IGNOU BCOS 183 Free Solved Assignment 2022
IGNOU BCOS 183 Free Solved Assignment 2022, BCOS 183 Solved Assignment 2022, BCOS 183
Assignment 2022, FREE BCOS 183 Assignment, IGNOU Assignments 2022- Gandhi
National Open University had recently uploaded the assignments of this session
for the year 2022. Students are recommended to download their Assignments from
this webpage itself. IGNOU BCOS
183 Free Solved Assignment 2022 They don’t need to go anywhere else
when everything regarding the Assignments are available during this text only.
BCOS 183 Free Solved Assignment 2022: for
college kids – BCOS 183 COMPUTER APPLICATION IN BUSINESS Solved
Assignment 2022, Students are advised that after successfully downloading
their Assignments, you’ll find each and every course assignments of your
downloaded. Candidates got to create separate assignment for the IGNOU Master
Course, so as that it’s easy for Evaluators to ascertain your assignments.
BCOS 183
COMPUTER APPLICATION IN BUSINESS
Programme: BAG/2021/2022
Course Code: BCOS 183
Max. Marks: 100
BCOS 183 Free Solved
Assignment
Section-A
(This
section contains five questions of 10 marks each)
Q.1 How are
the computers helpful to human beings? State the examples of real world where
computers are prominently being used these days. 5,
Computer has been intervened to every sphere of human life
such as Mobile phones, TV shows, Supermarkets, Hospitals, Railways,
Matrimonial, Share Tradings, Online Purchasing, Banking, Sports, Traffic
controls, Security Surveillance systems, Job Recruitment, Robotics, Machine
Learning, Artificial Intelligence etc. are a few of them, perhaps difficult to
list all.
1. COMPUTER AND HUMAN LIFE CORRELATED WITH COMMUNICATION
Computer can bring people closer together and facilitate
contacts between them using Email, Chatting, Videoconferencing, Mobile Phones
and Social Medias. It saves time, efforts and money compared with letters used,
before making influence of computers in human life. IGNOU BCOS 183 Free Solved Assignment 2022 These days, we seldom use
hand written letters, put in the envelopes and transport over long distances
because most of us have computer and education to make use of it.
Print media, Television and Radio play important role in our
life. They too have influence of computers from production, control, storage
and broadcasting. Using computers we are able to create a document, display it
on screen, modify and print it on a printer or publish in front of the world
through world wide web. IGNOU BCOS 183 Free Solved Assignment 2022 Computer connected with internet has ability to publish
ideas, thoughts, criticism etc, instantly across the world. Social networking
sites like, Facebook, Twitter, blogger, Youtube, Whatsapp etc. opens another
sophisticated yet easy to use viral communication, reveals the importance of
computer and human life. If it is not exaggerated, our younger generation has
become addicted to use these modern tools. IGNOU BCOS 183 Free Solved Assignment 2022 A majority of college students
cannot have a day without login to at least one social networking site.
2. INFLUENCE OF COMPUTER IN EDUCATION
No doubt! Computer has made massive makeover in education
field. Three decades ago, if anyone has a doubt to be clarified in a learning
process, finding right expert itself was a cumbersome task and there may not be
available further opinion about the subject. Although the different and more
easiest clarification or solution are available on the other side of the world,
we were unable to know its whereabouts because lack of communication. In this
modern world, our "Guru" as all we know is "Google search"
being evolved as Human Assist adopting Artificial Intelligence (the latest
trends in Computer application).
Q.2 What
are active and passive attacks? Explain with suitable examples. 6,
An eavesdropping attack is taken into account as a kind of
passive attack. An eavesdropping attack is to steal data transmitted among two
devices that area unit connected to the net. Traffic analysis is enclosed in
eavesdropping. BCOS 183 Free Solved Assignment 2022An eavesdropping attack happens once the attackers insert a
software package within the network path to capture future study network
traffic. IGNOU BCOS 183 Free Solved Assignment 2022 The attackers have to be compelled to get into the network path
between the end point and the UC system to capture the network traffic. If
their area unit additional network methods and also the network methods area
unit longer, it’ll be more comfortable for the offender to insert a software
package within the network path.
The release of messages is additionally another kind of
passive attack. The attackers install a package to the device by using virus or
malware to watch the device’s activities like a conversation of messages,
emails, or any transferred files that contain personal information and
knowledge. The attackers will use the data to compromise the device or network.
Some other attacks that have emerged thanks to the
exponential interconnection of insecure devices like IoT infrastructure include
those that square measure protocol-specific, likewise as wireless device
networks-based
For example, in associate IoT-based, mostly sensible-home
systems, the communication protocol used is also RPL (Routing protocol for
lowpower and lossy networks). IGNOU BCOS 183 Free Solved Assignment 2022 This protocol is employed thanks to its compatibility
with resource-constrained IoT devices that cannot use ancient protocols
Denial-of-Service attacks
(DoS) are one in each of the samples of active attack. A
denial-of-Service attack happens once the attackers take action to close up a
tool or network. This may cause the first user to be unable to access the
actual device or network. The attackers can flood the target device or network
with traffic till it’s not responding or flaming. IGNOU BCOS 183 Free Solved Assignment 2022 The services that are affected
are emails, websites, or on-line banking accounts. Dos attacks may be performed
merely from any location.
Q.3 What is
the generic structure of business report?
The structure of business reports includes a title page,
executive summary, table of contents, an introduction, the body portion, the
conclusion, recommendations, references, and appendices. It sounds like a great
many pieces, but each section has a clear purpose and is essential to the
formal structure of the document.
In the fictional document below, we can see what the
structure of a simply designed business report looks like, and how it makes the
material easier to navigate. Let’s look at the individual pieces of the
structure and why they’re so important.
Executive Summary
The executive summary is the CliffNotes version of the
entire report and includes the topic, an overview of the data obtained, and any
recommendations based on the study. IGNOU BCOS 183 Free Solved Assignment 2022 This shortened version of the report is
helpful for busy managers or executives who may not have time to read the
entire document, but want the gist of the information.
Table of Contents
This section is vital for lengthier reports as it lists the
sections and any subheads and the page location of those sections and subheads.
Directing the reader to page numbers is very helpful when looking for specific
pieces of information.
Q.4 What is
a business presentation? State its importance and various factors determining
the effectiveness of business presentations. 2,2
A presentation provides a framework for communicating
information about products, services or companies in a structured way. The
presentation should include bullet points or prompts to remind the presenter to
emphasize the most important points.
Versatility for
Reaching the Audience
Presentations are a versatile communication tool. You can
use them in one-to-one meetings, viewing the content on a laptop or tablet computer. IGNOU BCOS 183 Free Solved Assignment 2022 The same presentation can feature as a core element in a large meeting, using a
projector and screen. You can also make presentations available online for
downloading from the Internet or viewing during a Web conference.
Despite the growth of the Internet and online communication,
making presentations is still an important way to drive business success.
Whether those presentations are in person or, increasingly, take advantage of
online delivery mechanisms, including videoconferencing and webinars, business
professionals can take advantage of some easyto-implement tips to improve their
company presentations.
Q.5 Explain
the utilities of computers in online Banking and Finance. 5,5
A bank can be defined as a financial institution,
organization, or a place that provides financial service, equally, one can also
define a bank as an establishment authorized by a government to accept
deposits, pay interest, clear checks, make loans, act as an intermediary in
financial transactions, allows the purchase of bills and checks or the purchase
and sales of securities and provide other financial services to its customers.
· In
the banking sector use of computers are –
· In
banks, computers are used for keeping account information of customer accounts.
·
Banks use technology to carry out payments effectively and successfully.
· Computers
help bankers keep a record of and verify financial records much quicker.
· In
today’s world, ATMs are seen almost on every lane, which would be a machine
itself that enables customers to save time.
·
Online banking is also one way for individuals to make purchases at any time or
display their balance.
The role of computers in the banking sector. It further
describes the need and importance for banks to make use of Micro Computers for
effective utilization and storage of data. The use of computers in the banking
sector can be an efficient tool in speeding up the process and cutting the
price of creating and undertaking figure works. IGNOU BCOS 183 Free Solved Assignment 2022 There are numerous benefits of
Computer in the Banking Sector such as: Bring about simplicity in term of
worrying condition. Reduce the stress of work and consuming less in the bank.
This work shall be of vital benefit to the financial sectors, on effective use
of computer in delivering precise data.
Section-B
(This
section contains five short questions of 6 marks each)
Q.6
“Multimedia components are very important tools for better communication”.
Comment. 6
Multimedia
The word 'Multimedia' is a combination of two words, 'Multi'
and 'Media'. Multi means many and media means material through which something
can be transmitted or send. Multimedia combined all the media elements like
text and graphics to make the information more effective and attractive. Now I
am going to write about its components.
Components of
Multimedia
The various components of multimedia are Text, Audio,
Graphics, Video and Animation. All these components work together to represent
information in an effective and easy manner.
1)Text: Text is the most common medium of representing the
information. In multimedia, text is mostly use for titles, headlines,menu etc.
The most commonly used software for viewing text files are Microsoft Word,
Notepad, Word pad etc. Mostly the text files are formatted with ,DOC, TXT etc
extension.
Related Link:
IGNOU BEGC 131 Free Solved Assignment 2022
IGNOU BEGC 133 Free Solved Assignment 2022
IGNOU BANS 184 Free Solved Assignment 2022
IGNOU BEGAE 182 Free Solved Assignment 2022
2)Audio: In multimedia audio means related with recording,
playing etc. Audio is an important components of multimedia because this
component increase the understandability and improves the clarity of the
concept. audio includes speech, music etc. The commonly used software for
playing audio files are:
i) Quick Time
ii) Real player
iii) Windows Media Player
Q.7
Distinguish between Public key and Private Key. 6
Public key
It is an encryption technique that uses a pair of keys
(public and private key) for secure data communication. In the pair of keys,
the public key is for encrypting the plain text to convert it into ciphertext,
and the private key is used for decrypting the ciphertext to read the message
The private key is given to the receiver while the public
key is provided to the public. Public Key Cryptography is also known as
asymmetric cryptography.
The public key can be shared without compromising the
security of the private one. All asymmetric key pairs are unique, so a message
encrypted with a public key can only be read by the person who has the corresponding
private key. IGNOU BCOS 183 Free Solved Assignment 2022 The keys in the pair have much longer than those used in symmetric
cryptography. So, it is hard to decipher the private key from its public
counterpart. Many of us, heard about RSA, which is the most common algorithm
for asymmetric encryption in use today. Public-key encryption is slower than
secret-key encryption. In secret key encryption, a single shared key is used to
encrypt and decrypt the message, while in public-key encryption, different two
keys are used, both related to each other by a complex mathematical process.
Therefore, we can say that encryption and decryption take more time in
public-key encryption.
Private Key
In private key, the same key (or secret key) is used by both
the parties, i.e., the sender and receiver, for Encryption/Decryption
technique. The sender uses the secret key and encryption algorithm for
encryption, whereas for decryption, the receiver uses this key and decryption
algorithm. In Secret Key Encryption/Decryption technique, the algorithm used
for encryption is the inverse of the algorithm used for decryption. It means
that if the combination of addition and multiplication is used in the
encryption algorithm, then the decryption algorithm will use the combination of
subtraction and division.
The secret key encryption algorithm is also known as
symmetric encryption algorithm because the same secret key is used in
bidirectional communication. The mechanism of private key is faster than the
mechanism of public-key cryptography. BCOS 183 Free Solved Assignment 2022 The reason for this is that the size of
the key is small.
Q.8 How to
make Google forms? 6
If you want to create online surveys, quizzes, or
questionnaires, Google Forms is one of the most versatile tools available right
now. If you are new to Google Forms, this guide is for you. Keep reading as we
tell you how to create a form in Google Forms, how to share Google Forms, how to
check Google Forms, and everything else that you need to know about this tool.
Google Forms: How to
create a form
·
Making a form on Google Forms is pretty easy. Follow these steps.
·
Visit docs.google.com/forms.
· Once
the site is loaded, hover over the + icon to start creating a blank new form or
you can either choose a template. To start from scratch, hit Create new form.
·
Starting from the top, you can add a title and description.
· In
the box below, you can add questions. To keep adding more questions, simply
keep hitting the + icon from the toolbar on the right.
·
Other settings found in the floating toolbar include, importing questions from
other forms, adding a subtitle and description, adding a photo, adding video
and creating a separate section in your form.
· Do
note, at any given time you can always hit the Preview icon present at the top
right next to Settings, to see how your form looks when others open it.
Q.9 “All
the business organisations need to protect their IT security from unauthorized
users”. Comment. 6
All organizations need protection against cyber attacks and
security threats, and investing in those protections is important. Data
breaches are time-consuming, expensive, and bad for business. With strong
infosec, a company reduces their risk of internal and external attacks on
information technology systems. They also protect sensitive data, protect
systems from cyber attacks, ensure business continuity, and provide all
stakeholders peace of mind by keeping confidential information safe from
security threats.
Emphasizing the importance of information security in
organizations and acting on it are key to countering the main threats to data
security. The top six concerns in infosec are social engineering, third party
exposure, patch management, ransomware, malware, and overall data
vulnerabilities.
1. Social Engineering
Social attacks take place when criminals manipulate targets
into taking certain actions such as skipping security measures or disclosing
information in order to gain access to confidential information. Phishing
attempts are one common example.
2. Third Party
Exposure
Companies must be confident that any third party vendors are
handling information securely and sensitively. If there are data breaches with
a vendor, the main company that owns the consumer relationship is still
considered responsible. The importance of information security in organizations
must be held at the same high priority level for vendors as it is within your
own company.
Q.10
Distinguish between NEFT and RTGS.
The acronym 'NEFT' stands for National Electronic Funds
Transfer. It is a 24*7 available service of funds transfer wherein the
transaction gets processed in batches of half an hour. The RBI has not
specified any minimum or maximum limit on the transfer amount. All you need to
provide is a few details of the beneficiary to initiate an NEFT transfer. The details
required for a typical NEFT transfer are the name of the beneficiary, account
number and account type, name of the bank, and the Indian Financial System Code
(IFSC) of the bank. The acronym 'RTGS' stands for Real-Time Gross Settlement.
RTGS is a funds transfer system based on a gross settlement concept where money
is moved from one bank to another in real-time. RTGS is primarily designed for
high transaction amounts. As such, while there is no maximum limit on the
transfer amount, you need to transfer a minimum of INR 2 lakhs at a time. RTGS
is especially useful when the transaction amount is high, and payment needs to
be processed immediately. Like with NEFT, the details required for a typical
RTGS transfer are the name of the beneficiary, account number and account type,
name of the bank, and Indian Financial System Code (IFSC) of the bank
Section-C
(This
section contains four short questions of 5 marks each)
Q.11 “For
organizations the role of computer is to support the key aspects of running
them”. Comment. 5
Computers have become essential business tools. They are
used in every aspect of a company's operations, including product creation,
marketing, accounting and administration. It is critical that business owners
take the time to choose the right computers, software and peripherals for their
organization. Given the diversity of modern technology, from smartphones and
tablets to large desktop systems, the choice of the best tech for your business
can be daunting.
Business Computer
Functions
· Most
business processes now involve the use of computers. Here are some of them:
·
Communications: Companies use computers for both internal and external
communications via email, messenger systems, conferencing and word processing.
·
Research: Businesses can use computers to research industry trends, patents,
trademarks, potential clients and competitors via search engines and
proprietary databases.
·
Media Production: Computers are now used to produce different types of media,
including graphics, video and audio productions.
· Data
Tracking and Storage: Although paper files containing hard copy documents are
still in use, organizations also store and manage their data using software and
the cloud.
Q.12 Write
a short note on Uniform Resource Locator (URL).
A URL (Uniform Resource Locator) is a unique identifier used
to locate a resource on the Internet. It is also referred to as a web address.
URLs consist of multiple parts -- including a protocol and domain name -- that
tell a web browser how and where to retrieve a resource. IGNOU BCOS 183 Free Solved Assignment 2022 End users use URLs by
typing them directly into the address bar of a browser or by clicking a
hyperlink found on a webpage, bookmark list, in an email or from another
application.
The URL contains the name of the protocol needed to access a
resource, as well as a resource name. The first part of a URL identifies what
protocol to use as the primary access medium. The second part identifies the IP
address or domain name -- and possibly subdomain -- where the resource is
located. URL protocols include HTTP (Hypertext Transfer Protocol) and HTTPS
(HTTP Secure) for web resources, mail to for email addresses, FTP for files on
a File Transfer Protocol (FTP) server, and telnet for a session to access
remote computers. Most URL protocols are followed by a colon and two forward
slashes; "mail to" is followed only by a colon.
Optionally, after the
domain, a URL can also specify:
· a
path to a specific page or file within a domain;
· a
network port to use to make the connection;
· a
specific reference point within a file, such as a named anchor in an HTML file;
and
· a
query or search parameters used -- commonly found in URLs for search results.
Q.13 How is
E-payment system better than traditional payment system? 5
An electronic payment system is a system of financial
exchange that is facilitated by a digital financial instrument such as
encrypted credit card numbers, electronic cheques backed by a bank. To a
consumer, an electronic payment system is a convenient way of making a purchase
or paying for a service without holding cash or having to go through the
process of completing a cheque and producing some form of acceptable
identification.
To a supplier of goods or services, and electronic payment
is the receipt or outward movement of funds, linked into an inventory
management, ordering or accounting system, eliminating the need of large cash
holding, time-consuming clerical activities and offering easier management of
cash flows. To an account\ payment manager or bank, an electronic payment is a
series of the process by which value exchange is captured, verified and
accepted; a series of checks, balances to ensure integrity,
Q.14 What
is use of slide sorter view?
Slide Sorter view in PowerPoint lets you view and sort the
presentation slides. To switch to Slide Sorter view, click the “Slide Sorter”
button in the presentation view buttons in the Status Bar. Alternatively, click
the “Slide Sorter” button in the “Presentation Views” button group on the
“View” tab of the Ribbon.
You use Slide Sorter view to reorganize, insert, delete and
copy the presentation slides. Slide Sorter view in PowerPoint also shows the
presentation’s visual flow. You can also add and preview slide transition
animation here, as well. IGNOU BCOS 183 Free Solved Assignment 2022 In Slide Sorter view in PowerPoint, all the
presentation slides appear as thumbnails. You cannot modify the slide content
in this view. However, many of the features you can do in Slide Sorter view in
PowerPoint you can also do within the slide thumbnails pane in Normal view. To
select a slide in Slide Sorter view, click a slide thumbnail. To reorganize the
sequence of slides in your presentation, click and drag the slide thumbnails in
this view and then release them in the desired position.
Whatsapp 7838475019