वेब एप्लिकेशन और सुरक्षा (Web Application and Security) आज के डिजिटल युग में एक महत्वपूर्ण विषय है। इंटरनेट और तकनीकी विकास ने हमारे जीवन को आसान बनाया है, लेकिन इसके साथ ही ऑनलाइन खतरों और साइबर सुरक्षा की चुनौतियां भी बढ़ी हैं। इस अध्याय में, हम वेब एप्लिकेशन के उपयोग, उनकी सुरक्षा के महत्व और विभिन्न प्रकार के खतरों को समझने का प्रयास करते हैं। साथ ही, डेटा सुरक्षा के लिए जरूरी उपायों और तकनीकों पर भी चर्चा की गई है, ताकि हम सुरक्षित और जिम्मेदारी से इंटरनेट का उपयोग कर सकें।

UNIT-4 WEB APPLICATIONS AND SECURITY

SESSION 1: WORKING WITH ACCESSIBILITY OPTIONS

Q:-       What does the term “Computer Accessibility” refer to, and why is it important?

Ans:-   Computer Accessibility means making a computer easy to use for everyone, including people with disabilities. It ensures that no one is         left out from using technology.

Q:-       What is Assistive Technology, and how does it help individuals with disabilities or impairments?

Ans:-   Assistive Technology is a mix of special hardware and software that helps people with disabilities use a computer easily. For example, it   can include screen readers for blind users or voice controls for those who cannot use a keyboard.

Q:-       What is Sticky Key?

Ans:-   StickyKeys is an accessibility feature to help computer users with physical disabilities, but it is also used by others as a means to reduce          repetitive strain.  StickyKeys allows the user to press and release a modifier key, such as Shift, Ctrl, Alt, or the Windows key.

Q:-       How  to enable/Disable Sticky Keys

Ans:-   To enable StickyKeys, steps are following:-

  1. Click on Start Button -> Control Panel
  2. Then click on Accessibility Options. The Accessibility Options window appears
  3. In Keyboard Tab, select Use StickyKeys.
  4. • Click Apply. • Click OK. The Sticky Keys icon appears in the system tray.

To turn off Sticky Keys, uncheck the “Use Sticky Keys” option and click Apply, then OK.

Q:-       What happens when you press the CTRL key and then the letter A after enabling Sticky Keys?

Ans:-   The entire text in Notepad gets selected. This is the same as pressing CTRL+A together but done step by step.

Q:-       What steps do you follow to enable Sticky Keys and practice its effects?

Ans:-   First, open Notepad from Start > All Programs > Accessories > Notepad. Then, type some text and try using Sticky Keys by pressing one         key at a time, like CTRL and then A.

Q:-       What is use of Filter Key? How to enable filter key?

Ans:-   Filter Keys is a feature of Microsoft Windows. It is an accessibility function that tells the keyboard to ignore brief or repeated keystrokes,         making typing easier for people with hand tremors.

            To enable Filter Keys, check Use Filter Keys.

            • Click Settings under Filter Keys and check “Ignore Repeated Keystrokes”.

            • Click Apply. • Click OK

Q:-       What  is the use of Toggle Key?

Ans:-   ToggleKeys is also a feature of Microsoft Windows. It is an accessibility function which is designed for people who have vision     impairment or cognitive disabilities. When 165 ToggleKeys is turned on, computer emits sound cues when the locking keys (Caps Lock,      Num Lock, or Scroll Lock) are pressed.

Q;-       What is SoundSentry, and who is it designed to help?

Ans:-   SoundSentry is a feature that helps people who cannot hear well. It shows visual alerts, like a blinking title bar or flashing border,       whenever the computer makes a sound.

Q:-       How can you enable SoundSentry on your computer?

Ans:-   Go to the Sound Tab, check the “Use SoundSentry” option, choose a visual warning from the dropdown list, then click Apply and OK.

Q:-       How can you test SoundSentry to see how it works?

Ans:-   Open the Run window by clicking Start > Run. Type “note” instead of “notepad” and press Enter. When an error happens, the desktop            will flash to show a visual alert.

Q:-       What is High Contrast, and how does it help people with vision impairment?

Ans:-   High Contrast is a feature that changes the size and color of fonts and the background to make things easier to see for people with       vision problems.

Q:-       How can you enable the High Contrast feature on your computer?

Ans:-   Go to the Display Tab, check “Use High Contrast,” then click Apply and OK. You will see the changes immediately.

Q:-       What are Cursor Options, and how do they help people with vision impairment?

Ans:-   Cursor Options let you change the blinking speed and width of the cursor, making it easier for people with vision problems to see and            follow the cursor.

Q:-       What is MouseKeys, and how does it help users?

Ans:-   MouseKeys is a feature that lets you use the keyboard (mainly the numeric keypad) to move the mouse pointer. It helps people who find it hard to use a regular mouse.

Q:-       What is Serial Keys, and who does it help?

Ans:-   Serial Keys helps people who cannot use a keyboard or mouse by letting them use special devices like Sip, Puff, or Breath Switches to          control the computer.

Q:-       What type of devices are used with Serial Keys for input?

Ans:-   Special devices like Sip, Puff, and Breath Switches are used to provide input through Serial Ports.

Fill in the Blanks with Answers:

  1. The option in Microsoft Windows XP used for helping users with physical disabilities and to reduce repetitive strain is MouseKeys.
  2. Sound Sentry is designed to help users with auditory impairments.
  3. The High Contrast option in Microsoft Windows XP is designed to assist people with vision impairments.
  4. Serial Keys is designed to assist people that have difficulty using a keyboard or a mouse.

SESSION 2 : NETWORKING FUNDAMENTALS

Q:-       What is Computer Network?

Ans:-   A computer network is a collection of computers and other hardware components interconnected by communication channels (cables or           satellites) that allow sharing of resources and information.

Q:-       What is a Peer-to-Peer (P2P) network?

Ans:-   A Peer-to-Peer (P2P) network is a type of network where all computers are equal, and each has the same             capability, including a strong CPU.

Q:-       What is a Client-Server network, and how is it different from a P2P network?
Ans:-   A Client-Server network is a type of network where some computers (servers) provide services, and others             (clients) use these services. In a P2P network, all computers are equal, but in a Client-Server network, roles are       divided between servers and clients.

Q:-       What is a Local Area Network (LAN), and where is it used?
Ans:-   A LAN connects computers and devices in a small area like a home, school, or office. It provides high speed and is used to connect devices like printers and scanners.

Q:-       What is a Wide Area Network (WAN), and give an example?
Ans:-   A WAN covers a large area, like across cities or countries. The Internet is the most popular example of a WAN.

Q:-       What is the Internet, and why is it called a network of networks?
Ans:-   The Internet is a global system connecting many networks using standard protocols. It’s called a network of             networks because it links millions of private, public, academic, business, and government networks.

Q:-       What is the World Wide Web (WWW), and how is it accessed?
Ans:-   The World Wide Web is a system of linked hypertext documents accessed via the Internet using a web browser.          It includes text, images, videos, and multimedia.

Q:-       What are some advantages of networking?

Ans:-   Some of the advantages associated with networking are:

  • Data Sharing: Sharing data between users.
  • File Transfer: Sending files like documents, audio, and videos.
  • Hardware Sharing: Sharing devices like printers to save costs.
  • Internet Sharing: Using one Internet connection for many computers.
  • Network-based Applications: Using apps like browsers, email, and video calling.

Q:-       What do you need to access the Internet?
Ans:-   To access the Internet, you need an Internet connection provided by an Internet Service Provider (ISP) like             BSNL, Airtel, or Vodafone.

Q:-       What is an Internet Service Provider (ISP)?
Ans:-   An ISP is an organization that provides Internet access through dial-up, wired, or wireless connections.

Q:-       What is a modem, and what does it do?
Ans:-   A modem is a device that converts digital computer signals into analog signals to travel over phone lines and             vice versa. The name “modem” comes from its functions: MOdulator/DEModulator.

Q:-       What are the two main categories of Internet connectivity?
Ans:-   Internet connectivity is broadly divided into:

  • Wired Access (e.g., DSL, Cable Internet)
  • Wireless Access (e.g., 3G, WiMAX, Wi-Fi)

Q:-       What is Dial-up Internet access?
Ans:-   Dial-up uses telephone lines and a modem to connect to the Internet. It is very slow and is often replaced by             faster options like DSL or Cable Internet.

Q:-       What is DSL, and how does it work?
Ans:-   DSL (Digital Subscriber Line) provides Internet access by transmitting digital data over telephone wires. It             works along with a phone line.

Q:-       What is Cable Internet access?
Ans:-   Cable Internet uses the cable TV network to provide high-speed Internet access.

Q:-       What is 3G Internet connectivity?
Ans:-   3G is the third generation of mobile network standards that provide high-speed Internet on mobile phones.

Q:-       What is WiMAX, and where is it used?
Ans:-   WiMAX is a wireless technology for broadband Internet, often used in remote areas where DSL or cable             connections are difficult to install.

Q:-       What is Wi-Fi, and why is it useful?
Ans:-   Wi-Fi is a wireless technology that allows devices like smartphones and laptops to connect to the Internet             without cables. It is useful in places where cables cannot be installed, like old buildings or outdoor areas.

Assessment Questions and Answers:

I. Fill in the blanks:

  1. The acronym for LAN is Local Area Network.
  2. Three types of Wired Internet Connectivity are Dial-up, DSL, & Cable.
  3. Three types of Wireless Internet Connectivity are 3G, WiMAX, & Wi-Fi.

II. Answer the following:

  • Define networking?
    Networking is the practice of connecting computers and other devices together to share data and resources, such as files, printers, and internet connections, within a limited area like a home, office, or school.
  • Give any three advantages of networking?
    • Data Sharing: Allows multiple users to share files and resources.
    • Hardware Sharing: Devices like printers and scanners can be shared among multiple computers.
    • Internet Access Sharing: A single internet connection can be shared across multiple devices, saving costs.
  • Explain the term packet with reference to data transfer.
    A packet is a small unit of data sent over a network. It contains the data being transferred along with information like the sender’s and receiver’s addresses. Each packet travels independently across the network and may take different routes to reach its destination, ensuring efficient and reliable data transfer.
  • Explain WiFi and its significance.
    Wi-Fi is a wireless technology that allows devices like computers, smartphones, and tablets to connect to the internet without cables. It is significant because it enables users to access the internet and network resources from anywhere within the Wi-Fi coverage area, making it very convenient and suitable for places like homes, offices, cafes, and public spaces.
  • Compare LAN with WAN
    • LAN (Local Area Network): Connects devices within a limited area such as a building or school. It provides high-speed connections and is used for connecting computers and peripherals like printers.
    • WAN (Wide Area Network): Covers a broader geographical area, like a city, region, or even the entire country. The internet is the most common example of a WAN, linking multiple LANs over long distances.
  • Expand the following terms:
    • DSL: Digital Subscriber Line
    • ISP: Internet Service Provider
    • Modem: Modulator/Demodulator
    • www: World Wide Web
    • LAN: Local Area Network
    • MAN: Metropolitan Area Network
    • WAN: Wide Area Network
    • P2P: Peer-to-Peer
  • Explain P2P Architecture and how it is different from Client Server Architecture?
    P2P (Peer-to-Peer) Architecture: In a P2P network, all computers (peers) have equal status, sharing resources like files and printers. Each peer can act as both a client and a server.
    Client Server Architecture: In this type of network, certain computers (servers) provide services and resources to other computers (clients). The servers have dedicated roles, such as storing data or managing applications, while clients use these services. This setup is more centralized compared to the distributed nature of P2P networks.

SESSION 3: INTRODUCTION TO INSTANT MESSAGING

Q:-       What is instant messaging (IM)?

Ans:-   Instant messaging (IM) is a form of communication over the Internet that allows users to send text-based messages instantly from the sender to the receiver.

Q:-       What are the key features of instant messaging?

Ans:-   Key features of instant messaging include sending text messages to one or more people, audio calling and             conferencing, video calling and conferencing, file transfers (such as documents, audio files, and video files), and      message history to save messages for future reference.

Q:-       What are the two kinds of instant messaging software?

Ans:-   The two kinds of instant messaging software are application-based (like Google Talk, Yahoo! Messenger,             Skype) and web-based (like Meebo, MSN Web Messenger, IMO).

Q:-       How can you create an instant messaging account using Google Talk?

Ans:-   To create an instant messaging account using Google Talk, you need to download and install the Google Talk             application on your desktop, mobile, or laptop, or use it through a browser after signing into your Gmail account.           Google Talk allows you to communicate via text and voice, and make video calls, along with viewing updates            from your GMAIL mailbox.

Q:-       What are some popular web-based instant messaging services?

Ans:-   Some popular web-based instant messaging services include Meebo, Yahoo! Messenger for the Web, MSN Web     Messenger, and IMO.

Assessment Questions and Answers:

I. Fill in the blanks:

  • a. Instant messaging (IM) is a form of communication over the Internet that offers an instantaneous transmission of text-based messages from sender to receiver.

b. Microphone, speakers, and a web camera are required for audio and video conferencing.

  • List any five application-based instant messaging software:
    • Google Talk
    • Yahoo! Messenger
    • Skype
    • Windows Live Messenger
    • Rediff Bol
  • What do you mean by instant messages?
    • Instant messages are text-based communications sent over the internet, allowing users to communicate with one another in real-time.
  • Give any three key features of Instant Messaging:
    • 1. Sending text messages to one or more recipients.
    • 2. Audio and video calling and conferencing.
    • 3. File transfers including documents, audio files, and video files.

SESSION 4: CHATTING WITH A CONTACT – GOOGLE TALK

Q:-       What steps would you follow to chat with a contact using your Gmail account?

Ans:-   After signing into your Gmail account, a contact window will be displayed either on the left or right side within the browser where you can start chatting with your contacts.

Q:-       How do you set up an instant messaging account using Yahoo! Messenger?

Ans:-   To use Yahoo! Messenger, you need to download and install the Yahoo! Messenger application from             http://in.messenger.yahoo.com/download/. Additionally, you will need a Yahoo Mail account. If you don’t have     one, you can use the built-in option to create a new Yahoo Mail account.

Q:-       What is the requirement to use Yahoo! Messenger?

Ans:-   To use Yahoo! Messenger, you need to have a Yahoo Mail account. If you don’t already have a Yahoo Mail account, you can create one as part of the setup process for using Yahoo! Messenger.

Q:-       Describe the user interface for chatting in Gmail.

Ans:-   After signing into your Gmail account, a contact window will appear on either the left or right side of the browser where you can see your contacts and start chatting with them.

Q:-       What is the difference between chatting on Gmail and using Yahoo! Messenger?

Ans:-   Both Gmail and Yahoo! Messenger offer instant messaging capabilities, but while Gmail’s chat interface is integrated directly into the Gmail web browser, Yahoo! Messenger requires downloading and installing an application. Additionally, Gmail uses your Gmail contacts, while Yahoo! Messenger uses a Yahoo Mail account for login.

Assessment

Q:-       State any 03 rules and etiquettes to be followed while chatting on the Internet.

Ans:-   There are some general rules and etiquettes to be followed while chatting.

  • Messages should be short and to the point.
  • Always introduce yourself by name if your screen name doesn’t reflect it.
  • In a business environment, know exactly what you want to discuss
  • Typing your messages in uppercase is extremely rude – it’s considered shouting and very aggressive.

Q:-       What are the basic needs to use instant messaging (chat) software.

Ans:-   The basic needs to use instant messaging (chat) software include:

  1. A computer or mobile device: This is necessary to access the chat software.
  2. Internet connection: An active internet connection is required to send and receive messages.
  3. Chat software: Application-based or web-based instant messaging software like Google Talk, Yahoo! Messenger, Skype, etc.
  4. Sign-in credentials: An account with the chat service provider, such as a Gmail or Yahoo! Mail account, to log in and start chatting.

SESSION 5: CREATING AND PUBLISHING WEB PAGES – BLOG

Q:-       What is the purpose of creating a blog account on WordPress?

Ans:-   The purpose of creating a blog account on WordPress is to set up a personal web space where you can write, share, and customize   content. It allows you to create a beautiful and functional website or blog easily.

Q:-       What information is required to create a blog on WordPress?

Ans:-   To create a blog on WordPress, you need to provide the following information:

  • Blog address: A unique address for your blog.
  • Username: For managing the blog.
  • Password: A strong password for security.
  • Email address: To receive an activation link.
  • Language: To choose the preferred language for your blog.

Q:-       Why is it important to choose a strong password while creating a blog on WordPress?

Ans:-   It’s important to choose a strong password to secure your WordPress blog account from unauthorized access and potential hacking. A         strong password typically includes a mix of uppercase letters, lowercase letters, numbers, and symbols.

Assessment:

  • What is a blog? Explain its use.
    • A blog is a type of website where people share their thoughts, ideas, and personal stories in a discussion-style format. It acts like an online diary where anyone can publish their posts, and others can read and comment on them. Blogs are used for personal expression, sharing information, giving updates on hobbies, or discussing topics of interest.
  • List any 5 websites that provide blog service.
  • Difference between a web page and a website.
    • Web page is a single document or file on the Internet with its own unique address (URL). For example, a specific article on a blog is a web page.
    • Website is a collection of many web pages related to a common theme or purpose, all grouped together under one domain name. For instance, a blog may contain multiple web pages like the home page, individual posts, about page, etc.
  • What do you mean by publishing a post?
    • Publishing a post means making a new article or entry available for others to read on your blog. After writing a post, you click the “publish” button on the blogging platform to make it live, so it appears on your blog for your readers to see and comment on.

SESSION 6: USING OFFLINE BLOG EDITORS

Assessment:

  • Explain the purpose of an offline blog editor.
    • An offline blog editor is a software application that allows you to write, edit, and manage blog posts directly on your computer without needing an internet connection. It provides all the features needed to compose and format your posts, upload images, and schedule posts for later publishing, all while working offline. Once you are back online, you can publish your posts directly to your blog from the editor.
  • List any five offline blog editors.
    • Here are five popular offline blog editors:
      • Qumana
      • Windows Live Writer
      • Blogdesk
      • MarsEdit
      • Ecto

SESSION 7: ONLINE TRANSACTIONS

Q:-       What are online transactions?

Ans:-   Online transactions refer to the process of transferring money over the internet to make payments for goods and services. It simplifies the workflow in businesses and revolutionizes how transactions are handled electronically.

Q:-       What is online shopping?

Ans:-   Online shopping is a form of electronic commerce where customers can buy or sell goods over the internet. It involves viewing products online and paying using methods like credit cards, debit cards, or internet banking.

Q:-       List any four popular online transaction websites.

Ans:-   Some popular online transaction websites include:

  • IRCTC (for booking flight and train tickets),
  • Flipkart (for buying consumer products),
  • eBay (for buying and selling goods),
  • Redbus (for booking bus tickets).

ASSESSMENT

Q:-1     Explain the purpose of Online transactions.

Answer: The purpose of online transactions is to enable the convenient and secure transfer of money over the internet, allowing users to pay for goods and services from the comfort of their homes. It simplifies the workflow for businesses and makes transactions quicker and more efficient.

Q:-2     List any five websites that allow online transactions.

Answer:

  • IRCTC (for booking flight and train tickets),
  • Flipkart (for buying consumer products),
  • eBay (for buying and selling goods),
  • Redbus (for booking bus tickets),
  • Amazon (for a wide range of online shopping).

Q:-       List any three payment tools to use online transactions.

Answer:

  • Credit Cards,
  • Debit Cards,
  • Internet Banking.

Q:-       Give any two benefits of online transactions.

Answer:

  • Convenience: Online transactions allow users to make payments from anywhere at any time without the need to visit physical stores or banks.
  • Speed: Transactions are processed quickly, reducing the time it takes for funds to transfer, making the process more efficient compared to traditional methods.

SESSION 8: INTERNET SECURITY

Q:-       What is the purpose of using strong passwords, and what should you avoid when creating them?

Ans:-   The purpose of using strong passwords is to protect your accounts from being hacked. Avoid using simple passwords like your favorite color, pet’s name, or any common information that could be easily guessed. A strong password should include a mix of letters (both upper and lower case), numbers, and special characters.

Q:-       Why is it important to use encryption software, and what should you do if it’s not available within the operating system?

Ans:-   Encryption software is important because it helps protect your data from unauthorized access. If it’s not available within your operating system, you can use third-party encryption software to secure your files and information.

Q:-       What should you do if you receive an email from an unknown user?

Ans:-   If you receive an email from an unknown user, it’s best not to open it or click on any links or attachments. These emails may contain viruses or other malicious software that could harm your computer.

Q:-       Why is it recommended to clear browser cookies frequently, and what risks do they pose?

Ans:-   Clearing browser cookies frequently is recommended because cookies can store personal information like your login details, which could be accessed by unauthorized users. Regularly clearing cookies helps protect your privacy and keeps your personal information secure.

Q:-       Why should you never install software from unknown sources?

Ans:-   You should never install software from unknown sources because these programs may contain viruses, spyware, or other harmful software. It’s safer to download software only from reputable websites or official sources.

ASSESSMENT

Q:-       Explain the purpose of Internet Security.

Ans      The purpose of Internet Security is to protect your personal information and your devices from cyber threats like hacking, viruses, and malware. It involves setting up rules and measures to secure data and prevent unauthorized access over the Internet.

Q:-       Explain different kinds of online threats.

Ans:-   Different kinds of online threats include:

  • Hacking: Unauthorized access to personal information.
  • Viruses: Malicious software that can infect your computer.
  • Spyware: Software that tracks your internet activities and personal data.

Q:-       Explain the need to clear data stored in browsers.

Ans:-   Clearing data stored in browsers is important because cookies and cached files can store information about your browsing habits, which can be accessed by unauthorized users. Regularly clearing these helps protect your privacy and keeps your personal information secure.

Q:-       Explain any five tips to manage strong passwords.

Ans:-   Tips to manage strong passwords include:

  • Use a mix of letters (upper and lower case), numbers, and special characters.
  • Avoid using easily guessable information like names or birthdates.
  • Create passwords that are at least 12-14 characters long.
  • Avoid using the same password for multiple sites.
  • Use a password manager to store and generate strong passwords.

 Q:-      Explain any four best practices to secure data .

Ans:-   Best practices to secure data include:

  • Use encryption software to protect your files.
  • Regularly update your operating system and software to fix security vulnerabilities.
  • Use firewalls to monitor and control incoming and outgoing network traffic.
  • Install antivirus and anti-spyware software to protect against malware.

Q:-       Explain use of Antivirus and Anti Spyware

Ans:-   Antivirus and Anti Spyware software are tools that protect your computer from harmful software. Antivirus software scans and removes viruses and malware, while anti-spyware software detects and removes spyware. Together, they offer real-time protection and help keep your computer secure from threats.

SESSION 9 : MAINTAIN WORKPLACE SAFETY

Q1.      Why is it important for organizations to have safety rules and procedures?
Ans:-   Safety rules and procedures are essential to prevent accidents, protect employees, and create a secure working           environment. They ensure everyone follows standard safety practices.

Q2.      What are some basic fire safety rules that should be followed in an organization?

Ans:-  

  • Install fire escape plans and conduct regular drills.
  • Place smoke alarms at proper intervals.
  • Maintain safety equipment regularly and ensure the workplace is a no-smoking zone.

Q3.      How can falls and slips be prevented at the workplace?

Ans:-  

  • Keep the workplace clean and clutter-free.
  • Ensure floors are dry and oil spills or dust are cleaned immediately.

Q4.      What are the key electrical safety measures to avoid electrical hazards?

  • Use electrical equipment approved by recognized organizations.
  • Replace damaged or old wires and switches immediately.
  • Avoid overloading outlets or circuits.

Q5.      What is the significance of First Aid, and what are some basic rules to follow while providing First Aid?
Ans:-   First Aid provides immediate help to an injured person to save life and minimize health loss until medical help     arrives.

  • Assure the injured person to remain calm and avoid panic.
  • Keep them warm if they are in shock.

Q6.      Why should safety equipment and first aid kits be regularly maintained and checked?
Ans:-   Regular maintenance ensures that equipment and kits are functional and up to date, preventing failures during emergencies.

Q7.      What steps should be taken to prevent overloading electrical circuits in the workplace?

Ans:-  

  • Use proper outlets for appliances and avoid plugging too many devices into one circuit.
  • Regularly check and maintain electrical systems.

Q8.      What should be included in a workplace fire safety plan?

Ans:-  

  • Fire escape routes, smoke alarms, and regular fire drills.
  • Maintenance schedules for fire safety equipment.

Q9.      Why is it important to ensure proper ventilation and lighting in the workplace?
Ans:-   Good ventilation and lighting improve visibility, reduce hazards, and create a healthier work environment.

Q10.    What should be done with damaged or hazardous electrical equipment?
Ans:-   Damaged equipment should be replaced or repaired immediately by trained professionals to avoid accidents.

Q11.    Enlist any three basic safety rules to follow at the workplace.

Ans:-  

  • Follow fire safety measures like smoke alarms and fire drills.
  • Keep floors clean and dry to avoid slips.
  • Use first aid kits and provide immediate assistance when needed.

Q12.    Give any two basic safety rules for ensuring Falls and Slips safety.

Ans:-  

  • Wear non-slip footwear.
  • Clean spills and clutter immediately.

Q13.    Give any two electrical safety rules in any organization.

  • Train employees to handle electrical equipment safely.
  • Switch off and unplug appliances before cleaning or moving them.

Q14.    Explain any two first aid rules.

  • Do not move a victim with a back or neck injury to prevent further harm.
  • Ensure the injured person remains calm and avoid panic.

Q15.    What do you mean by occupational hazards?
Ans:-   Occupational hazards are risks or dangers faced by employees due to their work environment or tasks, such as         accidents, injuries, or exposure to harmful substances.

Q16.    List any three types of occupational hazards.

Ans:-  

  • Physical hazards (e.g., slips, falls).
  • Chemical hazards (e.g., exposure to toxic substances).
  • Biological hazards (e.g., infections).

SESSION 10 : PREVENT ACCIDENTS AND EMERGENCIES

ASSESSMENT 1.

Q:-       Explain the terms accident and emergency.

Ans:-   An accident is an unplanned event that may happen all of a sudden and may lead to unwanted or unprecedented results/outcomes.

Q:-       Enlist any four types of accidents.

Ans:-   Accidents may be of following types : –

  • Accidents at workplace : Slips and fall accidents, fire
  • Industrial disease/illness
  • Road traffic accidents
  • Clinical Accidents
  • Sports related accidents

Q:-       Give any three situations of emergency that require evacuation.

Ans:-  

  • Fire outbreaks in a building
  • Gas leaks or chemical spills
  • Earthquakes or other natural disasters

Q:-       Give any two ways to handle accidents.

Ans:-

  • Provide immediate First Aid to the injured person to prevent further harm.
  • Inform emergency services, such as firefighters, ambulance, or police, for professional help.

Q:-       Write any 5 types of Emergency.

Ans:-   Some of the types of emergencies are as follows :

  1. Chemical spills
    1. Extreme heat waves
    1. Droughts – Pandemics
    1. Terrorist attack
    1. Fire
    1. Floods

SESSION 11: PROTECT HEALTH AND SAFETY AT WORK

Assessment :-

Q:-       Fill in the blanks:

  1. An organization can face some hazards that could put the lives of the employees in danger.
  2. Hazards can be of different types depending on the workplace and the environment in which the employees work.
  3. Organization must have a designated evacuation plan for emergencies.

Q:-       List any three types of hazards.

Ans:-  

  • Physical hazards (e.g., slips, trips, and falls)
  • Chemical hazards (e.g., exposure to harmful chemicals)
  • Electrical hazards (e.g., faulty wiring or overloaded circuits)

Q:-       Give a checklist for workstations to minimize the hazards.

Ans:-  

  • Ensure proper lighting and ventilation.
  • Keep walkways clean and clutter-free.
  • Secure cables and wires to avoid tripping.
  • Use ergonomically designed furniture for proper posture.
  • Ensure that fire extinguishers are easily accessible.

Q:-       Explain the term ‘Evacuation Policy.’

Ans:-   An evacuation policy is a set of guidelines and procedures that an organization establishes to safely move employees out of a building during emergencies like fires, earthquakes, or gas leaks. It ensures that everyone knows how to exit quickly and safely to avoid harm.

Q:-       Explain Buddy System to implement evacuation efficiently in case of emergency.

Ans:-   The Buddy System pairs employees to ensure they help each other during emergencies. Each person is responsible for assisting their buddy, especially those with disabilities, injuries, or limited mobility. This system ensures no one is left behind and improves safety during evacuations.

Q:-       Explain the terms Floor Plans and Assembly Areas.

Ans:-  

  • Floor Plans: These are diagrams showing the layout of a building, including exits, staircases, fire extinguishers, and emergency routes. They guide employees on how to safely exit during an emergency.
  • Assembly Areas: These are pre-designated safe spots outside the building where employees gather after evacuating. It helps ensure everyone is accounted for and safe.

Q:-       Describe the importance of periodic evacuation drills.

Ans:-   Evacuation drills prepare employees to respond quickly and calmly during emergencies. They help identify gaps in evacuation plans, train staff to follow safety procedures, and ensure everyone knows the escape routes and assembly areas. Regular practice reduces panic and confusion during real emergencies.

Q:-       Explain the importance of a healthy lifestyle.

Ans:-   A healthy lifestyle is essential for maintaining physical and mental well-being. It helps employees stay fit, reduces the risk of chronic diseases, boosts energy levels, and improves focus and productivity at work. Healthy habits also contribute to a safer workplace by keeping employees alert and active.

Q:-       Give any four points of a healthy lifestyle.

Ans:-  

  • Eat a balanced diet with fruits, vegetables, and whole grains.
  • Exercise regularly to stay fit and energetic.
  • Get enough sleep to ensure proper rest and recovery.
  • Avoid smoking, excessive alcohol consumption, and stress.

Conclusion

वेब एप्लिकेशन और उनकी सुरक्षा न केवल तकनीकी विशेषज्ञों बल्कि हर व्यक्ति के लिए महत्वपूर्ण है। उचित सुरक्षा उपाय अपनाकर, मजबूत पासवर्ड बनाकर, और खतरों से सतर्क रहकर हम अपने व्यक्तिगत और व्यावसायिक डेटा को सुरक्षित रख सकते हैं।

यह अध्याय हमें यह समझने में मदद करता है कि सुरक्षित डिजिटल वातावरण बनाने के लिए जागरूकता और सही प्रथाओं को अपनाना कितना आवश्यक है। इस प्रकार, वेब एप्लिकेशन और सुरक्षा का अध्ययन करना हमें तकनीकी रूप से सक्षम और जिम्मेदार नागरिक बनने में मदद करता है।