IGNOU BCOS 183 Free Solved Assignment 2022

 

IGNOU BCOS 183 Free Solved Assignment 2022

IGNOU BCOS 183 Free Solved Assignment 2022, BCOS 183 Solved Assignment 2022, BCOS 183 Assignment 2022, FREE BCOS 183 Assignment, IGNOU Assignments 2022- Gandhi National Open University had recently uploaded the assignments of this session for the year 2022. Students are recommended to download their Assignments from this webpage itself. IGNOU BCOS 183 Free Solved Assignment 2022 They don’t need to go anywhere else when everything regarding the Assignments are available during this text only.

BCOS 183 Free Solved Assignment 2022: for college kids – BCOS 183 COMPUTER APPLICATION IN BUSINESS Solved Assignment 2022, Students are advised that after successfully downloading their Assignments, you’ll find each and every course assignments of your downloaded. Candidates got to create separate assignment for the IGNOU Master Course, so as that it’s easy for Evaluators to ascertain your assignments.

 

BCOS 183

COMPUTER APPLICATION IN BUSINESS

Programme: BAG/2021/2022

Course Code: BCOS 183

Max. Marks: 100

BCOS 183 Free Solved Assignment

Section-A

(This section contains five questions of 10 marks each)

Q.1 How are the computers helpful to human beings? State the examples of real world where computers are prominently being used these days. 5,

Computer has been intervened to every sphere of human life such as Mobile phones, TV shows, Supermarkets, Hospitals, Railways, Matrimonial, Share Tradings, Online Purchasing, Banking, Sports, Traffic controls, Security Surveillance systems, Job Recruitment, Robotics, Machine Learning, Artificial Intelligence etc. are a few of them, perhaps difficult to list all.

1. COMPUTER AND HUMAN LIFE CORRELATED WITH COMMUNICATION

Computer can bring people closer together and facilitate contacts between them using Email, Chatting, Videoconferencing, Mobile Phones and Social Medias. It saves time, efforts and money compared with letters used, before making influence of computers in human life. IGNOU BCOS 183 Free Solved Assignment 2022 These days, we seldom use hand written letters, put in the envelopes and transport over long distances because most of us have computer and education to make use of it.

IGNOU BCOS 183 Free Solved Assignment 2022


Print media, Television and Radio play important role in our life. They too have influence of computers from production, control, storage and broadcasting. Using computers we are able to create a document, display it on screen, modify and print it on a printer or publish in front of the world through world wide web. IGNOU BCOS 183 Free Solved Assignment 2022 Computer connected with internet has ability to publish ideas, thoughts, criticism etc, instantly across the world. Social networking sites like, Facebook, Twitter, blogger, Youtube, Whatsapp etc. opens another sophisticated yet easy to use viral communication, reveals the importance of computer and human life. If it is not exaggerated, our younger generation has become addicted to use these modern tools. IGNOU BCOS 183 Free Solved Assignment 2022 A majority of college students cannot have a day without login to at least one social networking site.

2. INFLUENCE OF COMPUTER IN EDUCATION

No doubt! Computer has made massive makeover in education field. Three decades ago, if anyone has a doubt to be clarified in a learning process, finding right expert itself was a cumbersome task and there may not be available further opinion about the subject. Although the different and more easiest clarification or solution are available on the other side of the world, we were unable to know its whereabouts because lack of communication. In this modern world, our "Guru" as all we know is "Google search" being evolved as Human Assist adopting Artificial Intelligence (the latest trends in Computer application).

Q.2 What are active and passive attacks? Explain with suitable examples. 6,

An eavesdropping attack is taken into account as a kind of passive attack. An eavesdropping attack is to steal data transmitted among two devices that area unit connected to the net. Traffic analysis is enclosed in eavesdropping.  BCOS 183 Free Solved Assignment 2022An eavesdropping attack happens once the attackers insert a software package within the network path to capture future study network traffic. IGNOU BCOS 183 Free Solved Assignment 2022 The attackers have to be compelled to get into the network path between the end point and the UC system to capture the network traffic. If their area unit additional network methods and also the network methods area unit longer, it’ll be more comfortable for the offender to insert a software package within the network path.

The release of messages is additionally another kind of passive attack. The attackers install a package to the device by using virus or malware to watch the device’s activities like a conversation of messages, emails, or any transferred files that contain personal information and knowledge. The attackers will use the data to compromise the device or network.


Some other attacks that have emerged thanks to the exponential interconnection of insecure devices like IoT infrastructure include those that square measure protocol-specific, likewise as wireless device networks-based

For example, in associate IoT-based, mostly sensible-home systems, the communication protocol used is also RPL (Routing protocol for lowpower and lossy networks). IGNOU BCOS 183 Free Solved Assignment 2022 This protocol is employed thanks to its compatibility with resource-constrained IoT devices that cannot use ancient protocols

Denial-of-Service attacks

(DoS) are one in each of the samples of active attack. A denial-of-Service attack happens once the attackers take action to close up a tool or network. This may cause the first user to be unable to access the actual device or network. The attackers can flood the target device or network with traffic till it’s not responding or flaming. IGNOU BCOS 183 Free Solved Assignment 2022 The services that are affected are emails, websites, or on-line banking accounts. Dos attacks may be performed merely from any location.

Q.3 What is the generic structure of business report?

The structure of business reports includes a title page, executive summary, table of contents, an introduction, the body portion, the conclusion, recommendations, references, and appendices. It sounds like a great many pieces, but each section has a clear purpose and is essential to the formal structure of the document.

In the fictional document below, we can see what the structure of a simply designed business report looks like, and how it makes the material easier to navigate. Let’s look at the individual pieces of the structure and why they’re so important.

Executive Summary

The executive summary is the CliffNotes version of the entire report and includes the topic, an overview of the data obtained, and any recommendations based on the study. IGNOU BCOS 183 Free Solved Assignment 2022 This shortened version of the report is helpful for busy managers or executives who may not have time to read the entire document, but want the gist of the information.

Table of Contents

This section is vital for lengthier reports as it lists the sections and any subheads and the page location of those sections and subheads. Directing the reader to page numbers is very helpful when looking for specific pieces of information.

Q.4 What is a business presentation? State its importance and various factors determining the effectiveness of business presentations. 2,2

A presentation provides a framework for communicating information about products, services or companies in a structured way. The presentation should include bullet points or prompts to remind the presenter to emphasize the most important points.

Versatility for Reaching the Audience

Presentations are a versatile communication tool. You can use them in one-to-one meetings, viewing the content on a laptop or tablet computer. IGNOU BCOS 183 Free Solved Assignment 2022 The same presentation can feature as a core element in a large meeting, using a projector and screen. You can also make presentations available online for downloading from the Internet or viewing during a Web conference.

Despite the growth of the Internet and online communication, making presentations is still an important way to drive business success. Whether those presentations are in person or, increasingly, take advantage of online delivery mechanisms, including videoconferencing and webinars, business professionals can take advantage of some easyto-implement tips to improve their company presentations.

Q.5 Explain the utilities of computers in online Banking and Finance. 5,5

A bank can be defined as a financial institution, organization, or a place that provides financial service, equally, one can also define a bank as an establishment authorized by a government to accept deposits, pay interest, clear checks, make loans, act as an intermediary in financial transactions, allows the purchase of bills and checks or the purchase and sales of securities and provide other financial services to its customers.

· In the banking sector use of computers are –

· In banks, computers are used for keeping account information of customer accounts.

· Banks use technology to carry out payments effectively and successfully.

· Computers help bankers keep a record of and verify financial records much quicker.

· In today’s world, ATMs are seen almost on every lane, which would be a machine itself that enables customers to save time.

· Online banking is also one way for individuals to make purchases at any time or display their balance.

The role of computers in the banking sector. It further describes the need and importance for banks to make use of Micro Computers for effective utilization and storage of data. The use of computers in the banking sector can be an efficient tool in speeding up the process and cutting the price of creating and undertaking figure works. IGNOU BCOS 183 Free Solved Assignment 2022 There are numerous benefits of Computer in the Banking Sector such as: Bring about simplicity in term of worrying condition. Reduce the stress of work and consuming less in the bank. This work shall be of vital benefit to the financial sectors, on effective use of computer in delivering precise data.

Section-B

(This section contains five short questions of 6 marks each)

Q.6 “Multimedia components are very important tools for better communication”. Comment. 6

Multimedia

The word 'Multimedia' is a combination of two words, 'Multi' and 'Media'. Multi means many and media means material through which something can be transmitted or send. Multimedia combined all the media elements like text and graphics to make the information more effective and attractive. Now I am going to write about its components.

Components of Multimedia

The various components of multimedia are Text, Audio, Graphics, Video and Animation. All these components work together to represent information in an effective and easy manner.

1)Text: Text is the most common medium of representing the information. In multimedia, text is mostly use for titles, headlines,menu etc. The most commonly used software for viewing text files are Microsoft Word, Notepad, Word pad etc. Mostly the text files are formatted with ,DOC, TXT etc extension.

Related Link:

IGNOU BEGC 131 Free Solved Assignment 2022

IGNOU BEGC 133 Free Solved Assignment 2022

IGNOU BANS 184 Free Solved Assignment 2022

IGNOU BEGAE 182 Free Solved Assignment 2022

2)Audio: In multimedia audio means related with recording, playing etc. Audio is an important components of multimedia because this component increase the understandability and improves the clarity of the concept. audio includes speech, music etc. The commonly used software for playing audio files are:

i) Quick Time

ii) Real player

iii) Windows Media Player

Q.7 Distinguish between Public key and Private Key. 6

Public key

It is an encryption technique that uses a pair of keys (public and private key) for secure data communication. In the pair of keys, the public key is for encrypting the plain text to convert it into ciphertext, and the private key is used for decrypting the ciphertext to read the message

The private key is given to the receiver while the public key is provided to the public. Public Key Cryptography is also known as asymmetric cryptography.

The public key can be shared without compromising the security of the private one. All asymmetric key pairs are unique, so a message encrypted with a public key can only be read by the person who has the corresponding private key. IGNOU BCOS 183 Free Solved Assignment 2022 The keys in the pair have much longer than those used in symmetric cryptography. So, it is hard to decipher the private key from its public counterpart. Many of us, heard about RSA, which is the most common algorithm for asymmetric encryption in use today. Public-key encryption is slower than secret-key encryption. In secret key encryption, a single shared key is used to encrypt and decrypt the message, while in public-key encryption, different two keys are used, both related to each other by a complex mathematical process. Therefore, we can say that encryption and decryption take more time in public-key encryption.

Private Key

In private key, the same key (or secret key) is used by both the parties, i.e., the sender and receiver, for Encryption/Decryption technique. The sender uses the secret key and encryption algorithm for encryption, whereas for decryption, the receiver uses this key and decryption algorithm. In Secret Key Encryption/Decryption technique, the algorithm used for encryption is the inverse of the algorithm used for decryption. It means that if the combination of addition and multiplication is used in the encryption algorithm, then the decryption algorithm will use the combination of subtraction and division.

The secret key encryption algorithm is also known as symmetric encryption algorithm because the same secret key is used in bidirectional communication. The mechanism of private key is faster than the mechanism of public-key cryptography. BCOS 183 Free Solved Assignment 2022 The reason for this is that the size of the key is small.

Q.8 How to make Google forms? 6

If you want to create online surveys, quizzes, or questionnaires, Google Forms is one of the most versatile tools available right now. If you are new to Google Forms, this guide is for you. Keep reading as we tell you how to create a form in Google Forms, how to share Google Forms, how to check Google Forms, and everything else that you need to know about this tool.

Google Forms: How to create a form

· Making a form on Google Forms is pretty easy. Follow these steps.

· Visit docs.google.com/forms.

· Once the site is loaded, hover over the + icon to start creating a blank new form or you can either choose a template. To start from scratch, hit Create new form.

· Starting from the top, you can add a title and description.

· In the box below, you can add questions. To keep adding more questions, simply keep hitting the + icon from the toolbar on the right.

· Other settings found in the floating toolbar include, importing questions from other forms, adding a subtitle and description, adding a photo, adding video and creating a separate section in your form.

· Do note, at any given time you can always hit the Preview icon present at the top right next to Settings, to see how your form looks when others open it.

Q.9 “All the business organisations need to protect their IT security from unauthorized users”. Comment. 6

All organizations need protection against cyber attacks and security threats, and investing in those protections is important. Data breaches are time-consuming, expensive, and bad for business. With strong infosec, a company reduces their risk of internal and external attacks on information technology systems. They also protect sensitive data, protect systems from cyber attacks, ensure business continuity, and provide all stakeholders peace of mind by keeping confidential information safe from security threats.

Emphasizing the importance of information security in organizations and acting on it are key to countering the main threats to data security. The top six concerns in infosec are social engineering, third party exposure, patch management, ransomware, malware, and overall data vulnerabilities.

1. Social Engineering

Social attacks take place when criminals manipulate targets into taking certain actions such as skipping security measures or disclosing information in order to gain access to confidential information. Phishing attempts are one common example.

2. Third Party Exposure

Companies must be confident that any third party vendors are handling information securely and sensitively. If there are data breaches with a vendor, the main company that owns the consumer relationship is still considered responsible. The importance of information security in organizations must be held at the same high priority level for vendors as it is within your own company.

Q.10 Distinguish between NEFT and RTGS.

The acronym 'NEFT' stands for National Electronic Funds Transfer. It is a 24*7 available service of funds transfer wherein the transaction gets processed in batches of half an hour. The RBI has not specified any minimum or maximum limit on the transfer amount. All you need to provide is a few details of the beneficiary to initiate an NEFT transfer. The details required for a typical NEFT transfer are the name of the beneficiary, account number and account type, name of the bank, and the Indian Financial System Code (IFSC) of the bank. The acronym 'RTGS' stands for Real-Time Gross Settlement. RTGS is a funds transfer system based on a gross settlement concept where money is moved from one bank to another in real-time. RTGS is primarily designed for high transaction amounts. As such, while there is no maximum limit on the transfer amount, you need to transfer a minimum of INR 2 lakhs at a time. RTGS is especially useful when the transaction amount is high, and payment needs to be processed immediately. Like with NEFT, the details required for a typical RTGS transfer are the name of the beneficiary, account number and account type, name of the bank, and Indian Financial System Code (IFSC) of the bank

Section-C

(This section contains four short questions of 5 marks each)

Q.11 “For organizations the role of computer is to support the key aspects of running them”. Comment. 5

Computers have become essential business tools. They are used in every aspect of a company's operations, including product creation, marketing, accounting and administration. It is critical that business owners take the time to choose the right computers, software and peripherals for their organization. Given the diversity of modern technology, from smartphones and tablets to large desktop systems, the choice of the best tech for your business can be daunting.

Business Computer Functions

· Most business processes now involve the use of computers. Here are some of them:

· Communications: Companies use computers for both internal and external communications via email, messenger systems, conferencing and word processing.

· Research: Businesses can use computers to research industry trends, patents, trademarks, potential clients and competitors via search engines and proprietary databases.

· Media Production: Computers are now used to produce different types of media, including graphics, video and audio productions.

· Data Tracking and Storage: Although paper files containing hard copy documents are still in use, organizations also store and manage their data using software and the cloud.

Q.12 Write a short note on Uniform Resource Locator (URL).

A URL (Uniform Resource Locator) is a unique identifier used to locate a resource on the Internet. It is also referred to as a web address. URLs consist of multiple parts -- including a protocol and domain name -- that tell a web browser how and where to retrieve a resource. IGNOU BCOS 183 Free Solved Assignment 2022 End users use URLs by typing them directly into the address bar of a browser or by clicking a hyperlink found on a webpage, bookmark list, in an email or from another application.

The URL contains the name of the protocol needed to access a resource, as well as a resource name. The first part of a URL identifies what protocol to use as the primary access medium. The second part identifies the IP address or domain name -- and possibly subdomain -- where the resource is located. URL protocols include HTTP (Hypertext Transfer Protocol) and HTTPS (HTTP Secure) for web resources, mail to for email addresses, FTP for files on a File Transfer Protocol (FTP) server, and telnet for a session to access remote computers. Most URL protocols are followed by a colon and two forward slashes; "mail to" is followed only by a colon.

Optionally, after the domain, a URL can also specify:

· a path to a specific page or file within a domain;

· a network port to use to make the connection;

· a specific reference point within a file, such as a named anchor in an HTML file; and

· a query or search parameters used -- commonly found in URLs for search results.

Q.13 How is E-payment system better than traditional payment system? 5

An electronic payment system is a system of financial exchange that is facilitated by a digital financial instrument such as encrypted credit card numbers, electronic cheques backed by a bank. To a consumer, an electronic payment system is a convenient way of making a purchase or paying for a service without holding cash or having to go through the process of completing a cheque and producing some form of acceptable identification.

To a supplier of goods or services, and electronic payment is the receipt or outward movement of funds, linked into an inventory management, ordering or accounting system, eliminating the need of large cash holding, time-consuming clerical activities and offering easier management of cash flows. To an account\ payment manager or bank, an electronic payment is a series of the process by which value exchange is captured, verified and accepted; a series of checks, balances to ensure integrity,

Q.14 What is use of slide sorter view?

Slide Sorter view in PowerPoint lets you view and sort the presentation slides. To switch to Slide Sorter view, click the “Slide Sorter” button in the presentation view buttons in the Status Bar. Alternatively, click the “Slide Sorter” button in the “Presentation Views” button group on the “View” tab of the Ribbon.

You use Slide Sorter view to reorganize, insert, delete and copy the presentation slides. Slide Sorter view in PowerPoint also shows the presentation’s visual flow. You can also add and preview slide transition animation here, as well. IGNOU BCOS 183 Free Solved Assignment 2022 In Slide Sorter view in PowerPoint, all the presentation slides appear as thumbnails. You cannot modify the slide content in this view. However, many of the features you can do in Slide Sorter view in PowerPoint you can also do within the slide thumbnails pane in Normal view. To select a slide in Slide Sorter view, click a slide thumbnail. To reorganize the sequence of slides in your presentation, click and drag the slide thumbnails in this view and then release them in the desired position.

Whatsapp 7838475019

Post a Comment

Previous Post Next Post