are some general rules and etiquettes to be followed while chatting.
•Messages should be short and to the point.
• Always introduce yourself by name if your screen name doesn’t reflect it.
• Always ask if the other person has time to chat first – regardless of how important you think
what you have to say is, it’s not going to be well received if the recipient is busy.
• Give people time to respond - Multiple questions sent to a recipient before they’ve had a
chance to answer can seem more like an interrogation rather than a conversation.
Online Threats
The threats / vulnerabilities that uses World Wide Web (Internet) to facilitate crimes are called
Online Threats.
Like:-
1) Phishing :- The act of acquiring personal / private and sensitive data from personal computers
for use in fraudulent activities. For eg. Mails from unknown persons that ask for your credit
debit card details.
2) Email spoofing :- It is the creation of email messages with a forged sender address. For eg.
Sending an email with a forged email address which appears to be original. These mails are
infected mails which contain worms.
3) Chat Spoofing:- Spoofing means hoax, trick, or deceive which contains false information.
Hiding / Faking the identity of another person over the internet is called chat spoofing
1) Use strong passwords: A combination of alphanumeric and special characters could be used
for creating a password that is not so easy to crack or guessed by other users.
General Guidelines for strong password
a) Keep the length of the password at least 12-14 characters if permitted.
b) Avoid keeping passwords based on repetition words, dictionary words, usernames, pet names
etc.
c) Include numbers and symbols in passwords.
d) Use Capital and lowercase letters.
e) Avoid using same password for multiple sites or purposes.
f) Avoid using something that the public or workmates know you strongly like or dislikes.
2. Backup your data: Always keep copies of data in CD, pendrives etc, so it could be helpful in
situation when there is a loss of data.
3. Use Encryption software: Use encrypted software available within the operating software to
protect data from unauthorized users.
4. Keep username and password private: Never save passwords or usernames on computers
that are used in shared environments like net café.
5. Registering with website: Read privacy policy whenever you register with a website, the
policy will include information about how the website use personal data.
6. Do not share personal information: Be cautious when filling out forms on internet. Because
your personal information or emails could be used by unauthorized users to send fake or
unwanted emails. So, first research and verify if it’s a trusted website or not before providing
personal information to any website.
7. Secure transactions: It is always recommended to use only secure websites for online
shopping or transactions, because these websites store your credit card or online banking
personal information. Verify if the website uses secure transaction, usually it is indicated through
a digital certificate represented as a golden lock in the web browser’s address bar.
8. Use Antivirus and antispyware software: These softwares protect your computer from any
changes by malwares/threats. Keep these softwares up to date.
9. Do not immediately respond to mails from unknown users: Some mails, that promise you
jobs or announce lottery results, may contain virus or scripts or they can try to gather your
personal information. Never open the attachments from unknown persons.
10. Install firewalls: Firewalls keep your system and network secure. They could be software or
hardware. So, Install and configure your firewall.
11. Regularly update your operating system and software applications.
12. When you visit websites, cookies are created on your system that may contain your personal
or logon details. Clear browser cookies frequently so that your logon details could not be tracked
by unauthorized users
Workplace Evacuation
In case of emergency there should be provision for evacuation. Evacuation is the process of
emptying a place in case of an emergency, disaster. Every company must ensure following points
for evacuation in case of any emergency:
An evacuation policy : Every organization must have an evacuation policy. All the Team
Leaders are responsible for informing about the policy to their employees about it. Proper
attention must be paid when the Team Leader is informing you about these details. Negligence at
this time may cost lives.
Organization must have a designated assembly point for emergencies. Ensure that every
employee/ worker must know where it is.
A ‘buddy system’ for individuals with special needs or disabilities must be designated. This
system ensures that differently-abled are assisted and guided out of the premises or the impacted
area properly. If you are a buddy to someone, ensure that your buddy is safe at the assembly
point with you.
Floor plans with evacuation routes in work areas. Ensure that you understand these so you can
use it in time of need.
Assembly areas, where you are required to assemble after evacuation, must be properly taken
care of.
Periodic evacuation drills should be conducted. Ensure that you pay attention during these
drills. You need to save your life and you can be helpful in saving someone else’s life too.
Healthy Living
‘A healthy body has a healthy mind’ - a very popular saying is true ‘Healthy Lifestyle leads to a
healthy being. A healthy living has a lasting impact on an individual which ultimately yields a
healthy environment at home as well as at work place. a happy and healthy worker will always
perform best to his ability. A healthy lifestyle helps to keep and improve people’s health and
well being.
A healthy lifestyle includes :
- healthy eating habits
- physical activities
- stress management
- healthy mind
- sound sleep