Site icon Blogger Key

10th Class | Web Application and Security | Questions Answer [For Exam]

web application and security

वेब एप्लिकेशन और सुरक्षा (Web Application and Security) आज के डिजिटल युग में एक महत्वपूर्ण विषय है। इंटरनेट और तकनीकी विकास ने हमारे जीवन को आसान बनाया है, लेकिन इसके साथ ही ऑनलाइन खतरों और साइबर सुरक्षा की चुनौतियां भी बढ़ी हैं। इस अध्याय में, हम वेब एप्लिकेशन के उपयोग, उनकी सुरक्षा के महत्व और विभिन्न प्रकार के खतरों को समझने का प्रयास करते हैं। साथ ही, डेटा सुरक्षा के लिए जरूरी उपायों और तकनीकों पर भी चर्चा की गई है, ताकि हम सुरक्षित और जिम्मेदारी से इंटरनेट का उपयोग कर सकें।

UNIT-4 WEB APPLICATIONS AND SECURITY

SESSION 1: WORKING WITH ACCESSIBILITY OPTIONS

Q:-       What does the term “Computer Accessibility” refer to, and why is it important?

Ans:-   Computer Accessibility means making a computer easy to use for everyone, including people with disabilities. It ensures that no one is         left out from using technology.

Q:-       What is Assistive Technology, and how does it help individuals with disabilities or impairments?

Ans:-   Assistive Technology is a mix of special hardware and software that helps people with disabilities use a computer easily. For example, it   can include screen readers for blind users or voice controls for those who cannot use a keyboard.

Q:-       What is Sticky Key?

Ans:-   StickyKeys is an accessibility feature to help computer users with physical disabilities, but it is also used by others as a means to reduce          repetitive strain.  StickyKeys allows the user to press and release a modifier key, such as Shift, Ctrl, Alt, or the Windows key.

Q:-       How  to enable/Disable Sticky Keys

Ans:-   To enable StickyKeys, steps are following:-

  1. Click on Start Button -> Control Panel
  2. Then click on Accessibility Options. The Accessibility Options window appears
  3. In Keyboard Tab, select Use StickyKeys.
  4. • Click Apply. • Click OK. The Sticky Keys icon appears in the system tray.

To turn off Sticky Keys, uncheck the “Use Sticky Keys” option and click Apply, then OK.

Q:-       What happens when you press the CTRL key and then the letter A after enabling Sticky Keys?

Ans:-   The entire text in Notepad gets selected. This is the same as pressing CTRL+A together but done step by step.

Q:-       What steps do you follow to enable Sticky Keys and practice its effects?

Ans:-   First, open Notepad from Start > All Programs > Accessories > Notepad. Then, type some text and try using Sticky Keys by pressing one         key at a time, like CTRL and then A.

Q:-       What is use of Filter Key? How to enable filter key?

Ans:-   Filter Keys is a feature of Microsoft Windows. It is an accessibility function that tells the keyboard to ignore brief or repeated keystrokes,         making typing easier for people with hand tremors.

            To enable Filter Keys, check Use Filter Keys.

            • Click Settings under Filter Keys and check “Ignore Repeated Keystrokes”.

            • Click Apply. • Click OK

Q:-       What  is the use of Toggle Key?

Ans:-   ToggleKeys is also a feature of Microsoft Windows. It is an accessibility function which is designed for people who have vision     impairment or cognitive disabilities. When 165 ToggleKeys is turned on, computer emits sound cues when the locking keys (Caps Lock,      Num Lock, or Scroll Lock) are pressed.

Q;-       What is SoundSentry, and who is it designed to help?

Ans:-   SoundSentry is a feature that helps people who cannot hear well. It shows visual alerts, like a blinking title bar or flashing border,       whenever the computer makes a sound.

Q:-       How can you enable SoundSentry on your computer?

Ans:-   Go to the Sound Tab, check the “Use SoundSentry” option, choose a visual warning from the dropdown list, then click Apply and OK.

Q:-       How can you test SoundSentry to see how it works?

Ans:-   Open the Run window by clicking Start > Run. Type “note” instead of “notepad” and press Enter. When an error happens, the desktop            will flash to show a visual alert.

Q:-       What is High Contrast, and how does it help people with vision impairment?

Ans:-   High Contrast is a feature that changes the size and color of fonts and the background to make things easier to see for people with       vision problems.

Q:-       How can you enable the High Contrast feature on your computer?

Ans:-   Go to the Display Tab, check “Use High Contrast,” then click Apply and OK. You will see the changes immediately.

Q:-       What are Cursor Options, and how do they help people with vision impairment?

Ans:-   Cursor Options let you change the blinking speed and width of the cursor, making it easier for people with vision problems to see and            follow the cursor.

Q:-       What is MouseKeys, and how does it help users?

Ans:-   MouseKeys is a feature that lets you use the keyboard (mainly the numeric keypad) to move the mouse pointer. It helps people who find it hard to use a regular mouse.

Q:-       What is Serial Keys, and who does it help?

Ans:-   Serial Keys helps people who cannot use a keyboard or mouse by letting them use special devices like Sip, Puff, or Breath Switches to          control the computer.

Q:-       What type of devices are used with Serial Keys for input?

Ans:-   Special devices like Sip, Puff, and Breath Switches are used to provide input through Serial Ports.

Fill in the Blanks with Answers:

  1. The option in Microsoft Windows XP used for helping users with physical disabilities and to reduce repetitive strain is MouseKeys.
  2. Sound Sentry is designed to help users with auditory impairments.
  3. The High Contrast option in Microsoft Windows XP is designed to assist people with vision impairments.
  4. Serial Keys is designed to assist people that have difficulty using a keyboard or a mouse.

SESSION 2 : NETWORKING FUNDAMENTALS

Q:-       What is Computer Network?

Ans:-   A computer network is a collection of computers and other hardware components interconnected by communication channels (cables or           satellites) that allow sharing of resources and information.

Q:-       What is a Peer-to-Peer (P2P) network?

Ans:-   A Peer-to-Peer (P2P) network is a type of network where all computers are equal, and each has the same             capability, including a strong CPU.

Q:-       What is a Client-Server network, and how is it different from a P2P network?
Ans:-   A Client-Server network is a type of network where some computers (servers) provide services, and others             (clients) use these services. In a P2P network, all computers are equal, but in a Client-Server network, roles are       divided between servers and clients.

Q:-       What is a Local Area Network (LAN), and where is it used?
Ans:-   A LAN connects computers and devices in a small area like a home, school, or office. It provides high speed and is used to connect devices like printers and scanners.

Q:-       What is a Wide Area Network (WAN), and give an example?
Ans:-   A WAN covers a large area, like across cities or countries. The Internet is the most popular example of a WAN.

Q:-       What is the Internet, and why is it called a network of networks?
Ans:-   The Internet is a global system connecting many networks using standard protocols. It’s called a network of             networks because it links millions of private, public, academic, business, and government networks.

Q:-       What is the World Wide Web (WWW), and how is it accessed?
Ans:-   The World Wide Web is a system of linked hypertext documents accessed via the Internet using a web browser.          It includes text, images, videos, and multimedia.

Q:-       What are some advantages of networking?

Ans:-   Some of the advantages associated with networking are:

Q:-       What do you need to access the Internet?
Ans:-   To access the Internet, you need an Internet connection provided by an Internet Service Provider (ISP) like             BSNL, Airtel, or Vodafone.

Q:-       What is an Internet Service Provider (ISP)?
Ans:-   An ISP is an organization that provides Internet access through dial-up, wired, or wireless connections.

Q:-       What is a modem, and what does it do?
Ans:-   A modem is a device that converts digital computer signals into analog signals to travel over phone lines and             vice versa. The name “modem” comes from its functions: MOdulator/DEModulator.

Q:-       What are the two main categories of Internet connectivity?
Ans:-   Internet connectivity is broadly divided into:

Q:-       What is Dial-up Internet access?
Ans:-   Dial-up uses telephone lines and a modem to connect to the Internet. It is very slow and is often replaced by             faster options like DSL or Cable Internet.

Q:-       What is DSL, and how does it work?
Ans:-   DSL (Digital Subscriber Line) provides Internet access by transmitting digital data over telephone wires. It             works along with a phone line.

Q:-       What is Cable Internet access?
Ans:-   Cable Internet uses the cable TV network to provide high-speed Internet access.

Q:-       What is 3G Internet connectivity?
Ans:-   3G is the third generation of mobile network standards that provide high-speed Internet on mobile phones.

Q:-       What is WiMAX, and where is it used?
Ans:-   WiMAX is a wireless technology for broadband Internet, often used in remote areas where DSL or cable             connections are difficult to install.

Q:-       What is Wi-Fi, and why is it useful?
Ans:-   Wi-Fi is a wireless technology that allows devices like smartphones and laptops to connect to the Internet             without cables. It is useful in places where cables cannot be installed, like old buildings or outdoor areas.

Assessment Questions and Answers:

I. Fill in the blanks:

  1. The acronym for LAN is Local Area Network.
  2. Three types of Wired Internet Connectivity are Dial-up, DSL, & Cable.
  3. Three types of Wireless Internet Connectivity are 3G, WiMAX, & Wi-Fi.

II. Answer the following:

SESSION 3: INTRODUCTION TO INSTANT MESSAGING

Q:-       What is instant messaging (IM)?

Ans:-   Instant messaging (IM) is a form of communication over the Internet that allows users to send text-based messages instantly from the sender to the receiver.

Q:-       What are the key features of instant messaging?

Ans:-   Key features of instant messaging include sending text messages to one or more people, audio calling and             conferencing, video calling and conferencing, file transfers (such as documents, audio files, and video files), and      message history to save messages for future reference.

Q:-       What are the two kinds of instant messaging software?

Ans:-   The two kinds of instant messaging software are application-based (like Google Talk, Yahoo! Messenger,             Skype) and web-based (like Meebo, MSN Web Messenger, IMO).

Q:-       How can you create an instant messaging account using Google Talk?

Ans:-   To create an instant messaging account using Google Talk, you need to download and install the Google Talk             application on your desktop, mobile, or laptop, or use it through a browser after signing into your Gmail account.           Google Talk allows you to communicate via text and voice, and make video calls, along with viewing updates            from your GMAIL mailbox.

Q:-       What are some popular web-based instant messaging services?

Ans:-   Some popular web-based instant messaging services include Meebo, Yahoo! Messenger for the Web, MSN Web     Messenger, and IMO.

Assessment Questions and Answers:

I. Fill in the blanks:

b. Microphone, speakers, and a web camera are required for audio and video conferencing.

SESSION 4: CHATTING WITH A CONTACT – GOOGLE TALK

Q:-       What steps would you follow to chat with a contact using your Gmail account?

Ans:-   After signing into your Gmail account, a contact window will be displayed either on the left or right side within the browser where you can start chatting with your contacts.

Q:-       How do you set up an instant messaging account using Yahoo! Messenger?

Ans:-   To use Yahoo! Messenger, you need to download and install the Yahoo! Messenger application from             http://in.messenger.yahoo.com/download/. Additionally, you will need a Yahoo Mail account. If you don’t have     one, you can use the built-in option to create a new Yahoo Mail account.

Q:-       What is the requirement to use Yahoo! Messenger?

Ans:-   To use Yahoo! Messenger, you need to have a Yahoo Mail account. If you don’t already have a Yahoo Mail account, you can create one as part of the setup process for using Yahoo! Messenger.

Q:-       Describe the user interface for chatting in Gmail.

Ans:-   After signing into your Gmail account, a contact window will appear on either the left or right side of the browser where you can see your contacts and start chatting with them.

Q:-       What is the difference between chatting on Gmail and using Yahoo! Messenger?

Ans:-   Both Gmail and Yahoo! Messenger offer instant messaging capabilities, but while Gmail’s chat interface is integrated directly into the Gmail web browser, Yahoo! Messenger requires downloading and installing an application. Additionally, Gmail uses your Gmail contacts, while Yahoo! Messenger uses a Yahoo Mail account for login.

Assessment

Q:-       State any 03 rules and etiquettes to be followed while chatting on the Internet.

Ans:-   There are some general rules and etiquettes to be followed while chatting.

Q:-       What are the basic needs to use instant messaging (chat) software.

Ans:-   The basic needs to use instant messaging (chat) software include:

  1. A computer or mobile device: This is necessary to access the chat software.
  2. Internet connection: An active internet connection is required to send and receive messages.
  3. Chat software: Application-based or web-based instant messaging software like Google Talk, Yahoo! Messenger, Skype, etc.
  4. Sign-in credentials: An account with the chat service provider, such as a Gmail or Yahoo! Mail account, to log in and start chatting.

SESSION 5: CREATING AND PUBLISHING WEB PAGES – BLOG

Q:-       What is the purpose of creating a blog account on WordPress?

Ans:-   The purpose of creating a blog account on WordPress is to set up a personal web space where you can write, share, and customize   content. It allows you to create a beautiful and functional website or blog easily.

Q:-       What information is required to create a blog on WordPress?

Ans:-   To create a blog on WordPress, you need to provide the following information:

Q:-       Why is it important to choose a strong password while creating a blog on WordPress?

Ans:-   It’s important to choose a strong password to secure your WordPress blog account from unauthorized access and potential hacking. A         strong password typically includes a mix of uppercase letters, lowercase letters, numbers, and symbols.

Assessment:

SESSION 6: USING OFFLINE BLOG EDITORS

Assessment:

SESSION 7: ONLINE TRANSACTIONS

Q:-       What are online transactions?

Ans:-   Online transactions refer to the process of transferring money over the internet to make payments for goods and services. It simplifies the workflow in businesses and revolutionizes how transactions are handled electronically.

Q:-       What is online shopping?

Ans:-   Online shopping is a form of electronic commerce where customers can buy or sell goods over the internet. It involves viewing products online and paying using methods like credit cards, debit cards, or internet banking.

Q:-       List any four popular online transaction websites.

Ans:-   Some popular online transaction websites include:

ASSESSMENT

Q:-1     Explain the purpose of Online transactions.

Answer: The purpose of online transactions is to enable the convenient and secure transfer of money over the internet, allowing users to pay for goods and services from the comfort of their homes. It simplifies the workflow for businesses and makes transactions quicker and more efficient.

Q:-2     List any five websites that allow online transactions.

Answer:

Q:-       List any three payment tools to use online transactions.

Answer:

Q:-       Give any two benefits of online transactions.

Answer:

SESSION 8: INTERNET SECURITY

Q:-       What is the purpose of using strong passwords, and what should you avoid when creating them?

Ans:-   The purpose of using strong passwords is to protect your accounts from being hacked. Avoid using simple passwords like your favorite color, pet’s name, or any common information that could be easily guessed. A strong password should include a mix of letters (both upper and lower case), numbers, and special characters.

Q:-       Why is it important to use encryption software, and what should you do if it’s not available within the operating system?

Ans:-   Encryption software is important because it helps protect your data from unauthorized access. If it’s not available within your operating system, you can use third-party encryption software to secure your files and information.

Q:-       What should you do if you receive an email from an unknown user?

Ans:-   If you receive an email from an unknown user, it’s best not to open it or click on any links or attachments. These emails may contain viruses or other malicious software that could harm your computer.

Q:-       Why is it recommended to clear browser cookies frequently, and what risks do they pose?

Ans:-   Clearing browser cookies frequently is recommended because cookies can store personal information like your login details, which could be accessed by unauthorized users. Regularly clearing cookies helps protect your privacy and keeps your personal information secure.

Q:-       Why should you never install software from unknown sources?

Ans:-   You should never install software from unknown sources because these programs may contain viruses, spyware, or other harmful software. It’s safer to download software only from reputable websites or official sources.

ASSESSMENT

Q:-       Explain the purpose of Internet Security.

Ans      The purpose of Internet Security is to protect your personal information and your devices from cyber threats like hacking, viruses, and malware. It involves setting up rules and measures to secure data and prevent unauthorized access over the Internet.

Q:-       Explain different kinds of online threats.

Ans:-   Different kinds of online threats include:

Q:-       Explain the need to clear data stored in browsers.

Ans:-   Clearing data stored in browsers is important because cookies and cached files can store information about your browsing habits, which can be accessed by unauthorized users. Regularly clearing these helps protect your privacy and keeps your personal information secure.

Q:-       Explain any five tips to manage strong passwords.

Ans:-   Tips to manage strong passwords include:

 Q:-      Explain any four best practices to secure data .

Ans:-   Best practices to secure data include:

Q:-       Explain use of Antivirus and Anti Spyware

Ans:-   Antivirus and Anti Spyware software are tools that protect your computer from harmful software. Antivirus software scans and removes viruses and malware, while anti-spyware software detects and removes spyware. Together, they offer real-time protection and help keep your computer secure from threats.

SESSION 9 : MAINTAIN WORKPLACE SAFETY

Q1.      Why is it important for organizations to have safety rules and procedures?
Ans:-   Safety rules and procedures are essential to prevent accidents, protect employees, and create a secure working           environment. They ensure everyone follows standard safety practices.

Q2.      What are some basic fire safety rules that should be followed in an organization?

Ans:-  

Q3.      How can falls and slips be prevented at the workplace?

Ans:-  

Q4.      What are the key electrical safety measures to avoid electrical hazards?

Q5.      What is the significance of First Aid, and what are some basic rules to follow while providing First Aid?
Ans:-   First Aid provides immediate help to an injured person to save life and minimize health loss until medical help     arrives.

Q6.      Why should safety equipment and first aid kits be regularly maintained and checked?
Ans:-   Regular maintenance ensures that equipment and kits are functional and up to date, preventing failures during emergencies.

Q7.      What steps should be taken to prevent overloading electrical circuits in the workplace?

Ans:-  

Q8.      What should be included in a workplace fire safety plan?

Ans:-  

Q9.      Why is it important to ensure proper ventilation and lighting in the workplace?
Ans:-   Good ventilation and lighting improve visibility, reduce hazards, and create a healthier work environment.

Q10.    What should be done with damaged or hazardous electrical equipment?
Ans:-   Damaged equipment should be replaced or repaired immediately by trained professionals to avoid accidents.

Q11.    Enlist any three basic safety rules to follow at the workplace.

Ans:-  

Q12.    Give any two basic safety rules for ensuring Falls and Slips safety.

Ans:-  

Q13.    Give any two electrical safety rules in any organization.

Q14.    Explain any two first aid rules.

Q15.    What do you mean by occupational hazards?
Ans:-   Occupational hazards are risks or dangers faced by employees due to their work environment or tasks, such as         accidents, injuries, or exposure to harmful substances.

Q16.    List any three types of occupational hazards.

Ans:-  

SESSION 10 : PREVENT ACCIDENTS AND EMERGENCIES

ASSESSMENT 1.

Q:-       Explain the terms accident and emergency.

Ans:-   An accident is an unplanned event that may happen all of a sudden and may lead to unwanted or unprecedented results/outcomes.

Q:-       Enlist any four types of accidents.

Ans:-   Accidents may be of following types : –

Q:-       Give any three situations of emergency that require evacuation.

Ans:-  

Q:-       Give any two ways to handle accidents.

Ans:-

Q:-       Write any 5 types of Emergency.

Ans:-   Some of the types of emergencies are as follows :

  1. Chemical spills
    1. Extreme heat waves
    1. Droughts – Pandemics
    1. Terrorist attack
    1. Fire
    1. Floods

SESSION 11: PROTECT HEALTH AND SAFETY AT WORK

Assessment :-

Q:-       Fill in the blanks:

  1. An organization can face some hazards that could put the lives of the employees in danger.
  2. Hazards can be of different types depending on the workplace and the environment in which the employees work.
  3. Organization must have a designated evacuation plan for emergencies.

Q:-       List any three types of hazards.

Ans:-  

Q:-       Give a checklist for workstations to minimize the hazards.

Ans:-  

Q:-       Explain the term ‘Evacuation Policy.’

Ans:-   An evacuation policy is a set of guidelines and procedures that an organization establishes to safely move employees out of a building during emergencies like fires, earthquakes, or gas leaks. It ensures that everyone knows how to exit quickly and safely to avoid harm.

Q:-       Explain Buddy System to implement evacuation efficiently in case of emergency.

Ans:-   The Buddy System pairs employees to ensure they help each other during emergencies. Each person is responsible for assisting their buddy, especially those with disabilities, injuries, or limited mobility. This system ensures no one is left behind and improves safety during evacuations.

Q:-       Explain the terms Floor Plans and Assembly Areas.

Ans:-  

Q:-       Describe the importance of periodic evacuation drills.

Ans:-   Evacuation drills prepare employees to respond quickly and calmly during emergencies. They help identify gaps in evacuation plans, train staff to follow safety procedures, and ensure everyone knows the escape routes and assembly areas. Regular practice reduces panic and confusion during real emergencies.

Q:-       Explain the importance of a healthy lifestyle.

Ans:-   A healthy lifestyle is essential for maintaining physical and mental well-being. It helps employees stay fit, reduces the risk of chronic diseases, boosts energy levels, and improves focus and productivity at work. Healthy habits also contribute to a safer workplace by keeping employees alert and active.

Q:-       Give any four points of a healthy lifestyle.

Ans:-  

Conclusion

वेब एप्लिकेशन और उनकी सुरक्षा न केवल तकनीकी विशेषज्ञों बल्कि हर व्यक्ति के लिए महत्वपूर्ण है। उचित सुरक्षा उपाय अपनाकर, मजबूत पासवर्ड बनाकर, और खतरों से सतर्क रहकर हम अपने व्यक्तिगत और व्यावसायिक डेटा को सुरक्षित रख सकते हैं।

यह अध्याय हमें यह समझने में मदद करता है कि सुरक्षित डिजिटल वातावरण बनाने के लिए जागरूकता और सही प्रथाओं को अपनाना कितना आवश्यक है। इस प्रकार, वेब एप्लिकेशन और सुरक्षा का अध्ययन करना हमें तकनीकी रूप से सक्षम और जिम्मेदार नागरिक बनने में मदद करता है।

Exit mobile version