0% found this document useful (0 votes)
8 views75 pages

RS - 402 - X - Unit 9 - Presentation

Uploaded by

xrayuniverse.dpy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views75 pages

RS - 402 - X - Unit 9 - Presentation

Uploaded by

xrayuniverse.dpy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 75

Unit 9

Web Applications and Security


Learning Objectives

This Unit Covers:


 Networking Fundamentals
 Working with Accessibility Options
 Introduction to Instant Messaging
 Using Google Hangouts
 Creating and Publishing Web Pages – Blog
 Using Offline Blog Editors
 Online Transactions
 Internet Security
 Maintaining Workplace Safety
 Understanding First Aid and Accidents
 Emergency and Evacuation Plan
 Understanding Hazards
 Healthy Living
Introduction

 A Web application refers to an application, which can be accessed through a


Web browser, such as Internet Explorer or Mozilla Firefox.
 Web applications are those applications that are only accessible using Internet.
 Web applications came into existence to overcome the shortcomings of
desktop applications which can be hosted on all the computers but not on the
network or Internet.
 Web applications are generally hosted in client-server networking
environment.
 The Web applications also help the companies in reaching out to prospective
clients and conducting businesses online.
Session 1: Networking Fundamentals

 The term ‘networking’ represents the processes involved in developing,


designing, implementing, managing and upgrading network technologies.
 A network generally consists of two or more computers which are
interconnected either logically or physically using special software and
hardware.
 Networked computers exchange information and share resources.
 Networked computers generally involve different technologies, protocols and
hardware devices to ensure connectivity and communication.
Session 1: Networking Fundamentals

 Networking provides the following benefits to its users:


Communication

Data sharing

Resource sharing

Internet access sharing

Data security

Performance enhancement
Session 1: Networking Fundamentals

 Despite so many advantages, networking also involves some challenges and


risks as listed below:

Setup Cost

Administration Cost

Undesirable sharing

Undesirable behavior

Data security
Components of Network

 A network usually comprises five basic components – server, client, channels,


operating system and interface.
 Servers are powerful host computers that store data and execute applications.
 Clients are computers connected to the server that use the network and
shared resources.
 Channels are circuits or pathways connecting networks through which
different interconnected computers share the information.
 Network operating system is the operating system software on the server.
 Interface devices connect server and clients.
Components of Network

 The following figure shows a typical example of a network:


Types of Network

 On the basis of geography, networks are classified as follows:


 Local Area Network (LAN): LAN is a localized network. This type of network
is useful when you want to connect two different departments in a
building. The data transfer rate for LAN technologies is up to 1000 Mbps.
LAN is a high-speed and fault-tolerant data network.
The following are the characteristics of LAN:
 LAN helps in resource sharing, for example, data, software and
hardware.
 It transfers data at a high speed.
 LAN’s reach is limited.
 LAN technology is generally less expensive than MAN and WAN.
Types of Network

 Metropolitan Area Network (MAN): MAN is a bigger version of LAN. MAN


covers a larger area than LAN, but smaller than WAN. MAN generally
connects two or more LANs or Campus Area Networks (CANs), for example,
providing Internet services to users in a city. Typically, a MAN covers an
area between 10 km and 100 km.
The following are the characteristics and purpose of MAN:
 MAN covers a larger area than LAN.
 It covers a distance between 10 km and 100 km.
 It operates at a speed of 34 Mbps to 155 Mbps.
 Expensive equipment is required for forming a MAN.
Types of Network

 Wide Area Network (WAN): WAN is a type of network used to cover a


wide geographical area or region. It links different metropolitan cities,
countries and national boundaries. It may be located entirely within a state
or country, or it may be interconnected around the world. The transfer rate
of WAN is up to 155 Mbps or less as it often uses public telephone
networks or leased transmission lines.
The following are the characteristics of WAN:
 WAN exists in an unlimited geographical area.
 It is very susceptible to errors due to the distances involved.
Types of Network

 On the basis of component role, networks are classified as follows:


 Peer-to-peer network: In this
type of network, all the
connected computers are equal.
In other words, each computer
maintains its information and can
serve both as a server as well as a
client whenever required. Such
network is primarily used in small
companies or homes. A peer-to-
peer network can have a
maximum number of 10 peers at
a time.
 A peer-to-peer network is shown
in the given figure.
Types of Network

 Server-based network: This type of network provides greater security and


centralized control where a dedicated server controls all the network
operations. The following figure shows a server-based network:
Types of Network

 Client-based network: This is a more refined server-based network which


employs the processing power of a client workstation to execute some
functions locally and requesting further processing from the server. This
increases the overall processing speed. The following figure shows a client-
based network:
Network Topology

 Network topology
refers to the basic
geometric layout
according to which the
server and clients are
connected via a
channel.
 Different topologies
provide different levels
of access to the clients
through the channel.
 The three most
common network
topologies are bus, ring
and star, as shown in
given figures.
Network Protocols and OSI Model

 Communication and information exchange over a network takes place at different


levels.
 The Open Systems Interconnection (OSI) reference model or the OSI model is used as a
fundamental framework to classify and regulate the processes involved with
communication and message exchange over the network.
 It represents the sequence of processes by which a message is transferred from one
computer to another on a network.
 According to OSI model, the services and functions of a network can be divided into
discrete layers.
 Each layer provides some services to the upper layer.
Network Protocols and OSI Model

 Following figure shows the services and protocol at different layers of the OSI
model:
Internet

 Internet is defined as a worldwide network of computers connected to each


other for sharing information.
 From searching for information to downloading music and videos, sending and
receiving e-mail messages to communicate with friends and conducting
everyday transactions, the Internet has become an integral part of our lives.
 The Internet has evolved as a fast and economically feasible mode of
communication.
 Apart from this, it is one of the best sources of news and latest happenings
around the world, which is being constantly updated in real time.
Working on Internet

 The computers on the Internet are connected to each other with the help of
various small networks. These different small networks are then connected to
the Internet backbone using several gateways.
 Following figure is a diagrammatic representation of the working of the Internet:
Accessing the Internet

 The Internet is a network that can be accessed from anywhere in the world.
 You can subscribe for an Internet connection from an Internet Service Provider (ISP).
 The ISP provides you the settings, such as username and password, which you
need to configure the Internet connection on your computer.
 There are a number of factors that should be considered while choosing an
Internet connection. Few of them are described as follows:
 Bandwidth and Speed: Your Internet connection varies depending on the
purpose for which you want to use the Internet.
 Internet Service Provider (ISP): The ISP you choose should be reliable and
provide immediate help to any Internet connection problem. There are a
number of ISPs, such as MTNL, Airtel, Reliance, etc.
 Cost-effectiveness: You should choose that Internet connection which is
cost-efficient for the desired purpose.
Modem

 Modem is a device which is used to transmit data over a network.


 In a network, while computers are communicating, a computer from the sender’s
side sends the data in binary code to a modem. The modem at the sender’s side
converts the binary-coded data into analog signals. Then these signals travel along
the telephone network. When the data reaches the destination computer, the
modem connected to that computer converts the analog signals back into the
binary-coded data, which can be read by the computer.
 Data transmitted through modem is measured in bits per second (bps). This
measurement gives us the speed of the modem. For example, 256 Kbps, 512
Kbps, 2 Mbps and 8 Mbps.
 There are two types of modems:
 External modem: It refers to the modem that has to be connected to your
computer as well as your telephone line with cables and electric socket.
 Internal modem: It is the modem which is built inside your computer.
Different Ways of Connecting to Internet

 There are two main ways of connecting to the Internet, that is, wired and wireless.
 Wired Internet connections are:
 Dial-up Connection
 Broadband Connection
 Leased Line
 Wireless Internet connections are:
 Wireless Fidelity (Wi-Fi)
 Worldwide Interoperability for Microwave Access (WiMAX)
 3G
 4G
 4.5G
 5G
WWW

 World Wide Web (WWW), also known as Web in short, was developed by Tim
Berners-Lee of the European Laboratory for Particle Physics (CERN) in
Switzerland.
 WWW represents an information space where documents and other web
resources reside.
 These documents are connected by hyperlinks and can be accessed by URIs
using Internet.
 WWW makes up a large part of the Internet and consists of websites that have
one or more Web pages.
Session 2: Working with Accessibility Options

 The ease of using computer due to hardware/software or their combination by the


impaired people is known as computer accessibility.
 Windows 10 generally provides some common accessibility features which can be
categorized as:
 Accessibility features for visually impaired users: People with limited eyesight can
benefit from features like text-to-speech, enlarged cursor and high-contrast
themes.
 Accessibility features for low-hearing or deaf users: Features like closed-
captioning help in visually conveying the information to deaf users. Mono audio
systems can equally transmit left and right audio signals to both the earbuds so
that people with limited hearing do not miss any part of the audio.
 Accessibility features for limited mobility users: Keyboard shortcuts and sticky
keys help people with limited mobility in effectively using the computer.
 The Accessibility features of Windows 10 are available via Ease of Access Center.
SerialKeys

 SerialKeys is an accessibility feature that allows users to control the computer


without using a keyboard and mouse.
 This accessibility feature helps those users who face challenges in using
keyboard and mouse.
 This accessibility feature uses an input device called Sip-and-Puff for providing
input and controlling the computer.
 Sip-and-Puff is a mouth-operated input device with one switch that can
control two devices.
 For using the Sip-and-Puff device, you need to insert the straw or tube of the
device in your mouth. By sipping (inhaling) the tube of the device, you can use
one device and by puffing (exhaling), you can use another device.
 This device works only when you sip or puff; otherwise, it will go off.
Session 3: Introduction to Instant Messaging

 Instant messaging refers to the real-time, text-based communication between


people over the internet using instant messaging software.
 In case of instant messaging, a text message instantly appears on the screen of
the receiver as soon as it is sent by the sender, hence the name.
 With instant messaging, people can share digital data in the form of text, video or
audio. People can instantly engage with multiple users on a network.
 The various types of instant messaging app are as follows:
 Google Hangouts
 Adium
 Spark
 Jabber
 Yahoo messenger
 Skype
How Instant Messaging Work?

 For using instant messaging services, users need to install an instant messaging
software application. The software program enables a computer with an IM
client to use instant messaging features.
 The user has to register on the IM client (IM software) with a unique password
and username combination.
 Once a user logs in with the correct
credentials, the connection
information such as port number and
IP address of the user are sent to the
IM server.
 The server checks the list of contacts
of the client to see if any of them is
also logged in and available for
communication. Following figure
shows an instant messaging model.
How Instant Messaging Work?

 In case the server finds an online connection, it sends the information back to the
client. Also, the server sends the information about the client to the online contact.
 The information exchange allows both the users to communicate with each
other either directly or via server.
 In most cases, IM systems work in client-server architecture for sending and
receiving messages and other IM operations. In this case, all the messages
exchanged between users are directed via the server. The IM server appears a
single entity to a connected client but it can be a group of servers operated by
the service provider or collective servers from independent service providers.
In this model, when a user wants to communicate with another user, both
must connect to the same IM service using their credentials.
 Some IM systems employ the peer-to-peer architecture, wherein they can
directly share content or transfer files without the intervention of a central
server. This architecture does not involve any file storage requirements. The
network architecture only uses client’s bandwidth to transfer files.
Instant Messaging Architecture

 Peer-to-peer architecture is more scalable and cost-effective as compared to


client-server architecture in case of instant messaging system.
 Instant messaging protocols are used by the IM clients and server for
communicating with each other. These protocols include Extensible Messaging
and Presence Protocol (XMPP) and Session Initiation Protocol for Instant
Messaging and Presence Leveraging Extensions (SIMPLE).
Instant Messaging Authentication

 To ensure security, IM systems follow strict authentication. Authentication


refers to the process of confirming and verifying the claimed identity of a user
requesting connection to the IM system. Authentication serves as a security
mechanism to provide authorized access to the system. Furthermore, users
are granted appropriate permission for using specific IM system resources. The
following figure depicts the authentication process followed by an IM system:
Instant Messaging Applications in Business

 Instant messaging provides notable benefits by offering a flexible mode of


real-time communication in various sectors, such as business, education and
social networking.
 Some applications of instant messaging are as follow:
 Voice over IP or VoIP Services: This service enables instant messaging
users to talk to each other verbally by transmitting voice messages through
the internet.
 Conferencing: Modern instant messaging software allows more than two
people to talk to each other at a time, thereby providing a new mode of
meeting over chat.
 Video Calls: People can talk to one another through real-time videos using
instant messaging software.
Instant Messaging Applications in Business

 Video Conferencing: More than two people can participate on a video call
in video conferencing. This helps in conducting meetings or learning
sessions face-to-face even when the participants are physically present at
different places.
 Job Outsourcing: Employers can find and employ overseas employees
easily since instant messaging provides a safe, quick and cost-effective
mode of instant communication with the remote employees.
Rules and Etiquettes Followed while Chatting

 Some rules and etiquettes that need to be followed by anyone during chatting
are as follows:
 Begin chatting with formal greetings.
 Ensure that the message should be short and the idea is conveyed.
 Ensure to match the communication style of the receivers, else the
receivers will lose their interest in chatting.
 Give recipients time to respond.
 Know about the abbreviation and shortcut used in chatting such as COS is
used for ‘because’ and KIT is used for ‘keep in touch’.
 Do not chat with strangers.
 Be attentive during chatting with multiple persons lest you might miss
some important information.
 Ensure that the person with whom you want to chat is not busy.
 End chatting with a closing message.
Session 4: Using Google Hangouts

 Google Talk was the iconic instant


messenger software of Google which has
been used to share text and voice. This
iconic messenger software was
discontinued by Google in June 2017 to be
replaced by a revolutionary instant
messenger software called Google
Hangouts. It is available as a
communication app in Gmail and can be
used for conversations, discussions and
sharing Google Drive documents. With
Hangouts, you can easily chat with your
friends or share media documents right
from your Gmail account on your
computer system or mobile device.
Session 5: Creating and Publishing Web Pages – Blog

 A blog is a website or part of a website containing the thoughts and ideas of a


user. It is written in the form of an online journal containing a continuous
commentary on a specific subject.
 Generally, blogs contain textual information, but you can also share your
photographs, videos and artworks with other users.
 The blogs can be of various
types, some of which are as
follows:
 Personal Blogs
 Corporate and
Organizational Blogs
 Genre Blogs
The given figure shows a
WordPress.
Session 6: Using Offline Blog Editors

 Blogs are very popular these days among people who want to share their ideas
with others on the Internet.
 You can easily start a blog or host your web pages by following some simple
steps listed as follows:
1. Select a Blogging Platform
2. Carefully Select Your Hosting
3. Register the Hosting and Domain Name
4. Setting Up the Blog Editor
5. Adding Posts or Pages
 Some commonly used offline blog editors used for editing blogs on Windows
operating system are as follows:
 Qumana  BlogJet (Windows)
 Windows Live Writer (Windows)
Reasons for Using an Offline Blog Editor

 Blogs are very popular these days among people who want to share their ideas
with others on the Internet.
 You can easily start a blog or host your web pages by following some simple
steps listed as follows:
1. Select a Blogging Platform
2. Carefully Select Your Hosting
3. Register the Hosting and Domain Name
4. Setting Up the Blog Editor
5. Adding Posts or Pages
Session 7: E-commerce

 E-commerce simply means using an electronic mode, such as the Internet, to


sell, and buy products or services.
 Business transactions are often conducted through the Internet, and many
organizations have adopted this mode to expand their market share.
 E-commerce saves time and effort of both the buyers and the sellers while
making a transaction.
 The factors that have contributed to the popularity and success of e-
commerce are listed as follows:
 Allows organizations to manage and conduct their business transactions
easily and efficiently
 Provides maximum customer satisfaction as the transactions are
completed in a short time
 Enables organizations to achieve a competitive edge in the market by
providing products at economical prices quickly
Session 7: E-commerce

 Allows customers to access products and services of an organization


anytime and anywhere by using the Internet
 Provides better trading opportunities to small merchants as well as other
parties, such as suppliers, wholesalers and retailers, as they can have their
own Web stores on the Internet to trade online
 Opens new opportunities for earnings and revenue generation even for
consumers who can also sell products to other consumers without
maintaining an inventory of their own
 Helps organizations to improve the quality of their products and services
based on the feedback received from their online customers
Session 8: Online Transactions

 Have you ever done online shopping?


 Have you ever paid your bills using a mobile app?
 Both of these are examples of online transactions. In this manner, online
transactions cover any monetary transactions made from a computer system
or mobile.
 Online transactions help you in transferring funds easily to other accounts for
making a payment.
 You can view all the recent transactions made online and can also get a
printout of your bank account statement.
 You get a 24-hour access to your bank account with online transactions,
popularly known as internet banking or online banking.
 You can control your online transactions from nearly anywhere, irrespective of
your physical location.
Actors in an Online Transaction

 An online transaction involves many participants, which include the merchant,


the customer and the technology.
 The merchant must have a merchant account to accept payments on his
behalf.
 The customer requires a bank-approved credit card or debit card.
 Technology enables the transaction between the merchant and the customer.
 Technology involves a payment gateway software that establishes a link
between the shopping cart of a merchant website and the processing
network.
 It also involves a payment processor to move the transaction through the
payment processing network, send a billing statement to the customer and
work with the bank account.
How Does An Online Transaction Work?

 You get two options to pay for the goods purchased online with your debit card – to
make an offline payment via credit card processing or to make an online payment via
electronic funds transfer.
 In an online transaction, the transfer of funds is completed via an EFT network to
which your bank is associated.
 Payment processing takes place in two stages which include authorization for
payment approval and settlement to transfer money to the receiver’s account.
Authorization process involves the following steps:
1. A customer purchases an item on a website using a debit card or credit card.
2. The payment information is received by the payment gateway which encrypts the
received data to ensure privacy and forwards the same to the payment
processing system.
3. The payment processor sends a payment request to the issuing bank of the
customer to ensure the customer has enough credit in his account to pay for the
bills.
How Does An Online Transaction Work?

4. The issuing bank responds with an approval or a denial accordingly.


5. The payment processor forwards the answer back to you confirming
the approval of sale and informs the bank of the merchant to credit
your account.
 The entire authorization process executes in a few seconds. After
authorization, settlement process involves the following steps:
1. The issuing bank of the cardholder transfers funds to the bank of the
merchant which deposits the amount in the merchant’s bank account.
2. Funds are available to the merchant and you are notified with a credit
account confirmation message.
Online Transaction Pricing Model

 All the online transactions follow a pricing model according to which all the participants
receive some share as a fee.
 In other words, a small percentage of the transaction amount is received by the following:
 The issuer (as an interchange fee)
 The credit card association (as an assessment fee)
 The merchant’s bank account (as a transaction processing fee)
 The payment processor (as an authorization fee)
 The pricing structures are categorized as follows:
 Flat-rate pricing, where you pay a fixed percentage for every transaction, irrespective
of the actual transaction cost.
 Interchange plus pricing, where the merchant charges a fixed fee for every
interchange.
 Tiered pricing, where the processor takes different interchange rates classified into
three buckets, namely qualified, non-qualified and mid-qualified.
Secure Password

 Passwords are very important because they protect your computer,


smartphones, tablets and personal information from unauthorized access.
 The password you use should always be strong and secure because weak
passwords can easily be cracked by hackers.
 Hence, it is necessary to know how to create a strong password to ensure the
security of your important and sensitive data from hackers and malicious
software.
 Some tips to manage a secure and strong password are as follows:
 Ensure that the length of the password should at least be 8 characters.
 Ensure that the password should be created with a combination of
uppercase, lowercase, numbers, and symbols.
 Do not share the username and password with anyone.
Secure Password

 Do not write the username and password on the notebook and papers.
 Ensure that the password should not be included in the password
dictionaries.
 Uses the random password generators available online to create a secure or
strong password.
 Update the password within 6 months.
 Ensure that the password you create does not match the past used password.
 Ensure that the password will not the bike number, mobile number, pet
name, favorite colour, childhood name, etc.
 Ensure that the different passwords are used for different portals and
websites.
 Use Two-Factor Authentication (2FA) at the time of resetting the password.
Session 9: Internet Security

 Internet was established to be an open, loosely connected network of


computers to enable exchange of information and ideas. The data, internet
transactions and communication over the web involve exchange of critical data
over an insecure medium. Therefore, internet security is paramount.
 Internet security is extremely important for government agencies and business
organizations to protect confidential details and critical financial data.
 The term ‘internet security’ includes browser security, authentication, data
protection and security of data submitted via web forms.
 Various encryption mechanisms such as Pretty Good Privacy (PGP) are used to
ensure secure data transfer over the internet.
 Resources such as Firewalls block unwanted traffic. Anti-virus, anti-malware and
anti-spyware programs monitor and screen attachments for malwares or
malicious data.
Potential Threats

 Various security issues concern Internet users all over the world.
 The threats can be either undirected, which implies that they do not
personally target your computer but may still affect its performance. For
example, computer viruses and phishing emails are examples of undirected
threats. You can protect yourself from such threats by implementing general
security and ensuring secure browsing.
 You may encounter some directed threats that personally target your
computer system or organization.
 Attackers use different techniques for directed threats which combine
sophisticated tools with software engineering. You may counter such attacks
by implementing basic security such as password protection and screen locks
whenever you leave your computer unattended.
Potential Threats

 Other circumstances that may potentially harm your system include:


 Malicious software
 Denial-of-Service Attack
 Phishing
 Application Vulnerability
 Hacking
 Password Cracking
 Spoofing
Defence against Cybercrime

 A netizen should keep in mind the following points:


 Avoid disclosing any personal information as it amounts to disclosing your
identity to strangers in a public place.
 Avoid sharing photographs and personal information on social networking
sites.
 Use the updated antivirus software to protect the system against virus
attacks.
 Keep back up volumes so that one may not suffer data loss in case of virus
attacks.
 Never reveal your credit card number to an insecure website, look for
Secured Socket Layer and https//:
 Keep a watch on the sites that your children access to prevent any kind of
harassment.
 Check carefully the e-mail messages before responding to them. There
might be phishing e-mails in your account.
Defence against Cybercrime

 Create strong passwords for log-in accounts on websites.


 Use the authentic websites to buy things and make financial transactions.
 Set privacy settings on your social media accounts so that only known
persons can view your information.
 Check the profile of unknown persons before accepting any friend request
from them on the social networking sites.
 Advance Persistent Threat (APT) infections.
 Adhere to the 5P mantra of online security:
 Precaution
 Prevention
 Protection
 Preservation
 Perseverance
Resolving Internet Security Issues

 Computer users can effectively protect themselves from common security


threats by using antivirus software, frequently backing up data and
implementing measures to minimize risks of virus transmission.
 Users must protect their data with strong passwords and prevent identity
thefts by sharing data only on secure websites and platforms.
 Computer users must adopt various security services via authentication,
authorization, data integrity, access control, data confidentiality, DoS
mitigation and auditing or logging.
Resolving Internet Security Issues

 Some remedies for resolving internet security threats that may affect a
computer system are as follows:
 Encryption: In this method data is encoded in a manner so that it can only
be read by an authorized user. Encryption uses different algorithms at its
core to generate ciphertext (encoded text) which can be read only after
decryption.
 Digital Signature: The digital signatures help in authenticating the content
by verifying the author, signature date and signature time.
 Firewall: A firewall serves as a barrier between the internet and LAN. It
helps in minimizing the security risks by maintaining the confidentiality of
the private resources.
Resolving Internet Security Issues

 Antivirus Software: These are security programs for protecting a


programmable device from security threats that work by detecting and
eliminating malware and viruses.
 Password Manager: These software programs help in storing and
organizing passwords. The passwords are stored in an encrypted format.
The user must have a strong master password to access password
database.
 Security Suits: These contain a collection of antivirus, firewalls and anti-
spyware. They offer elaborated protection against theft and facilitate
private internet browsing. They also provide other benefits, like safety
check of portable storage devices, cloud anti-spam and file shredder.
Clearing Cookies and Data from Browser

 A cookie is a file that contains small textual information about the activity of a
user over the Internet.
 The unauthorized user can easily access the information stored in a cookie by
tracking them.
 Hence, you need to clear the cookies from the browser to prevent any
unauthorized access from them.
 Beside cookies, Web browser also saves the user id/username and password
of a user when he/she fills the form at the time of registering and logging into
a portal and websites.
Clearing Cookies and Data from Browser

 The steps to clear cookies and data from the Web browser are as follows
1. Launch the Microsoft Edge Web browser.
2. Click the Settings and more icon on the Web browser window. A drop-
down list appears.
3. Select the History  Clear browsing data option from the drop-down list.
The Clear browsing data dialog box appears.
4. Select the desired check boxes to remove data from the Web browser.
5. Click the Clear now button in the Clear browsing data dialog box.
Temporary Internet files, cookies, history, form data, password, etc., get
deleted from the Web browser.
Use Antivirus Software

 Antivirus software is used to identify, prevent and take action against malicious
programs, such as viruses and worms, by deactivating or deleting them.
 Antivirus software protects your computer from virus attacks by:
 Scanning e-mail messages and their attachments
 Scanning and monitoring files and folders to ensure that they are not
infected
 Scanning your computer’s files on a regular basis
 You can easily purchase antivirus software from the market or download a free
version of an antivirus program from its company’s website.
 Some popular antivirus software applications are Norton Antivirus, McAfee,
Quick Heal Antivirus, Kaspersky Antivirus, etc.
Take Data Backup

 Taking regular backup ensures that your computer data is protected and can
be recovered in the following circumstances:
 Hardware Failure
 Accidental Deletion or Modification of Data
 Restoration of the Old Version of a File
 Unauthorized Deletion or Modification of Data
 You can use different types of storage devices to take the backup of your data.
These include the following:
 CD
 Digital Versatile Disc (DVD)
 External hard disk
 USB drive
 Online backup and storage services
Session 10: Maintaining Workplace Safety

 Health and safety of employees at the workplace play an important role in the
overall effectiveness of an organization.
 To minimize employees’ exposure to risk, organizations usually put certain
processes or systems in place, for instance, using protective gear and other
safety equipment where necessary.
 It is the responsibility of both the organization and its employees to follow the
system in place and ensure a risk-free work environment for all.
 Essentially, a healthy and safe workplace is a decisive factor for enhanced
employee productivity.
Fire Safety Rules

 Some fire safety rules followed at workplace are as follows:


 Ensure that the fire detection system and fire safety alarms are properly
installed in the organization.
 Ensure that all the employees or workers know where the fire
extinguishers are placed in the organization.
 Ensure that all the employees or workers know about the fire escape plan.
 Ensure the maintenance of fire safety tools and equipment.
 Provide training to employees and workers on how to deal and treat in a
fire emergency.
 Ensure the fire safety signs are clearly visible and placed in many places in
the organization.
 Press the alarm button in case of fire and convey the message about the
fire to other employees in the organization.
Falls, Slips, Trips Safety Rules

 Some falls and slips safety rules followed at the workplace are as follows:
 Ensure that the footwear and shoes you wear are suitable and appropriate
for the workplace.
 Ensure that the floor surface is clean from any type of spillages.
 Ensure that the floor surface is not damaged at the workplace.
 Ensure that the floor is clean and dry.
 Ensure that the cupboard, file cabinet, and desk drawers are properly
closed when they are not in use.
 Ensure that the cables and wires in the walkways are covered.
 Ensure that walkways and halls are free from any type of garbage and
obstacles.
 Ensure that proper lighting is available at the workplace.
 Ensure that the walkways are clear during the movement of large items.
Electrical Safety Rules

 Some electrical safety rules followed at the workplace are as follows:


 Ensure that the power supply is disconnected from the electrical
equipment or device while repairing.
 Ensure that the hands, feet, and body are not wet while handling the
electrical equipment.
 Wear protective gloves, clothes and shoes, if needed.
 Ensure that multiple power cords are not plugged together.
 Ensure the outlets are not overloaded.
 Repair the faulty or broken cables at the workplace.
 Ensure that the equipment and tools used for resolving electricity
problems are properly working.
 Ensure that the electrical equipment used in an organization is approved
on the standard set by the government.
Session 11: Understanding First Aid

 First aid is the initial aid given to an injured or sick person to save his/her life
before the arrival of medical assistance.
 The main purpose of first aid is to provide immediate relief to the patient until
medical assistance arrives.
 The Do’s that must be followed while providing first aid are as follows:
 Assure victim of immediate help.
 Use direct pressure to stop bleeding.
 Keep an eye on victim’s condition.
 Raise head of the victim if bleeding is in the upper body.
 Raise feet of the victim if bleeding is in the lower body.
 Wash burns and wounds with sterile wipes.
Session 11: Understanding First Aid

 The Don’ts that must be followed while providing first aid are as follows:
 Do not move the victim if it is not required.
 Do not apply a tourniquet.
 Do not set fractures, if any (that is, keep victim still).
 Do not use any burn ointment unless told by a physician or qualified first
aider.
 Do not clean the wound with a cloth.
Session 12: Accidents

 An accident is defined as an unfortunate event that happens unpredictably as


well as nintentionally and may lead to harm and injury to people.
 Some common types of accident at workplace are as follows:
 Slip, trip and fall  Burn Injuries
 Moving, lifting, pushing heavy  Electrocutions
objects  Violence at workplace
 Hit by falling objects  Vehicle-based accident
 Leakage of Toxics  Faulty and unhealthy machinery
 Struck by objects in walkway
 Repetitive Strain Injuries
 Falling from a height
Handling Accidents at Workplace

 Some rules and guidelines followed for handling accidents at the workplace
are as follows:
 Provide first aid to the victim during an accident.
 Report about the accident to the superior or manager.
 Follow the standard operating procedure (SOP) designed by the
organization for handling accidents.
 Ensure that sufficient safety equipment is available at the workplace to
avoid accidents.
 Call the doctor or medical team immediately in the wake of an accident.
 Follow emergency drills set by the organization during an emergency.
Session 14: Emergency

 An emergency is defined as an unforeseen situation that requires immediate


attention and action to prevent risk of health, life, wealth, or atmosphere.
 There are various types of emergencies at workplace, which are as follows:
 Fire  Chemical spills
 Earthquake  Civil riots
 Explosion  Workplace violence and
 Floods harassment
 Storm/Cyclone  Severe weather
 Radiological accidents  Terrorism
 Transmissible illness
Session 15: Emergency and Evacuation Plan

 An emergency plan is a set of rules and instructions that describes the course
of action employees must take when an emergency arise at the workplace.
 An evacuation plan provides a set of procedures to be used by the occupants
of a building in an emergency.
 General training for employees on emergency and evacuation plans should
address the following:
 Roles and responsibilities of an individual
 Possible threats and hazards and their consequences as well as the plan of
action to prevent them
 The process for warning and communicating others about an emergency
 The process how to respond in an emergency situation
 The place where the emergency equipment is placed and its usage
Session 15: Emergency and Evacuation Plan

 Safe places at the workplace


 The procedure on how to shut down the plant and machinery in an
emergency
 Symbols used in emergency and evacuation plans
 Emergency escape procedures and route assignments
 Names, designations, contact numbers and departments of concerned
persons
 The evacuation policy and procedure
Session 16: Understanding Hazards

 Hazard is defined as a potential source that causes harm to an individual. In an


organization, there are several types of hazards that may harm the life and
health of an employee or worker.
 Some common types of hazards at workplace are as follows:
 Physical Hazard: Refers to the hazard that could harm an individual with or
without making a physical contact. The common sources of physical
hazards are slippery floors, excessive noise, poor lighting, fire, fall, etc.
 Ergonomic Hazard: Refers to the hazard in which the working condition
and environment, body posture, and type of work, etc., put the strain on
the body of an employee. The common sources of ergonomic hazards are
bad sitting posture, repetitive and awkward movement, stretching the
body, lifting heavy objects, etc.
Session 16: Understanding Hazards

 Psychological Hazard: Refers to the hazard that affects or harms the


employee mentally. The common sources of psychological hazards are
extra workload, working shift, harassment, violence at workplace, work
stress, partial judgement of seniors, lack of respect, continuous low-level
noise, etc.
 Biological Hazard: Refers to the hazard that includes viruses, bacteria,
insects, animal and bird droppings, etc., which can cause an adverse
impact on the health of employee. Common sources of biological hazards
are mildew, blood, harmful plants, bodily fluids, sewage, dust, insect bites,
etc.
 Chemical Hazard: Refers to the hazard that harms employees when they
prepare a chemical or deal with any form of chemical, such as solid, liquid,
and gas. The sources of chemical hazard are paints, acids, solvents, vapors,
fumes, varnishes, gases, flammable materials, pesticides, etc.
Session 16: Understanding Hazards

 Safety Hazard: Refers to the hazard that creates an unsafe working


atmosphere. The sources of safety hazards are unguarded machinery, loose
or frayed carpets, hanging cables, faulty cables, unsafe and malfunctioning
equipment, etc.
Session 17: Healthy Living

 A healthy lifestyle helps an individual to maintain and improve his/her health


and happiness.
 He/she can do a lot of things to live a healthy lifestyle, such as eating a healthy
diet, doing regular exercise, and handling stress efficiently.
 The healthy lifestyle of an individual makes a healthy environment at home as
well as at work place.
 Happy and healthy employees always do their best at the workplace.
 Our health balance is often disturbed by trying to complete so many tasks at
once during the whole day.
Session 17: Healthy Living

 Some tips for living a healthy life are as follows:


 Eat healthy food
 Maintain smoke free environment
 Do physical exercise
 Do not sit on chair for long
 Take quality sleep
 Drink sufficient amounts of water
 Manage stress
 Be hygienic
 Clean the workstation
 Take breaks during work
 Maintain good posture
Thank You

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy