Sei sulla pagina 1di 11

Web applications

1
Web applications

Assistive Technology: When a combination of hardware and software, it enables a person with a
disability or impairment to us a computer. It is known as assistive technology
Types of impairments that Impacts computer usage
Cognitive impairments and learning disabilities
Visual impairments such as
 Low vision
 Complete or partial blindness
 Colour blinds
Hearing impairments including deafness
Steps of launching accessibility option
Step 1: Click start
Step 2: Go to control panel
Step 3: Then choose accessibility option
STICKY KEYS
Sticky keys is an accessibility feature to help computer
users with physical disabilities .Sticky keys allows
the users to press and release a modifier key and have
it remain active until any other key is pressed.
Steps to enable sticky keys
Step 1: Select “use sticky keys “option
Step 2: Now click on apply and then click on ok
To disable sticky key uncheck use sticky keys and then click on apply OK
FILTER KEYS
Filter keys is an accessibility function that tells the keyboard to ignore brief or repeated keystrokes,
making typing easier for people with hands tremors.
Steps to enables filter key
Step 1: check “use filter keys”

2
Web applications
Step 2: click settings under filter key and check “ignore repeated keystrokes “
Step 3: click on apply and then click on ok
To disable filter key, uncheck use filter key and then click on apply OK
TOGGLE KEYS
A toggle key is an accessibility function which is designs for people have vision problem impairment
or cognitive disabilities. A high sound is emitted when the keys are switched off
Steps to enable toggles keys
Step 1: click on the settings of the toggle keys
Step 2: click on apply and then on ok
SOUND SENTRY
Sound sentry generates visual warning such as blinking title bar or a flashing border whenever the
computer generates sounds.
Steps to enables sound sentry
Step 1: check use sound sentry under sound tab, it will
activate a drop down list where from
we can choose the type of visualising described.
Step 2: click on apply and then on ok
SHOW SOUNDS
Show sound instructs application that convey information by sound <to also provide information
visually through text captions or informative icons.
HIGH CONTRAST
High contrast is an accessibility feature to asset people with vision impairment
CURSOR OPTION
Cursor option is also a feature that assists people with vision impairment by changing the blink rate
and width of the cursor.
 To change the spry of the cursor blink rate and width of the cursor
 To change the width of the cursor

MOUSE KEYS
Mouse keys are an accessibility feature that features that assist people who have difficulty using a
mouse.
SERIAL KEYS
Serial keys are an accessibility feature that assists people that have difficulty using or a mouse

3
Web applications
(Or both). It can use special devices such as Sip and Puff.
 Apply all settings to logon desktop can be used to apply
configured accessibility option to this user at logon
 Apply all settings to defaults for new users can be used to apply
configured accessibility option to all users using a particular computer

Note: a computer network is a collection of computers and other hardware which are interred
connected by the communication channels such as cables or satellites.
Networks are designed using the following architecture:
Peer to peer (P2P) architecture:
Networks in which all computers have an equal status are called peer to peer networks
Client-server architecture
Networks in which certain computers have special dedicated task, providing
services to other
Computers in the network are called client server networks
The computers which provides services are called servers
The one who uses these services are called clients.
Types of networks
Mainly there are two types of network:
 LAN (local area network)
 WAN (wide area network )
Local area network (LAN)
A local area network is one which connects the computers and devices in a
limited geographical area such as school, collages etc. Usually they are of high
speed.

Wide area network (WAN)


A wide area network is one which covers a broad area like metropolitan, regional or national
boundaries.
The internet is the most popular WAN
INTERNET
The internet is a global system of interconnected computer
network. It is network of networks that consist of millions of
government, private networks. It is widely used in today world
most commonly by the students.

4
Web applications
It is also considered as the largest encyclopaedia of all the age group of today. It also helps in
maintaining contact with our friends via internet chatting or email software and is becoming major
source of entertainment for the general public
World Wide Web (WWW)
Abbreviated as WWW or W3, commonly known as the web
World Wide Web is a system of interlinked hypertext documents
accessed via the internet. Web can only be viewed by the help of a web
browser.
A web browser is software used to view web sites and acts as an interface between the user and the
World Wide Web
A web server is a computer that stores web site and their related files for viewing on the internet.
Advantages with networking
 Data sharing: it is one of the most important use of networking where user can send and
receive files , audio etc
 Hardware sharing: hardware components can also be shared such as instead of purchasing 10
fax machines for each user ,one fax machine can be purchased and shared among all the 10
users
 Internet access sharing: we can purchase 1 internet connection and share among every
computer instead of purchasing internet connection for each computer.
 Usage of network based application : such as browsers, email clients, chat applications etc in
another advantage
Internet service provider
An internet service provider (ISP) is a group or company which provides us
access to the internet via dial up, direct, or wireless connection. Small and
medium business users and home users like us use DSL, cable modem, dial-
up, broadband wireless, WIMAX or 3G.
Modem
A modem is a device that converts digital signal into analogy signal so
that it can travel through telephone lines and then re convert analogy
signal into digital signal. Its full form is Modulator and Demodulator
Types of internet connectivity
Dial up connection: It is one of the first forms of internet service.
This type of connection relies on the use of telephone lines to carry data
and provide users with access to the web.

5
Web applications
DSL: Digital Subscriber Line is a high-speed data service that is delivered over the standard
phone lines. High-speed internet access can be delivered over the same phone line as standard
telephone service.
Cable internet access: cable internet acces is a form of broadband internet acces that uses the cable
television .This is similar to the dsl but here tv cables are used.
3G: A mobile communications standard that allows mobile phones, computers, and
other portable electronic devices to access the Internet wirelessly. Its abbreviation is
third generation. This provides us a high speed for commercial activities
WIMAX :It stands for Worldwide Interoperability for Microwave Access
Imax, it has a range of up to 31 miles, and mainly aimed at making
broadband network access widely available without the expense of stringing
wires (as in cable-access broadband) or Digital Subscriber Line \

WIFI: It is the most accessible wireless way to connect the various


devices. The best advantage is that no router or a single access point is
needed to connect Wi-Fi Direct in multiple ports in various devices.
This often used in schools offices and other business places
Data transpher over internet

 The data is broken up into bits of same sized pieces called packets.
 A header is added to each packet explaining where the data has come from,
where it should end up and where it fits in with the rest of the packets.
 Each packet is sent from computer to computer until it finds its destination.
 Each computer on the way decides where next to send the packet.
 All Packets may not take the same route.
 At the destination, the packets are examined. If any packets are missing or
 Damaged, a message is sent asking for them to
 Be re-sent. This continues
The packets are arranged into their original form. All these are done in Seconds
Instant messaging
a type of communications that enables us to interact with another
individual in order to communicate in real time over the Internet,
using text-based, not voice-based, communication. The instant

6
Web applications
messaging system notifies us or shows them in the active list whenever somebody on
our private list is online.
Features of an instant messaging are as follows:
 Text Messages can be sent to one or more person
 Audio and video calling and conferencing.
 File transfers which includes photos , videos ,files etc
 Message history is saved for future purposes
Some instant messaging software is Yahoo! Messenger, Windows Live Messenger,
facebook messenger, whatsapp messenger etc
There are two kinds of instant messaging software:-
 application based
 Web Based
Application based instant messaging software is downloaded and installed on
User’s computer. E.g.: - Google Talk, Yahoo! Messenger etc.
Web based instant messaging software is accessed using browsers like Google Chrome, etc.
Some of the popular web based instant messaging software is: Yahoo! Messenger for the
Web, IMO, etc.
BLOG
A blog is a type of website, usually maintained by a person with regular entries of
commentary, description of events, or graphics or video.
There are hundreds of websites that offer blog service for free. Some of the popular blogs
include:
 www.blogger.com
 www.blog.com
 www.weebly.com
CREAT A BLOG

Step 1: open a browser and Sign into Blogger.


Step 2: On the left, click the Down arrow.
Step 3: Click new blog and enter a name for the blog.
Step 4: then choose a blog address or URL and choose a template.
Step 5: Click Create blog.
If we do not have an active internet connection then we can create blogs using a

7
Web applications
Blog application and publish the blog whenever internet connectivity is Available.
Offline blog editors available such as:-
 Qumana
 Windows Live Writer
TO CREAT A POST
STEP 1:-Click on New Post.
STEP 2:-A windows will be displayed
STEP 3:-type the desired things and click Publish Post.
ONLINE SHOPPING
Online shopping is a form of electronic commerce where customers can buy goods and
Sellers can sell goods over the Internet.
Customers should have an active internet connection for viewing goods
which are offered by the sellers and customers can pay online using a
credit, debit card or other payments methods.
USES ONLINE SHOPING
A customer does not have sufficient time to visit stores.
Visiting a store is more expensive than purchasing a product online.
A product or service that is not available in the local market is
available online. Popular online transaction websites are:
IRCTC (an online portal for booking flight and train tickets)
Flipkart, (an online shopping portal for buying consumer products)
EBay (an online portal for buying and selling goods)
ONLINE TRANSACTION ON FLIPKART
STEP 1: Open Flipkart and chose the product which we want to buy.
STEP 2: Click on buy now option and click on the amount written
STEP 3: Chose any online payment methods like debit or credit card or others
STEP 4: type the information carefully and type the OTP
STEP 5: Click on proceed and pay.
BOOK TICKET ON IRCTC
STEP 1: At first download the Irctc and Connect App for our Phone(Android, Ios)
STEP 2: Then open the app and login with the Irctc account, and if don’t have then register on
Irctc through mobile app.
STEP 3: Then it will ask for a Pin which we can set any 4 digit pin.
STEP 4: Now just select the origin and destination station and the date to search the train.

8
Web applications
STEP 5: It will list the train and we can select the desired train,
STEP 6: Check for seat availability and then tap on Book Now to book the ticket.
STEP 7: Now tap on Add Passenger, Enter person Name, Age and Gender, and then tap on
Done STEP 8: Then Tap on Book Ticket button confirm the booking.
STEP 9: Then it will take to the payment page and then select the desired payment option and
complete the payment.
INTERNET SECURITY
Internet security is a branch of computer security specifically related to the
Its objective is to establish rules and measures.
USING A STRONG PASSWORD
A combination of alphanumeric and special characters could be
used for creating a password that is not so easy to crack or guessed
by other users. Do not keep passwords such as favourite colour,
friends or relatives name or mobile number
GENERAL GUIDELINE FOR MANAGEING STRONG
PASSWORD
 Keep the length of the password at least 12-14 characters if permitted.
 Avoid keeping passwords based on repetition, dictionary words, letter or
Number sequences, usernames, relative or pet names, etc.
 Including numbers, and symbols in passwords if allowed.
 Use capital and lower-case letters.
 Avoid using the same password for multiple sites or purposes.
Example of a strong password: XfdLD$%3F$32f
BACKUP YOUR DATA
We should always keep copies of personal data in other media such as in CD, pen
drives, etc. This could be helpful in situation of loss of data.
USE ENCRYPTION SOFTWARE
To protect our data from unauthorized users this is used and if encryption software is
not available within the operating system then we can use a 3rd party software.
KEPPING USERNAME AND PASSWORD PRIVATE
Never save our username or password on computers that are used by many persons
such as internet café or in offices. Browsers may save our personal data that can be
used by another user using the same computer.

9
Web applications
REGISTERING WITH WEBSITES
Read the privacy statement or policy whenever you Register with a website, the
statement or policy will include information about how the website use personal data.

DO NOT SHARE PERSONAL INFORMATION


Websites require you to fill out forms containing fields such as name, gender,
age, email address, school, etc. Be Cautious when filling out such forms; research
and verify if it’s a trustable Website. Our email addressed could be used by
unauthorized users to send us fake or unwanted emails.
SECURE TRANSACTIONS
During online shopping or transactions websites Even store our credit card or online
banking personal information such as our Credit card number, account details, etc. This
information can be tracked and Used by un-authorized users often known as hackers to
misuse this information.
USE ANTIVIRUS AND ANTISPYWARE SOFTWARE
Computers are prone to attacks from software known as Malware that
could harm our computer. Malware track browsing behaviour evens the
key strokes and transmits personal data from our computer. Antivirus
and Antispyware programs also offer real-time protection monitoring
our computer for any changes by malware software. We should keep
our antivirus and antispyware software always up to date and we should
not immediately respond to mails from unknown users, it may be a fake
mail trying to gather personal information such as our bank account
details, home address.
CLEAR BROWSER COOKIES FREQUENTLY
Cookies are the programs that are created on our local computer when we visit
websites. Though cookies are meant for Storing data based on our activity performed
during our earlier visit such as login details, details of a shopping cart, visited pages in
a website, etc. they could also be tracked by unauthorized users and possibly
gain access to our personal information.
INSTALL FIREWALL
Firewalls could be software or hardware and can assist in keeping a computer
and a network secure. Firewalls analyze the network traffic and determine if the
traffic should or not .In most cases, operating systems such as Linux, Windows or Mac

10
Web applications
include firewall software as a part of operating system thus keeping the computer
secure. In rare cases, you may need to configure our firewall for additional security.
NEVER INSTALL SOFTWARE FROM UNKNOWN SOURCE
We should not download software from unknown source as they could not de
trustworthy so we should always download software only from well-known or reputed
websites. Verify the source if it is legitimate by searching the internet or
referring to comments from other users before downloading them .
REMOVE UNWANTED OR UNKNOEN SOFTWARE APPLICATIONS

We should remove unwanted or unknown software applications as these might have


got installed without our knowledge when we have visited
some websites. Unwanted software could get installed as
they might have been bundled along with necessary
software. Some programs such as toolbars get installed
usually through bundled software and are programmed to
send personal data without our consent.
CLEARING DATA STORED IN BROWSERS
STEP 1: Open the desired browser
STEP 2: Click on the three dots or press ctrl+H
STEP 3: In the left side choose the clear browsing data option
STEP 4: Select from beginning option
STEP 5: then click on clear data.

11

Potrebbero piacerti anche