Class 10th unit-4 WORKING WITH ACCESSIBILITY OPTION

WORKING WITH ACCESSIBILITY OPTIONS

 

Computer Accessibility refers to the user friendliness of a computer system for all, regardless of their disability. This is mainly a software issue. However, when a combination of hardware and software, it enables a person with a disability or impairment to use a computer. It is known as Assistive Technology. 


Types of impairment

   Cognitive impairments and learning disabilities, such as dyslexia, attention

deficit-hyperactivity disorder (ADHD) or autism.

 

  Visual impairment such as low-vision, complete or partial blindness, and color blindness.

  Hearing impairment including deafness.

 

  Motor or dexterity impairment such as paralysis, cerebral palsy, or carpal tunnel

syndrome and repetitive strain injury.

 

 

KEYBOARD TAB

 

1. Sticky Keys

StickyKeys is an accessibility feature to help computer users with physical disabilities, but it is also used by others as a means to reduce repetitive strain.

2.  FilterKeys

FilterKeys is a feature of Microsoft Windows. It is an accessibility function that tells the keyboard to ignore brief or repeated keystrokes, making typing easier for people with hand tremors.

3.  ToggleKeys


ToggleKeys is also a feature of Microsoft Windows. It is an accessibility function which is designed for people who have vision impairment or cognitive disabilities. When ToggleKeys is turned on, computer emits sound cues when the locking keys (Caps Lock, Num Lock, or Scroll Lock) are pressed. A high sound is emitted when the keys are switched on and a low sound is emitted when they are switched off.

 

 

4.  SoundSentry

SoundSentry is designed to help users with auditory impairments. SoundSentry generates visual warnings, such as a blinking title bar or a flashing border, whenever the computer generates a sound.

 

 

5. SerialKeys

 

SerialKeys is an accessibility feature that assists people that have difficulty using a keyboard or a mouse (or both). They can use special devices such as Sip, Puff and Breath Switches to provide input to the computer through Serial Ports.

 

 

NETWORKING FUNDAMENTALS:-

 

A computer network is a collection of computers and other hardware components interconnected by communication channels (cables or satellites) that allow sharing of resources and information.

Network Architecture

 

1.  PEER-TO-PEER (P2P) ARCHITECTURE:

Networks in which all computers have an equal status are called peer to peer networks. Generally in such a network each terminal has an equally competent CPU.


2.   CLIENT-SERVER ARCHITECTURE:

Networks in which certain computers have special dedicated tasks, providing services to other computers (in the network) are called client server networks. The computer(s) which provide services are called servers and the ones that use these services are called clients.

 

 

advantages of networking

                Data Sharing: One of the most important uses of networking is to allow the sharing of data.

•Files transfer : Users can send text files, spread sheets, documents, presentations, audio files,

video files, etc. to other users.

 

•Hardware Sharing: Hardware components such as printers, scanners, etc. can also be shared. For example, instead of purchasing 10 printers for each user, one printer can be purchased and shared

among multiple users thus saving cost.

 

•Internet Access Sharing: You can purchase a single Internet connection and share it among other computers in a network instead of purchasing multiple Internet connection for each computer. This is very commonly found in Internet café (browsing centres), schools, colleges, companies, etc.

                Usage of network based applications: Such as web browsers, email clients, chat application, audio & video calling, etc. is another advantage.

 

 

TYPES OF NETWORKS:-


There are two major types of network Local Area Network (LAN) and Wide Area Network (WAN).

1.     LOCAL AREA NETWORK

A local area network (LAN) is one which connects computers and devices in a limited geographical area such as home, school, computer laboratory, office building, or closely positioned group of buildings.Usually local area networks offer very high speeds and are used for connecting computers and peripherals such as printers, scanners, etc.

2.  WIDE AREA NETWORK

A wide area network (WAN) is one which covers a broad area (i.e., any network that links across metropolitan, regional, or national boundaries). The Internet is the most popular WAN, and is used by businesses, governments, non-profit organizations, individual consumers, artists, entertainers, and many others.

INTERNET:-

 

The Internet is a global system of interconnected computer networks that use the standard Internet protocol suite to serve billions of users worldwide. It is a network of networks that consists of millions of private, public, academic, business, and government networks.Internet is one of the most useful technologies of modern times which help us in our daily, personal and professional life. Internet is widely used by students, educational institutes; scientist and professionals to gather information for research and general information.

WORLD WIDE WEB:-

 

World Wide Web (abbreviated as WWW or W3, commonly known as the Web), is a system of interlinked hypertext documents accessed via the Internet. With a web browser, one can view web pages that may contain text, images, videos, and other multimedia, and navigate between them via hyperlinks.


Information is stored on web servers referred to as web pages are retrieved by using a web browser such as Firefox on the local computer.

 

 

Web Browser :- is a software used to view Web sites and acts as an interface between the user and the World Wide Web. A Web server is a computer that stores web sites and their related files for viewing on the Internet.

 

 

INTERNET SERVICE PROVIDER:-

 

An Internet service provider (ISP) is an organization which provides you with access to the Internet via a dial-up (using modem) or direct (hard wired) or wireless connection.

MODEM

 

Á modem is a device that converts digital computer signals into a form (analog signals) that can travel over phone lines. It also re-converts the analog signals back into digital signals. The word modem is derived from its function MOdulator/DEModulator.

TYPES OF COMMON INTERNET CONNECTIVITY

 

There are different types of Internet Connectivity available today; it can be widely categorized into wired and wireless access.


 

 

 

 

 

DSL: Digital subscriber line(DSL) provide Internet access by transmitting digital data over wires of a local telephone network

 

 

WiMAX: WiMAX (Worldwide Interoperability for Microwave Access) is a wireless communications standard designed to provide mobile broadband connectivity across cities and countries through a variety of devices. WiMAX is a long range system, covering many kilometres and is typically used

 

 

WI-Fi: Wi-Fi is a popular technology that allows an electronic device such as computers or mobile phones to exchange data wirelessly over a network, including high-speed Internet connections. Wi-Fi devices such as personal computer, smartphones, video game console, etc. can connect to a network resource such as Internet through a device called the Wireless Access Point (WAP). Wi-Fi is used where cables cannot be run (such as old buildings, outdoor areas) to provide network and Internet access. Wi-Fi can also be used where users require mobile connectivity.Wi-Fi connectivity is used in home & offices, hotels,


college & school campus typically for Internet Access. Shopping malls, coffee shops, resorts mostly offer free or paid Wi-Fi access to the Internet for their customers.

 

 

DATA TRANSFER ON THE INTERNET:-

 

  Each packet is sent from computer to computer until it finds its destination.

 

  At the destination, the packets are examined. If any packets are missing or damaged, a message

is sent asking for them to be re-sent. This continues until all packets have been received intact.

  The packets are now reassembled into their original form. All this done in seconds!


Instant messaging (IM):-

 

Instant messaging (IM) is a form of communication over the Internet that offers an instantaneous transmission of text-based messages from sender to receiver. Most instant messaging software include the option for performing file transfers, audio chat, video calling and conferencing, sharing desktops, etc. apart from standard text chat. Instant messaging software is widely used for personal and commercial use.

Key Features of an instant messaging

 

  Text Messages can be sent to one or more person (Similar to SMS)

  Audio calling and conferencing.

  Video calling and conferencing.

 

  File transfers (Not limited to documents, spread sheets, audio files, video files,

etc.)

  Message history (Save messages for future reference).

 

INSTANT MESSAGING SERVICES

 

There are two kinds of instant messaging software – application based and Web based.

  Application based instant messaging software is downloaded and installed on

user’s computer. Some of the popular instant messaging software are:

  Google Talk

  Yahoo! Messenger

  Skype

  Windows Live Messenger

  Rediff Bol, etc.


  Web based instant messaging software is accessed using browsers such as Internet

Explorer, Mozilla Firefox, Google Chrome, etc. Some of the popular web based instant messaging

software are:

  Meebo

 

  Yahoo! Messenger for the Web

 

  MSN Web Messenger

  IMO, etc.

 

 

CREATING AND PUBLISHING WEB PAGES BLOG:-

 

A blog is a discussion style site used by non-technical (or technical users) users for creating personal web pages. Blogs are similar to an online personal diary and simple to use.You can use a blog to convey messages about events, announcements, news, reviews, etc. Blogs are usually managed using a web browser and this requires active internet connection. You can also use offline blog software to create content first and later publish the content when an active internet connection is available.

There are hundreds of websites that offer blog service for free. Some of the popular blogs include:

  www.WordPress.com

  www.blogger.com

  www.blog.com

  www.weebly.com


  www.blogsome.com

 

 

 

USING OFFLINE BLOG EDITORS

 

If you do not have an active internet connection, you can create blogs using a blog application and publish the blog whenever internet connectivity is available.

There are several free offline blog editors available that can be downloaded and installed on the

local computer such as:

  Qumana

 

  Windows Live Writer

  Blogdesk

 

ONLINE TRANSACTIONS:-

 

Online shopping is a form of electronic commerce where customers can buy or sell goods over the Internet. Customers need to have an active internet connection for viewing goods or services offered by a seller; customers can pay online using a credit, debit card or by internet banking.

Online shopping could be useful in situations when:

 

  A customer does not have sufficient time to visit stores.

 

  Visiting a store is more expensive than purchasing a product online.

  A product or service that is not available in the local market is available online.

Some of the popular online transaction websites are:

 

  IRCTC, an online portal for booking flight and train tickets.


  Flipkart, an online shopping portal for buying consumer products.

  EBay, an online portal for buying and selling goods.

  Redbus, an online portal for booking bus tickets.

INTERNET SECURITY:-

 

Internet security is a branch of computer security specifically related to the Internet, often involving browser security but also network security. The Internet represents an insecure channel for exchanging information leading to a high risk of intrusion or fraud, such as phishing. Online threats such as Phishing, email spoofing, chat spoofing, etc. can increase the chances of users getting compromised.

Best Practices for Security:-

 

1.   strong passwords.

  Keep the length of the password at least 12-14 characters if permitted.

Avoid keeping passwords based on repetition, dictionary words, letter or number sequences, usernames, relative or pet names, etc.

  Including numbers, and symbols in passwords if allowed.

  Use capital and lower-case letters.

  Avoid using the same password for multiple sites or purposes.

 

  Avoid using something that the public or workmates know you strongly like or

dislike.

  Use random password generators if possible.

2.  Secure transactions:


3.Install firewalls: Firewalls could be software or hardware and can assist in keeping a computer and a network secure. Firewalls analyze the network traffic and determine if the traffic should be

allowed or not. In most cases, operating systems such as Linux, Windows or Mac include firewall

software as a part of operating system thus keeping the computer secure.

4.   Clearing Data Stored In Browsers

Hazards and sources of hazards:-

 

An organisation can face some health hazards that could put the lives of the employees in danger.

Hazards can be of different types depending on the industry and the environment in which

the employees work. The different types of hazards include:

  Physical

  Chemical

  Biological

  Mechanical

 

Sources of Hazards

Checklist for Workstations :

The workstation should:

  provide sufficient space for the user to alter position comfortably

  provide adequate lighting

  have windows fitted with adjustable coverings to alter the sunlight level


  be spacious enough when a workstation is shared by more than one person

 

Healthy Living:

 

‘A healthy body has a healthy mind’ - a very popular saying is true .

 

‘Healthy Lifestyle leads to a healthy being. A healthy living has a lasting impact on

an individual

 

which ultimately yields a healthy environment at home as well as at work place. a happy and

healthy worker will always perform best to his ability.

 

A healthy lifestyle helps to keep and improve people’s health and well being.

A healthy lifestyle includes :

-  healthy eating habits

-  physical activities

-  stress management

- healthy mind

 - sound sleep

 - goal setting

Comments

Popular posts from this blog

Class 10th IT(402) sample paper

Class 10th unit-3 RELATIONAL DATABASE MANAGEMENT SYSTEMS (BASIC)

Class 9th Unit-3 Digital Documentation