Web Applications, Security, and Workplace Safety Guide

🌐 Web Applications, Security, and Workplace Safety Guide

🌐 Comprehensive Guide to Web Concepts, Security, & Safety

Essential knowledge for the digital age and the modern workplace.

1. Web Applications

A. Detailed Explanation of Web Concepts

Web applications rely heavily on fundamental networking concepts like the **Internet** and the **World Wide Web (WWW)**.

Concept Definition/Explanation
**The Internet** A global system of interconnected computer networks that use the standard Internet protocol suite to serve billions of users worldwide. It is a network of networks.
**World Wide Web (WWW/W3)** Commonly known as the Web, this is a system of interlinked hypertext documents accessed via the Internet. It allows users to view web pages and navigate using **hyperlinks**.
**Web Browser** A software used to view websites and acts as an interface between the user and the World Wide Web.
**Web Server** A computer that stores websites and their related files for viewing on the Internet.

B. Key Web Application Functionalities and Examples

1. Online Transactions

Involve the transfer of money or the purchase/sale of goods (OLTP). Security protocols like NEFT/RTGS are adopted.

Q: What are some common scenarios where online shopping is useful?

A: When a customer **lacks time** to visit physical stores, when visiting a store is **more expensive**, or when a product is **unavailable locally**.

  • **IRCTC:** Booking flight and train tickets.
  • **Flipkart:** Online shopping portal (offers multiple payment methods including COD).
  • **Redbus:** Booking bus tickets.

2. Instant Messaging (IM)

Instantaneous **text-based communication** over the Internet.

Q: What key features does IM software typically offer?

A: Sending text messages, **audio/video calling** and conferencing, **file transfers**, and **message history**.

Types of IM Software:

  • **Application based:** Software that is downloaded and installed (e.g., Google Talk, Skype).
  • **Web based:** Software accessed directly using a browser (e.g., Meebo, Yahoo! Messenger from the Web).

3. Blogging

A discussion-style site used for creating personal web pages, functioning like an **online personal diary**.

Q: How are blogs managed and what are Offline Blog Editors?

A: Usually managed through a web browser (requires active connection). **Offline Blog Editors** (Qumana, Windows Live Writer) can be used to create content when offline and publish it later.


2. Web Security

A. Detailed Explanation of Internet Security & Threats

Internet security is a branch of computer security related to the Internet, encompassing browser and network security to establish rules against online attacks.

Q: What are common online threats?

A: Common online threats include **Phishing**, **Email Spoofing**, and **Chat Spoofing**.

Online Threat Explanation
**Phishing** Acquiring personal, private, or sensitive data for fraudulent activities, often via emails from unknown persons asking for financial details.
**Email Spoofing** Creating email messages with a **forged sender address** that appears original, often containing infected mails or worms.
**Chat Spoofing** Hiding or **faking the identity** of another person over the internet; meaning hoax, trick, or deceive.

B. Best Practices and Security Measures

Q: What constitutes a strong password?

A: A combination of **alphanumeric and special characters** (12-14 chars recommended), including numbers, symbols, and both capital and lowercase letters. Avoid repetition, dictionary words, and public knowledge.

Q: What steps should users take regarding software and network defense?

  • Use updated **Antivirus and Antispyware** to protect from Malware.
  • Use **Encryption** software to protect data.
  • Install and configure **Firewalls** to analyze and control network traffic.
  • **Never install software from unknown sources**; remove unwanted applications.
  • **Regularly update** your operating system and software.

Q: How should users handle personal information and online transactions?

  • Always read the **privacy statement** when registering.
  • Be cautious when filling out forms with personal information; verify website trustworthiness.
  • Use only **secure websites** for transactions (indicated by a **golden lock** / digital certificate).
  • Keep credentials private and **never save them on shared computers**.
  • Do not respond to or open attachments from **unknown mails** (e.g., job/lottery promises).
  • **Clear browser cookies** frequently.

C. Security Scenario: Clearing Personal Data

Scenario: A user wants to ensure their private browsing history and cookies are cleared from a shared computer after an online session.

Action (Scenario Steps - General):

  1. Launch the web browser.
  2. Go to the **Tools Menu**.
  3. Select **Options** (or Settings).
  4. Navigate to the Security/Privacy Tab.
  5. Find the History/Cookies section.
  6. Click **Clear Now** (or equivalent action).

3. Workplace Safety

Workplace safety is concerned with protecting employees from hazards and ensuring a healthy environment.

A. Detailed Explanation of Concepts

Concept Definition/Explanation
**Accident** An unplanned event that happens suddenly and may lead to unwanted or unprecedented results, hazardous results, or injury.
**Emergency** Any unexpected situation that needs immediate attention and action.
**Hazard** Anything that is the source of any potential harm, damage, or any kind of potential loss of health or life.

Q: What are the different types of hazards?

A: Hazards can be categorized into **Physical, Chemical, Biological, and Mechanical** types.

Q: What are the basic safety rules to follow at the workplace?

A: **Fire safety**, **Falls and slips prevention**, **Electrical safety**, and the Use of **first aid**.

B. Specific Safety Rules and Scenarios

  • **Falls and Slips Safety:** Workplace must be properly ventilated, floors must be **clean and dry**, and oil spills or dust must be immediately cleaned.
  • **Electrical Safety:** Electrical equipment must be approved, and circuits or outlets should **not be overloaded**.

Workstation Health and Safety Checklist

Key items to check to address employee discomfort and poor visibility:

  • **Space:** Sufficient space for the user to change position comfortably.
  • **Environment:** Adequate lighting; adjustable coverings for windows to control sunlight.
  • **Display Screen:** Well-defined characters, easily adjustable brightness/contrast, ability to tilt and swivel.
  • **Keyboard:** Able to tilt easily and separate from the screen for a comfortable working position.
  • **Work Surface:** Adequate space for flexible arrangement of equipment.

Q: What crucial elements must an organization ensure for effective evacuation?

  • An **evacuation policy** is established and communicated.
  • A designated **assembly point** is known by every employee.
  • A **‘buddy system’** is designated to assist differently-abled individuals.
  • Floor plans with evacuation routes are clearly **displayed and understood**.
  • **Periodic evacuation drills** are conducted.

C. Healthy Living at Work

Q: Why is a healthy lifestyle important in the workplace and what does it include?

A: A healthy lifestyle leads to a **healthy body and mind**, ensuring a happy and healthy worker performs best. It includes: **healthy eating habits, physical activities, stress management, a healthy mind, and sound sleep**.


4. Computer Accessibility and Ease of Access Features

**Computer Accessibility** ensures user-friendliness for everyone, regardless of disability. Hardware/software combined to help an impaired person is **Assistive Technology**.

A. Types of Impairment

  • **Visual impairment:** Blindness, low-vision, color blindness.
  • **Hearing impairment:** Deafness or difficulty using audio content.
  • **Mobility impairment:** Paralysis, carpal tunnel syndrome, repetitive strain injury.
  • **Speech impairment:** Difficulty in adding audio input.
  • **Specific learning disabilities:** ADHD, dyslexia, or autism.

B. Windows Ease of Access Center (Key Features)

Impairment Group Feature Explanation/Function
**Vision** **Narrator** A screen reading feature that **reads aloud the text** on the computer screen.
**Vision** **Magnifier** Makes part or all of the computer screen **bigger**.
**Vision** **High Contrast** Allows users to change the size and color of fonts and the background for **easier viewing**.
**Hearing** **SoundSentry** Generates **visual warnings** (e.g., flashing border) whenever the computer produces a sound.
**Mobility** **Sticky Keys** Allows a user to press and release a modifier key (like Ctrl, Alt, Shift) and have it remain active.
**Mobility** **Mouse Keys** Allows users to control mouse movement through the **numeric keypad** on the keyboard.
**Speech** **Text-to-speech** Converts typed text into audio.

1. Web Applications A. Detailed Explanation of Web Concepts Web applications rely heavily on fundamental networking concepts like the Internet and the World Wide Web (WWW). Concept Definition/Explanation Source(s) The Internet A global system of interconnected computer networks that use the standard Internet protocol suite to serve billions of users worldwide. It is a network of networks consisting of millions of private, public, academic, business, and government networks. World Wide Web (WWW/W3) Commonly known as the Web, this is a system of interlinked hypertext documents accessed via the Internet. It allows users to view web pages containing text, images, videos, and other multimedia, and navigate between them using hyperlinks. Web Browser A software used to view websites and acts as an interface between the user and the World Wide Web. Web Server A computer that stores websites and their related files for viewing on the Internet. B. Key Web Application Functionalities and Examples Web applications encompass various tools and services accessible over a network. 1. Online Transactions Online transactions involve the transfer of money or the purchase/sale of goods over the internet. Many security measures and protocols, such as NEFT/RTGS, are adopted to ensure safe Online Transaction Processes (OLTP). Q1: What are some common scenarios where online shopping is useful? A: Online shopping is useful when a customer lacks sufficient time to visit physical stores, when visiting a store is more expensive than buying online, or when a product or service unavailable locally is available online. Scenario Examples (Online Transaction Portals): • IRCTC: An online portal primarily used for booking flight and train tickets. • Flipkart: An online shopping portal for buying consumer products, offering multiple payment methods like credit card, debit card, net banking, e-gift vouchers, and Cash on Delivery. • Redbus: An online portal used for booking bus tickets. 2. Instant Messaging (IM) IM is a form of instantaneous text-based communication over the Internet from sender to receiver. Q2: What key features does instant messaging software typically offer? A: Key features include sending text messages to one or more persons (similar to SMS), audio calling and conferencing, video calling and conferencing, file transfers (documents, spreadsheets, audio/video files, etc.), and message history for future reference. Example (Types of IM Software): • Application based: Software that is downloaded and installed on the user's computer, such as Google Talk, Yahoo! Messenger, and Skype. • Web based: Software that is accessed directly using a browser, such as Meebo and Yahoo! Messenger from the Web. 3. Blogging A blog is a discussion-style site used by technical or non-technical users for creating personal web pages, functioning similarly to an online personal diary. Q3: How are blogs managed and what are Offline Blog Editors? A: Blogs are usually managed through a web browser, requiring an active internet connection. However, if an active internet connection is unavailable, Offline Blog Editors can be used to create content and publish it later when connectivity is restored. Examples of free offline editors include Qumana, Windows Live Writer, and Blogdesk. -------------------------------------------------------------------------------- 2. Web Security A. Detailed Explanation of Internet Security Internet security is a branch of computer security specifically related to the Internet, encompassing browser security and network security. The objective of internet security is to establish rules and measures to use against attacks over the internet. Q4: What are common online threats? A: Common online threats include Phishing, email spoofing, and chat spoofing. Online Threat Explanation Source(s) Phishing The act of acquiring personal, private, or sensitive data from personal computers for use in fraudulent activities. This often occurs via emails from unknown persons asking for details like credit/debit card information. Email Spoofing The creation of email messages with a forged sender address that appears original, often containing infected mails or worms. Chat Spoofing Hiding or faking the identity of another person over the internet; spoofing means hoax, trick, or deceive and contains false information. B. Best Practices and Security Measures (Q&A Format) Q5: What constitutes a strong password and why is it important? A: A strong password is a combination of alphanumeric and special characters that is difficult to guess or crack. General guidelines recommend the password length be at least 12-14 characters if permitted, and it should include numbers, symbols, and both capital and lowercase letters. Users should avoid passwords based on repetition, dictionary words, usernames, pet names, or anything that the public or workmates know they strongly like or dislike. Q6: What steps should users take regarding software and network defense? A: 1. Antivirus and Antispyware: Use updated Antivirus and Antispyware software to protect the computer from Malware (software that harms the computer, tracks browsing, or transmits personal data). 2. Encryption: Use encryption software, often available within the operating system, to protect data from unauthorized users. 3. Firewalls: Install and configure firewalls (software or hardware) to analyze network traffic and determine whether it should be allowed, thereby keeping a computer and network secure. 4. Software Source: Never install software from unknown sources, as they might not be trustworthy, and frequently remove unwanted or unknown software applications that may have been bundled with necessary software. 5. Updates: Regularly update your operating system and software applications. Q7: How should users handle personal information and online transactions? A: 1. Privacy: Always read the privacy statement or policy when registering with a website. 2. Personal Data: Be cautious when filling out forms requiring personal information (name, gender, age, email) on websites; research and verify if the website is trustworthy. 3. Transaction Security: For online shopping or transactions, use only secure websites. A secure transaction is usually indicated through a digital certificate, represented as a golden lock in the web browser’s address bar. 4. Credentials: Keep your username and password private and never save them on computers used in shared environments like net cafés. 5. Unknown Mails: Do not immediately respond to mails from unknown users, especially those promising jobs or lottery results, as they may contain viruses or scripts trying to gather personal information. Never open attachments from unknown persons. 6. Cookies: Clear browser cookies frequently, as cookies created on your system may contain personal or logon details. C. Security Scenario: Clearing Personal Data Scenario: A user wants to ensure their private browsing history and cookies are cleared from a shared computer after an online session. Action (Scenario Steps to Clear Personal Data from a Web Browser): 1. Launch the web browser. 2. Go to the Tools Menu. 3. Select Options. 4. Navigate to the Security Tab. 5. Navigate to the Privacy Tab. 6. Find the History section. 7. Select Use custom settings for history from the drop-down list. 8. Click Clear Now. 9. Click OK. -------------------------------------------------------------------------------- 3. Workplace Safety A. Detailed Explanation of Concepts Workplace safety is concerned with protecting employees from hazards and ensuring a healthy environment. Concept Definition/Explanation Source(s) Accident An unplanned event that happens suddenly and may lead to unwanted or unprecedented results, hazardous results, or injury. Emergency Any unexpected situation that needs immediate attention and action. Hazard Anything that is the source of any potential harm, damage, or any kind of potential loss of health or life. Q8: What are the different types of hazards? A: Hazards can be categorized into Physical, Chemical, Biological, and Mechanical types, depending on the industry and work environment. Q9: What are the basic safety rules to follow at the workplace? A: Basic safety rules include Fire safety, Falls and slips prevention, Electrical safety, and the Use of first aid. B. Specific Safety Rules and Scenarios 1. Falls and Slips Safety To prevent falls and slips, the workplace must be properly ventilated, floors must be clean and dry, and oil spills or dust must be immediately cleaned. 2. Electrical Safety Electrical equipment should be approved by a recognized organization, and care must be taken to ensure that outlets or circuits are not overloaded. 3. Workstation Health and Safety Scenario Scenario: An employee working at a computer workstation reports discomfort and poor visibility. What should be checked based on the Workstation Checklist for Health and Safety? Action (Workstation Checklist): • Space: The workstation should provide sufficient space for the user to change position comfortably. • Environment: There should be adequate lighting, and windows should be fitted with adjustable coverings to control sunlight levels. The space should also be spacious enough if the workstation is shared. • Display Screen: The screen should display well-defined characters of adequate size and spacing, have easily adjustable brightness and contrast, and be able to tilt and swivel easily to suit the user. • Keyboard: The keyboard should be able to tilt easily and should be separate from the screen to allow the user to adopt a comfortable working position. • Work Surface: The surface should provide adequate space for the user and be of an adequate size to allow flexible arrangement of the screen, keyboard, and other peripherals. 4. Workplace Evacuation Scenario Q10: What crucial elements must an organization ensure for effective evacuation during an emergency? A: Evacuation is the process of emptying a place in case of an emergency or disaster. Organizations must ensure: • An evacuation policy is established, and all employees are informed about it by Team Leaders. • A designated assembly point for emergencies is known by every employee/worker. • A ‘buddy system’ is designated to assist and guide differently-abled individuals out of the premises, ensuring they reach the assembly point safely. • Floor plans with evacuation routes are clearly displayed in work areas and understood by employees. • Assembly areas are properly taken care of. • Periodic evacuation drills are conducted, and employees pay attention during these drills. C. Healthy Living at Work Q11: Why is a healthy lifestyle important in the workplace context, and what does it include? A: A healthy lifestyle is based on the popular saying, "A healthy body has a healthy mind". A happy and healthy worker will always perform best to their ability, and a healthy lifestyle leads to a healthy being. A healthy lifestyle includes healthy eating habits, physical activities, stress management, a healthy mind, and sound sleep. I. Computer Accessibility and Ease of Access Features Computer Accessibility refers to the user-friendliness of a computer system for everyone, regardless of disability. When hardware and software are combined to enable a person with an impairment to use a computer, it is known as Assistive Technology. A. Types of Impairment that Impact Computer Usage The sources define several types of impairments that affect how users interact with technology: 1. Visual impairment: This includes complete or partial blindness, low-vision, and color blindness. 2. Hearing impairment: This involves deafness or difficulty using audio content. 3. Mobility impairment: This category covers conditions like paralysis, cerebral palsy, carpal tunnel syndrome, and repetitive strain injury. 4. Speech impairment: This includes difficulty in adding audio input. 5. Specific learning disabilities: Examples include attention deficit hyperactivity disorder (ADHD), dyslexia, or autism. B. Windows Ease of Access Center (Accessibility Options) Accessibility Options (or Ease of Access) in Windows are used to customize the functions of the display, keyboard, or mouse. These settings can be launched by clicking Settings > Ease of Access > Other options. Impairment Group Accessibility Feature Explanation/Function Source(s) Vision Narrator A screen reading feature that reads aloud the text on the computer screen. Vision Magnifier Makes part or all of the computer screen bigger, helping the user see images and words better. Vision High Contrast Allows users to change the size and color of fonts and the background for easier viewing. Vision Cursor Options Assists people with vision impairment by adjusting the width and blink rate of the cursor. Hearing SoundSentry Generates visual warnings, such as a flashing border or blinking title bar, whenever the computer produces a sound. Hearing ShowSounds Instructs applications that normally convey information via sound to also provide that information visually, through informative icons or text captions. Hearing Closed Captioning Enables a textual representation of audio, such as in a TV program. Mobility Sticky Keys Allows a user to press and release a modifier key (like Ctrl, Alt, Shift, or Windows key) and have it remain active until another key is pressed. Used to reduce repetitive strain. Mobility Filter Keys An accessibility function that directs the keyboard to ignore brief or repeated keystrokes, which assists users who have hand tremors. Mobility/Vision ToggleKeys Emits sound cues when the locking keys (Num Lock, Caps Lock, or Scroll Lock) are pressed: a low sound when switched off and a high sound when switched on. Mobility Mouse Keys Allows users who have difficulty using a mouse to control mouse movement through the numeric keypad on the keyboard. Speech Text-to-speech Converts typed text into audio. -------------------------------------------------------------------------------- II. Networking Fundamentals A. Core Concepts and Architecture A computer network is defined as a collection of computers and other hardware components (like cables or satellites) interconnected by communication channels that enable the sharing of resources and information. Architecture Type Explanation (Example for Fresher) Source(s) Peer-to-Peer (P2P) Network Networks where all computers have an equal status. Example: Two friends directly connecting their laptops to share large files; neither computer controls the other. Client-Server Network Networks where certain computers have special, dedicated tasks (servers) providing services, while other computers (clients) use those services. Example: When you access Gmail, your phone (client) requests an email from Google's computer (server). Q1: What are the main benefits of computer networking? A: Some advantages of networking include: • Data Sharing: Networking allows the sharing of data among users. • Files Transfer: Users can send documents, text files, spreadsheets, video files, audio files, etc., to other users. • Hardware Sharing: Components such as printers and scanners can be shared across the network. • Internet Access Sharing: A single internet connection can be purchased and shared among multiple computers on the network. • Usage of Network-Based Applications: This allows the use of applications like web browsers, email clients, audio and video calling, and chat applications. B. Network Scope (LAN, MAN, WAN) There are several major types of networks based on geographical scope: 1. Local Area Network (LAN): Connects computers and devices in a limited geographical area. LANs are commonly found in a school, home, office building, or computer laboratory. They typically offer very high speeds for connecting peripherals like printers and scanners. 2. (Metropolitan Area Network (MAN)): A network that is spread over a city. Cable TV systems are an example of this. 3. Wide Area Network (WAN): Covers a broad area, linking across national, regional, or metropolitan boundaries. The most popular WAN is the Internet. C. Internet Connectivity and Data Transfer The Internet is a global system of interconnected computer networks that utilizes the standard Internet protocol suite to serve billions of users worldwide. It is fundamentally a "network of networks" consisting of millions of private, public, academic, business, and government networks. Internet Terminology Definition/Explanation Source(s) ISP (Internet Service Provider) An organization that provides access to the Internet. This access can be via a dial-up, direct (hard wired), or wireless connection. Examples mentioned are BSNL, Airtel, Jio, and Vodafone. Modem A device that converts digital computer signals (from the PC) into analog signals that can travel over phone lines, and re-converts the analog signals back into digital signals. The name is derived from its function: MOdulator/DEModulator. Q2: What are the main options for Internet connectivity? A: Internet connectivity is broadly categorized into Wired Technology and Wireless Technology. • Wired Connections: ◦ Dial-up: Uses telephone lines and a modem to establish a connection to an ISP via the Public Switched Telephone Network (PSTN). Dial-up connections are extremely slow and have largely been replaced by high-speed connections. ◦ Digital Subscriber Line (DSL): Provides Internet access by sending digital data over the wires of a local telephone network. DSL allows data transmission and phone use on a single line and requires a DSL modem and subscription. ◦ Cable Internet Access: A form of broadband access that uses the existing cable television (cable TV) infrastructure. • Wireless Connections (Internet Access via WiFi): ◦ Wi-Fi: A popular technology allowing an electronic device to exchange data wirelessly over a network, including high-speed Internet connections. ◦ WiMAX (Worldwide Interoperability for Microwave Access): A wireless communication standard designed to provide mobile broadband connectivity across entire countries and cities. It is considered a long-range system. ◦ 3G: A set of standards used for mobile telecommunication services and networks. High-Speed Downlink Packet Access (HSDPA) is a 3G protocol that enables higher data capacity and transfer speeds. Q3: How does data transfer occur on the Internet? A: Data transfer involves breaking down information into small pieces and reassembling them: 1. The data is first broken up into same-sized pieces known as packets. 2. A header is added to each packet, explaining the destination, the origin, and where the packet fits within the overall sequence of data. 3. Each packet is sent from one computer to the next until it reaches its destination. Not all packets necessarily take the same route. 4. At the destination, the packets are examined. If any packets are damaged or missing, a message is sent requesting them to be re-sent. This continues until all packets are received intact. 5. Finally, the packets are reassembled into their original form. This entire process is completed in seconds. -------------------------------------------------------------------------------- III. World Wide Web (WWW) and Applications A. Web Terminology and Structure Term Definition/Explanation (Example for Fresher) Source(s) World Wide Web (WWW or W3) Commonly called the Web, it is a system of interlinked hypertext documents accessed via the Internet. It allows users to view web pages and navigate using hyperlinks. Web Browser Software used to view websites. It acts as the interface between the user and the World Wide Web. Web Server A computer that stores websites and all their related files, making them available for viewing on the Internet. Web Page Information stored on web servers and retrieved by using a web browser. Hyperlink Allows users to navigate between web pages. Note: The terms HTML, Web Address, DNS, URL, IP address, Web Portal, Switch, Hub, Bridge, Router, Gateway, Bandwidth, E-commerce, E-learning, E-governance, E-banking, UPI, Online exam, and E-reservation are listed in the query, but are not defined or detailed in the provided source material. B. Instant Messaging (IM) Instant messaging (IM) is a form of instantaneous, text-based communication over the Internet from the sender to the receiver. Q4: What are the key features of Instant Messaging software? A: IM software typically includes features such as: • Sending text messages to one or more persons (similar to SMS). • Audio calling and conferencing. • Video calling and conferencing. • File transfers, including documents, spreadsheets, and multimedia files. • Message history, which saves conversations for future reference. • Other options often include sharing desktops. Q5: What are the two types of Instant Messaging software? A: 1. Application based: Software that must be downloaded and installed on the user’s computer. Example: Google Talk, Yahoo! Messenger, Skype, Window Live Messenger, Rediff Bol. 2. Web based: Software that is accessed directly using web browsers. Example: Meebo, Yahoo! Messenger from Web, IMO, MSN Web Messenger. Scenario: Creating an IM Account (Google Talk) To create an instant messaging account using Google Talk, a user first needs to download and install the application from www.google.com/talk. They also need a Gmail account. After launching Google Talk (Start > Programs > Google Talk > Google Talk), the user can send an invite to add contacts by using their Gmail account. C. Blogging A blog is a discussion-style site used by technical or non-technical users for creating personal web pages. Blogs resemble an online personal diary and are used to convey announcements, news, events, and messages. Q6: How are blogs typically created, and what are offline blog editors? A: Blogs are usually managed through a web browser, requiring an active internet connection. However, Offline Blog Editors can be downloaded and installed on the local computer to create content, which can then be published later when internet connectivity is available. • Examples of Offline Blog Editors: Qumana, Windows Live Writer, and Blogdesk. • Examples of Blog Services: www.blogger.com, www.wordpress.com, www.weebly.com, and www.blog.com. D. Online Transactions (Illustration of Online Shopping) Online transactions involve the transfer of money or goods over the internet, covering activities like purchasing goods, selling goods, booking tickets, and paying fees (Online Transaction Process - OLTP). Security measures and protocols like NEFT/RTGS are adopted to ensure safe online funds transfer. Online Shopping is a form of electronic commerce where customers can buy or sell goods over the Internet. Scenario Example: Online Shopping (Flipkart) Flipkart is an online shopping portal where customers can buy various products like accessories, electronic goods, books, mobile phones, and peripherals. Flipkart offers multiple payment methods, including credit card, debit card, net banking, e-gift voucher, and Cash on Delivery. Q7: When is online shopping useful? A: Online shopping is beneficial in situations where: 1. A customer lacks sufficient time to visit physical stores. 2. Visiting a physical store is more expensive than purchasing the product online. 3. A product or service unavailable in the local market is available online. Commonly Used Online Applications (E-Reservation): Popular online transaction websites often deal with reservations, such as IRCTC, which is an online portal used for booking flight and train tickets, and Redbus, used for booking bus tickets. -------------------------------------------------------------------------------- IV. Web Security and Secured Passwords Internet security is a branch of computer security related specifically to the Internet, encompassing both network security and browser security. Its main objective is to establish rules and measures to use against attacks over the internet. A. Importance of Secured Password (Q&A and Example) Q8: Why is using a strong, secured password important? A: Strong passwords lower the risk of a security breach. A strong password is a combination of alphanumeric and special characters that is difficult for other users to crack or guess. General Guidelines for Creating a Strong Password: • Keep the password length at least 12–14 characters if permitted. • Include both Capital and lowercase letters. • Include numbers and symbols. • Avoid using passwords based on usernames, pet names, dictionary words, or repetition. • Avoid using the same password for multiple purposes or sites. • Avoid using anything that workmates or the public know you strongly like or dislike. Example for a Fresher: Imagine your password is password123. A simple program could guess this instantly. A stronger password, incorporating symbols, mixed cases, and length, might be P@55wOrd!2345. This combination is far more difficult for unauthorized users to guess or crack. B. Online Threats (Explanation with Example) Online threats are vulnerabilities that use the World Wide Web (Internet) to facilitate crimes. Online Threat Detailed Explanation (Example) Source(s) Phishing The action of acquiring sensitive, private, or personal data from users’ computers for use in fraudulent activities. Example: Receiving an email from an unknown person asking you to urgently confirm your credit or debit card details by clicking a link. Email Spoofing The creation of email messages that have a forged sender address, making them appear original. These often contain worms or infected mails. Example: Receiving an email that looks exactly like it came from your bank, but the sender's address is slightly fake, intending to trick you into opening a malicious attachment. Chat Spoofing Hiding or faking the identity of another person over the internet. Spoofing fundamentally means to hoax, deceive, or trick, containing false information. Example: A fraudster pretending to be your manager on an instant messaging app to gather confidential workplace information.

© 2025 IT Blog | Source: Educational Materials

Comments

Popular posts from this blog

Communication Skill

Class IX - Sample Test I - (Q&A)

Class 9 - Chapter - 7 - Introduction to IT-ITES Industry