Web Applications and Security - One Shot
Web Applications and Security - One Shot
and Security
in
Session – 1
Working with
Accessibility Options
Computer Accessibility
3
Network Architecture
» Peer-to-Peer Architecture
Networks in which all computers have an equal status
are called peer to peer networks. Generally in such a
network each terminal has an equally competent CPU.
» Client-Server Architecture
Networks in which certain computers have special
dedicated tasks, providing services to other computers
(in the network) are called client server networks. The
computer(s) which provide services are called servers
and the ones that use these services are called clients.
18
Types of Networks
» Local Area Network (LAN):
» A local area network (LAN) is one which
connects computers and devices in a limited
geographical area such as home, school,
computer laboratory, office building, or closely
positioned group of buildings.
» Usually local area networks offer very high
speeds and are used for connecting computers
and peripherals such as printers, scanners, etc.
19
Types of Networks
» Wide Area Network (WAN):
» A wide area network (WAN) is one which
covers a broad area (i.e., any network that links
across metropolitan, regional, or national
boundaries).
» The Internet is the most popular WAN, and is
used by businesses, governments, non-profit
organizations, individual consumers, artists,
entertainers, and many others.
20
Internet
» The Internet is a global system of interconnected
computer networks that use the standard Internet
protocol suite to serve billions of users worldwide.
» It is a network of networks that consists of millions of
private, public, academic, business, and government
networks.
21
Uses of Internet
» Internet is one of the most useful technologies of
modern times which help us in our daily, personal and
professional life. Internet is widely used by students,
educational institutes; scientist and professionals to
gather information for research and general
information. Businesses use the Internet to access
complex databases such as financial database.
» The Internet is the largest encyclopedia for all age
groups. The Internet helps in maintaining contact with
friends and relatives who live across different locations
via Internet chatting systems and email software.
Internet is also becoming a major source of
entertainment for the general public.
22
Advantages of Network
» Data Sharing: One of the most important
uses of networking is to allow the sharing of
data.
» Files Transfer : Users can send text files,
spread sheets, documents, presentations,
audio files, video files, etc. to other users.
» Hardware Sharing: Hardware components
such as printers, scanners, etc. can also be
shared.
24
Advantages of Network
» Internet Access Sharing: You can purchase
a single Internet connection and share it
among other computers in a network
instead of purchasing multiple Internet
connection for each computer.
» Usage of network based applications: Such
as web browsers, email clients, chat
application, audio & video calling, etc. is
another advantage.
25
Getting Access to Internet
➜ Internet Service Provider
➜ An Internet service provider (ISP) is an organization
which provides you with access to the Internet via a
dial-up (using modem) or direct (hard wired) or
wireless connection.
➜ MODEM
➜ A modem is a device that converts digital computer
signals into a form (analog signals) that can travel
over phone lines. It also re-converts the analog
signals back into digital signals. The word modem is
derived from its function MOdulator/DEModulator.
26
Types of
Common Internet Connectivity
Technology Type of Connectivity
Dial Up Wired
DSL Wired
3G Wireless
WiMax Wireless
WiFi Wireless
27
Dial Up
➜ Dial-up Internet access is a form of Internet access that
uses the facilities of the public switched telephone
network (PSTN) to establish a connection to an Internet
service provider (ISP) via telephone lines using a device
called MODEM. Dial-up connections are extremely
slow and in most cases, it is replaced by a high speed
connection such as DSL or Cable Modem.
28
DSL
➜ Digital subscriber line(DSL) provide Internet access by
transmitting digital data over wires of a local telephone
network. DSL service is delivered along with wired
telephone service on the same telephone line. For using
a DSL connection, you need a DSL modem and a
subscription.
29
Cable Internet Access
➜ Cable Internet Access is a form of broadband Internet
access that uses the cable television infrastructure.
Cable Internet Access is provided through existing
cable TV networks.
30
3G
➜ 3G, short for 3rd Generation is a set of standards used
for mobile devices and mobile telecommunication
services and networks. High-Speed Downlink Packet
Access (HSDPA) is 3G mobile telephony
communications protocol that allows higher data
transfer speeds and capacity.
31
WiMax
➜ WiMAX (Worldwide Interoperability for Microwave
Access) is a wireless communications standard
designed to provide mobile broadband connectivity
across cities and countries through a variety of devices.
WiMAX is a long range system, covering many
kilometers and is typically used where DSL or Cable
Internet Access cannot be used; this could be difficulty
in laying out cables for home or offices located in
remote locations but need access to the Internet.
32
WiFi (Wireless Fidelity)
➜ Wi-Fi is a popular technology that allows an electronic
device such as computers or mobile phones to
exchange data wirelessly over a network, including
high-speed Internet connections. Wi-Fi is used where
cables cannot be run (such as old buildings, outdoor
areas) to provide network and Internet access. Wi-Fi
can also be used where users require mobile
connectivity.
33
Data Transfer on Internet
➜ Each packet is sent from computer to computer until it
finds its destination. Each computer on the way decides
where next to send the packet. All packets may not take
the same route.
➜ At the destination, the packets are examined. If any
packets are missing or damaged, a message is sent
asking for them to be re-sent. This continues until all
packets have been received intact.
➜ The packets are now reassembled into their original
form. All this done in seconds!
Session – 3
Introduction to
Instant Messaging
Instant Messaging
35
Chatting on Gmail
» Once you sign into your Gmail account, a contact
window will be displayed either on the left side or
the right side within the browser.
» If you would like to chat with a contact, double click
on the contact’s name. You will see a pop-up.
» Now you can start typing the message you want to
send and the other contact should be able to
respond to your chat message.
44
Chatting on Yahoo
» Before you start using Yahoo! Messenger, a Yahoo
Mail account is required.
» If you don’t have a Yahoo! Mail Account already you
can use the built in option for creating a new Yahoo!
Mail Account.
» You should have a list of contacts that are available
for chat. If you don’t have any contacts, you can add
their Yahoo Mail account to your contact list by
sending an invite.
» Note: If you would like to import your contacts from
other sources such as Microsoft Outlook, Gmail,
Hotmail, etc., you can use the import option.
Session – 5
Creating & Publishing
Web Pages - Blog
46
Blog
➜ A blog is a discussion style site used by non-
technical (or technical users) users for creating
personal web pages. Blogs are similar to an
online personal diary and simple to use.
➜ Use of Blog - We can use a blog to convey
messages about events, announcements, news,
reviews, etc.
47
Blog
➜ Management of Blog - Blogs are usually managed
using a web browser and this requires active internet
connection. You can also use offline blog software to
create content first and later publish the content
when an active internet connection is available.
➜ Free blog services are provided by :
➜ www.WordPress.com
www.blogger.com
www.blog.com
www.weebly.com
www.blogsome.com
Creating a Post
48
Creating a Post
» Click New Post.
» Enter the title for the post in the Title field and the
post content in the area given below the page title.
» Click Publish Post. Once you click Publish Post, the
post will get automatically updated to your blog
whenever the internet connectivity is available.
» To view the published content, open the web
browser and type your blog address.
You can include photos or pictures in your blog to
make it attractive.
55
Creating a Post
» To insert a picture
» Click on the image icon on the right hand side of the
application
» Click Browse to locate the image that you want to
publish in the blog.
» Once you click “Browse”, the OS browse window
appears, enabling you to locate the image to be
loaded.
» When you have chosen the image click Upload &
Insert.
» Click Publish Post.
Session – 7
Online Transactions
Online Transactions
57
➜ Types of Emergencies
➜ Chemical spills, Extreme heat waves, Droughts,
Pandemics, Terrorist attack, Fire, Floods,
Thunderstorms, Leakage of some hazardous gas/
chemical.
➜ Emergencies that require evacuation
➜ Fire, Explosion, Floods, Earthquake, Hurricane,
Tornado, Toxic material release, Civil disturbance,
Workplace violence
Session – 11
Protect health and
safety at Work
Hazards
84