0% found this document useful (0 votes)
81 views

Web Applications and Security - One Shot

The document discusses computer accessibility options and how they can help users with disabilities. It describes features like sticky keys, toggle keys, high contrast settings, and mouse keys that make computers easier to use for those with visual, hearing, physical, or cognitive impairments. The document also covers networking fundamentals, different network types, and how individuals can access the internet.

Uploaded by

Ansh Gupta
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
81 views

Web Applications and Security - One Shot

The document discusses computer accessibility options and how they can help users with disabilities. It describes features like sticky keys, toggle keys, high contrast settings, and mouse keys that make computers easier to use for those with visual, hearing, physical, or cognitive impairments. The document also covers networking fundamentals, different network types, and how individuals can access the internet.

Uploaded by

Ansh Gupta
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 100

Web Applications

and Security
in
Session – 1
Working with
Accessibility Options
Computer Accessibility
3

➜ Computer accessibility refers to user


friendliness of a computer system for all,
regardless of their disability.
4
Types of Impairments
➜ Cognitive impairments and learning disabilities, such as
dyslexia, attention deficit hyperactivity disorder (ADHD)
or autism.
➜ Visual impairment such as low-vision, complete or
partial blindness, and color blindness.
➜ Hearing impairment including deafness.
➜ Motor or dexterity impairment such as paralysis,
cerebral palsy, or carpal tunnel syndrome and repetitive
strain injury.
5
Launching Accessibility Options
➜ To launch accessibility options in Windows XP :
➜ Click Start > Control Panel > Accessibility Options.
The Accessibility Options window appears.

➜ Keyboard Tab : Sticky Keys, Toggle Keys, Filter Keys


➜ Sound Tab : Sound Sentry, Show Sounds
➜ Display Tab : High Contrast, Cursor Options
➜ Mouse Tab : Mouse Keys
➜ General Tab : Serial Keys
6
Sticky Keys
➜ Sticky Keys is an accessibility feature to help computer
users with physical disabilities, but it is also used by
others as a means to reduce repetitive strain.
➜ Sticky Keys allows the user to press and release a
modifier key, such as Shift, Ctrl, Alt, or the Windows
key, and have it remain active until any other key is
pressed.
➜ To enable Sticky Keys, select Use Sticky Keys > Click
Apply > Click OK.
7
Filter Keys
➜ It is an accessibility function that tells the keyboard to
ignore brief or repeated keystrokes, making typing easier
for people with hand tremors.
➜ To enable Filter Keys, check Use Filter Keys.
➜ Click Settings under Filter Keys and check “Ignore
Repeated Keystrokes”.
➜ Click Apply.
➜ Click OK.
8
Toggle Keys
➜ It is an accessibility function which is designed for
people who have vision impairment or cognitive
disabilities. When ToggleKeys is turned on, computer
emits sound cues when the locking keys (Caps Lock,
Num Lock, or Scroll Lock) are pressed.
➜ A high sound is emitted when the keys are switched on
and a low sound is emitted when they are switched off.
➜ To enable ToggleKeys, Check Use ToggleKeys >
Settings > Apply > Click OK.
9
Sound Sentry
➜ SoundSentry is designed to help users with auditory
impairments.
➜ SoundSentry generates visual warnings, such as a
blinking title bar or a flashing border, whenever the
computer generates a sound.
➜ To enable SoundSentry, Check Use SoundSentry under
Sound Tab. Doing so activates a drop down list
wherefrom you can choose the type of visual warning
desired.
➜ Click Apply.
➜ Click OK.
10
Show Sounds
➜ ShowSounds instructs applications that convey
information by sound, to also provide information
visually, through text captions or informative icons.
➜ To enable ShowSounds, Check Use ShowSounds under
Sound Tab.
➜ Click Apply.
➜ Click OK
11
High Contrast
➜ High Contrast is an accessibility feature to assist people
with vision impairment. You can change the size and
color of fonts and the background for ease of viewing.
➜ To enable High Contrast, check Use High Contrast >
Apply > OK.
12
Cursor Options
➜ Cursor Options is also an accessibility feature that
assists people with vision impairment by changing the
blink rate and width of the cursor.
➜ To change the speed of the cursor blink, move the Blink
Rate slider back and forth. Notice the cursor blinking at
various speeds.
➜ To change the width of the cursor, move the Width
slider back and forth. Notice the with of the cursor
changing.
13
Mouse Keys
➜ MouseKeys is an accessibility feature that assists people
who have difficulty using a mouse. This option uses the
keyboard (especially numeric keypad) as a pointing
device instead of a mouse.
➜ To enable MouseKeys
Check Use MouseKeys > Click Apply > Click OK.
14
Serial Keys
➜ Serial Keys is an accessibility feature that assists people
that have difficulty using a keyboard or a mouse (or
both).
➜ They can use special devices such as Sip, Puff and
Breath Switches to provide input to the computer
through Serial Ports.
Session – 2
Networking
Fundamentals
Computer Network
16

➜ A computer network is a collection of


computers and other hardware components
interconnected by communication channels
(cables or satellites) that allow sharing of
resources and information.
17

Network Architecture
» Peer-to-Peer Architecture
Networks in which all computers have an equal status
are called peer to peer networks. Generally in such a
network each terminal has an equally competent CPU.

» Client-Server Architecture
Networks in which certain computers have special
dedicated tasks, providing services to other computers
(in the network) are called client server networks. The
computer(s) which provide services are called servers
and the ones that use these services are called clients.
18

Types of Networks
» Local Area Network (LAN):
» A local area network (LAN) is one which
connects computers and devices in a limited
geographical area such as home, school,
computer laboratory, office building, or closely
positioned group of buildings.
» Usually local area networks offer very high
speeds and are used for connecting computers
and peripherals such as printers, scanners, etc.
19

Types of Networks
» Wide Area Network (WAN):
» A wide area network (WAN) is one which
covers a broad area (i.e., any network that links
across metropolitan, regional, or national
boundaries).
» The Internet is the most popular WAN, and is
used by businesses, governments, non-profit
organizations, individual consumers, artists,
entertainers, and many others.
20

Internet
» The Internet is a global system of interconnected
computer networks that use the standard Internet
protocol suite to serve billions of users worldwide.
» It is a network of networks that consists of millions of
private, public, academic, business, and government
networks.
21

Uses of Internet
» Internet is one of the most useful technologies of
modern times which help us in our daily, personal and
professional life. Internet is widely used by students,
educational institutes; scientist and professionals to
gather information for research and general
information. Businesses use the Internet to access
complex databases such as financial database.
» The Internet is the largest encyclopedia for all age
groups. The Internet helps in maintaining contact with
friends and relatives who live across different locations
via Internet chatting systems and email software.
Internet is also becoming a major source of
entertainment for the general public.
22

World Wide Web


» World Wide Web is a system of interlinked hypertext
documents accessed via the Internet. With a web
browser, one can view web pages that may contain
text, images, videos, and other multimedia, and
navigate between them via hyperlinks.
» Information is stored on web servers referred to as
web pages are retrieved by using a web browser such
as Firefox on the local computer.
» A Web Browser is a software used to view Web sites
and acts as an interface between the user and the
World Wide Web. A Web server is a computer that
stores web sites and their related files for viewing on
the Internet.
23

Advantages of Network
» Data Sharing: One of the most important
uses of networking is to allow the sharing of
data.
» Files Transfer : Users can send text files,
spread sheets, documents, presentations,
audio files, video files, etc. to other users.
» Hardware Sharing: Hardware components
such as printers, scanners, etc. can also be
shared.
24

Advantages of Network
» Internet Access Sharing: You can purchase
a single Internet connection and share it
among other computers in a network
instead of purchasing multiple Internet
connection for each computer.
» Usage of network based applications: Such
as web browsers, email clients, chat
application, audio & video calling, etc. is
another advantage.
25
Getting Access to Internet
➜ Internet Service Provider
➜ An Internet service provider (ISP) is an organization
which provides you with access to the Internet via a
dial-up (using modem) or direct (hard wired) or
wireless connection.
➜ MODEM
➜ A modem is a device that converts digital computer
signals into a form (analog signals) that can travel
over phone lines. It also re-converts the analog
signals back into digital signals. The word modem is
derived from its function MOdulator/DEModulator.
26
Types of
Common Internet Connectivity
Technology Type of Connectivity

Dial Up Wired

DSL Wired

Cable Internet Access Wired

3G Wireless

WiMax Wireless

WiFi Wireless
27
Dial Up
➜ Dial-up Internet access is a form of Internet access that
uses the facilities of the public switched telephone
network (PSTN) to establish a connection to an Internet
service provider (ISP) via telephone lines using a device
called MODEM. Dial-up connections are extremely
slow and in most cases, it is replaced by a high speed
connection such as DSL or Cable Modem.
28
DSL
➜ Digital subscriber line(DSL) provide Internet access by
transmitting digital data over wires of a local telephone
network. DSL service is delivered along with wired
telephone service on the same telephone line. For using
a DSL connection, you need a DSL modem and a
subscription.
29
Cable Internet Access
➜ Cable Internet Access is a form of broadband Internet
access that uses the cable television infrastructure.
Cable Internet Access is provided through existing
cable TV networks.
30
3G
➜ 3G, short for 3rd Generation is a set of standards used
for mobile devices and mobile telecommunication
services and networks. High-Speed Downlink Packet
Access (HSDPA) is 3G mobile telephony
communications protocol that allows higher data
transfer speeds and capacity.
31
WiMax
➜ WiMAX (Worldwide Interoperability for Microwave
Access) is a wireless communications standard
designed to provide mobile broadband connectivity
across cities and countries through a variety of devices.
WiMAX is a long range system, covering many
kilometers and is typically used where DSL or Cable
Internet Access cannot be used; this could be difficulty
in laying out cables for home or offices located in
remote locations but need access to the Internet.
32
WiFi (Wireless Fidelity)
➜ Wi-Fi is a popular technology that allows an electronic
device such as computers or mobile phones to
exchange data wirelessly over a network, including
high-speed Internet connections. Wi-Fi is used where
cables cannot be run (such as old buildings, outdoor
areas) to provide network and Internet access. Wi-Fi
can also be used where users require mobile
connectivity.
33
Data Transfer on Internet
➜ Each packet is sent from computer to computer until it
finds its destination. Each computer on the way decides
where next to send the packet. All packets may not take
the same route.
➜ At the destination, the packets are examined. If any
packets are missing or damaged, a message is sent
asking for them to be re-sent. This continues until all
packets have been received intact.
➜ The packets are now reassembled into their original
form. All this done in seconds!
Session – 3
Introduction to
Instant Messaging
Instant Messaging
35

➜ Instant messaging (IM) is a form of communication


over the Internet that offers an instantaneous
transmission of text-based messages from sender to
receiver.
➜ Most instant messaging software include the option
for performing file transfers, audio chat, video calling
and conferencing, sharing desktops, etc. apart from
standard text chat.
➜ Instant messaging software is widely used for
personal and commercial use.
36
Features of Instant Messaging
➜ Participants messaging to each other need to be
signed in to the same instant messaging software.
➜ To use instant messaging software, a user must have
a valid instant messaging account.
➜ Instant messaging accounts differ in formats; some
instant messaging software such as Yahoo!
Messenger, Windows Live Messenger use email
addresses for managing the account and software
such as Skype use standard names.
37

Instant Messaging Services


» Application Based instant messaging
software is downloaded and installed on
user’s software. Some of the popular
application based instant messaging
software are:
• Google Talk
• Yahoo! Messenger
• Skype
• Rediff Bol
• Windows Live Messenger
38

Instant Messaging Services


» Web Based instant messaging software is
accessed using browsers such as Internet
Explorer, Mozilla Firefox, Google Chrome,
etc. Some of the popular web based instant
messaging software are:
• Meebo
• Yahoo! Messenger for the Web
• MSN Web Messenger
• IMO
39
Creating Instant Messaging
Account
➜ Google Talk is an instant messaging service that
provides both text and voice communication developed
by Google Inc.
➜ Google Talk can also be used for making video calls
and to view updates from GMAIL mailbox.
➜ Google Talk is free and is available as application
based and web based.
➜ Before you start using Google Talk, a Gmail account is
required.
➜ We can download it from www.google.com/talk
Session – 4
Chatting with a
contact –
Google Talk
41
Google Talk
➜ Whenever your friend in the contact list is online you
can see the person along with a green dot.
➜ You can start sending text chat message instantly by
double-clicking on a contact. A window will pop up.
➜ You can type the text in the text box and press enter;
the other person will see the text message and respond
to your message.
42
Rules and Etiquettes
➜ Messages should be short and to the point.
➜ Always introduce yourself by name if your screen name
doesn’t reflect it.
➜ Always ask if the other person has time to chat first.
➜ In a business environment, know exactly what you want
to discuss.
➜ Typing your messages in uppercase is extremely rude.
➜ Give people time to respond.
➜ Wherever possible, give the person you are
communicating with your undivided attention.
➜ It’s important to properly end an IM conversation.
43

Chatting on Gmail
» Once you sign into your Gmail account, a contact
window will be displayed either on the left side or
the right side within the browser.
» If you would like to chat with a contact, double click
on the contact’s name. You will see a pop-up.
» Now you can start typing the message you want to
send and the other contact should be able to
respond to your chat message.
44

Chatting on Yahoo
» Before you start using Yahoo! Messenger, a Yahoo
Mail account is required.
» If you don’t have a Yahoo! Mail Account already you
can use the built in option for creating a new Yahoo!
Mail Account.
» You should have a list of contacts that are available
for chat. If you don’t have any contacts, you can add
their Yahoo Mail account to your contact list by
sending an invite.
» Note: If you would like to import your contacts from
other sources such as Microsoft Outlook, Gmail,
Hotmail, etc., you can use the import option.
Session – 5
Creating & Publishing
Web Pages - Blog
46

Blog
➜ A blog is a discussion style site used by non-
technical (or technical users) users for creating
personal web pages. Blogs are similar to an
online personal diary and simple to use.
➜ Use of Blog - We can use a blog to convey
messages about events, announcements, news,
reviews, etc.
47

Blog
➜ Management of Blog - Blogs are usually managed
using a web browser and this requires active internet
connection. You can also use offline blog software to
create content first and later publish the content
when an active internet connection is available.
➜ Free blog services are provided by :
➜ www.WordPress.com
www.blogger.com
www.blog.com
www.weebly.com
www.blogsome.com
Creating a Post
48

➜ To create a post, click New Post.


➜ Title: You must provide a title for your post; choose a tile
that this post will focus on. For example, “School Annual
Day Function 2012”.
➜ Using the rich text box, you can type content that you
want others to read.
➜ Once you have finished typing the content, you need to
publish the post for others to see.
➜ Click Publish Post to publish your content.
➜ To view the post, you can type the blog address in the
address bar of the web browser, you should see your
blog along with the post
Commenting on a Post
49

➜ You can comment on posts published by others.


Usually, the comment option is available towards the
end of the post.
» In the Enter your comment here… text box, type your
comments about the post
» In the Email (required) field, type your email address.
» In the Name (required) field, type your name.
» In the Website filed, you may type your blog address
(Optional).
» Once you have typed the content in the comment area, review
carefully and Click Post Comment.
» Once you click the Post Comment, you will see the blog along
with your comment.
Session – 6
Using
Offline Blog Editors
51
Offline Blog Editor
➜ If you do not have an active internet connection, you can
create blogs using a blog application and publish the
blog whenever internet connectivity is available.
➜ There are several free offline blog editors available that
can be downloaded and installed on the local computer
such as:
➜ Qumana
➜ Windows Live Writer
➜ Blogdesk
52
Qumana
➜ You need to download and Install Qumana.
Qumana can be downloaded from www.qumana.com.
➜ Once installed, you can use the program to manage
blogs.
53
Launching Qumana
➜ To launch Qumana, Click Start > Programs > Qumana >
Qumana.
➜ You need an existing blog account to use with Qumana.
➜ Enter your blog address and Click Next.
➜ A login window appears. You need to provide details of
your blog account.
➜ Give the blog address in the Web address field.
➜ Enter the Username and password of the blogaccount.
➜ Click Next > Finish.
54

Creating a Post
» Click New Post.
» Enter the title for the post in the Title field and the
post content in the area given below the page title.
» Click Publish Post. Once you click Publish Post, the
post will get automatically updated to your blog
whenever the internet connectivity is available.
» To view the published content, open the web
browser and type your blog address.
You can include photos or pictures in your blog to
make it attractive.
55

Creating a Post
» To insert a picture
» Click on the image icon on the right hand side of the
application
» Click Browse to locate the image that you want to
publish in the blog.
» Once you click “Browse”, the OS browse window
appears, enabling you to locate the image to be
loaded.
» When you have chosen the image click Upload &
Insert.
» Click Publish Post.
Session – 7
Online Transactions
Online Transactions
57

» Online transactions have made transactions very


convenient and simplified the workflow in many forms
in a business.
Online transactions deals with transfer of money over
the internet. Revolution in the electronic media has
made transaction handling easy.
» Online shopping is a form of electronic commerce
where customers can buy or sell goods over the
Internet.
Customers need to have an active internet connection
for viewing goods or services offered by a seller;
customers can pay online using a credit, debit card or by
internet banking.
Online Transactions
58

» Online shopping could be useful in situations when:


› A customer does not have sufficient time to visit stores.
› Visiting a store is more expensive than purchasing a
product online.
› A product or service that is not available in the local
market is available online.
» Some of the popular online transaction websites are:
› IRCTC, an online portal for booking flight and train
tickets.
› Flipkart, an online shopping portal for buying consumer
products.
› EBay, an online portal for buying and selling goods.
› Redbus, an online portal for booking bus tickets.
59
Flipkart
➜ Flipkart is an online store where you can purchase a variety of
electronic goods, books, accessories, digital cameras, mobile
phones and peripherals such as printers, etc.
➜ Flipkart offers multiple payment methods like credit card, debit
card, net banking, e-gift voucher, and Cash on Delivery.
➜ To work with Flipkart, you need to use a web browser and an
active internet connection.
➜ Open any Browser such as Firefox, Chrome or Internet Explorer
➜ Type www.flipkart.com in the address bar and Press Enter.
➜ To perform transactions using Flipkart, you need to sign up for
a Flipkart account.
➜ Locate and click on the Sign Up link at the top of the web page.
60
Flipkart
➜ To buy products
➜ Find the products
➜ Add all the items to the cart
➜ Click on buy now
➜ Enter the address
➜ Choose a payment method
IRCTC
61

➜ Indian Railway Catering and Tourism Corporation is an


online portal that can be used for booking travel tickets.
➜ To work with IRCTC, you need to use a web browser and an
active internet connection.
➜ Open any Browser such as Firefox, Chrome or Internet
Explorer
➜ Type www.irctc.co.in in the address bar and Press Enter.
➜ To perform transactions using IRCTC, you need to sign up
for an IRCTC account.
➜ Once you logon to IRCTC, you can use the website for
booking tickets.
➜ Go ahead and fill in the details. The ones marked with an
asterisk (*) are mandatory fields.
Session – 8
Internet Security
Internet Security
63

➜ Internet security is a branch of computer security specifically


related to the Internet, often involving browser security but
also network security. Its objective is to establish rules and
measures to use against attacks over the Internet.
➜ The Internet represents an insecure channel for exchanging
information leading to a high risk of intrusion or fraud, such as
phishing.
➜ Online threats like Phishing, email spoofing, chat spoofing
can increase the chances of user getting compromised.
➜ You can reduce the risks by using best practices such as using
Antivirus Software, Antispyware Software, Firewalls, strong
passwords, etc. in addition to spreading awareness of the
best practices.
Strong Password
64

» Following is a general guideline for managing strong


passwords :
• Keep the length of the password at least 12-14 characters if
permitted.
• Avoid keeping passwords based on repetition, dictionary
words, letter or number sequences, usernames, relative or pet
names, etc.
• Including numbers, and symbols in passwords if allowed.
• Use capital and lower-case letters.
• Avoid using the same password for multiple sites or
purposes.
• Avoid using something that the public or workmates know
you strongly like or dislike.
• Use random password generators if possible.
• Example of a strong password: ftc@y&hw}b
Best Practices for Security
65

➜ Use encryption software: (Usually available within


the operating system) to protect your data from
unauthorized users. If encryption software is not
available within the operating system, use a 3rd party
software.
➜ Keeping your username and password private:
Never save your username or password on computers
that are used in shared environments such as internet
café. Browsers may save your personal data on the
local computer that can be used by another user using
the same computer.
Best Practices for Security
66

➜ Registering with websites: Read the privacy


statement or policy whenever you register with a
website, the statement or policy will include
information about how the website use personal data.
➜ Do not share personal information: Websites require
you to fill out forms containing fields such as name,
gender, age, email address, school, etc. Be cautious
when filling out such forms.
Best Practices for Security
67

➜ Secure Transactions - If you are using online


shopping or transactions, websites even store your
credit card or online banking personal information
such as your credit card number, account details, etc.
➜ Antivirus and Antispyware programs also offer real-
time protection monitoring your computer for any
changes by malware software. Keep your Antivirus
and Antispyware software always up to date.
➜ Do not immediately respond to mails from unknown
users: It may be a fake mail trying to gather personal
information such as your bank account details, home
address, etc.
Best Practices for Security
68

➜ Clear browser cookies frequently: Cookies are


programs that are created on your local computer
when you visit websites. Though cookies are meant
for storing data based on your activity performed
during your earlier visit such as log-on details, details
of a shopping cart, visited pages in a website, etc.
they could also be tracked by unauthorized users and
possibly gain access to your personal information.
Clearing Data Stored in Browsers
69

➜ Web browsers have built-in password management


designed to store passwords used in forms on websites.
Browsers often prompt to save usernames and passwords
when users attempt to logon to websites.
➜ However it is not advisable to leave the web browser store
this data particularly on public or shared computers.
➜ To clear personal data from a web browser such as Mozilla
Firefox, launch the browser.
➜ Click Tools Menu, click Options.
➜ Click Security Tab.
➜ Notice that under Passwords section, Remember password
for sites is checked.
Clearing Data Stored in Browsers
70

➜ This means the browser is configured to save passwords


for websites automatically.
➜ You can uncheck Remember password for sites option, if
you prefer NOT to store passwords.
➜ Mozilla Firefox can also store data such as cookies,
visited websites or webpages data, browsing history,
etc.
➜ To clear this stored data, click General tab > Option.
➜ Click Privacy Tab > History
➜ Click Clear Now and then click OK.
Fire Safety Rules
71

➜ Fire escape plans must be installed at proper levels


➜ Conduct regular drills
➜ Smoke alarms must be placed at proper intervals
➜ Keep workplace a no-smoking zone
➜ Maintenance of safety equipment must be taken care of
regularly
Session – 9
Maintain Workplace
Safety
Fire Safety Rules
73

➜ Fire escape plans must be installed at proper levels


➜ Conduct regular drills
➜ Smoke alarms must be placed at proper intervals
➜ Keep workplace a no-smoking zone
➜ Maintenance of safety equipment must be taken care of
regularly
Falls and Slips Safety Rules
74

➜ Keep the moving area clean and clutter free.


➜ Workplace must be proper ventilated receive light.
➜ Wear non slippery footwear.
➜ Floors must be clean and dry
➜ Oil spills, dust must be immediately cleaned.
Electrical Safety Rules
75

➜ Electrical equipment used should be approved by a


recognised organization.
➜ Workers should be trained to handle the electric equipment
safely.
➜ Damaged and hazardous electrical equipment should be
immediately replaced. All old and workout and frayed
switches and wires should be changed.
➜ Heat emanating equipment should be kept away from the
electrical equipment.
➜ Take care that the outlets/ circuits should not be overloaded
➜ Switch off and unplug the electrical appliances before
cleaning or relocating them.
Use of First Aid
76

➜ First Aid is the immediate assistance provided to the


injured to save life and minimize health loss till the
proper medical aid/ facility is provided.
➜ Assure the injured to remain calm and not to panic
➜ Keep them warm if they are under shock
➜ Do not move the victim in case of back/neck injury
Occupational Hazards
77

➜ An occupational hazard is the illness one may acquire


due to his occupation.
➜ Like people working in a chemical factory may get
affected due to presence of certain chemicals.
➜ Some types of occupational hazards are : Physical
hazards, chemical hazards, biological hazards, ,
behavioral hazards, radiological hazards, ergonomic
hazards etc.
Session – 10
Prevent Accidents
and Emergencies
Accident
79

➜ An accident is an unplanned event that may happen all


of a sudden and may lead to unwanted or
unprecedented results/outcomes.
➜ Types of Accidents:
➜ Accidents at workplace : Slips and fall accidents, fire
➜ Industrial disease/illness
➜ Road traffic accidents
➜ Clinical Accidents
➜ Sports related accidents
Handling Accidents
80

➜ Every organization must follow SOP for accident


handling
➜ Safety measures must be placed to prevent workplace
accidents
➜ Immediately call the medical team for any injury
➜ Stay alert
➜ Pay attention to and follow emergency drills
Emergency
81

➜ An emergency is any unexpected situation that needs


immediate attention and action.
➜ An emergency situation might pose a sudden risk to
life, property health etc. and needs intervention to
prevent deteriorating results/ hazards.
➜ An emergency situation is one that:
➜ threatens the employees, customers or the public
➜ disrupts or shuts down the operations
➜ causes physical or environmental damage
Emergency
82

➜ Types of Emergencies
➜ Chemical spills, Extreme heat waves, Droughts,
Pandemics, Terrorist attack, Fire, Floods,
Thunderstorms, Leakage of some hazardous gas/
chemical.
➜ Emergencies that require evacuation
➜ Fire, Explosion, Floods, Earthquake, Hurricane,
Tornado, Toxic material release, Civil disturbance,
Workplace violence
Session – 11
Protect health and
safety at Work
Hazards
84

➜ An organization can face some health hazards that could


put the lives of the employees in danger. A hazard is
anything that is the source of any potential harm,
damage or any kind of potential loss of health or life.
➜ Hazards can be of different types depending on the
industry and the environment in which the employees
work.
➜ The different types of hazards include:
➜ Physical, Chemical, Biological, Mechanical
Checklist for Workstations
85

➜ The workstation should:


➜ provide sufficient space for the user to alter position
comfortably
➜ provide adequate lighting
➜ have windows fitted with adjustable coverings to alter
the sunlight level
➜ be spacious enough when a workstation is shared by
more than one person
Checklist for Workstations
86

➜ The display screen should:


➜ display well-defined characters of adequate size and
spacing
➜ have a stable image
➜ have easily adjustable brightness and contrast
➜ tilt and swivel easily to suit the user
➜ be free from glare and reflections
➜ Use a separate base for the screen or an adjustable table
Checklist for Workstations
87

➜ The keyboard should:


➜ be able to tilt easily and should be able to separate from
the screen to allow the user to adopt a comfortable
working position
➜ have space in front to provide support for the hands or
arms of the user
➜ have a matt surface
➜ have clearly legible symbols on the keys
Checklist for Workstations
88

➜ The work surface should:


➜ provide adequate space for the user
➜ have a low reflective surface
➜ be of an adequate size to allow the screen, keyboard and
other peripherals to be flexibly arranged
➜ have a stable and adjustable document holder, which
should be at the same level as the screen and at the
same viewing distance
Workplace Evacuation
89

➜ Evacuation is the process of emptying a place in case


of an emergency, disaster.
➜ Every company must ensure following points for
evacuation in case of any emergency:
➜ An evacuation policy : Every organization must have
an evacuation policy. All the Team Leaders are
responsible for informing about the policy to their
employees about it.
➜ Organization must have a designated assembly point
for emergencies. Ensure that every employee/ worker
must know where it is.
Workplace Evacuation
90

➜ A ‘buddy system’ for individuals with special needs or


disabilities must be designated. This system ensures that
differently-abled are assisted and guided out of the
premises or the impacted area properly.
➜ Floor plans with evacuation routes in work areas. Ensure
that you understand these so you can use it in time of need.
➜ Assembly areas, where you are required to assemble after
evacuation, must be properly taken care of.
➜ Periodic evacuation drills should be conducted. Ensure
that you pay attention during these drills. You need to save
your life and you can be helpful in saving someone else’s
life too.
Healthy Living
91

➜ ‘A healthy body has a healthy mind’ - a very popular


saying is true .
➜ Healthy Lifestyle leads to a healthy being.
➜ A healthy living has a lasting impact on an individual
which ultimately yields a healthy environment at
home as well as at work place.
➜ A happy and healthy worker will always perform best
to his ability. A healthy lifestyle helps to keep and
improve people’s health and well being.
Healthy Living
92

➜ A healthy lifestyle includes :


➜ healthy eating habits
➜ physical activities
➜ stress management
➜ healthy mind
➜ sound sleep
➜ goal setting
➜ A healthy lifestyle takes needs practice, commitment
and sincere efforts .
Important Questions !!
93

1. What is meant by Computer Accessibility?


2. Mention any 4 types of impairments a person can have.
3. Write the definition and steps for the following:
a) Sticky Keys b) Filter Keys c) Toggle Keys
d) Sound Sentry e) Mouse Keys f) Show Sounds
g) Serial Keys h) High Contrast i) Cursor Options
4. Which accessibility options are available under Sound
Tab and Display Tab?
5. How can we disable Mouse Keys?
6. What is a computer network?
OR
What is networking?
Important Questions !!
94

7. What do you understand by peer-to-peer architecture?


8. What is Client-Server Architecture?
9. Differentiate between LAN and WAN.
10. Write a short note on ‘Internet’.
11. Write a short note on World Wide Web.
12. What are the advantages of a network?
13. What is an ISP?
14. Explain the need for a modem.
15. Write three examples of wired connectivity and explain
them. [Important]
16. Write three examples of wireless connectivity and
explain them. [Important]
17. Explain how is data transferred on the Internet.
Important Questions !!
95

18. What is Instant Messaging?


19. What are the features/advantages of instant
messaging?
20. What are application based instant messaging
software? Explain with examples.
21. What are web based instant messaging software?
Explain with examples.
22. Write a short note on Google Talk.
23. Write the steps to chat with a contact on Google Talk.
24. Mention any five rules and etiquettes to follow while
chatting on the internet.
25. How can we chat on Gmail?
26. How can we chat on Yahoo?
Important Questions !!
96

27. What is a blog?


28. What is the use of blog?
29. How can we create and manage blog?
30. How can we create a post in blog?
31. How can we comment on a post in blog?
32. Explain the purpose of an offline blog editor.
33. List any five offline blog editors.
34. Write the Steps to Launch Qumana.
35. How can we create a post in Qumana?
36. How can we insert an image in the post?
37. Explain the purpose of Online transactions.
38. List any five websites that allow online transactions.
39. List any three payment tools to use online transactions.
Important Questions !!
97

40. Give any two benefits of online transactions.


41.Write a short note on Flipkart.
42.Write the full form of IRCTC.
43.Why is IRCTC used?
44. Explain the purpose of Internet Security.
45. Explain different kinds of online threats.
46. Explain the need to clear data stored in browsers.
47. Explain any five tips to manage strong passwords.
48. Explain any four best practices to secure data .
49. Explain use of Antivirus and Anti Spyware.
50. Enlist any three basic safety rules to follow at
workplace.
51.Give any two basic safety rules for ensuring Falls and
Slips safety.
Important Questions !!
98

52. Give any two electrical safety rules in any


organization.
53. Explain any two first aid rules.
54.What do you mean by occupational hazards?
55.List any three types of occupational hazards.
56. Explain the terms accident and emergency.
57.Enlist any four types of accidents.
58.Give any three situations of emergency that require
evacuation.
59.Give any two ways to handle accidents.
60. Give a checklist for workstations to minimize the
hazards.
61.List any three types of hazards.
Important Questions !!
99

62. Explain the term ‘ Evacuation Policy’


63. Explain Buddy System to implement evacuation
efficiently in case of emergency
64. Explain the terms Floor Plans and Assembly /areas.
65. Describe the importance of periodic evacuation drills.
66. Explain importance of a healthy lifestyle.
67. Give any four points of a healthy lifestyle
68. An organization can face some __________ that could
put the lives of the employees in danger.
69. Hazards can be of different types depending on the
________ and the ______________ in which the
employees work.
70. Organization must have a designated ______________
for emergencies
100

Thanks! Any questions?


You can find me on instagram @i_pratikkumar
& [email protected]

You might also like