0% found this document useful (0 votes)
11 views14 pages

Part B Unit 4 IT Notes

Uploaded by

vanshikatyagi211
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views14 pages

Part B Unit 4 IT Notes

Uploaded by

vanshikatyagi211
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 14

ASTER PUBLIC SCHOOL, NOIDA EXTENSION

CLASS X
INFORMATION TECHNOLOGY

Unit IV - Web Applications

Computer Accessibility: A computer is meant to be accessible to everyone regardless of any disability or


impairment, this is known as Computer Accessibility.

Assistive Technology: When a combination of hardware and software, it enables a person with a disability
or impairment to use a computer. It is known as Assistive Technology.
Impairments that impact Computer Usage
There are numerous types of impairment that impact computer usage. These include:
• Cognitive impairments and learning disabilities, such as dyslexia, attention deficit-hyperactivity
disorder (ADHD) or autism.
• Visual impairment such as low-vision, complete or partial blindness, and color blindness. It can be
temporary or partial.
• Hearing impairment People suffering from hearing impairment can face partial or total hearing loss
including deafness. It can be temporary or permanent.
• Motor or dexterity impairment such as paralysis, cerebral palsy, or carpal tunnel syndrome and
repetitive strain injury. People suffering from motor or dexterity impairments face difficulty in making use
of their hands or their body to perform tasks.

Accessibility Options (Ease of Access Center) in Control Panel are used to customize the way your
keyboard, display, or mouse function. Many of these features are useful for people with disabilities

Sticky Keys allows the user to press and release a modifier key, such as Shift, Ctrl, Alt, or the Windows
key,and have it remain active until any other key is pressed.
It is an accessibility feature to help computer users with physical disabilities, but
it is also used by others as a means to reduce repetitive strain.

Filter Keys is an accessibility function that tells the keyboard to ignore brief or repeated
keystrokes,making typing easier for people with hand tremors. It is a feature of Microsoft Windows.

ToggleKeys is an accessibility function which is designed for people who have vision impairment or
cognitive disabilities. When ToggleKeys is turned on, computer emits sound cues when the locking keys
(Caps Lock, Num Lock, or Scroll Lock) are pressed. A high sound is emitted when the keys are switched on
and a low sound is emitted when they are switched off. ToggleKeys is also a feature of Microsoft Windows.

Sound Sentry is designed to help users with auditory impairments. SoundSentry generates
visualwarnings, such as a blinking title bar or a flashing border, whenever the computer
generates a sound.

High Contrast is an accessibility feature to assist people with vision impairment. You can change the size
and color of fonts and the background for ease of viewing.

Cursor Options is also an accessibility feature that assists people with vision impairment by
changing the blink rate and width of the cursor.

MouseKeys is an accessibility feature that assists people who have difficulty using a mouse. This
option uses the keyboard (especially numeric keypad) as a pointing device instead of a mouse.
Serial Keys is an accessibility feature that assists people that have difficulty using a keyboard or
amouse (or both). They can use special devices such as Sip, Puff and Breath Switches to provide
input to the computer through Serial Ports.

1
ASTER PUBLIC SCHOOL, NOIDA EXTENSION
CLASS X
INFORMATION TECHNOLOGY

A computer network is a collection of computers and other hardware components interconnected


by communication channels (cables or satellites) that allow sharing of resources and information.
It is a group of two or more computer systems or peripheral devices that are connected together to
exchange information and share resources with each other.
Types of Networking Structures

Peer-to-peer (P2P) Architecture:


Networks in which all computers have an equal status are called peer to peer networks.
Generally,in such a network each terminal has an equally competent CPU.

Client-Server Architecture:
Networks in which certain computers have special dedicated tasks, providing services to other
computers (in the network) are called client server networks. The computer(s) which provide
services are called servers and the ones that use these services are called clients.

Difference between P2P & Client Server Networks


P2P Client Server
All computers are equal in capabilities as well as in the
A specific computer, more powerful than the others,
use of resources. acts as the server and provides resources to the
other computers on the network.
In this type of network, each computer can request and The server provides resources, whereas the client
also provide services to the other computers. can request resources from the server.
Each computer can store its own data. The data is stored in a centralized computer, i.e,
server.
Since every computer is required to provide its If all the computers of the network request for
resources for use by the others in the network, no service simultaneously from the server, it will result
effect will be noted when multiple users in slowing down the server.
simultaneously perceptible operate their computers.
AP2P network is less expensive and easier to Client-Server networks are usually more expensive
implement. and not-so-easy ‘to implement
Security is a major concern with this type of network. lt is easy to take measures to secure the system in a
Client-Server network. Specific computers can be
allowed access to specific areas of the server.
It is usually implemented for a smaller number of A Client-Server application, like emails is used
world computers located in a limited area. However, worldwide, However, in many cases this type of
certain P2P applications, like Napster and Bit Torrent network is implemented locally also, such as in office
are spread across the world. buildings or educational campuses.

Types of networks
There are two major types of network LAN and WAN. Other are PAN and MAN
Local Area Network
A local area network (LAN) is one which connects computers and devices in a limited geographical
area such as home, school, computer laboratory, office building, or closely positioned group of
buildings.
Usually, local area networks offer very high speeds and are used for connecting computers
andperipherals such as printers, scanners, etc.
Wide Area Network
A wide area network (WAN) is one which covers a broad area (i.e., any network that links across
metropolitan, regional, or national boundaries). The Internet is the most popular WAN, and is used
by businesses, governments, non-profit organizations, individual consumers, artists, entertainers,
and many others.

2
ASTER PUBLIC SCHOOL, NOIDA EXTENSION
CLASS X
INFORMATION TECHNOLOGY
Personal Area Network (PAN)
This type of network connection covers a very small area, such as home or an office cabin. Desktop
computer, laptops, tablets, smartphones, printers, or wireless headphones make up the nodes of
this type of network. It uses Bluetooth, USB connections, or the increasingly popular Wi-Fi
technology for communication. It generally covers the range of less than 10 meters.

Metropolitan Area Network (MAN)


This type of network is geographically largen than LAN and covers a city. They are used by large
organisations, having several branches over a city or local government bodies, like Municipal
corporation, or police. This type of network uses microwave transmissions or fiber optic cables to
link the different nodes of the network.

Internet
The Internet is a global system of interconnected computer networks that use the standard Internet
protocol suite to serve billions of users worldwide. It is a network of networks that consists of millions of
private, public, academic, business, and government networks.
Internet is widely used by students, educational institutes; scientist and professionals to gather
information for research and general information.
World Wide Web
World Wide Web (abbreviated as WWW or W3, commonly known as the Web), is a system of
interlinked hypertext documents accessed via the Internet. With a web browser, one can view web
pages that may contain text, images, videos, and other multimedia, and navigate between them
via hyperlinks.

A Web Browser is a software used to view Web sites and acts as an interface between the user and the
World Wide Web. Ex – Mozilla Firefox, Internet Explorer

A Web server is a computer that stores web sites and their related files for viewing on the Internet.
Some of the advantages associated with networking are:
• Data Sharing: One of the most important uses of networking is to allow the sharing of data.
Users can send text files, spread sheets, documents, presentations, audio files, video files,
etc. to other users.
• Hardware Sharing: Hardware components such as printers, scanners, etc. can also be
shared. For example, instead of purchasing 10 printers for each user, one printer can be
purchased and shared among multiple users thus saving cost.
• Internet Access Sharing: You can purchase a single Internet connection and share it
among other computers in a network instead of purchasing multiple Internet connection for
each computer. This is very commonly found in Internet café (browsing centres), schools,
colleges, companies, etc.
• Usage of network-based applications: Such as web browsers, email clients, chat
application,audio & video calling, etc. is another advantage.
Some of the disadvantages associated with networking are:
• Initial Costs: Although the running cost of a network is lower than that of the individual
computer, but the initial cost of setting up a network is higher. Expensive devices, such as
routers, switches, hubs, networks interface cards and server can add up to the cost.
• Maintenance and Administration: If the network grows too large, various issues
may crop up in the day-to-day operation of the computer network. To work efficiently
and optimally, it requires high technical skills and know-how of its operations and
administration. A person just having basic skills cannot do this job.
• Major effect of Breakdown: If a computer network’s main server break downs, the
entire system would become useless. Likewise, in case of problems with the shared
resources, like hardware, software or storage system, all the computers on the network

3
ASTER PUBLIC SCHOOL, NOIDA EXTENSION
CLASS X
INFORMATION TECHNOLOGY
would also come to a standstill.
• Viruses: Unless special care is taken by using antivirus programs, a virus infection in one
computer may spread to all the computers on the network.
• Security: There is a danger of hacking, especially in large networks. The security of the
network, therefore, will have to be monitored and special software, like firewall will have to be
installed to prevent the breach of security.

Internet Service Provider


An Internet service provider (ISP) is an organization which provides you with access to the Internet via a
dial-up (using modem) or direct (hard wired) or wireless connection. Example are Bharat Sanchar Nigam
Limited (BSNL), Airtel, Vodafone etc.

Modem
Á modem is a device that converts digital computer signals into a form (analog signals) that can
travel over phone lines. It also re-converts the analog signals back into digital signals. The word
modem is derived from its function MOdulator/DEModulator.

Types of Common Internet Connectivity


Wired type of Connectivity: Dial-Up, DSL, Cable Internet Access
Wireless type of Connectivity: 3G, WiMAX, Wi-Fi

Dial-up: Dial-up Internet access is a form of Internet access that uses the facilities of the public
switched telephone network (PSTN) to establish a connection to an Internet service provider
(ISP) via telephone lines using a device called MODEM. Users dial a particular number provided
by the ISP and gain access to the Internet.
Dial-up connections are extremely slow and in most cases, it is replaced by a high speed connection
such as DSL or Cable Modem.

DSL: Digital subscriber line(DSL) provide Internet access by transmitting digital data over wires
of a local telephone network. DSL service is delivered along with wired telephone service on
the same telephone line. On the customer premises, a DSL filter removes the high frequency
interference, enabling simultaneous use of the telephone and data transmission.
For using a DSL connection, you need a DSL modem and a subscription.

Cable Internet Access: Cable Internet Access is a form of broadband Internet access that uses
the cable television infrastructure. Cable Internet Access is provided through existing cable TV
networks; this is similar to DSL that is provided over existing telephone lines.

3G: 3G, short for 3rd Generation is a set of standards used for mobile devices and mobile
telecommunication services and networks. High-Speed Downlink Packet Access (HSDPA) is 3G
mobile telephony communications protocol that allows higher data transfer speeds and capacity.

WiMAX: WiMAX (Worldwide Interoperability for Microwave Access) is a wireless communications


standard designed to provide mobile broadband connectivity across cities and countries through
a variety of devices. WiMAX is a long range system, covering many kilometres and is typically
used where DSL or Cable Internet Access cannot be used; this could be difficulty in laying out
cables for home or offices located in remote locations but need access to the Internet.

WI-Fi(Wireless Fidelity): Wi-Fi is a popular technology that allows an electronic device such as computers
or mobile phones to exchange data wirelessly over a network, including high-speed Internet connections.
Wi-Fi devices such as personal computer, smartphones, video game console, etc. can connect to
a network resource such as Internet through a device called the Wireless Access Point (WAP).

Wi-Fi is used where cables cannot be run (such as old buildings, outdoor areas) to provide network
and Internet access.

4
ASTER PUBLIC SCHOOL, NOIDA EXTENSION
CLASS X
INFORMATION TECHNOLOGY
Wi-Fi connectivity is used in home & offices, hotels, college & school campus typically for Internet
Access. Shopping malls, coffee shops, resorts mostly offer free or paid Wi-Fi access to the Internet
for their customers.
Data transfer on the Internet
• The data is broken up into bits of same sized pieces called packets.
• A header is added to each packet explaining where the data has come from, where it should
end up and where it fits in with the rest of the packets.
• Each packet is sent from computer to computer until it finds its destination. Each computer
on the way decides where next to send the packet. All packets may not take the same
route.
• At the destination, the packets are examined. If any packets are missing or damaged, a
message is sent asking for them to be re-sent. This continues until all packets have been
received intact.
• The packets are now reassembled into their original form. All this done in seconds!

Instant messaging (IM)


Instant messaging (IM) is a form of communication over the Internet that allows you to connect with
people over the Internet. IM allows you to have real-time conversation with people across the globe.
OR
Instant messaging (IM) is a form of communication over the Internet that offers an instantaneous
transmission of text-based messages from sender to receiver.

Unlike email, instant messaging happens in real-time and the response from participants can be
spontaneous. Some instant messaging software allows users to view messages received when
they are not logged on. These are called “Offline Messages”.

For utilizing audio and video chat or conferencing, you need to have microphones and headsets
or speakers and web cameras so that users can talk or see each other.

Key Features of an instant messaging are as follows:


• Text Messages can be sent to one or more person (Similar to SMS)
• It allows you to make audio and video calls.
• You can transfer all types of files including documents, spreadsheets, audio files, video files, etc.
• It provides you with a Message(chat) history. (Save messages for future reference).

Types of instant messaging software


• Application based instant messaging software is downloaded and installed on user’s
computer. Some of the popular instant messaging software are:
• Google Talk
• Yahoo! Messenger
• Skype
• Windows Live Messenger
• Rediff Bol, etc.
• Web based instant messaging software is accessed using browsers such as Internet Explorer,
Mozilla Firefox, Google Chrome, etc. Some of the popular web based instant messaging
software are:
• Meebo
• Yahoo! Messenger for the Web
• MSN Web Messenger
• IMO, etc.
General rules and etiquettes to be followed while chatting
• Messages should be short and to the point.
• Use appropriate language. Do not use offensive language.

5
ASTER PUBLIC SCHOOL, NOIDA EXTENSION
CLASS X
INFORMATION TECHNOLOGY
• Always introduce yourself by name if your screen name doesn’t reflect it.
• Typing your messages in uppercase is extremely rude - it’s considered shouting and very
aggressive.
• Always ask if the other person has time to chat first - regardless of how important you think
what you have to say is.
• In a business environment, know exactly what you want to discuss.
• Do not use casual language, in terms or abbreviations that the receiver will have difficulty in
understanding.
• Give people enough time to respond.
• Message should be clear.
• Wherever possible, give the person you are communicating with your undivided attention.
• It’s important to properly end an IM conversation - you may think the chat is over, but the
other person may not.

Blog
A blog is a discussion style site used by non-technical (or technical users) users for creating
personal web pages. Blogs are similar to an online personal diary and simple to use.
You can use a blog to convey messages about events, announcements, news, reviews, etc. Blogs
are usually managed using a web browser and this requires active internet connection.

There are hundreds of websites that offer blog service for free. Some of the popular blogs
include:
• www.WordPress.com
• www.blogger.com
• www.blog.com
• www.weebly.com
• www.blogsome.com

WordPress
WordPress is free web service that you can use to create a beautiful website or blog. WordPress
has support for “themes” for customizing the design of a blog. Themes can make the blog or the
webpage look attractive.

Before you start using a blog, a blog account is required. To create one, you need a web
browser and an internet connection. After that you requires following:-
• Blog Address
• Username
• Password
• Email Address
• Language

Offline Blog Editor


If you do not have an active internet connection, you can create blogs using a blog application and
publish the blog whenever internet connectivity is available.
There are several free offline blog editors available that can be downloaded and installed on the
local computer such as:
• Qumana
• Windows Live Writer
• Blogdesk
• BlogJet

Online shopping
Online shopping is a form of electronic commerce where customers can buy or sell goods over
the Internet. Customers need to have an active internet connection for viewing goods or services
offered by a seller; customers can pay online using a credit, debit card, Cash on Delivery(COD), E-Gift
Voucher or by internet banking.

6
ASTER PUBLIC SCHOOL, NOIDA EXTENSION
CLASS X
INFORMATION TECHNOLOGY
Different payment tools to use online transactions are Amazon Pay, Paytm, Google Pay, Pay Pal etc

Online shopping could be useful in situations when:


• A customer does not have sufficient time to visit stores.
• Visiting a store is more expensive than purchasing a product online.
• A product or service that is not available in the local market is available online.

Some of the popular online transaction websites are:


• IRCTC, an online portal for booking flight and train tickets.
• Flipkart, an online shopping portal for buying consumer products.
• EBay, an online portal for buying and selling goods.
• Redbus, an online portal for booking bus tickets.

Internet security
Internet security is a branch of computer security specifically related to the Internet, often
involving browser security but also network security. Its objective is to establish rules and
measures to use against attacks over the Internet. The Internet represents an insecure channel
for exchanging information leading to a high risk of intrusion or fraud, such as phishing.

Online threats such as Phishing, email spoofing, chat spoofing, etc. can increase the chances of
users getting compromised.
You can reduce the risks by using best practices such as using Antivirus Software, Antispyware
Software, Firewalls, strong passwords, etc. in addition to spreading awareness of the best
practices.

Computer Threat
Anything which has a potential to harm the computer and endanger the security of the computer called the
threat.

Best Practices for Security


Use strong passwords, a combination of alphanumeric and special characters could be used
for creating a password that is not so easy to crack or guessed by other users.
Backup your data: Always keep copies of personal data in additional media such as compact discs, pen
drives, etc. This could be helpful in situation when there is a loss of data. Keep the data away from
unauthorized users.
Use encryption software: (Usually available within the operating system) to protect your data from
unauthorized users.
Keeping your username and password private: Never save your username or password on computers
that are used in shared environments such as internet café.
Registering with websites: Read the privacy statement or policy whenever you register with a website,
the statement or policy will include information about how the website use personal data.
Do not share personal information: Websites require you to fill out forms containing fields such as name,
gender, age, email address, school, etc. Be cautious when filling out such forms; research and verify if it’s a
trustable website . Your email addressed could be used by unauthorized users to send you fake or
unwanted emails; think twice or thrice before providing information to any website and decide if it is really
necessary.
Secure transactions: If you are using online shopping or transactions, websites even store your credit
card or online banking personal information such as your credit card number, account details, etc. This
information can be tracked and used by un-authorized users often known as hackers to misuse this
information. Again, ensure the website is legitimate and uses secure practices for performing and
maintaining online transactions. Since information such as credit

7
ASTER PUBLIC SCHOOL, NOIDA EXTENSION
CLASS X
INFORMATION TECHNOLOGY
card details or personal information is sent over the network, it is always recommended to use only secure
websites for such transactions. Verify if the website uses secure transaction; usually it is indicated through
a digital certificate represented as a golden lock in the web browser’s address bar.
Use antivirus and antispyware software: Computers are prone to attacks from software known as
Malware that could harm your computer. Malware track browsing behavior or transmit personal data from
your computer; programs such as keyloggers could be installed on your computer track and transmit every
key that is pressed on a keyboard (keystrokes) to unauthorized users. Antivirus and Antispyware
programs also offer real-time protection monitoring your computer for
any changes by malware software. Keep your Antivirus and Antispyware software always up to date, this
can help in protecting your computer from recent threats.

Do not immediately respond to mails from unknown users: It may be a fake mail trying to gather
personal information such as your bank account details, home address, etc. Some mails could promise you
jobs or announce lottery results which in turn could compromise the user. And in some cases, virus or
scripts that are dangerous could be attached to the mail; NEVER open the attachment from an unknown
source.

Clear browser cookies frequently: Cookies are programs that are created on your local computer when
you visit websites. Though cookies are meant for storing data based on your activity performed during
your earlier visit such as logon details, details of a shopping cart, visited pages in a website, etc. they could
also be tracked by unauthorized users and possibly gain access to your personal information.

Install firewalls: Firewalls could be software or hardware and can assist in keeping a computer and a
network secure. Firewalls analyze the network traffic and determine if the traffic should be allowed or not.
In most cases, operating systems such as Linux, Windows or Mac include firewall software as a part of
operating system thus keeping the computer secure. In rare cases, you may need to configure your firewall
for additional security.

Never install software from unknown sources: As they might not be trustworthy; download only from
well-known or reputed websites.
Remove unwanted or unknown software applications: These might have got installed without your
knowledge when you have visited some websites. Unwanted software could get installed as they might
have been bundled along with necessary software. Some programs such as toolbars get installed usually
through bundled software and are programmed to send personal data without
your consent.

Following is a general guideline for managing strong passwords.


• Keep the length of the password at least 12-14 characters if permitted.
• Avoid keeping passwords based on repetition, dictionary words, letter or number sequences,
usernames, relative or pet names, etc.
• Including numbers, and symbols in passwords if allowed.
• Use capital and lower-case letters.
• Avoid using the same password for multiple sites or purposes.
• Avoid using something that the public or workmates know you strongly like or dislike.
• Use random password generators if possible.
Example of a strong password: u1vX:,4Hd{]$
www.strongpasswordgenerator.com can generate random strong passwords.

Virus: virus are malicious programs that cause damage to data files on a system. Virus Abbreviation is vital

8
ASTER PUBLIC SCHOOL, NOIDA EXTENSION
CLASS X
INFORMATION TECHNOLOGY
information resource under Seize.

Worm: A worm is a self replicating program which eats of the entire disk space or memory evam keeps on
creating its copies and tell on the disk space or memory is filled.

Trojan horse: Trojan Horse is a program that appears harmless but actually performs malicious functions
such as deleting organizing files.
Boot sector: this virus attaches itself to the boot sector of the disk this virus is very dangerous.

File infector: This is a very common type of virus attacks virus code to the regular programming code
within the program files.

Spyware: spyware is a software which is installed on your computer to spy on your activities and report
this data to people willing to pay it.

Adware: Adware are the programs that deliver unwanted ads to your computer.

Malware: Malware is General term used to refer to virus, worms, spyware, adware. Malware track browsing
behavior or transmit personal data from your computer.

Spamming: spamming refers to the selling of bulk mail by an identified or unidentified source.

Phishing: Phishing is the practice of sending fraudulent communication that appear to come from a
reputable source. It is usually done through email the goal is to steal sensitive credit card and login
information or to install Malware on the victims machine.

Firewall is a program that protect your computer from unauthorized access over the internet. It Acts like
interface between a computer and internet. Firewalls analyze the network traffic and determine if the
traffic should be allowed or not.

Cookies are messages that a web server transmits to a web browser so that the web server can keep track
of the user activity on a specific website. Cookies are saved in the form of text file in client computer.

Differentiate between hacking and cracking


Hacking generally refers to unauthorized Access into a computer or a network. The person engaged in
hacking activities is known as a hacker.
Cracking is the act of breaking into a computer system, often on a network. A cracker can be doing this for
profit, maliciously, for some altruistic purpose or cause, or because the challenge is there.

Difference between email and chat


1. Chat requires the permission of both parties while email does not require permission.
2. Chat is typically software dependent while email is not.
3. Chat needs accounts on the same application whereas email does not.

Clearing Data Stored In Browsers


Web browsers have built-in password management designed to store passwords used in forms
on websites. Browsers often prompt to save usernames and passwords when users attempt to
logon to websites.
This facility is offered to users, so that they can logon to their frequently used websites without
having to type the usernames or passwords. However, it is not advisable to leave the web browser

9
ASTER PUBLIC SCHOOL, NOIDA EXTENSION
CLASS X
INFORMATION TECHNOLOGY
store this data particularly on public or shared computers.
MAINTAIN WORKPLACE SAFETY
Basic safety rules to follow at workplace – Fire safety, Falls and slips, Electrical safety, Use of first
aid.
Basic Fire safety rules in an organization are :
Most of the time fire can be prevented using appropriate measures.
- Fire escape plans must be installed at proper levels
- Conduct regular drills
- Smoke alarms must be placed at proper intervals
- Keep workplace a no-smoking zone
- Maintenance of safety equipment must be taken care of regularly

Falls and Slips Safety rules


- Keep the moving area clean and clutter free.
- Workplace must be proper ventilated receive light.
- Wear non slippery footwear.
- Floors must be clean and dry
- Oil spills, dust must be immediately cleaned.

Electrical Safety Rules:


Electrical equipment used should be approved by a recognized organization.
- Workers should be trained to handle the electric equipment safely
- Damaged and hazardous electrical equipment should be immediately replaced. All old
and workout and frayed switches and wires should be changed.
- Heat emanating equipment should be kept away from the electrical equipment.
- Take care that the outlets/ circuits should not be overloaded.
- Switch off and unplug the electrical appliances before cleaning or relocating them.

Use of First Aid


First Aid is the immediate assistance provided to the injured to save life and minimize health loss
till the proper medical aid/ facility is provided.
Some rules of First Aid are:
- Assure the injured to remain calm and not to panic.
- Keep them warm if they are under shock.
- Do not move the victim in case of back/neck injury.
An occupational hazard is the illness one may acquire due to his occupation.
Some types of occupational hazards are : Physical hazards, chemical hazards, biological hazards, ,
behavioural hazards, radiological hazards, ergonomic hazards etc.

Accident: an accident is an unplanned event that may happen all of a sudden and may
lead to unwanted or unprecedented results/outcomes.
Or
It can be defined as an unfortunate incident that occurs unintentionally causing hazardous
result or injury or unwanted results.
Emergency:
Any unexpected situation that needs immediate attention and action.
Hazards:
A hazard is anything that is the source of any potential harm, damage or any kind of potential loss
of health or life.
Workplace Evacuation:
Evacuation is the process of emptying a place in case of an emergency, disaster.

10
ASTER PUBLIC SCHOOL, NOIDA EXTENSION
CLASS X
INFORMATION TECHNOLOGY
Question/Answer of NCERT
1. What do you mean by Computer Accessibility? Name different types of impairments.
Ans. Computer Accessibility is the user friendliness of a computer system for all, regardless of
their disability. The types of impairment that impact computer usage are:
● Cognitive impairments and learning disabilities, such as dyslexia, attention deficit-hyperactivity
disorder (ADHD) or autism.
● Visual impairment such as low-vision, complete or partial blindness, and color blindness.
● Hearing impairment including deafness.
● Motor or dexterity impairment such as paralysis, cerebral palsy, or carpal tunnel syndrome and
repetitive strain injury.
2. What is the use of Filter Keys accessibility function?
Ans. It is an accessibility function that tells the keyboard to ignore brief or repeated keystrokes,
making typing easier for people with hand tremors.
3. What is the use of Cursor options accessibility function?
Ans. Cursor Options is an accessibility feature that assists people with vision impairment by
changing the blink rate and width of the cursor.
4. What is the use of Mouse Keys accessibility function?
Ans. MouseKeys is an accessibility feature that assists people who have difficulty using a mouse.
This option uses the keyboard (especially numeric keypad) as a pointing device instead of a
mouse.
5. What do you mean by computer network?
Ans. A computer network is a collection of computers and other hardware components
interconnected by communication channels (cables or satellites) that allow sharing of resources
and information.
6. Explain different types of network architecture.
Ans. The types of network architecture are:
● PEER-TO-PEER (P2P) ARCHITECTURE: Networks in which all computers have an equal status
are called peer to peer networks. Generally in such a network each terminal has an equally
competent CPU.
● CLIENT-SERVER ARCHITECTURE: Networks in which certain computers have special dedicated
tasks, providing services to other computers (in the network) are called client server networks.
The computer(s) which provide services are called servers and the ones that use these services
are called clients.
7. What is the difference between LAN and WAN?
Ans. Local Area Network (LAN): A LAN is a computer network that is limited to a local area such
as a laboratory, a school or an office building.
Wide Area Network (WAN): A WAN is a computer network that spans a wide geographical area
such as cities, countries and continents.
8. Define the Internet.
Ans. The Internet is a global system of interconnected computer networks that use the standard
Internet protocol suite to serve billions of users worldwide.
9. What are the advantages of Networking?
Ans. The advantages of networking are:
● Data Sharing: One of the most important uses of networking is to allow the sharing of data.
● Files transfer: Users can send text files, spreadsheets, documents, presentations, audio files,
video files, etc. to other users.
● Hardware Sharing: Hardware components such as printers, scanners, etc. can also be shared.
For example, instead of purchasing 10 printers for each user, one printer can be purchased and
shared among multiple users thus saving cost.
● Internet Access Sharing: You can purchase a single Internet connection and share it among
other computers in a network instead of purchasing multiple Internet connections for each
computer. This is very commonly found in Internet café (browsing centres), schools, colleges,
companies, etc.
● Usage of network based applications: Such as web browsers, email clients, chat application,
audio & video calling, etc. is another advantage.
10. Define a Modem.

11
ASTER PUBLIC SCHOOL, NOIDA EXTENSION
CLASS X
INFORMATION TECHNOLOGY
Ans. A modem is a device that converts digital computer signals into a form (analog signals) that
can travel over phone lines. It also re-converts the analog signals back into digital signals. The
word modem is derived from its function MOdulator/DEModulator.
11. Write a note on Instant Messaging.
Ans. Instant messaging (IM) is a form of communication over the Internet that offers an
instantaneous transmission of text-based messages from sender to receiver. Most instant
messaging software include the option for performing file transfers, audio chat, video calling and
conferencing, sharing desktops, etc. apart from standard text chat. Instant messaging software is
widely used for personal and commercial use.
12. What are the key features of Instant Messaging?
Ans. The key features of Instant Messaging are:
● Text Messages can be sent to one or more person (Similar to SMS)
● Audio calling and conferencing. Page 2 of 5 Class 10 Web Applications and Security IT (402)
● Video calling and conferencing.
● File transfers (Not limited to documents, spreadsheets, audio files, video files, etc.)
● Message history (Save messages for future reference).
13. Write a note on a blog. Name some popular blogging websites.
Ans. A blog is a discussion style site used by non-technical (or technical users) users for creating
personal web pages. Blogs are similar to an online personal diary and simple to use. A blog can be
used to convey messages about events, announcements, news, reviews, etc. Blogs are usually
managed using a web browser and this requires active internet connection. Some offline blog
software can also be used to create content first and later publish the content when an active
internet connection is available. Some of the popular blogging websites are:
● www.WordPress.com
● www.blogger.com
● www.blog.com
● www.weebly.com
● www.blogsome.com
14. Name some offline blog editors.
Ans. The offline blog editors are:
● Qumana
● Windows Live Writer
● Blogdesk
15. When online shopping could be useful.
Ans. The online shopping could be useful in the following situations:
● A customer does not have sufficient time to visit stores.
● Visiting a store is more expensive than purchasing a product online.
● A product or service that is not available in the local market is available online.
16. Name some of the online transaction websites.
Ans. The some of the online transaction websites are:
● IRCTC, an online portal for booking flight and train tickets.
● Flipkart, an online shopping portal for buying consumer products.
● EBay, an online portal for buying and selling goods.
● Redbus, an online portal for booking bus tickets.
17. What do you mean by Internet Security?
Ans. Internet security is a branch of computer security specifically related to the Internet, often
involving browser security but also network security. Its objective is to establish rules and
measures to use against attacks over the Internet. The Internet represents an insecure channel for
exchanging information leading to a high risk of intrusion or fraud, such as phishing.
18. Suggest some guidelines to make passwords stronger.
Ans. The guidelines to make passwords stronger are:
● Keep the length of the password at least 12-14 characters if permitted.
● Avoid keeping passwords based on repetition, dictionary words, letter or number sequences,
usernames, relative or pet names, etc.
● Including numbers, and symbols in passwords if allowed.
● Use capital and lower-case letters.

12
ASTER PUBLIC SCHOOL, NOIDA EXTENSION
CLASS X
INFORMATION TECHNOLOGY
● Avoid using the same password for multiple sites or purposes.
● Avoid using something that the public or workmates know you strongly like or dislike.
● Use random password generators if possible.
19. Write a note on Firewall.
Ans. Firewalls could be software or hardware and can assist in keeping a computer and a network
secure. Firewalls analyze the network traffic and determine if the traffic should be allowed or not.
In most cases, operating systems such as Linux, Windows or Mac include firewall software as a
part of the operating system thus keeping the computer secure. In rare cases, you may need to
configure your firewall for additional security.
20.What are the standard set of safety rules and procedures to be followed by every
organisation? Ans. The standard set of safety rules and procedures to be followed by every
organisation are: Basic Fire safety rules
● Fire escape plans must be installed at proper levels
● Conduct regular drills
● Maintenance of safety equipment must be taken care of regularly Falls and Slips Safety rules
● Workplace must be proper ventilated
● Floors must be clean and dry
● Oil spills, dust must be immediately cleaned.
● Smoke alarms must be placed at proper intervals
● Keep the workplace a no-smoking zone. Electrical safety rules
● Electrical equipment approved by a recognised organization.
● Damaged and hazardous electrical equipment should be immediately replaced. all old and
workout and frayed switches and wires should be changed.
● Heat emanating equipment should be kept away from the electrical equipment.
● Take care that the outlets/ circuits should not be overloaded.
21. What is the difference between Accident and Emergency?
Ans. The difference between Accident and Emergency are: Accident: an accident is an unplanned
event that may happen all of a sudden and may lead to unwanted or unprecedented
results/outcomes. Emergency: any unexpected situation that needs immediate attention and
action. An emergency situation might pose a sudden risk to life, property health etc. and needs
intervention to prevent deteriorating results/ hazards.
22. Name some common types of Accidents.
Ans. Accidents may be of following types :
● Accidents at workplace: Slips and fall accidents, fire
● Industrial disease/illness
● Road traffic accidents
● Clinical Accidents
● Sports related accidents
23. Give some guidelines to be followed to handle accidents.
Ans. The guidelines to be followed to handle accidents are:
● Every organization must follow SOP for accident handling
● Safety measures must be placed to prevent workplace accidents
● Immediately call the medical team for any injury
● Stay alert
● Pay attention to and follow emergency drills
24. Define Evacuation. Write some points to be ensured in case of emergency evacuation.
Ans. Evacuation is the process of emptying a place in case of an emergency, disaster. The points to
be ensured in case of emergency evacuation are:
● Every organization must have an evacuation policy. All the Team Leaders are responsible for
informing the policy to their employees about it.
● Organization must have a designated assembly point for emergencies. Ensure that every
employee/ worker must know where it is.
● A ‘buddy system’ for individuals with special needs or disabilities must be designated. This
system ensures that differently-abled are assisted and guided out of the premises or the impacted
area properly.
● Floor plans with evacuation routes in work areas. Ensure that you understand these so you can

13
ASTER PUBLIC SCHOOL, NOIDA EXTENSION
CLASS X
INFORMATION TECHNOLOGY
use it in time of need.
● Assembly areas, where you are required to assemble after evacuation, must be properly taken
care of.
● Periodic evacuation drills should be conducted. Ensure that you pay attention during these
drills.

14

You might also like