Important Announcement
PubHTML5 Scheduled Server Maintenance on (GMT) Sunday, June 26th, 2:00 am - 8:00 am.
PubHTML5 site will be inoperative during the times indicated!

Home Explore Code 402 class 10 Open Office

Code 402 class 10 Open Office

Published by Edusoft Drive, 2022-03-22 12:12:44

Description: Code 402 class 10 Open Office

Search

Read the Text Version

Some of the common questions that help you in your decision are: ¤ What is the purpose of getting this connection? ¤ Will you use the connection regularly? ¤ How much data will be downloaded on an average per month? ¤ How much speed do you need? ¤ What technology is available in your particular area? ¤ What are the different plans available from the ISP? ¤ Is there any limitation or catch for the selected plan? Use the following table to compare different subscription plans to get an estimate and analyse if that would suit your requirement. To access Wi-Fi, you need an access point with an active Internet connection. Usually when you subscribe to an Internet connection, the ISP provides options to purchase or rent a Wi-Fi router that can act as both an internet connectivity device and an access point for Wi-Fi connectivity. Setting up a Wi-Fi network requires technical expertise; how ever, you can access the Wi-Fi network by connecting to an access point that is already setup for use. On computers that run Windows, you can view the list of wireless networks available by using the following procedure: Windows will display the list of available Wi-Fi networks; you can choose any of the connection from the list. Select by Double- clicking on the name displayed in the list. EXERCISE 1. How is internet different from the network in a closed, small area like your computer lab? 2. How WWW is different from internet? 3. What is a modem? 4. What is the role of internet service provider in accessing internet? 5. How does data travel on internet? Session-3 Introduction to Instant Messaging Instant messaging (IM) is a form of communication over the Internet that offers an instantaneous transmission of text-based messages from sender to receiver. 5200 Web Applications and Security

Most instant messaging software include the option for performing file transfers, audio chat, video calling and conferencing, sharing desktops, etc. a part from standard text chat. Instant messaging software is widely used for personal and commercial use. In this session, you will be introduced to the concept of instant messaging, the steps to create an instant messaging account and also work with instant messaging software. Unlike email, instant messaging happens in real-time and the response from participants can be spontaneous. Some instant messaging software allows users to view messages received when they are not logged on. These are called “Offline Messages”. For utilizing audio and video chat or conferencing, you need to have microphones and headsets or speakers and web cameras so that users can talk or see each other. Key features of an instant messaging are as follows: ¤ Text Messages can be sent to one or more person (Similar to SMS). ¤ Audio calling and conferencing. ¤ Video calling and conferencing. ¤ File transfers (Not limited to documents, spreadsheets, audio files, video files, etc.). ¤ Message history (Save messages for future reference). Instant Messaging Account Participants messaging to each other need to be signed in to the same instant messaging software. To use instant messaging software, a user must have a valid instant messaging account. Instant messaging accounts differ in formats; some instant messaging software such as Windows Live Messenger use email addresses for managing the account and software such as Skype use standard names. Instant Messaging Services There are two kinds of instant messaging software – application based and Web based. ¤ Application based instant messaging software is downloaded and installed on user's computer. Some of the popular instant messaging software are: l Google Talk – Now known as Google Hangout. l Yahoo! Messenger (now discontinued). l Skype. l Windows Live Messenger. l RediffBol, etc. ¤ Web based instant messaging software is accessed using browsers such as Internet Explorer, Mozilla Firefox, Google Chrome, etc. Some of the popular web based instant messaging software are: l Meebo. l MSN Web Messenger. l IMO, etc. Instant Messaging with Google Hangout Google Hangout was earlier available as an installable application GTalk. Hangout provides chatting, voice calls and video calls for free over Internet. This facility comes along with the e-mail account. Besides Google Hangout, Facebook Instant Web Applications and Security 5201

Messaging,WhatsApp, Skype provide this facility on different interfaces. To use Hangout, login to your Gmail account. You will see your hangout connections on the right hand side as shown here. To begin conversation follow the steps below: 1. Click on Search button to search and send the chatting request to someone, who is online. 2. Type the name or email address of the person and press Enter key. 3. If the person or email address is found, the name and profile image appear on the left pane and chatting window appears on the right of the window. Here you can start text chatting. LAB EXERCISE Go to Gmail and create an account if you do not have already. Session-4 Chatting with a Contact - Google Talk (Hangout) To chat with someone, the person needs to be online. When you see the person online, you will see a green dot beside the name of the person. 5202 Web Applications and Security

To begin chatting, double click on the contact name. A chat window will popup where messages can be typed, sent and seen. Chat Etiquettes 1. Messages should be short and to the point. 2. Always introduce yourself by name if your screen name doesn't reflect it. 3. Always ask if the other person has time to chat first-regardless of how important you think what you have to say is, it's not going to be well received if the recipient is busy. 4. In a business environment, know exactly what you want to discuss. 5. TYPING YOUR MESSAGES IN UPPER CASE is extremely rude-it's considered shouting and very aggressive. 6. Give people time to respond - Multiple questions sent to a recipient before they've had a chance to answer can seem more like an interrogation rather than a conversation. 7. Wherever possible, give the person you are communicating with your undivided attention. It's not just a sign of respect, but if you have multiple conversations happening or are allowing other issues to distract you, you may miss an important point in the other person's messages or lose the gist of the conversation. 8. It's important to properly end an IM conversation - you may think the chat is over, but the other person may not. While you're off doing other things, they may be sitting there staring at the screen waiting for further communication from you!! LAB EXERCISE Go to Gmail and practice instant messaging with some of your classmates with teacher's permission. Session-5 Creating and Publishing Web Pages - Blog A blog is a discussion style site used by non-technical (and technical users) users for creating personal web pages. Blogs are similar to an online personal diary and simple to use. You can use a blog to convey messages about events, announcements, news, reviews, etc. Blogs are usually managed using a web browser and this requires active internet connection. You can Web Applications and Security 5203

also use off line blog software to create content first and later publish the content when an active internet connection is available. There are hundreds of websites that offer blog service for free. Some of the popular blogs include: • www.WordPress.com • www.blogger.com • www.blog.com • www.weebly.com • www.blogsome.com Creating a Blog Account Let us learn how to create a blog account on WordPress. 1. Open the browser and go to https://wordpress.com/ 2. Click on Get Started on top right corner. 3. Fill the simple registration form mentioning your email id, username and password. Then, click Continue. 5204 4. You email inbox will receive an activation mail from WordPress which you need to confirm by clicking Click here to Confirm Now. Web Applications and Security

5. Fill in Create Site form and click on Continue. 6. Enter blog address for your site and click on Create for free account. Web Applications and Security 7. Click on Start with Free choice. 5205

Starting with New Blog Post 1. In your account page, click on Add beside Blog Posts. 2. This will take you to the post editor where you mention the title of the post and the content. You can format the content using various controls given on the top toolbar. You can preview you post before publishing to have an idea how it would look like finally. You can click on + Add to insert audio, video, images and other controls in your page. 3. Once you finish writing your post, click Preview to see how your post looks like and whether you need further edits in it. Once finalised, click on Publish… to publish the post on the web. You can decide to publish immediately or any future date. Click on green colured Publish! button. It will show your published page. Click on Visit Site. 4. Your final published post will be displayed which you can share with others. 5206 Web Applications and Security

Posting Comments on Other Posts When you visit other blogs and read posts, you can post comments on the post. The options for posting comments are usually given at the end of the post which you might find after scrolling down the post page. Key in your comments and details and click on Post Comment. LAB EXERCISE 1. Go to WordPress or Blogger.com to create a blog account and create a small blog post about your school. 2. After publishing blogs share it with your classmates online through Facebook. Post comments on each other's blog posts. Session-6 Using Offline Blog Editors Offline blog editors can be used that can be installed on your computer and you can use them to draft your blog posts without having to connect with internet. When your post is finalised, you can connect with internet and publish your final post. Some popular offline blog editors are Windows Live Writer from Microsoft, Qumana, BlogDesk, Blog Jet and Weblog. Weblog extrension can be installed in Writer for blog publishing but here we shall see how to use MS Word to create a blog post. You should have an online blog account already before starting with offline blog editor. Publishing Blog from MS Word. ¤ Open MS Word 2013. ¤ Go to File tab >New option. ¤ Select Blog Post template. Web Applications and Security 5207

Click on Create in the popup. MS Word will ask you to register your online blog. Click on Register Now. In New Blog Account dialog box, select WordPress. In New WordPress Account dialog box, enter your blog post URL and login credentials of your blog site. Working with Blog You can create a new blog post just like you create any Word document with pictures, SmartArts, Shapes, ClipArts, etc. or you can open existing post to edit from your blog site. Publishing a New Blog Post Once your blog is ready to publish. Click Publish option in Publish drop-down in Blog group of Blog Post tab. 5208 Web Applications and Security

The post will be published and an update will be displayed on the page. Clicking on Home Page option in Blog group of Blog Post tab will take you to the online home page of your blog in the browser. Editing an Existing Blog Post from Blog Site 1. In Blog group under Blog Post tab, click on Open Existing option. 2. In Open Existing Post dialog box, your online posts will be listed. Select the desire post and click OK. 3. Selected post will be opened for editing. 5209 Make changes and publish it again. Web Applications and Security

Working with Qumana Qumana can be downloaded and installed from https://www.softpedia.com/get/Internet/News- Newsgroups-Blog-Tools/Qumana.shtml Qumana makes blogging very easy. You can add pictures, audio, video and images to your blog. You can easily manage you blog and publish it online. Once installed, open Qumana by clicking Start > All Programs > Qumana > Qumana or by clicking Qumana shortcut on the desktop. Connecting with Online Blog 1. On first start, mention your blog's address in Add Blog Wizard and click Next. It will automatically locate your blog. 2. Enter login credential of your blog site and click Next. 3. Blogs on your site will be listed. Web Applications and Security Select the blog you need to work with and click Finish. 5210

Qumana interface will open up listing your blog posts. Editing Blog Posts 1. In the list of your blog posts, double click on the one you wish to edit. It will open up in the editor. 2. Make changes in your post in the editor. You can use formatting toolbar. If you have basic knowledge of HTML, you can insert content with HTML using Insert HTML button at the top. Insert Ad button lets you insert advertisement in your post page. Once changes are done, click on Save button to save your post offline on your computer. Publishing the Blog Post 1. To publish changes to your blog site, click on Update Post button. Web Applications and Security 5211

2. Qumana will take a while and publish the changes to your online post. LAB EXERCISE 1. Go to WordPress, register yourself and create a simple blog. 2. Publish a post using MS Word. 3. Download and install Qumana. 4. Use the editor to connect with your online blog. 5. Edit the online blog created in previous session using offline editor and publish the changes. Session-7 Online Transactions Online shopping is a form of electronic commerce where customers can buy or sell goods over the Internet. Customers need to have an active internet connection for viewing goods or services offered by a seller; customers can pay online using a credit, debit card. Online shopping could be useful in situations when: ¤ A customer does not have sufficient time to visit stores. ¤ Visiting a store is more expensive than purchasing a product online. ¤ A product or service that is not available in the local market is available online. Some of the popular online transaction websites are: ¤ IRCTC, an online portal for booking flight and train tickets. ¤ Flipkart, an online shopping portal for buying consumer products. ¤ eBay, an online portal for buying and selling goods. ¤ Redbus, an online portal for booking bus tickets. To perform an online transaction, all you need is a web browser and an active internet connection. In some cases where purchasing is involved, you will need a valid credit card, debit card or online banking support referred to as Net Banking Subscription. Some websites even allow COD (Cash on delivery) where the users can pay once they receive the product or service. A Basic Online Shopping Process All online shopping websites follow following standard shopping process: 5212 Web Applications and Security

1. User registers on the website. 2. User searches for products and browses through product catalogues. 3. User selects, reviews and adds the products in online shopping cart. 4. User reviews the cart and finalises the products in the cart. 5. User fills in the shipping address. 6. User fills in the online payment details. 7. User furnishes the payment and checks out. 8. Website sends SMS and Email to the user, acknowledging the payment received and regarding the dispatch of the products purchased. 9. Finally, products are delivered to the dispatch address. Let us understand this process with Amazon.in. Online Transaction Using Amazon Amazon is one of the premiere online stores where you can purchase a variety of consumer goods, books, apparels, mobile phones, groceries, toys, sports goods and several other goods. Amazon offers multiple payment methods like credit card, debit card, net banking, e-gift voucher, and Cash on Delivery. You can make purchase and transactions on Amazon without registering but every time you make payments you will have to enter all your details again hence otos recommended that your create an account on Amazon.in and log into it to make online purchase. Shopping on Amazon.in 1. Open any browser and go to www.amazon.in. 2. Bring the mouse pointer over Your Orders and click on Sign In to login to your account. 3. On next page enter your email ID, click Continue, enter your password and click Continue. Amazon home page will provide you a wide variety of products organised into various categories. Page also displays various deals. You can also search for the products from the search bar at the top which 5213 provides choice for product categories. Web Applications and Security

Browsing Product Catalogue Products in a catalogue can be sorted according price, reviews and popularity. You can narrow down your search on the basis of manufacturer, product price range, discounts, availability etc. The catalogue interface is seamlessly provided with search, links and category choices that your can easily look around. Shopping Cart and Wish List When you click on a product or its image, its features, any technical details, discount schemes, customer reviews and payment options are displayed on a new page. It is not necessary to buy the products immediately. You can add the product into a wish list to review it later. If you like the product, you can add it to your shopping cart and continue shopping. Finally, you can decide which products you really need to buy and delete rest from the cart. Once your shopping cart contents are finalised, you can proceed to payment. Viewing Shopping Cart and Purchasing To visit your cart, click on Cart link at the top right corner. This will take you to your shopping cart listing your items. With each item, there is Delete link to remove the item from the cart. Web Applications and Security Once finalised, click on Proceed to Checkout button. Enter your Delivery address and Shipping preferences. Amazon will save it for future use. Click Continue. Select Payment options through all standard credit and debit cards, Netbanking, EMI (if applicable), Cash on Delivery, Gift Cards, Vouchers etc. Select the suitable method and click Continue. 5214

Fill on your payment details like card details, login credentials etc. Click Continue. On next page, click on Place Your Order and Pay. This will take you to the payment gateway and once the payment is successful you will receive an acknowledgment mail regarding product, payment and delivery details. Online Transaction for Booking Rail Tickets Let us see how we can use an online ticketing service for booking train tickets. Here we shall use IRCTC website for this purpose. Open the browser and go to IRCTC website: https://www.irctc.co.in On website's home page, fill in the details of your journey like cities to travel from and to, date of journey and preferred travel class. Then, click on Find trains. You can login into IRCTC account which you may have created earlier. Registering on IRCTC is the same standard process as on any other public services website. To login, click Login option in the drop- down menu on top right corner. The trains will be listed. Click on Check Availability to check the seats available. You can change the travel class to check seats for other classes. Once you decide to book a seat, click on Book Now. Web Applications and Security 5215

On the next screen, fill the passenger details as shown here. If you have passenger details already saved in the website then you can pick up details by clicking My Saved Passenger(s) List. To add more passenger details, click on Add Passenger. Scroll down, fill in mobile number and captcha details and click Continue Booking. Review booking page will appear. When sure, click on Continue Booking. On payments page, select the suitable payment option for example Net banking, select the Bank and click on Make Payment. This will take to the payment portal. Furnish the payment and your ticket will be displayed to download and print. Viewing Transactions In the main menu, click on MY ACCOUNT and hover mouse pointer on My Transactions. You will see choices namely Booked Ticket History, Failed Transaction History, Ticket Cancellation History. You can select the desired choice. LAB EXERCISE 1. Create an account on any online shopping site of your choice with teacher's permission. Add some items in shopping cart, go upto payment option and then logout without buying the items. 2. Register yourself on IRCTC website and practice booking a ticket. (Do not book actual ticket. Stop when payment page appears.) 3. Check you email ID of there is any mail from shopping website and IRCTC. Session-8 Internet Security Web Applications and Security Internet security refers to computer security especially when we are online on Internet. It often involves browser security but also network security. Internet security is to establish preventive measures against attacks from hackers, phishers and online 5216

scammers. The Internet is as secured as safely we use it. Exchanging information may often involves high risk of intrusion. Though Internet is a valuable and vast source of information. It is also the most preferred source and virtual place of entertainment. But it makes your computer prone to many online threats. Ensuring security of our login credentials on various sites like bank sites, our credit card and online banking information from unauthorized users is a must. Some web sites can also install Malware on the computer without user consent thereby leaving the computer damaged or insecure. Online threats such as Phishing, email spoofing, chat spoofing, etc. can increase the chances of users getting compromised.You can reduce the risks by using best practices such as using Antivirus Software, Antispyware Software, Firewalls, strong passwords, etc. in addition to spreading awareness of the best practices. Best Practices for Security Use strong passwords, with combination of letters in both cases, numbers, and special characters which makes a password difficult to crack or guessed by others. Do not keep easy-to-guess obvious passwords like your birth date, birth place, friend's name, relative's birth date, mobile number etc. Change your pass word frequently at least monthly or fortnightly. Most web sites like Gmail, Facebook, bank web sites and important transactional web sites check for password effectiveness when you register for the first time or change the password. Following is a general guideline for managing strong passwords. ¤ Password length should be at least 10-15 characters if possible or allowed by the website or software. ¤ Do not repeat password while changing them. Many bank web sites do not allow this. ¤ Pass words should be a complex combination of numbers, letters and symbols. ¤ Avoid using same password for multiple sites. Example of a strong password is k3xP%,7Ym[} Web sites such as www.strongpasswordgenerator.com help generate random strong pass words. Go to www.strongpasswordgenerator.com and click Generate strong password. The pass word will be displayed. Regular Data Backup: Regularly backup your data on an offline storage like external drive, disc or tape drive etc. You can restore it in case of data loss or computer hard drive crash. Keep the back up in a secured place away from unauthorized users. Encrypt Data by using a good encryption software. Some operating systems provide this feature also. Secure your user name and password: Never save your security credentials in a place or location, which is shared among others such as cybercafé, shared drive etc. Do not set your browser to automatically login to your bank sites for automatic logon. Every time you visit such site, type the password always. Do not share personal data; web sites require you to fill out forms containing fields such as name, gender, age, email address, school, etc. Be cautious when filling out such forms; research and verify if it's a trustable web site. Your email addressed could be used by unauthorized users to send you fake or unwanted emails; think twice or thrice before providing information to any website and decide if it is really necessary. Secure transactions: If you are using online shopping or transactions, web sites even store your credit card or online banking personal information such as your credit card number, account Web Applications and Security 5217

details, etc. This information can be tracked and used by un-authorized users often known as hackers to misuse this information. Again, ensure the web site is legitimate and uses secure practices for performing and maintaining online transactions. Since information such as credit card details or personal information is sent over the network, it is always recommended to use only secure web sites for such transactions. Verify if the web site uses secure transaction; usually it is indicated through a digital certificate represented as a golden lock in the web browser's address bar. Use antivirus and antispyware software, computers are prone to attacks from software known as Malware that could har my our computer. Malware track browsing be havior or transmit personal data from your computer; programs such as key loggers could be in stalled on your computer track and transmit every key that is pressed on akey board (keystrokes) to unauthorized users. Antivirus and Antispyware programs also offer real-time protection monitoring your computer for any changes by malware software. Keep your Antivirus an Antispy ware software always up to date, this can help in protecting your computer from recent threats. Do not immediately respond to mails from unknown users, it may be a fake mail trying to gather personal information such as your bank account details, home address, etc. Some mails could promise you jobs or announce lottery results which in turn could compromise the user. And in some cases, virus or scripts that are dangerous could be attached to the mail; NEVER open the attachment from an unknown source. Clear browser cookies frequently, cookies are programs that are created on your local computer when you visit web sites. Though cookies are meant for storing data based on your activity performed during your earlier visit such as logon details, details of as hopping cart, visited pages in a website, etc. they could also be tracked by unauthorized users and possibly gain access to your personal information. Keep the operating system and software applications up to date; though operating systems and applications are designed, tested and distributed, sometimes they may have security holes through which a hacker can take advantage; they may track and gather information or even damage the whole computer. In general, most vendors notify the users whenever a security hole is identified and an update is available to address that particular issue. You can also visit respective vendor's website to check if there are any updates available, download and keep your operating system and software applications up to date, free from security holes. Install Firewalls: Firewalls could be software or hardware and can assist in keeping a computer and a network secure. Firewalls analyze the network traffic and determine if the traffic should be allowed or not. In most cases, operating systems such as Linux, Windows or Mac include firewall software as a part of operating system thus keeping the computer secure. In rare cases, you may need to configure your firewall for additional security. 5218 Web Applications and Security

Never install software from unknown sources as they might not be trust worthy; download only from well-knownorreputed web sites. Verify the source if it is legitimate by searching the internet or referring to comments from other users before downloading them; understand the nature and the purpose of the software before attempting to download and install them. Secured Socket Layer Certification is done for web sites by known authorised Certification Authorities (CA). CAs do not issue SSL certificates to phishers, spammers or any agency that is not properly identified and cleared. Check the website's certificate icon of a padlock in the address bar. All secured web sites have SSL (Secured Socket Layer) certificates. If padlock icon is of open lock then website is not secured and must be left immediately. Remove unwanted or unknown software applications; these might have got installed without your knowledge when you have visited some web sites. Unwanted software could get installed as they might have been bundled along with necessary software. Some programs such as toolbars get installed usually through bundled software and are programmed to send personal data without your consent. Cyber Bullying Any sort of threat or harassment over internet is the act of cyber bullying. Messages in bad taste and intentions, online mockery in friend groups or circles, stalking someone's online profile and trying to post unwanted updates, sending unsolicited private messages, videos, and pictures are considered as Cyber bullying that affects young minds intensely even up to the threats of death. Protection from Cyber Bullying ¤ Children must know that their parents and teachers are always available for them when they face such problem. ¤ Children must know that no matters what, parents and teachers are their first support. ¤ Children should inform their elders about any incident that sounds nasty even remotely. ¤ Children must know the fact that cyber bullies are not capable to do any harm and they can never carry out their claims of harming someone. ¤ Children are advised to block such intruders immediately and never entertain them. ¤ In case of cyber bully attack, save all his/ her messages offline as evidence for later use. Malicious Smartphone Applications Many smart phone applications seem attractive but in fact contain malicious code that steals information stored in the smart phone, such as the address book data without the owner's knowledge. The personal information stolen this way is forwarded to the hackers who abuse it to commit cyber crimes such as spam operations, billing frauds and cyber scams. Every trending app is not worth downloading. Smartphone Safety Measures ¤ Set up emergency numbers for instant calling. ¤ Do not use cell phone everywhere – keep your senses free to perceive other stimuli like while crossing road, driving, using escalators, crowded areas etc. ¤ Get rid of unwanted data as soon as possible – keep your phone data tidy. ¤ Protect your phone from physical theft. Make it a habit to check while leaving any place. ¤ Keep good password and pattern protection. ¤ Keep the antivirus and software updated. Web Applications and Security 5219

¤ Sign out of and close the apps that are used. ¤ Avoid automatic download settings. ¤ Keep your wireless access secured. ¤ Do not install just any app impulsively or in peer pressure. ¤ Keep a regular backup of your phone data. Clearing Data Stored In Browsers Web browsers have built-in password management designed to store passwords used informs on web sites. Browser soften prompt to save user name sand passwords when users attempt to logon to web sites. This facility is offered to users, so that they can logon to their frequently used web sites without having to type the user names or passwords. However it is not advisable to leave the web browser store this data particularly on public or shared computers. To clear personal data from a web browser such as Google Chrome, launch the browser. Click Tools Menu > More Tools > Clear Browsing data… The next window will show various options to clear Browsing History, Cookies and Cache. You can make changes in Privacy settings according to your preferences. LAB EXERCISE Visit security options of Internet Explorer and note down your observations in notebook like how history settings are changed, how cookies settings are changes and how other security levels are setup in Internet Explorer. Session-9 Workplace Safety People on a workplace are important asset of the company they work for. In addition to this, workplaces may have other people also involved such as students in schools, patients in hospitals, customers in a bank and clients in other working places. So, workplace safety is not an issue concerning only the people who work in a particular place but everyone who is present at the workplace due to one reason or other. Why Workplace Safety is Important? Safety is always an important issue in every aspect of life owing to the reason that it concerns the living beings directly. A safe environment is what everyone looks for and wants to be in. Workplaces are very dynamic in nature and depending on that they can be very crowded too. So, a place that involves dynamic interaction of people at work needs to be safer for all people concerned. A safe working environment ensures better work performance and efficient workforce. It is the responsibility of every organisation to provide as much as it is the right of every working person to have a safe and healthful working environment. 5220 Web Applications and Security

Safety Issues and Workplace As we learnt that workplaces are mostly dynamic in nature and depending on that, their environment varies. Think of a small stationery shop manned by two people at one hand and on the other a busy railway platform buzzing with the crowd of passengers arriving and leaving, along with vendors, staff and security personnel around. Quite a contrast! Isn't it? So, you can now figure out that certain workplaces could be quiet like, offices and libraries while some workplaces are moderately noisy and crowded such as shops and restaurants, yet some workplaces like hospitals, public transport stations, factories, mines, construction sites, packaging units, ware houses etc. work under stringent safety controls. What is of importance is the safety of each and every individual directly or indirectly related to the place of work. For instance, hospitals have responsibility of safety not only for their staff but also for the patients and the visitors. So does for airports, railways and bus stations for passengers, shopping malls for shoppers, restaurants for customers, schools for students, recreation parks for children and the likes. Safety Hazards Preventing and protecting against a threat or hazard needs the knowledge of kind and nature of the threat. Knowledge helps in devising effective safety measures and rules. Nature of workplace is the prime factor that decides the kind of threats to the safety of the people present there. In highly sophisticated workplaces such as laboratories, construction sites, mines and manufacturing expert guidance and vigil are needed to ensure safety and a strict code of conduct is followed in complying with the safety rules and regulations. In certain specialised cases, breaching such rules may be considered as criminal offence. Comparatively common workplace areas such as schools, offices and shops need not to have such extensive safety measures but they do need to follow certain basic and mandatory safety practices on regular basis. Some common workplace safety hazards are related to the following items or factors: Fire: Fire has the most devastating effect. In absence of appropriate safety measures, it is like inviting the trouble knowingly. Fire safety must be the prime concern for every domestic and commercial place. Protection against fire is the part of basic rules and guidelines of safety. A sudden outbreak of fire catches the people off-guard and by the time they react, it spreads. In certain areas like mines, paper and garment go-downs, confined places like elevators, theatres and washrooms, oil-rigs, fuel stations, chemical laboratories are most prone to complete devastation by fire. If fire breaks out in such places and adequate means of safety are absent then such places succumb completely to the raging fire in no time. Electricity: We tend to take this silent monster very lightly and in most of the cases, victims hardly survived. Today, quality electrical equipment and fittings are installed which make us little inadvertent in using them. This makes us overlook certain trivial danger signs such as broken sockets or wire- casings, water leakage near the electrical fittings, wires exposed due to rodent-bites, wear and tear of the old fitting and wirings etc. Other reasons behind a safety hazard due to electricity are misuse of allocated power (using high voltage equipment over a low voltage line) leading to short-circuits, equipment and fittings in the reach of children, deployment of untrained personnel for repairs and poor fitting layout design. Careless handling of equipment. For instance, using a hair-drier casually in the bathroom or handling electrical fittings barefoot standing on the naked ground. Electricity accidents, like short-circuits, may cause fire, leading to more destruction and loss of life. Unsafe places: An unsafe place could be as ordinary as a narrow passage cluttered with a stack of heavy cartons or as dangerous as several feet below the ground in a coal mine. A construction Web Applications and Security 5221

site is a life-threatening place for untrained, unequipped and casual individuals. Like construction sites, factories and warehouses have two major threats – heavy objects and moving objects. For example, heavy containers and fork lifts. Confined places like narrow passages, operation theatres, air-locked rooms, bank safes, freezers and cold storages, driver's cabin, cockpit, soundproof cabins and basements – parking, go-downs, mines – all such places turn out to be hell holes when disaster strikes. Certain places are unsafe due to hazardous nature of the work such as virus medical research centre, nuclear plants and machinery, blast furnaces, refineries, work involving dust, smoke and other particles in the air, work involving high decibel noise due to heavy equipment like drilling machines and hammers, life threatening sites such as underwater, space research, outer space missions, extreme heights and extreme weather conditions (desert, north pole etc.), places which bring workers in contact with harmful diseases – people working for patients during a pandemic such as recent Covid-19 virus etc. Tools and Machinery: Various trades use different kinds of tools, machines, gadgets and instruments. Using certain tools and operating specific machines needs right kind of training and methods. Tools pose a threat if they are not used in the adequate manner, machines can create havoc if they are not worked with adequate skills. Mishandling of these leads to the dangers for the people on the workplace. Certain examples are heavy drills, cranes, trolleys, furnaces, medical equipment, forklifts, indoor carriage cars, push carts, carpentry tools etc. Working with a tool or a machine is as safe as the level of skill and knowhow of its operator. Proper placement and location of the equipment is also necessary. Distractions while operating them may also lead to accidents sometimes. Ergonomics: There are certain ways to operate equipment and right kind of postures to assume while working. A person merely sitting in a chair, typing on a computer is exposed to the effects of not using the equipment properly and not assuming the right posture. The correct posture of working on a computer, correct posture to man a vehicle, correct pose to handle an equipment come under ergonomics. The quality of a product is also determined by its ergonomic design. A chair meant for sitting for longer hours by a data entry operator will be different than that meant for a person working on a loom. Ergonomics involves both – the right product design and the right posture to work. Slippery and unsafe passages: A simple slip may cause a broken hip or elbow. Businesses involved in show and display such as hotels, malls, restaurants and other such places have more reasons for accidents due to a sudden slip. Imagine a slip and topple from the third floor of a mall down to the ground floor or a slip over the moving escalator. Passages partially blocked by discarded stuff like broken furniture or wooden cartons. Untidy narrow pathways due to poor housekeeping. This is the reason that in certain professions, personnel are trained into handling equipment in narrow passages like the passage in aeroplanes, crowded places like restaurants, moving trains. All such workplaces made of slippery floors need extra care and caution for the people who work there and the visitors. Crowd: Overcrowded workplaces may cause different kind of threats but they are more of a big disaster in other kinds of threats such as fire breakout or stampede. Crowd makes an emergency situation worse. Law enforcement professionals and workers many times deal with crowd. Crowded hospitals are a common example. Such places need discipline and a code of conduct for restricted movement as well as authorised access to specific areas. Crowds on railway platforms and over bridges many time lead to accidents. Hygiene and health: People in healthcare, medical profession and scientific research are exposed to infections, radiations and other similar threats depending on where they work. A strict regime of discipline and safety measures are needed to be followed in such places. People not trained into working at such places pose greater threat. 5222 Web Applications and Security

Training and capability of staff: Certain businesses sometimes compromise on the adequate training, capacity and skills of the working staff due to budget constraints or short-sighted business decisions. This leads to accidents. In certain businesses it is more of a mortal threat such as public transport and commutation services (taxi, school van etc.). There had been a few news of school van accidents. Capability refers to the physical and mental state of the worker or operator of the machine. A drunk driver kills self and many others. Lack of adequate staff results in untrained persons handling the equipment. We have heard cases where an untrained support staff was caught administering an injection to a patient. All professions involving handing of equipment, tools and machines need adequate expertise level and certified, trained and skilful personnel to work. Anything less than this is an open invitation to an accident in waiting. EXERCISE 1. Imagine a public place which you visited recently. Which safety hazards did you notice there? 2. What are the common safety hazards likely at a school? Session-10 Maintain Workplace Safety As we discovered earlier, workplaces are exposed to different kinds of threats depending on their nature of business and location. It is imperative to ensure safety of workers and to do so, adequate safety norms and discipline are followed at workplaces. The safety rules and measures should be clearly communicated through formal ways and displayed for everyone to see on the workplace. Let us have a look at some common workplace safety measures. Suitable safety gear: Certain specialised professions need specific uniforms and safety gears. It's not only for sportspersons to wear safety gear. Personal protection equipment (PPE), helmets, goggles, anti-glare specs, thermal safety wear, anti-slip shoes, overalls, anti-radiation suits, protective boots and gloves, bulletproof and fireproof jackets are necessarily used in various work fields. For doctors, construction workers, mine workers, engineers, mechanics, housekeeping staff, computer operators, security personnel, vehicle handlers, packagers, assembly line operators and factory workers it is necessary by rule to wear adequate safety gear to ensure workplace safety. Fire safety: It is important to have suitable and adequate fire safety measures. These include the workplace design and environment as well as safety equipment. Fire-safe work environment includes: 1. Proper ventilation at workplace. 2. Emergency exits. 3. Safe electrical, LPG and water supply fittings. 4. Suitable safety against any inflammable material. 5. Means to check and handle overcrowding. 6. Practice of safety rules by all at workplace. Fire safety equipment includes: 2. Fire alarm. 1. Fire extinguishing equipment. In addition to the above, the staff should be trained through mock drills and regulations to practice Web Applications and Security 5223

safety. People at workplace should know what to do during a fire breakout. Evacuation drills, demo and practice sessions for using fire extinguishers, instant access to fire fighting services and medical help, self-management and helping others during the emergent situation etc., equip staff to handle the emergency adequately instead of panicking and losing control. General health and ergonomic safety: Nature of work and workplace environment affect the health of the workers. A conducive work environment is conscious of workers' general health and its ergonomic aspects. Due to work-specific environment workers may get exposed to different kinds of health hazards. For instance, coalmine labourers are exposed to poisonous gases, harmful radiations, inflammable materials etc., sewage cleaners lose their lives due to poisonous gases and deep running smudge. Such workers need adequate equipment and gear to work. Hospitals are a dangerous place for the staff who come in direct contact of the patients with infectious diseases, people working in refineries, chemical plants and dye industry tend to get their respiratory system infected with hazardous chemical, tiny dust particles and general air contamination, extreme temperatures may cause discomfort or danger to physical health, Such workers should follow the safety guidelines such as wearing right kind of PPE, gear and obey the prescribed health measures. People working behind desks with least or zero physical movement are prone to ailments related to heart, backbone and neck. Suitable breaks, fitness regime and discipline must be followed by them. Many big corporates provide gym facility for the employees. Minimised physical activity takes a toll on the physical fitness. Long durations of standing (shopping mall, food joint), too much physical movements such as by salespersons, traffic policemen, hotel kitchens, waiters, security guards etc. Suitable breaks, arrangements for little recreation and physical fitness must be in place for such professions. First Aid Kit is a mandatory requirement at all workplaces irrespective of their nature and kind however, it should be equipped with suitable tools and medicines. FAK helps in minimising the risk of life until the help arrives. It enables the victim to hang on for a little longer time until the real help is reached. A standard FAK contains the following: plasters in different sizes and shapes sterile gauze dressings bandages of different size/shape safety pins tweezers and/or small scissors alcohol-free cleansing wipes sticky tape digital thermometer skin rash cream antiseptic cream/ liquid painkillers cough medicine antihistamine cream or tablets small torch FAKs need to be checked regularly to replace any expired material or to add any new item depending on the requirements. Providing first aid: Every individual should know how to provide basic first aid to a victim. Usually, first aid is a matter of trained persons but a basic training from the right source such as redcross.org etc. equip a person to become useful during emergency. Depending on the cause of harm, the patient or victim should be treated properly for the quick comfort and safety. Taking care of proper air flow (ventilation), comfortable lying down of the patient, applying suitable medicine, suppressing any bleeding, aiding in respiration, supporting a broken bone, least distressing movement of the patient are certain basic know-hows that may save a life. The main purpose of the first aid is to keep the victim or patient alive and comfortable until the adequate health arrives. Visit www.redcross.org to learn more about providing first aid. Ergonomic safety refers to the correct way of working with an equipment. It involves body posture, 5224 Web Applications and Security

duration of working, safety of sensitive organs such as eyes and right skill. For example, to type for longer duration on a keyboard, one must be trained in the typing skills of specific language keyboard, the right posture of the body, kind of chair, position of knees and elbows, position of wrists while typing and using mouse, distance from the monitor, intensity of the monitor glare etc. need to be considered. Keyboard ¥ Your neck and shoulders should be relaxed. ¥ Your upper arms & elbows should make a little more than 900 angle. ¥ Your wrists should be straight. Mouse ¥ Mouse should not cause pressure on the wrist. ¥ Avoid bulky mouse. ¥ Keep mouse closer to the keyboard. ¥ Elbows should be bent and closer to the body. Monitor ¥ Monitor should be placed at a distance anywhere between 18 and 30 inches. ¥ You should be able to focus on the screen while still using the back of the chair and keep your arms parallel to your upper body. ¥ Your eyes should be level with the top of the screen. ¥ Turn the screen brightness down to a comfortable level. Sitting and Posture ¥ Chair height should be adjustable. ¥ Chair should swivel (rotate on centre) easily and completely (3600) ¥ Chair should have good back support. ¥ You should be able to sit with your feet flat on the floor (or a footstool) and knees approximately 900. Mild Exercises (Do not over stretch and do not do with jerk) þ It is a good idea to take a break of a few minutes for every hour. þ One by one, gently lower your ears to your shoulders. Repeat a few times. þ Turn head slowly & look over left shoulder (10 sec) then right shoulder. Repeat a few times. þ Tilt the head slowly backwards then bring slowly forward to tuck the chin in the neck. Hold for 10 seconds and repeat a few times. þ Circle shoulders forward several times, then backwards. Repeat 3-5 times. þ Stretch arms above head, pull elbows behind the head. Hold for 10 seconds and repeat. þ Go to an open area, swing arms one by one forward & backwards like a windmill. Repeat. þ Interlace fingers, palms outwards and straighten arms in front. Hold for 10 sec & repeat. þ Rotate wrists clockwise for 30 seconds than rotate them anti clockwise. þ Every 20 minutes, look away from the screen at a distant object for 10 seconds. Safety equipment: It is the responsibility of the concerned business and authorised persons to ensure that safety equipment required for the work is worn by the workers. Through guidelines, trainings and checks must be there to ensure the compliance in using the safety equipment. In Web Applications and Security 5225

sensitive areas like hospitals, construction sites etc., government regulations need to by applied and followed. There must be detailed guidelines and stringent discipline to ensure everyone's safety. People must be educated in realising that safety equipment may slow them down but prolongs their life span. To stay alive and physically safe are the prerequisites to be of any use to a workplace. No business would like to have a crippled worker or a worker lost. Lighting: Workplaces involving late working hours or places like mines, go-downs and basements need suitable amount of lights for workers to see and carry out their tasks. Improper lighting leads to visual health issues and low productivity. A well lit room, a mine fitted with moving flash lights, operation theatre with bright overhead flash lights, a classroom with proper light arrangements are examples of well-lit workplaces. Cleanliness and hygiene: Clean and tidy workplaces is a prerequisite for better working environment. Workplace should be free of rodents and other insects. Regular cleaning of the floors, working areas, desks and other parts of the building should be carried out. Occasional but regular sanitisation and disinfection is needed depending on the nature of the workplace. Cleanliness of the washrooms and other areas is necessary. Adequate arrangements must be there to ensure that employees could manage hygiene properly. Maintaining a clean and healthy environment is the responsibility of both the employer and the workers. Suitable guidelines and rules should be communicated regarding this and management should ensure that they are obeyed strictly. Controlled access: Certain organisations and enterprises need to ensure authorised access to certain parts of the workplace. For example, everyone cannot go inside an operation theatre. Places like electrical control rooms, centralised machine control rooms, server rooms and specific floors are kept out of reach from the unauthorised personnel to ensure that entire system runs smoothly. Large organisations even practice authorised security card-based access into the working site besides having a detail of security personnel. These measures ensure that untrained, hostile and unwanted persons should not get in. Training the workforce: All the measures for ensuring workplace safety fall flat if workers are not properly aware of them, understand them and acknowledge them. Workers should be informed, educated and trained into following the safety measures laid out by the organisation. Formal means of communication, quarterly safety measures quiz and mock drills, evacuation plans are effective ways to ensure that workers understand and comply with the safety policy and safety rules of the workplace. EXERCISE 1. What is the use of First Aid Kit? 2. Discuss in brief the ergonomics related with working on computer. Session-11 Prevent Accidents and Emergencies Prevention is better than correction. Safety rules and guidelines, if followed by the word, help in 5226 Web Applications and Security

preventing major accidents at workplace. That is why mock drills and reminder quizzes are important. Let us understand some common types of accidents. Slipping: Wet floors, slippery surfaces, edges of the stairs etc. are common places where a person may slip and hurt badly. Anti-slip strips and big warning displays prevent such accidents. The grips on the stairs should be anti-slip. Cleaning staff should clean the floor by putting up warning boards on every possible entrance of the area being cleaned. Tripping over: One must be careful while moving in a cluttered place like maintenance rooms strewn with wires or place with loose rugs. Tripping over sometimes may cause serious accidents as it leads to falling objects and further damage and threat to life. For instance, tripping over the wire of a stand-alone fan causing it to fall down may lead to short circuit. Tripping over can only be prevented through informing all in advance, cordoned off areas, restricted access and suitable warning signs and most importantly being careful ourselves. Falling: Falling down from the ladder, edge, roofing and other such unprotected areas may lead to serious injuries or even deaths in case of dangerous heights. Construction sites, factories, warehouses, go-downs, mining and digging operations are the sites prone to accidents and deaths due to fall. People working at heights should be trained and skilled in doing so, they should be equipped with adequate gears such as safety ropes, helmets, anti-slip gloves and shoes, climbing gear, anti-slip ladders, walkie-talkie, catching nets and arrangements of instant first aid of advanced level. Hit by vehicle or falling objects: People should be careful in places like car parking, moving trucks in a warehouse, loaded truck backing up, fork-lifts moving inside a large warehouse or store, heavy objects kept at height, rail-carts, carriages and even people carrying some heavy object. Warning signs placed at conspicuous points, restricted access, localised, in-house traffic rules, signal controls, suitable announcements on loudspeakers, controlled movement, automatic warning sirens such as backing up warning callout can prevent such accidents. Other common workplace accidents are due to electrocution, tools and machine handling, lifting accidents, common physical injuries and strains, overexertion, inhaling toxic material, crashes, collision and harms due to high decibel noise, dust, smoke and dirt. Major accidents include explosions, fire breakout, leakage of hazardous material, electrical surge and high voltage accidents, mine collapse and underground avalanche, flooding of closed, congested areas, building collapse and machine-related accidents etc. Preventing Accidents Some common preventive measures against accidents at workplaces are listed here. Safety guidelines, rules and their communication: Workplace should be governed by standard as well as specific safety rules. Staff should be communicated formally about them and should also be educated and trained in certain cases through draft policy, email literature, quizzes and mock drills. Workplaces should be displayed with conspicuous warning signs, directions, safety tips and indicators for any diversions during maintenance. For cases where danger can be anticipated, timely warning should be conveyed to all concerned through most effective channel. One such example is sending an email to all, informing that staff buses will leave early through alternate route due to sudden heavy rainfall and water-clogged roads. Efficient housekeeping should be ensured through trained and skilled staff. Carelessness during cleaning and maintenance are causes of most common accidents. Housekeeping should have clear guidelines for standard tasks and rules for safety. Storage of materials, movement and lifting of heavy objects and use of cleaning equipment should be done in the safest possible manner. Web Applications and Security 5227

Preventing unauthorised access through restricted entry with the help of ID cards, security checks, digital swipe cards, fingerprint scanners, CCTV cameras, alarm systems and classified, secured areas greatly helps in most of the accidents because it keeps untrained and unwanted hands at bay. Only required and skilled persons access the place who are aware of importance of safety for everyone. Safety guidelines during operations at production floors installed with machines should be followed strictly. Movements around the machines (slow, vigilant and cautious), proper uniform (no loose clothing), adequate gear (helmet, eye guards) and careful operation of the equipment can prevent many accidents. Risk assessment should be done regularly to understand who are at risk, potential dangers and possible losses. Such assessments provide clear picture of the safety quality of the workplace and help in devising effective preventive measures. Identifying safety exits and devising effective evacuation plans are helped by thorough risk assessment. Employing trained and skilful personnel ensures that major safety guidelines are taken care of. Skilled and trained hands are educated in observing safety measures. Regular training of new staff ensures that everyone at workplace knows how to keep self and others safe and what to do when emergency occurs. Discipline, alertness and care are the three basic qualities which help every individual in maintaining common security. Attitude of the people is of importance here. If everyone is motivated and encouraged to follow safety guidelines, observe carefulness in daily operations and show care and concern for others then many mishaps can be avoided. A feeling of responsibility and professionalism needs to be there in working personnel to cooperate in observing safety at workplace. Such attitude strengthens the preventive measures otherwise all kinds of safety measures are not enough to help. EXERCISE List any 4 different workplaces you might have seen and suggest how common accidents can be prevented there. Buddy System for Workplace Safety This is an industry standard in workplace safety wherein two co-workers are paired as part of safety management practice with the responsibility to ensure mutual safety at work place. The practice of grouping employees so that each member of the work group is observed by at least one other employee in the work group. The primary purpose of the buddy system is to provide instant aid to employees in any emergent situation at workplace. Buddy system is considered an important risk control measure by both government and non- government organisations. Pairing is done among the team members working on a same project or work site. In certain cases, one person is given only the role of ensuring safety. This person is not supposed to carry out the task at hand as it is done by the other partner. This arrangement is mostly used in the work that involves higher risks such as working in hazardous environment and dangerous setup. Generally, both the partners carry out the assigned task while ensuring each other's safety. This system helps in the orientation of a new joiner in the team. The experienced employee guides the 5228 Web Applications and Security

newcomer until s/he gets acclimatised with the work environment and risks involved. Later, the newcomer can also play the role of safety-buddy with the same partner. This arrangement gives an opportunity to the experienced employee to test his/her skills in doing the role of the buddy. Buddy system is useful in: l Reducing risk through safety assistance. l Helps in monitoring for possible workplace risks and dangers. l Advising to keep safe from potential exposure to hazards. l Providing rescue assistance during emergency situations l Providing instant help such as first aid, evacuation to safety if the partner is injured. l Raising an alert or alarm to summon help in case of any accident. Emergency Evacuation In the event of any emergency such as fire, flood or any such disaster, an emergency evacuation procedure is a must to ensure that everyone at the workplace is evacuated to safety with least harm possible. Workplaces should set their own standard policies for handling workplace emergencies. Employees should be made aware of the policy and procedures of emergency evacuation. Suitable training, if needed, and regular drills should be scheduled to assess how effective the emergency plans are. Regular drills and training helps in preventing as well as handling an emergency in time. It reduces panic among the people and helps them use their heads instead of adding to chaos. Evacuation plan also helps in eliminating or minimising the risks to injury and life. General Emergency Evacuation Procedure l Alert everyone by activating the nearest alarm and shout the alert clear and loud. Use any other procedure set by the safety policy of the workplace. l In response to the alarm or emergency call/shout out employees should immediately stop all the work and collect personal valuables. l Ensuring one's own safety, one should assist others who might be in immediate danger or need any immediate aid. l Ensuring one's own safety and if necessary, then check or curb any activity that may pose threat, become hazardous or cause damage if left unattended during evacuation. l Comply to the emergency instruction issued by designated control personnel until you reach to the safety. l Assist with the general evacuation if directed to do so by emergency control personnel. l Follow emergency procedures and instruction to provide assistance to disabled, physically challenged, elderly people. l In case of fire, avoid taking elevator to evacuate a building. Use emergency staircase or any stairs for that matter. l Maintain strict discipline, keep calm and stay alert with your mind fully present on the current situation until you reach the evacuation assembly area. l Stay in the evacuation assembly area until the signal of all clear is conveyed by the authority. Web Applications and Security 5229

Emergency Evacuation Plan Emergency evacuation plan includes: l Floor plans of the building or workplace. l Maps of emergency exit paths. l Location of emergency equipment. l System map of electricity connections, generator sites and exits (stairs, doorways etc.) A Sample Evacuation Diagram Emergency and Evacuation Policy An evacuation policy should be in place depending on the type of workplace and nature or work being carried out there. For instance, evacuation policy of a cola mine will be completely different from that of a construction site or a hospital. A standard emergency and evacuation policy: l Clearly states the objectives and commitment regarding ensuring safety of everyone present on the workplace. l Describes any legislative requirement of the policy to address compliance to the local laws and rules regarding safety of the employees. l Includes detailed emergency and evacuation procedures, floor plans, escape route diagrams and evacuation procedures. l Describes the preparation plans, training procedures and general information system in place to educate employees in handling emergencies and be part of evacuation process. 5230 Web Applications and Security

l Lists the findings of the risk assessments and countermeasures of any risks. l Includes the training and drill calendar for regular awareness on the workplace hazards, emergencies and safety procedures. l It states for whom the policy is meant for in what way. (E.g. children, elderly, disabled, patients, management etc.) l Includes work health safety measure observed by the workplace. l Clearly defines specific procedures against each potential emergency. l Describes the control hierarchy of individuals and designated chain of command for emergency procedures to execute along with their duties and powers in such situations. l Includes policy review plan to ensure that policy remains updated over the period of since it is drafted or renewed last. Session-12 Various Workplace Emergencies Work-specific emergencies such as blasts, explosions, spills of hazardous material, breakdown, crash etc. Equipment or machine-related emergencies like sudden injury, cuts or bruises; body-part or cloth stuck in the machinery, accidents related to turbines, boilers and chemical plants; crashes and accidents by moving objects – vehicles, lifts, trolleys and carts etc. Natural calamities also add to emergencies sometimes or increase the chances of accidents, for instance, heavy rainfall at a construction or mining site, earthquakes, extreme temperature conditions (too hot regions, too cold regions) and extreme weather conditions (hurricanes, storms). Civil or behavioural emergencies such as conflict and violence at workplace, strike or hostile crowd, unauthorised access to restricted area, rogue or disgruntled employee, sabotage by competitor or adversaries are some major causes that pose threat to the safety of the work-force. Web Applications and Security 5231

Health related emergencies can occur at common workplaces like a desk and chair as well as dangerous work environments like chemical plants, mines, oil-rigs and medical research labs etc. Workers in factories may be exposed to smoke, poisonous gases, extreme heat, extreme cold, radiations, intense lighting, high decibel noise and extreme physical exertion. Careful, efficient and regular safety measures can only protect workers from the impending harm. Workspaces during a pandemic: Due to the recent COVID-19 pandemic, the entire world had almost come to a halt. Still, as of this writing, the threat still looms and we are forced to practice strict safety measures since no definite cure has been devised. The workplaces need to be kept safe during this pandemic as the lockdown has been relaxed and world business and economy are resuming back to normal. During this time, safety measures mandated by the government agencies need to be observed strictly such as social distancing, using masks, regular sanitising and following other related safety measures to keep infection at bay. Workplaces need to ensure that employees follow the safety rules strictly and if not there should be suitable penalties to set serious examples. While commuting between our residence and workplace, we need to follow safety guidelines as we move on crowded places and closed places such as buses and other means of public transport. Protect Health and Safety at Work Health is one of the prime concerns for an efficient and productive work-force. Employees with sound health and fitness can give desired output from the assigned tasks and projects. Workplaces that are prone to obvious health-related emergencies need specialised measures of safety. We have discovered earlier some common health related emergencies are smoke, poisonous gases, extreme heat, extreme cold, radiations, intense lighting, high decibel noise and extreme physical exertion etc. Hazards and their sources: Hazards cause physical damage and health related emergencies for the workers. Certain hazards do not seem harmful initially until their prolonged exposure results into evident damages. For instance, prolonged working hours at a desktop computer may lead to physical stress, muscle strain, vision-related ailments and bone-joints related problems. Another instance is exposure of mine workers to a colourless and odourless poisonous gas which slowly damages the lungs or skins causing skin and respiratory disorders. A lung disease called pneumonoultramicroscopicsilicovolcanokoniosis (pro: new-mono-ultra-my-kro-skopic…siliko- volkano-ko-neo-sys) is caused by inhaling fine silica particles of ash or dust in the workers involved in areas like thermal plants, furnaces or places affected by dust-storms and volcano ashes. Some hazards types and sources are listed here: Ergonomic: Incorrect posture, prolonged work hours, improper use of equipment, careless usage and sometimes poor product design lead to damages caused in muscles and body joints. Work environment: Noisy workplaces, poor lighting, inadequate setup of work area, over- crowded places, longer than usual working hours, poor work ethics, work-floor politics, exploitation, bullying, poor work policies and underpaid jobs are the examples of non-conducive work environment which causes distress, physical ailments, poor health, and psychological disorders. Chemical and physical: Exposure to hazardous chemicals in the form of liquids, gases and radiations leads to poisoning, skin diseases, respiratory disorders, vision-related ailments and sometime mortal diseases like cancer and even sudden death. Physical dangers include places that are dangerous for human life which are prone to collapse of walls, sudden fall, crushing under heavy objects, vehicular accidents, electrocution, fire outbreaks, flooding etc. 5232 Web Applications and Security

Countermeasures to Hazards Risk assessment: Analysing and assessing risk factors to identify possible risks and potential dangers help in devising effective safety measures. Emergency plans: Emergency exits and general evacuation procedures should be in place to ensure safety when sudden emergency strikes. Trained personnel and educated staff make the emergency plan execution efficient. Regular checks and tests: Regular monitoring of workplaces, mock drills, quizzes and awareness sessions empower the workers in managing themselves and help others during emergency. Healthy Living Workplace safety is the combined responsibility of the organisation and workers. But, as an individual one should take care of one's health and physical wellbeing. A working person should follow some sort of health discipline and fitness regime. Depending on the nature of work, daily routine and available time, one should devise a plan related to diet, physical health and mental strength. Some common ways to healthy living are listed here: Mild exercises: They help in keeping fit and get rid of physical stress. Yoga, good reading and meditation: These are the ways to keep mental stress at bay and develop a positive mind set. A strong and positive mind develops impressive physical appearance too. Sports, jogging and gym: Some people play some sports, go for jogging or visit gym regularly as a hobby to keep fit. Playing a sport that involves physical exercise, running and any game like chess, sodoku etc. that tweaks one's mental faculties are best practices to stay healthy. Healthy eating: Eating almost everything one likes but in right measure and frequency is the key to healthy eating. Having some sort of discipline in eating brings out good physical results and add to the impressive personality. Avoiding temptations like indulgence in drinking and smoking is good. An occasional cheers is no harm but smoke and joints should be a big and strict no-no! Basic human values: Observing basic human values such as humility, respectfulness, respecting other's perspectives, avoiding fruitless conflicts, being considerate, developing civic sense, clean and good habits make you strong from inside and develop an effective and positive outlook. EXERCISE 1. How do you ensure a healthy living being a student? 2. What is the importance of safety at workplace? 3. Describe some safety issues at school and how to prevent them? 4. Describe some common safety hazards. 5. What is a first aid kit? What is its significance? What are the contents of a standard FAK? 6. Describe computer related ergonomics? 7. How can we prevent common accidents at workplace? 8. What are various types of workplace emergencies? Describe any 2. 9. What are some health hazards at workplaces? 10. How do sports and basic human values help in healthy living? Web Applications and Security 5233

A. Select the correct option to answer the following questions – 1 mark each. 1. User friendliness of a computer software for all regardless of their disability is called: a. GUI     b. Computer Accessibility c. User assistance   d. All of these 2. When a combination of computer software and hardware provides computer accessibility to the disabled users then it is called: a. Computer accessibility b. Assistive technology c. Supportive technology  d. Hard-soft computer support 3. Dyslexia and attention-deficit are which of the following impairments? a. Cognitive    b. Visual c. Hearing    d. Motor 4. Colour blindness is which of the following impairments? a. Cognitive    b. Visual c. Hearing    d. Motor 5. Accessibility features are mainly the part of a/an: a. Utility     b. Operating system c. Application software   d. Customised software 6. Turning on mouse keys enables ______________ keys to move mouse pointer. a. Arrow keys    b. Arrow keys on numeric key pad c. Both a) and b)    d. Numeric keys 1, 2, 3, and 4 7. Raj needs to use only single finger to paste the copied text, which accessibility feature should he use? a. Sticky keys    b. Toggle keys c. Both a) and b)    d. Filter keys 8. Raj needs to use only single finger to paste the copied text, which key should he make an sticky key? a. Ctrl     b. V c. Both a) and b)    d. C 9. Anwar's granddad is 70 years. He types a letter in a word processor with trembling hands. Which feature makes the operating system ignore his multiple presses of the same key due to this? a. Toggle     b. Sticky c. Filter     d. Any of these 10. Anish suffers with hearing impairment, what should he do to deal with system sounds while working on the computer? a. Use filter key feature   b. Turn on visual notification for sounds c. Choose a high contrast theme d. Use visual notifier for system alerts 5234 Web Applications and Security

11. Too see entire screen clearly for visually impaired persons, which of the following features must be used? a. Magnifier    b. High contrast theme c. Both a) and b)  d. None of these 12. To see the objects or a part of the screen in comparatively larger size, which of the following features is most suited? a. Magnifier    b. High contrast theme c. Zoom into screen   d. Setting display to higher resolution 13. Which of the following features are not the part of making mouse easier to use? a. Change the colour and size of mouse pointer. b. Activate a window by hovering mouse over it without having to click it. c. Use enter key to click the mouse. d. None of these. 14. Which of the following client computers rely on the server for data processing? a. Smart clients     b. Dumb clients c. Remote clients  d. Virtual clients 15. Arjun has several computers in his office. He needs a cost-effective solution for printing the documents. Which of the following solution is best suited? a. Procure printers in bulk.  b. Network the computers and install a printer on one of them making it a file server. c. Network the computers together and install a printer on each computer. d. Network the computers and install a printer on one of them making it a print server. 16. Railway reservation system allows reservation and cancellation of tickets by millions of users at the same time. What kind of network is it? a. Client-server     b. Peer-to-peer c. Both a) and b)  d. Internet 17. For the devices at a distance of a few meters, which of the following network types is most suited? a. PAN      b. MAN c. LAN      d. WAN 18. Find the odd one out: a. Cable TV network   b. Computer network in a city c. Telephone network in a metro city d. Wireless network running on Bluetooth 19. Which is the largest information system on Internet today? a. WWW b. Twitter c. Google      d. All of these 20. _____________ is the massive network of computers world over, ______________ is the medium or means to access information over it. a. www, internet     b. internet, www c. ISP, www     d. www, ISP Web Applications and Security 5235

21. Find the odd one out: a. Telephone line  b. Google c. Modem   d. Browser 22. Which of the following protocol enables use of 3G network? a. HSDPA    b. WAP c. TCP/IP     d. WiMax 23. Details of data transmitted over a network are found in: a. Packet     b. Packet header c. Database    d. Protocol 24. Find the odd one out on the basis of real time online communication: a. Email     b. Chat c. Instant Messaging   d. Video call 25. For web-based instant messaging, you need which of the following applications? a. Google hangout   b. Skype c. Browser   d. Any of these 26. Which of the following messages are considered rude over live chat? a. I want the details as soon as possible otherwise consequences would be very harsh. b. I WANT THE DETAILS AS SOON AS POSSIBLE. c. Both a) and b). d. Hi, I want the details asap. 27. For an instant but formal message which of the following is the most suitable medium? a. Instant messaging  b. SMS c. Email  d. Handwritten letter dispatched through courier 28. Personal web pages created by people are also called _____________. a. Channel   b. Blog c. Timeline   d. Home page 29. Which of the following URL example is correct to connect with our blog post through an offline editor? a. https://www.myblog.home.blog/xmlrpc.php b. https://www.myblog.home.blog c. Both a) and b) d. None of these 30. An online shopping cart contains which of the following? a. Items selected by you.  b. Items purchased by you. c. Items returned by you.   d. Items liked by you. 31. Checkout is the process of ______________________. a. Completing purchase of the items in the cart. b. Logging off the online web store. c. Emptying the shopping cart and leave the web store. d. All of these. 5236 Web Applications and Security

32. Refund on cancellation of online tickets is done on the basis of __________________. a. Web service provider's cancellation policy. b. Government's cancellation policy. c. Number of passengers. d. No refund is allowed for a confirmed booked ticket. 33. Internet security addresses which of the following? a. Internet security   b. Browser security c. Both a) and b)  d. None of these 34. Complex combination of numbers, letters and symbols is the sign of a __________________. a. Digital signature   b. Complex password c. Strong password   d. Encryption 35. Having same strong, hard to crack password for all our online accounts helps maintain security and remember just one password easily. This is a/an __________________. a. Good practice    b. Foolish practice c. Efficient way of saving time and effort d. Easy practice 36. A spyware infects the sensitive files in our system and send their details to the concerned hackers. a. True    b. False 37. A website saves details of our shopping cart on our own computer. Which of the following statement is correct regarding this phenomenon? a. Website has created a cookie. b. This is dangerous and must not be allowed at all. c. A Hacker may discover my shopping list and will get those items mailed at his address. d. This is harmless and we can let the details there as long as browser doesn't delete it. 38. The best way to ensure a secured environment on our computer is: a. Always keep the operating system updated. b. Always install the best hardware lock for the system. c. Always purchase best operating system in the market. d. Always keep the newest version of operating system on the computer. 39. A closed padlock icon beside the URL of the website in the browser's address bar denotes: a. SSL certification of that website. b. Website is running over https protocol. c. Website is registered with a known certification authority. d. All of these. 40. Visiting someone's profile without one's knowledge is a mild form of ________________. a. Cyber-bullying  b. Cyber-attack c. Hacking   d. Blackmailing 41. Which of the following is not the part of a first aid kit? a. sterile gauze dressing  b. digital thermometer c. bandages    d. Mini oxygen cylinder Web Applications and Security 5237

42. First aid can only be given by _______________.  a. An expert    b. Anyone trained in it  c. Nurse     d. Victim 43. What is the correct position of the elbows while working on a computer?  a. Closer to the body   b. Bent at a comfortable angle  c. Both a) and b)  d. Straight 44. Usually, the comfortable distance between the computer monitor and eyes should be ______________. a. 6 inches   b. 20 inches c. 60 inches    d. Any of these 45. Two co-workers paired on workplace as part of safety management practice is called _______________. a. Backup    b. Force-2  c. Buddy system   d. Safety pair 46. During any emergency at workplace, which of the following ensures that everyone knows how to reach to safety easily.  a. Safety drill     b. Company safety policy  c. Emergency evacuation procedure  d. Floor plan 47. Which of the following is an example of civil or behavioural emergency?  a. riots     b. violent conflict  c. fight     d. All of these 48. Which of the following is not a natural calamity? a. Earthquake b. Explosion c. Avalanche d. Hurricane 49. Social distancing and mask are effective to prevent which of the following? a. Any likely pandemic b. Spreading of infection of any kind c. Virus d. Bacteria 50. Incorrect posture and prolonged working relate to which kind of hazards? a. Ergonomic b. Psychological c. Chemical d. Physical Ubuntu Specific Questions. 1. Which of the following is not an Accessibility option? a. Seeing b. Hearing c. Recording d. Typing 2. Ravi's grandfather has a poor vision, which of the following accessibility features must help him using computer? a. Screen reader b. Setting Text size and contrast c. Both a) and b) d. Hover click 5238 Web Applications and Security

3. Which of the following is the suitable alert for visually impaired? a. Flashing of mouse pointer. b. Flashing of the desktop. c. Both a) and b) d. Flashing of the window Title bar. 4. Which of the following allow user to keep the modifier key active when it is pressed? a. Sticky keys b. Slow keys c. Bounce keys d. Mouse keys 5. Setting up a time delay between the key presses can be done using which of the following? a. Sticky keys b. Slow keys c. Bounce keys d. Mouse keys 6. Which of the following help avoid the acceptance of repeated or duplicate key press? a. Sticky keys b. Slow keys c. Bounce keys d. Mouse keys 7. Typing assistant is suitable for people with which kind of impairment? a. Hearing b. Seeing c. Listening d. None of these 8. Simulated Secondary Click allows which of the following? a. Set a time delay for left click to be accepted as right click. b. Set a time delay for right click to be accepted as left click. c. Both a) and b) d. None of these 9. Arrow keys on the Numeric key pad can be used as which of the following? a. Sticky keys b. Slow keys c. Bounce keys d. Mouse keys 10. Activating left mouse click just by bringing the mouse pointer over the desired option is referred to as which of the following: a. Simulated Secondary Click b. Hover Click c. Right click d. Mouse Keys B. Answer the following questions – 2 marks each. 1. How will you open 'Ease of Access Center' in Windows 7 or ‘Universal Access’ in Linux? 2. What do you mean by accessibility feature? 3. What do you mean by mouse keys? 4. What do you mean by sticky keys? 5. What do you mean by filter keys (Windows) or bounce keys (Linux)? 6. What is the use of Narrator (Windows) or Orca or any screen reader in Linux? 7. What is Navigator used for in Windows? 8. How is a LAN different from PAN? 9. How is a WAN different from MAN? Web Applications and Security 5239

10. What is internet? 11. What do you mean by computer networking? 12. What is WiFi connectivity? 13. Briefly explain instant messaging. 14. What do you mean by a blog? 15. What do you mean by the term E-commerce? 16. List any 4 best practices about internet security. 17. What is a cookie? 18. Give some examples of crowded and potentially dangerous workplaces. 19. List some workplace safety hazards. 20. What is first aid? 21. What are some common types of accident that may occur in workplaces? 22. List some countermeasures to hazards at workplaces. C. Answer the following questions – 3 marks each. 1. What is the significance of Accessibility options in a computer? 2. How will you setup mouse key? 3. How will you setup sticky key? 4. How will you setup filter key (Windows) or bounce key (Linux)? 5. How will you setup the mouse pointer so that it hovers on a window and that window activates. 6. Briefly explain the advantages of networking. 7. What limitations of LAN are overcome in WAN? 8. What is a browser? 9. List various types of internet connectivity. 10. What is the standard process of online shopping? Explain in brief. 11. How will you setup privacy options in a browser? 12. How will you clear your browsing history? 13. What is the significance of first aid? 14. What is the significance of a browser on WWW? 15. How will you open, modify and republish your blog post in MS Word? 16. What is the importance of safety at workplace? 17. What is a first aid kit? What is its significance? What are the contents of a standard FAK? 18. Describe computer related ergonomics? 19. List the 8 preventive measures of accidents (do not describe them). 20. How should you follow healthy living as a growing teenager? 21. How do sports and basic human values help in healthy living? 5240 Web Applications and Security

D. Answer the following questions – 3 marks each. 1. How will you setup visual feedbacks to appear on the screen instead of sound? 2. Explain the use of read aloud feature and Magnifier or Zoom for a visual impairment. 3. Why do we need to network computers together? How a LAN different from MAN? 4. Write short note on types of internet connectivity. 5. What are the advantages of instant messaging? How will you begin chatting on an online instant chatting website or service? Hat is a blog? List some popular blog sites. 6. How will you open, modify and republish your blog post in an offline blog editor? 7. How will you book a train ticket from your city to another using IRCTC website? How will you check the booking history of your ticket? 8. What are the best practices about internet security? 9. How will you clear your browsing history and cookies? 10. What are various types of workplace emergencies? Describe any 2. 11. How can we prevent common accidents at workplace? 12. As an individual how can we take care of our health to stay fit? 13. Describe some safety issues at school and how to prevent them? 14. Describe some common safety hazards. 15. What are some health hazards at workplaces? 16. Describe the 3 countermeasures to hazards. 17. What is the significance of evacuation procedure? 18. Write brief note on proper use of keyboard, mouse and monitor. Watch & Learn www.eduitspl.com www.youtube.com/edusoftknowledgeverse Web Applications and Security 5241

Projects Documentation Project 1: School has assigned you the job of a 4 page quarterly school magazine titled - YOUNG INSPIRERS. The magazine describes the achievements of the school. teachers and students every quarter. Design two magazine templates considering different colour themes and designs. Template should allow to insert text, headings, images and various shapes. Think of a few sections and divide the magazine into section breaks accordingly. Each page should have attractive page border. Footers should contain stylish page numbers and header should contain magazine name (except the cover page). Cover page will have a the magazine title in big stylish fonts and text effect. The first page of the magazine is its cover which should look attractive. Project 2: Design a visiting card for your friend mentioning his/ her name, address, designation, company, contact details and a company logo assuming that your friend works in that company as Regional Sales Manager. Spreadsheet You are assigned the task to maintain the following details of all the students in your class. ¤ Academic Performance in percentage in Mid Term and Final Term Exams. ¤ Co-curricular activities performance in terms of grades out of 10 (passing is 4). ¤ Grades out of 20 in sports (passing is 16). Calculate the overall total performance in percentage for all the students.Now, do the following: ¤ Conditional formatting for the cells containing percentage marks so that cells with passing marks or more are displayed in light blue fill colour otherwise light red fill colour. ¤ Create 4 well formatted graphs to show the following: 1. Column chart to show Academic performance of all the students. 2. Line chart to show Co-curricular performance of all the students. 3. Bar chart to show sports performance of all the students. 4. Pie chart to show the overall performance of all the students in all activities. Database Development Assume that you own a bicycle store and deal in bicycles for the following categories: Girl kids, Boy kids, Girl Teens, Boy Teens, Ladies, Gents. Create a database to store the stock details of the bicycles in your shop for the months of January and February as: Bicycle category, month, quantity sold, quantity in stock, sale value. Create a report grouped on the basis of months showing all the details about bicyles. Write queries to display: 1. Details of all the bicycles sorted on the basis of categories. 2. Details of all the Ladies and Gents bicycles sorted in the basis of month. 3. Increase the stock and quantity sold bu 5% for Girl Teens bicycles. Projects 242 Information Technology NSQF Level-2

SAMPLE QUESTION Term 1 Download more question papers from https://www.eduitspl.com/teachers-corner-2 Maximum Marks: 25 Part A: EMPLOYABILITY SKILLS (5 X 1 = 5) 1. Which of the following is/are the characteristics of effective communication? a. It should be concise and to the point. b. Should be clear in content and purpose. c. Both a & b d. It should not be complete with vast scope of questions. 2. Which of the following is/are healthier lifestyle habits? a. Avoid smoking and sports b. Good eating and taking drugs. c. Joining gym and taking Alcohol d. All of these 3. How to manage internal stress? a. Keeping positive attitude b. Try to adapt changing situation c. Better utilisation of your time d. All of these 4. Ctrl + S is used to: a. Print whole Pages b. Print current page c. Save Document d. None of these 5. which of the following helps to create short words that expand into actual longer words/phrase? a. Ctrl +V b. Bullet & Numbering c. Ctrl + X d. Autocorrect Part B: SUBJECT SPECIFIC SKILLS (20 X 1 = 20) 1. Which of the following features is best suited to make a formatted document reusable multiple time? a. Save it as Template b. Apply styles c. Apply themes d. Mail merge 2. To return value 10 from a function myfunction, which of the following statements is correct? a. myfunction(10) b. myfunction = 10 c. 10 = myfunction() d. myfunction 10 3. The variable values inserted in the main document from the data source are indicated by ______________. a. Merged fields b. Merged document c. Data d. Main document 4. Databases reduce multiple copies of data. Such multiple copies are called which of the following? a. Redundant values b. Foreign key c. Information d. Queries 5. Rajat has created some labels. He changed the text colour in one of the labels. How can he cascade same changes to all the other labels? a. Styles b. Label templates c. Synchronise content d. Apply to all 6. Graphics styles can be applied using which type of styles? a. List b. Frame c. Paragraph d. Page 7. Ravi has drafted his office annual report. He wants to quickly format the contents and give them a professional, formal look. Which of the following should help him? a. Templates b. Styles c. Themes d. None of these Sample Question Paper 243 Information Technology NSQF Level-2

8. Employee code E00009 has joined the company on 10/10/1990 – in this statement, identify the data. a. Employee code b. Date of joining c. Both a) and b) d. Company 9. If certain values are stored in a collection, then the position of the first value in that collection will be denoted by which of the following? a. 1 b. 0 c. total number of values - 1 d. None of these 10. Which of the following styles affect the formatting of a block of text in a paragraph? a. Character b. Frame c. Paragraph d. Page 11. Contents of the labels are inserted from which of the following? a. Label database b. Label templates c. Data source d. Typed manually 12. Ravi has Science marks of students of class IX and X. He wants to calculate the average marks class-wise. Which of the following is best suited for this? a. Goal seek b. Solver c. Sub-total d. User defined formula 13. Varun has got marks of 500 students of Term1 and Term 2 of class X in separate sheets. He needs to create a third sheet that contains total of Term1 and Term2 of all the students. Which of the following is best suited for this? a. Goal seek b. Sheet linking c. Data consolidation d. Scenario 14. Which of the following is not a “what-if ” analysis tool in a spreadsheet? a. Goal seek b. Sub-total c. Solver d. Scenario 15. Applying a set of values on a data set to analyse changes in the calculations and result is achieved by which of the following tools? a. Goal seek b. Sub-total c. Solver d. Scenario 16. If certain values are stored in a collection, then the position of the last value in that collection will be denoted by which of the following? a. 1 b. 0 c. total number of values – 1 d. None of these 17.Renu wants to apply formatting of a text piece to multiple other text pieces. Which of the following must help her in doing so? a. New style from selection b. Format Painter c. Update selected styled. d. None of these 18.“How many months would it take to pay the loan if monthly instalment paid is increased by 25%?” – this question can be answered most suitably by which of the following tools? a. Goal seek b. Sub-total c. Solver d. Scenario 19. Which of the following is the correct sequence of containership. a. workbook.sheet.cell.range b. workbook.sheet.range.cell c. sheet.workbook.range.cell d. sheet.workbook.cell.range 20. In the statement: for z = 10 to 100, z is which of the following? a. Loop counter b. Variable c. Both a) and b) d. None of these Sample Question Paper 244 Information Technology NSQF Level-2

SAMPLE QUESTION Term 2 Download more question papers from https://www.eduitspl.com/teachers-corner-2 Maximum Marks: 25 Part A: EMPLOYABILITY SKILLS (5 X 1 = 5) 1. What is common among Elon Musk, Bill Gates, Jeff Bezoz & Steve Jobs? a. They all are among the richest businessmen on earth. b. They all belong to global IT industry. c. They all are entrepreneurs. d. They all are technology giants of 21st century. 2. It is difficult to predict if an innovative product will be accepted in the market by the customers. - This fact refers to which of the following qualities of entrepreneurs? a. Innovators b. Risk takers c. Leaders d. Empathetic 3. Planning, organising and controlling - these activities belong to which of the following functions of an entrepreneur? a. Management b. Sales and Promotion c. Finance and commerce d. All of these 4. Which of the Ps of sustainable development refers to the economy of a nation? a. People b. Planet c. Policy d. Profit 5. As an individual, how can we contribute to the sustainable development of our country? a. Following general public rules b. Responsible power consumption c. Contribute to green initiatives d. All of these Part B: SUBJECT SPECIFIC SKILLS (20 X 1 = 20) 1. LIKE 'P*P' refers to which of the following?  a. PPP     b. POP c. PP d. All of these 2. In which of the following calculated fields are saved?  a. Table b. Form c. Both a) and b) d. None of these 3. A passenger is allocated one seat in the flight is which type of relationship? a. One-to-one    b. Many-to-many  c. One-to-many   d. Many-to-one 4. What can we mention in the Field section of Query design view?  a. Field name    b. Formula  c. Both a) and b)   d. Alias name 5. Between 10 and 25 – this will check which of the following range?  a. Between 9 and 24   b. Between 10 and 25  c. Between 11 and 26   d. None of these 6. Which of the following clauses will sort the output in ascending order?  a. Order by price asc b. Order by price c. Both a) and b) d.None of these 7. Where clause can be used with which of the following SQL commands?  a. SELECT    b. UPDATE c. DELETE d. All of these Sample Question Paper 245 Information Technology NSQF Level-2

8. You cannot interact with a control whose ____________________.  a. Enabled = False   b. Visible = True  c. Both a) and b)   d. Input required = No 9. In which of the following views do you see the field properties?  a. Table design view   b. Form design view  c. Query design view   d. Table data view 10. In a flat file system, which of the following is difficult to perform?  a. updates    b. deletes  c. Manage data   d. All of these 11. Anish suffers with hearing impairment, what should he do to deal with system sounds while working on the computer? a. Use filter key feature   b. Turn on visual notification for sounds c. Choose a high contrast theme d. Use visual notifier for system alerts 12. Which of the following features are not the part of making mouse easier to use? a. Change the colour and size of mouse pointer b. Activate a window by hovering mouse over it without having to click it c. Use enter key to click the mouse d. None of these 13. Arjun has several computers in his office. He needs a cost-effective solution for printing the documents. Which of the following solution is best suited? a. Procure printers in bulk.  b. Network the computers and install a printer on one of them making it a file server. c. Network the computers together and install a printer on each computer. d. Network the computers and install a printer on one of them making it a print server. 14. Railway reservation system allows reservation and cancellation of tickets by millions of users at the same time. What kind of network is it? a. Client-server     b. Peer-to-peer c. Both a) and b)   d. Internet 15. For web-based instant messaging, you need which of the following applications? a. Google hangout   b. Skype c. Browser    d. Any of these 16. Having same strong, hard to crack password for all our online accounts helps maintain security and remember just one password easily. This is a/an __________________. a. Good practice    b. Foolish practice c. Efficient way of saving time and effort d. Easy practice 17. First aid can only be given by _______________.  a. An expert   b. Anyone trained in it  c. Nurse     d. Victim 18. During any emergency at workplace, which of the following ensures that everyone knows how to reach to safety easily.  a. Safety drill     b. Company safety policy  c. Emergency evacuation procedure  d. Floor plan 19. Social distancing and mask are effective to prevent which of the following? a. Any likely pandemic b. Spreading of infection of any kind c. Virus d. Bacteria 20. Visiting someone's profile without one's knowledge is a mild form of ________________. a. Cyber-bullying   b. Cyber-attack c. Hacking    d. Blackmailing Sample Question Paper 246 Information Technology NSQF Level-2

WRITER: Shortcut Keys for Moving and Resizing Frames, Graphics and Objects Keyboard Function Shortcut Esc Cursor is inside a text frame and no text is selected: Escape selects the text frame. Text frame is selected: Escape clears the cursor from the text frame. F2 or Enter or any key that produces If a text frame is selected: positions the a character on screen cursor to the end of the text in the text frame. If you press any key that produces Alt+Arrow Keys a character on screen, and the Alt+Ctrl+Arrow Keys document is in edit mode, the character Alt+Ctrl+Shift+Arrow Keys is appended to the text. Ctrl+Tab Move object. Resizes by moving lower right corner. Resizes by moving top left corner. Selects the anchor of an object (in Edit Points mode). Shortcut Keys for Paragraphs and Heading Levels LibreOffice Writer Keyboard Function Shortcut Ctrl+Alt+Up Arrow Move the active paragraph or selected paragraphs up one paragraph. Ctrl+Alt+Down Arrow Move the active paragraph or selected paragraphs down one paragraph. Tab The heading in format \"Heading X\" (X = 1-9) is moved down one level in the outline. Shift+Tab The heading in format \"Heading X\" (X = 2-10) is moved up one level in the outline. Ctrl+Tab At the start of a heading: Inserts a tab stop. Depending on the Window Manager in use, Alt+Tab may be used instead. To change the heading level with the keyboard, first position the cursor in front of the heading. Shortcuts 247 Information Technology NSQF Level-2

Keyboard CALC: Common Keyboard Shortcuts Shortcut Function Ctrl + N Ctrl + O Create a new workbook Ctrl + S Open an existing workbook. Ctrl + Shift + S Save the active workbook. Ctrl + Q Open Save as dialog box. Ctrl + C Quit Calc. Ctrl + X Copy the contents of the selected cells to Clipboard. Ctrl + V Cut the contents of the selected cells to Clipboard. Ctrl + Z Insert the contents of the Clipboard into the selected cell(s). Ctrl + P Undo your last action. Panic button :) Shift + F3 Open the \"Print\" dialog. Ctrl + F5 Cycle case for selected text. Tab Show/Hide Side bar. Autocomplete any function name. Example: Enter = and start typing av, press Ctrl + ` Tab and you will get =average( Toggle between displaying cell values and formulas. Ctrl + F1 Ctrl + Tab Show/hide the Excel Ribbon. Hide the ribbon to view more than 4 rows of data. Ctrl + PgDown Switch to the next open Excel workbook. Ctrl + H Switch to the next worksheet. Press Ctrl+PgUp to switch to the previous sheet. Ctrl + F Display “Find and Replace” dialog box. Ctrl + Home Display the \"Find\" dialog box. Ctrl + End Move to the beginning of a worksheet (A1 cell). Move to the last used cell of the current worksheet, i.e. the lowest row of the F2 rightmost column. Ctrl + Enter Edit the current cell. Ctrl + ; In cell editing mode, enter a new line (carriage return) into a cell. Ctrl + Shift + V Enter the current date. Press Ctrl + Shift + ; to enter the current time. Ctrl + Y Open the \"Paste Special\" dialog when clipboard is not empty. Ctrl + A Repeat (Redo) the last action, if possible. Ctrl + Space Select the entire worksheet. Shift + Space Select the entire column. Select the entire row. Shortcuts 248 Information Technology NSQF Level-2


Like this book? You can publish your book online for free in a few minutes!
Create your own flipbook