INFORMATION TECHNOLOGY 402

NAME :______

CLASS/ SEC :______ROLL: _____

SESSION :______

QUOTE :______

PART 1: Working With Accessibility Options

1. Accessibility options: These are the options in Windows Operating System which makes handling of computer easy for physically challenged people.

Some of its options are discussed below: a. Sticky keys: is an accessibility option in Windows Operating System used for person who faces difficulty in holding multiple keys. When activated, it makes the key pressed without actually holding it until you press another key. b. Filter keys: is an accessibility option in Windows Operating System used for person who faces visual impairment. When activated, it makes a beep sound when Lock keys (CapsLock, NumLock, ScrollLock) are pressed. c. Toggle keys: is an accessibility option in Windows Operating System used for person whose hands keep on trembling by ignoring repeated keystrokes. When activated, if a person presses the same key multiple times quickly; its character is shown only once on the screen. d. Sound Sentry: is an accessibility option in Windows Operating System used for person with auditory impairments. It displays alerts when an error sound plays. e. Narrator: is an accessibility option in Windows Operating System used for person with visual impairment. It reads the selected text to the user.

WEB APPLICATIONS CONTINUED.. Page 1

INFORMATION TECHNOLOGY 402

PART 2: Networking Fundamentals 1. Data Communication It refers to the transfer of data and information from one computer to another over a network.

Types

i. Wired Communication: involves data communication using wires. It is used in the following technologies:  Digital Subscriber (DSL): is a technology which uses telephone cable to provide fast internet. It is used in the broadband connections.  Dial Up: is a technology which uses telephone cable to provide internet connection with speed only up to 56 kb/s.  Cable Internet Access: is a technology which uses cable TV lines to provide internet connection. ii. Wireless Communication: involves data communication using wireless technologies. It is used in the following technologies:  3G: is a Third Generation technology which uses wireless mobile networks for internet.  Bluetooth: is a technology which transfers data at slow speed. Its range is spread across 10 m radius.  Wireless Fidelity (WiFi): is a technology which transfers data at high speeds. Its range is spread across 30 m radius.  Worldwide Interoperability Microwave Access (WiMax): is a technology which transfers data at high speeds. Its range is spread across 8 km radius.

2. Network It is a computer system in which computers are connected to each other to share data.

 Some of its advantages are: i. File Management: It helps to save file easily over long distance. ii. Resource Sharing: It helps to easily share resources such as data and hardware. iii. Cost Saving on Software: It enables us to use single software over different computers. Thus, it saves cost of purchase for multiple software. iv. Internet Sharing: It enables us to share internet connectivity to surrounding computers. v. Security: It helps us to securely save data from client computer to a server connected in network.

 Types i. Local Area Network (LAN): is a computer network in which computers and its peripherals (printer, scanner etc) are connected to each other over a smaller area. Usually, RJ-45 cable is used to make wired LAN connections. ii. Campus Area Network (CAN): is a computer network in which computers and its peripherals across a campus in multiple buildings are connected to each other. iii. Metropolitan Area Network (MAN): is a computer network in which computers and its peripherals are connected across the city.

WEB APPLICATIONS CONTINUED.. Page 2

INFORMATION TECHNOLOGY 402

iv. Wide Area Network (WAN): is a computer network in which computers and its peripherals are connected across larger geographical distance. The largest WAN in Internet.

 Architecture It refers to the layout in which computers are connected to each other in a network.

Peer to Peer Architecture Client Server Architecture All the computers are connected to each other All the client systems are connected to the and there is no server required. server.

 To connect computers in LAN, follow the steps below: i. Connect the Network Interface Card (NIC) to the motherboard of computers to be connected in the network. If NIC is wireless, it will have an antenna; otherwise connect RJ-45 cable to it. ii. Configure their connection with the switch/ hub.

3. Modem: stands for Modulator Demodulator. It is used for data transmission using telephone lines in a network.

4. Hot-Spot: is a zone in which high-speed internet speed connection is available.

5. Global Positioning System (GPS): is a positioning system which gives exact location of the user using a constellation of 24 satellites used for this purpose.

6. Miscellaneous terms: i. Internet is the world’s largest computer network in which computers and their peripherals are connected to each other for data sharing. ii. Internet Service Provider (ISP) is an organization which enables the customer to use internet. Examples are BSNL, MTNL, Reliance Communication, Sify etc iii. World Wide Web (WWW/ W3) is the graphical part of internet which is displayed on the screen. iv. IP Address is unique identification for computers which uses internet protocol over a network. It is a four set of numbers separated by periods. For example, 216.58.216.164 v. Uniform Resource Locator (URL) is the unique address of all the web resources. i. Parts of URL https:// www. mck. edu. au /subjects/IPT Protocol Informs that the Domain Top Level Geographical File Path/ resource is a webpage name Domain TLD Directory

WEB APPLICATIONS CONTINUED.. Page 3

INFORMATION TECHNOLOGY 402

 Protocol is the set of rules which computers use to communicate over a network.  Domain name is the specific name of the website which is used to uniquely identify an IP Address.  Top Level Domain Name (TLD) is the extension of domain name which identifies the type of website.

It is broadly classified as:

TLD .com .org .net .edu .gov .mil Entity Commercial Organization Network Education Government Military

Some of the geographical top level domains are:

TLD .in .us .uk .ca .au .de Country India United States United Kingdom Canada Australia Germany  File Path/ Directory is the address of a specific file or folder within the website.

vi. Domain Name Server is a directory on internet in which all the domain names are linked to a particular IP Address. vii. Webpage is a hypertext document used to display web resources on the World Wide Web. They are most commonly made using Hypertext Markup Language (HTML). viii. Web browser is the software which is used to browse World Wide Web. For example, Chrome, Internet Explorer, Mozilla Firefox, Dolphin, UC Browser etc. ix. Search engine are the programs which are specifically used to search information on the World Wide Web. For example, Google, Bing, Yahoo, DuckDuckGo etc

WEB APPLICATIONS CONTINUED.. Page 4

INFORMATION TECHNOLOGY 402

PART 3: Introduction to

1. Instant Messaging is a service in which usually two people can communicate with each other in real-time using text, audio, video etc. Most popular platforms which provide this service are WhatsApp, , , Hangouts and .

a. Types i. Application based instant messaging software which is downloaded and installed on user’s computer. For example, WhatsApp, Skype, , Yahoo Messenger etc. ii. Web based instant messaging software which is used through browsers. For example, WhatsApp Web, Yahoo Messenger for Web, Meebo etc.

b. Etiquettes/ Rules to be followed i. Avoid strangers. ii. Start with a short greeting. iii. Don’t write completely in Capital letters. iv. Be careful with the abbreviations. v. Avoid sarcasm. vi. Don’t reply with a single letter word. vii. Never send bad news over such platforms.

c. Advantages i. Real time communication ii. Cost saving iii. Convenient to use options iv. Compatible with many devices v. Team building vi. Spam reduction

2. Email, also called as electronic mail, is a digital message sent by person to one or more people using internet.

3. Video Conferencing is a method to conduct audio-visual conference between two or more people located at different places using a computer network. Requirements for video-conferencing include a , a computer and fast internet connection.

4. Internet telephony is a technology that uses internet connection to make phone calls by converting analog speech signals into digital signals, and then sending them over internet.

WEB APPLICATIONS CONTINUED.. Page 5

INFORMATION TECHNOLOGY 402

PART 4: Creating and Publishing Web Pages – Blog

1. Blog is a website which is used as online journal/ diary in which people writes post about their opinions, stories, photos, videos, creative writings such as poems etc. 2. Post is the material in a blog which a user publishes. 3. Free blog services are provided by websites such as blog.com, .com, blogsome.com, wordpress.com, weebly.com etc. 4. Offline blog editor are tools using which one may create blog posts without internet creation and publish it on the blog when internet is available. Popular editors are BlogDesk, BlogJet, Qumana, MarsEdit, Ecto and Windows Live Writer.

PART 5: Online Transactions

1. E-Commerce/ Online Shopping/ Internet Commerce is the practice of buying or selling of goods or services over internet.  Advantages i. Provides more options to customers ii. Products are easily available iii. Helps in better customer service iv. Product with better pricing and rating can be easily found v. Reduces paperwork vi. Improves brand image of the company vii. Helps in growth of small industry in villages

2. Online Transaction is a payment method which is done using internet.  Online Transaction Methods i. Payment Gateway is a service which is directly started by the customer to complete the payment for a product or service using Debit Card, Credit Card or Net Banking. It is usually found in online stores. ii. Point of Sale (PoS) is a system in which the merchant uses customer’s Debit Card or Credit Card to make payment for the product or service sold. It is usually found in malls.

WEB APPLICATIONS CONTINUED.. Page 6

INFORMATION TECHNOLOGY 402

PART 6: INTERNET SECURITY

1. Internet Security is the process of securing resources connected through internet such as web pages, computers, peripherals etc. from cyber-crimes.

2. Cyber Crime is the crime which is committed against a person using electronic means of communication.

a. Types i. Cyber Bullying is a form of cyber-crime in which a person is harassed using electronic means of communication. ii. Cyber Stalking is a form of cyber-crime in which a person is repeatedly cyber-bullied. iii. Identity Theft is a form of cyber-crime in which the personal details of a person such as signature, address, bank account detail is used without permission to commit various crimes. iv. Denial of Service (DoS) is a cyber crime in which computer resource is made unavailable to its intended user by increasing the network traffic to abnormal levels.

3. Protection Measures/BEST PRACTICES to ensure internet security i. Never open the links sent by an unknown person. ii. Never share personal details publicly. iii. Build a strong password with mixture of uppercase letter, lowercase letter, number, symbol and at least eight characters. iv. Regularly change the password after few months. v. Keep the password secret. vi. Use legally purchased good antivirus. vii. Uninstall unnecessary cookies. viii. Never save password in the browser.

4. Reporting Cyber Crimes Cyber Crimes may be reported to Cyber Crime Cell of the district or even to the local police station.

5. Malwares are the computer software designed to access, disrupt or damage computer system. Some of them are: a. Vital Information Resource under Siege (VIRUS) is a malware which is attached to a host file. It starts only when the user runs the host file. Once activated, it automatically replicates itself and infects other . Example, Chernobyl Virus. b. Worm is a malware which acts independently without a host file. It automatically replicates itself and infects other files. Example: ILOVEYOU worm. c. Trojan (Horse) is a malware which is disguised as a useful program. Once activated by user, it starts infecting other files. It does not self-replicate. Example: Trojan-Banker. d. Ransomware is a malware which restricts the access of the user to its computer. The access of user to its computer is restored only after a ransom payment is made to ransomware’s creator. e. Spyware is a malware which secretly sends the details of the user without his/her permission to its creator. Example: Keylogger.

WEB APPLICATIONS CONTINUED.. Page 7

INFORMATION TECHNOLOGY 402

6. Botnet is a network of hacked computers which work as per instruction given by bot as programmed by its creator.

WEB APPLICATIONS CONTINUED.. Page 8