Web Applications and Security It Code 402 Notes
Web Applications and Security It Code 402 Notes
Sticky Keys
FilterKeys
ToggleKeys
SoundSentry
ShowSounds
Display Tab
Cursor Options
MOUSE TAB
MouseKeys
This tab enables you to configure accessibility options for all users.
SerialKeys
TYPES OF NETWORKS
There are two major types of network Local Area Network (LAN)
and Wide Area Network (WAN).
Usually local area networks offer very high speeds and are used for
connecting computers and peripherals such as printers, scanners,
etc.
A wide area network (WAN) is one which covers a broad area (i.e.,
any network that links across metropolitan, regional, or national
boundaries). The Internet is the most popular WAN, and is used by
businesses, governments, non-profit organizations, individual
consumers, artists, entertainers, and many others.
INTERNET
MODEM
Wired Technology
packets.
A header is added to each packet explaining where the data has
come from, where it should end up and where it fits in with the
rest of the packets.
Each packet is sent from computer to computer until it finds its
done in seconds!
If you don’t have a Gmail account already you can create a new
Gmail account.
• Whenever your friend in the contact list is online you can see the
person along with a green dot.
• Always ask if the other person has time to chat first - regardless
of how important you think what you have to say is, it’s not going
to be well received if the recipient is busy.
www.wordpress.com
www.weebly.com
www.blog.com
There are several free offline blog editors available that can be
downloaded and installed on the local computer such as:
• Qumana
• Blogdesk
Examples
Online Threats
The threats / vulnerabilities that uses World Wide Web (Internet)
to facilitate crimes are called Online Threats.
Like:-
1) Phishing :- The act of acquiring personal / private and
sensitive data from personal computers for use in fraudulent
activities. For eg. Mails from unknown persons that ask for
your credit / debit card details.
2) Email spoofing :- It is the creation of email messages with a
if permitted.
b) Avoid keeping passwords based on repetition words,
Handling accidents:
Workplace Evacuation
In case of emergency there should be provision for evacuation.
Evacuation is the process of emptying a place in case of an
emergency, disaster.
Every company must ensure following points for evacuation in
case of any emergency:
PLATINUM CLASSES
Learn Simple | Learn Easy