BCOS 183 Important Questions

Download as pdf or txt
Download as pdf or txt
You are on page 1of 25

BCOC-183

COMPUTER APPLICATION IN BUSINESS


IMPORTANT QUESTIONS AND ANSWERS
Q1. Explain evolution and applications of computers. What are the advantages and
disadvantages of computers?
Ans. Evolution of computers
There are six apparent generations of computers which are as follows :
1.) First Generation (1940-1956)
a. used vacuum tubes for circuitry and magnetic drums for memory
b. size used to be very huge taking up the space of almost an entire room
c. costly to operate
d. used a large amount of electricity
e. used to produce lots of heat, which was often the cause of malfunction
2.) Second Generation (1956-1963)
a. Based on transistors that substituted the vacuum tubes
b. Didn’t require a complete room anymore
c. Great deal of heat which subjected to damage computer’s internal sensitive parts
d. Used assembly language for programming
3.) Third Generation (1964-1971)
a. Brought a significant change in the way of computing
b. Based on use of integrated circuits, which increased speed and efficiency of
computers
c. Smaller in size as components were squeezed onto the single chip
d. Users interacted using keyboards and monitors
e. Facilitates the machine to run various applications
4.) Fourth Generation (1972-2010)
a. based on use of microprocessors , a single silicon chip on which thousands of
integrated circuits were built
b. use of microprocessors reduced the size of computers
c. could be linked together to form a network
5.) Fifth Generation (2010-2020)
a. Began with major innovations in computer architecture
b. Essence is to utilize these technologies to ultimately engender machines
6.) Sixth Generation (2020 onwards)
a. Era of intelligent computers , based on artificial neutral networks or artificial brains
b. AI is a concept which enables the devices to think and take actions on their own
c. Introduced voice recognition
d. Use of nanotechnology is a characteristic of sixth generation computers
Applications of Computers
1.) Business
2.) Education
3.) Banking
4.) Communication
5.) Healthcare
6.) Personal use
7.) Military and Defence
8.) Insurance
Advantages of Computers
1.) Multitasking
2.) Speed
3.) Storage
4.) Accuracy
5.) Data Security
Disadvantages of Computers
1.) Reduction in employment opportunities
2.) Potential of loss of privacy
3.) Virus and hacking attacks
4.) Cyber crimes
Q2. Describe role of computers in business organisation and in trade and commerce also in
banking and finance.
Ans. Role of computers In business organisation
Computers have brought away organisations a long way ahead from the age of pen , papers
and folders stored in dusty storage of compartments . there are various usages of
computers in business organisations from generating reports to communicating with
clients.
For organisations the role is to support the key aspects of running them . every aspect is
improved with the help of computers. They are used in every aspect of company’s
operations, including product creation, marketing, accounting and administration.
Computers have made possible the concepts such as flexible working schedules and remote
work forces have become possible enabling employees to work from wherever they want
and at whatever times they wish .
Some of the applications in business are as follows:

1.) Communication
2.) Marketing
3.) Accounting
4.) Storage
5.) Educational purposes
6.) Research
Role of computers in business, trade and commerce
In business, trade and commerce, computers are helpful in research, production,
distribution, marketing, banking, team management, business automation, data storage,
employee management and to increase productivity at a lower cost in less time with
higher quality. The various advantages of computers in business, trade and commerce
are :
1.) Inventory Management
2.) Easier Financial Record Keeping
3.) Budgeting and Forecasting
4.) Storage
5.) Efficiency of Operations
6.) Streamlining Business Communications
7.) Managing Customer and Partner Relationships
Role of computers in online banking and finance
Technology has revamped the accounting and management system of banking operations and it is now also focusing
on changing the way how banks are delivering services to their customers. Along with these, computers have also
transformed the financial industry and the way business deals are conducted from offline meeting to the online
spaces. Accountants can now keep large amount of data to conduct complex calculations and manage financial
transactions all from a computer than storing the data in books. Various applications of computers in online banking
and finance are :
Plastic Money Financial Trading

Financial
Self-Enquiry Information
Facility Organizing and
Analyzing Data and
Online Files
Remote Banking Finance
Banking Data Storage
Digital
Authentication Convenience

Centralized Budgeting and


Information Book-keeping

Q3. ( i.) What is Computer software and its types ? Explain methods to prevent identity
theft.
Ans. Software : software consists of a set of instructions that directs computer to perform
the designated / specific task . it is a common term used to describe various programmes
used for computer and related devices operations . the variable and non- physical
instructions given with the help of scripts , applications and programmes of computer are
used to describe software.
Types of Software

software

system application
software software

operating language device general acquired /


utilities
system processor driver purpose tailor mode

Methods to prevent identity theft


i) At the time of entering any personal information on the Internet, please make sure
that connection is encrypted.
ii) Avoid storing credit card or personal information on any website if you do online
shopping over the Internet.
iii) Do have an active and up-to-date spy ware protection software & antivirus
software.
iv) Make yourself aware about fake e-mails and phishing e-mails that claim to be a
company.
v) Never use unknown & unsecured systems & smart phones.
vi) Always have strong password & keep answer of secret question unguessable.
( ii.) Define usage of Plastic Money and E-payment system in commerce.
Ans. Usage of Plastic Money
Credit card and Debit card are two most popular form of plastic money used by people
worldwide. Few other popular plastic cards are – Store value card, ATM card, Smart card,
Pre-paid card, Agricultural card etc. Ease in storage, security with convenience to use it
almost everywhere lead to rise in the popularity of plastic money. There are varieties of
places where one can use plastic money.
• For purchasing groceries at grocery stores. No need to carry cash. In India almost
everywhere, plastic money is accepted at groceries stores.
• At fuel station, we can use credit or debit card for purchasing fuel for your vehicles.
• For paying at restaurants, hotels.
• We can book bus, train, flight tickets using our debit or credit card.
• For paying our gas, mobile, landline, electricity bills.
• Debit cum ATM card can be used to withdraw money from ATMs.
• With increase in e-commerce websites, we can use credit, debit for our online
shopping purchases.
• Smart card a form of plastic money is being used to pay for small purchases like bus
fare, metro fare. Most popular example would be Delhi Metro Smart Card.
• Farmers use agricultural card, for example in India kisan credit card, for improving
their credit flow under agriculture and allied activities.
E-PAYMENT SYSTEM IN COMMERCE
Electronic payment or E-payment system facilitates commercial transactions by enabling
the payments for goods and services through electronic medium, without involving the use
of cash or checks. With the growth in E-commerce and internet-banking system, E-payment
system has grown increasingly over last decade. This growth has further been supported by
recent technological advancements, which not only improved the ease of use but also
helped in addressing our security concerns. E-payment system is rapidly replacing the
traditional payment system.
QR Code (QUICK RESPONSE CODE)

UPI (Unified Payment Interface)

Digital Wallets

USSD(unstrctured supplementary service data)- make payment


with codes without smartphone or internet

technologies MMID(Mobile Money Identifier)-registered customers of bank


involved in E- get 7 digit number
payment
System IMPS (Immediate Payment Service )

Aadhar Enabled Payment System(AEPS)

Near Field Communication(NFC)-wave smartphone near a point of


sale device to make payment

Banking cards

Internet Banking

Q4. What are the six essential security actions and impact of digitalization in business
world?
Ans. Six essential security Actions
1. Firewall: Firewall is a type of virtual protection wall which helps to protect network
traffic inbound and outbound to any organization. It stops unauthorized hackers from
attacking the network by blocking them from the systems of organizations. Firewalls
are programmed in such a way that they restrict the network from sending out
proprietary data and confidential emails.
2. Antivirus Software: The Antivirus program is used to remove the virus from system
and network of business organizations. It is basic software and should be the part of
any cyber security system. The antivirus works as the final frontier in securing and
defending unwanted attacks from intruding the network of business organizations.
The antivirus works by detecting and removing virus and malware, adware and
spyware from the network. It also scans & filter out potentially harmful downloads
and emails of systems of all the organizations.
3. Use Complex Passwords: The user-id and password is essential to access the
resources of business organization over the network. We should always have strong
password and keep it confidential from the hackers. The passwords should be
changed periodically. Strong password is difficult for users to crack it and thus makes
the data secure.
4. Regular Backup: : The process of saving data regularly and taking backup saves
organizations from the risks of data loss. In case of data loss backup is very useful and
could be used to restore the data in business organisation. To reduce the risk, regular
back of data is very much essential.
5. Penetration Testing and Limit Access to Critical Data: Testing is used to test the
software with the objective of finding faults in it. There are several types of testing in
software engineering and penetration testing is one of them. The penetration testing
is used to test the security of business organizations by calling security professionals
to test the network security of business data. The security professionals; use the
same technique which the hackers use to find the potential weakness and
vulnerability in the security systems.
6. Employee Training: All the employees of business organizations handling critical data
must be trained before they are given responsibility to secure the data. There are
several types of attacks and phishing is one of them. To protect the business
organizations from phishing attacks the employees must be trained how to handle
keep secure data from such attacks.
Impact of Digitalization in Business world
Digitalization: The term digitization is used to convert paper based data and information
into electronic way of saving, so that it can be retrieved, processed and updated by using
computer system. The integration of digital technologies into computer readable format is
known as digitization.
Impacts:
1.) Artificial Intelligence (AI): Artificial intelligence is the design and development of
artificially intelligent machines which can do the work the way human do AI has
already changed the business world to such an extent, that all the business
organizations are using AI in their products.
2.) Flexible work
3.) Innovation
4.) New Business Models
5.) Communication
Q5. Explain the impact of Demonetization on E-wallets.
OR
How is e-payment system better than traditional payment system?
Ans. E-Wallet: An Electronic Wallet is any device or software which allows a user to store,
manipulate, and pay with various types of payment instruments such as electronic cash and
credit cards. They make it unnecessary to retype credit card numbers and addresses each
time a purchase is made.
Impact of Demonetization on E-Wallets
➢ Demonetization is withdrawal of particular form of currency in circulation.
Government of India boldly announced the demonetization on 8 November, 2016.
The circulation of C500 and C1000 for any form of liquid transaction was banned
from midnight and no more a legal tender from 9th November 2016. The ATM
withdrawal limit was set to C2500 for that particular period.
➢ The unexpected announcement of demonetization and prolonged cash shortages
helped in increasing the digital transactions. Every sphere of economy ranging from a
small shop to big malls witnessed a spurt in digital transactions across the country.
➢ Every citizen of the country, be it a farmer, teacher, soldier or even a CEO of a big
brand, needs to know about the available methods to make cashless transactions.
They become more aware about the existing facilities - how they can perform online
transactions such as checking account balance, bill payment, funds transfer, etc.
through internet banking.
➢ it is available 24x7 for the customer’s convenience. Small sellers also flocked to e-
wallet methods – Paytm, Mobikwik, etc. to continue doing their business. These all
gave a big push to the overall digital transactions across the country.
➢ E-wallet companies like Paytm welcomed the decision of demonetization as this gave
them an opportunity to increase their customer base.
In conclusion demonetization gave the digital payment a thrust which led to success
of many payment wallet companies along with increase in acceptance of digital mode
of payment among the masses.
Q5. Explain salient features of MS Word and different types of Text case. What is Generic
structure of Business Report ?
Ans. Salient features of MS Word
i. It allows you to create and save the document.
ii. You can add, modify, or delete the text anytime in your document and save it for
future reference.
iii. It enables you to set or change the page margins as required.
iv. It features various formatting options like and a change of font and its style.
Moreover, you can insert Header and footer in the document.
v. The Auto Correct feature of MS Word automatically corrects the spellings and also
suggests the alternate words.
vi. It also shows document statistics like word count.
vii. Text can be written in and a columnar style as written in newspapers. Also, text
boxes can be inserted.
viii. You can create tables in the document.
ix. The image and graphics can also be inserted in the document. MS Word provides its
clip arts or the pictures can be imported from outside.
x. The Mail Merge feature of MS Word helps you generate multiple copies of a letter
with different addresses.
xi. MS Word also provides Macros that can be created and used in the document.
xii. Online help is also available to know more about and the various features and tools
of MS Word.
Different types of Text Case
a) Sentence case: This option will make the first letter of each sentence in upper case.
b) Lower case: If you select the “Lower Case” option, all the characters of the selected
text would be changed in the lower case
c) Upper case: If you select the “Upper Case” option, all the characters of the selected
text would be changed in the lower case
d) Title case: The “Title Case” makes the first character of each word in the Upper Case.
e) Toggle case: The Toggle Case makes all the lower case characters into upper case and
all the upper case characters into the lower case for the selected paragraph.
Generic Structure of Business Report
The structure of business report includes the following essentials:
• Title Page
• Executive Summary
• Table of Content
• Introduction
• The Body of the Report
• Conclusion
• Recommendation
• Appendix
• Bibliography and Reference
Q7. What are the challenges faced in implementing multimedia tool in business? Explain
main functions and application of Youtube in business.
Ans. Challenges faced in implementing multimedia tool in business
i. Information security (including data privacy, storage, and management)
ii. Social media
iii. Risk management and governance
iv. Regulatory compliance
v. Technology integration and upgradation
vi. Resource management
vii. Infrastructure management etc.
Main functions of Youtube
1) Users can search for and watch videos of their interest
2) A personal YouTube channel can be created to reach to a large group of people
3) Upload videos to your channel
4) Video uploaded on YouTube can be watched and shared with others free of cost
5) Users can subscribe and follow other YouTube channels and users to get updated with
any further notification by them
6) Various playlists can be created as per the need to organize and group videos together
Application of Youtube in business
1.) Using youtube for brand awareness
2.) Using youtube for advertising products
3.) Using youtube for retail promotion
4.) Using youtube for sales
5.) Using youtube for product/ customer support
6.) Using youtube for training purpose
Q8. Explain importance and various factors determining the effectiveness of business
presentations. Define types of business presentations.
Ans. Importance of Business Presentations
• Business presentations are often utilized by the business as a way to sell its idea or
product for motivating the audience to accept their offering.
• An effective business presentation helps the business to obtain market and
competitive information that in a way helps them to improve their business
performances.
• Presentations can be used to inform executives and managers about the key markets
and competitive strategies this can help the management in developing strategies
and marketing plans for different markets as the needs.
• Managers can also learn more about competitive marketing strategies. Business
presentations are important because they enable executives to share details on a
company's performance.
Factors determining the effectiveness of a business presentation
• Connecting: A business presentation must be connecting; it should be interactive to
hold a memorable bonding experience between the audience and the presenter to
deliver the overall message.
• Informative: A business presentation must convey a good piece of information to the
audience and must be eye-opening and enlightening.
• Inspiring: A business presentation must be able to grab the attention of the audience
by focusing on the important points.
• Appealing: The overall impact of a business presentation is also affected by using
visual or physical props. Some of the factors that mostly appeal the audience are
screen projectors, handouts, slides and body language of the presenter.
Types of Business Presentation
1) Group Presentations: Group presentations are informational in structure; they seek
to convince the audience to accept new strategies and programs. These presentations
effectively communicate the findings of a team. These are often used at large
corporate meetings where a senior executive presents the overall corporate direction
followed by a series of staff members who present detailed strategies.
2) Presentation Aids: Nowadays, the computer programs such as Flash and PowerPoint
are used by the presenters for enhancing their presentation. PowerPoint
presentations are simple, cheap and easy to edit and are an effective visual tool. Flash
presentations, while more expensive, can help the audience to experience the
presentation via video excerpts.
3) Persuasive Presentations: Persuasive presentations seek to convince the audience to
support a certain viewpoint. Generally, it outlines an organization goal or problem
and then follows it by the statements for detailing the present state of affairs. The
presentation will lead the audience to that solution favored by the presenter using
facts as well as examples from similar business situations. For example, presentation
to introduce a new product or service or expand plant or equipment.
4) Informative Presentations: An informative business presentation plays a vital role in
the advancement of any organization and focuses on educating the audience. It
consists of marketing plan summaries and status report. Such presentations generally
begin with an overall mission statement or goal, followed by specifics and action
plans.
Difference between:
1) Android Operating System and Windows Operating System
Basis of distinction Android operating system Windows operating system
User Interface touch-based user traditional desktop user
interface interface with a mouse
and keyboard
App store Google Play Store Microsoft Store
File formats .apk file format .exe file format.
Hardware Less powerful than windows Changing with new
generation of device
customization high less
security More secure than windows Fair share of security issues
updates Released sooner than Takes time
windows
cost cheaper Expensive
compatibility Compatible with wider Less compatible than
range of apps android
Ecosystem Part of google ecosystem Part of Microsoft ecosystem

2)NEFT, RTGS, IMPS


NEFT RTGS IMPS
IMPS enables electronic
It enables one to one RTGS is primarily used for
money transactions round
transfer fund electronically large value transactions
the clock. Using IMPS, funds
to individuals/businesses (min. INR 2 Lakhs) and there
can be transferred instantly
having bank account with is no upper cap on RTGS
to any bank account across
any bank. transactions
the country.
This is an inter-bank
Is a nation-wide payment The minimum amount to be electronic fund transfer
system facilitating one-to- transferred through RTGS is system that uses mobile
one funds transfer. Rs 2 lakh. phones as a platform for the
transfer process.

3)Bookmark and Cross Referencing

• A bookmark is a kind of hyperlink that directs readers to a specific place within a


document. Bookmarks are commonly used within tables of contents to enable
readers to go straight to a particular document section.
• A cross-reference directs readers to a named source within the same document,
such as a table or graph.

5) Out of syllabus
• Active and passive attacks private

• Private and public key

Short Notes
i) Components of computer hardware
Ans. Hardware: Hardware is basically the physical element of a computer. It is also called as
the machinery or the equipment of the computer. However, most of a computer's
hardware cannot be seen; in other words, it is not an external element of the computer. A
computer's hardware is consisted of various different parts, but the most vital of all these is
the motherboard.
Software: Software is known as programs or apps, comprising of all the instructions that
direct the hardware in performing tasks. These instructions come from a software
developer in the form and are accepted by the platform (operating system + CPU) that they
are based on. Software is capable enough to perform numerous tasks, compared to
hardware that can only perform mechanical tasks they are designed forPractical computer
systems divide software systems into two parts:
1) System Software: System software is designed for controlling and working with
computer hardware. It allow users to interact directly with hardware functionality,
like the device manager and many of the utilities found in the control panel. It
consists of operating systems, device drivers, diagnostic tools, etc. and is almost
always pre-installed in computers and smartphones, examples are Windows 10, Linux,
Macintosh, Android.
2) Application Software: Application software is capable of dealing with user inputs and
helping them to complete tasks. It resides above the system software and allows
users to accomplish one or more tasks. It is programmed for simple as well as
complex tasks. It can either be a single program or a group of programs that are
referred to as an application suite.
ii) Types and Advantages of Computer Network
Ans. Types of Computer Network
1) Personal Area Networks (PAN): Personal Area Networks are interconnected
technology devices that serve a single individual within one facility. It is reachable
within a distance of 10 meters and is appropriate for small offices or residences. IT
enabled devices include telephones, computers, video game and peripheral devices
etc.
2) Local Area Network (LAN): Local Area Networks are limited to a single building like an
official establishment. It covers a defined area. It is useful for resource sharing
including file servers, printers and data storage. LAN hardware such as ether net
cables and hubs are affordable to acquire and maintain. Small LANs can efficiently
manage two to three computers, and large LANs can host thousands of servers.
Internet connectivity can either be wired or wireless. It is popular with many
establishments because of its higher speed and lower set up costs.
3) Metropolitan Area Networks (MAN): Metropolitan Area Network covers a much
larger area as compared to Local Area Network. MAN includes configured computers
covering a town, city or campus. On the basis of connections, MAN can connect either
a single area or cross several miles. MAN is basically a series of several LANs linked to
create a greater network.
4) Wide Area Networks (WAN): Wide Area Networks cover a larger geographical area as
compared to the Metropolitan Area Networks and can connect a country or even
continents. The computers are interlinked through various cables, optical fibers or
satellites. The users can access the network through modems. WANs basically
comprised several smaller networks of LANs and MANs. The internet which consists of
networks and gateways is an example of a public WAN.
5) Home Area Network (HAN): Home Area Network is a computer network limited to a
defined boundary like a house or home office. It is a type of IP based LAN which can
either be wired or wireless. HAN is a broadband connection available to users using a
wired or wireless modem. It consists of shared devices like faxes, printers, scanners
etc.
Advantages of Computer Networking
1) Overcoming Geographic Distances
2) Allowing Information Sharing
3) Supporting Distributed Processing
iii) Web Browser and its types
Web browser, in short browser, is special application software designed to enable the users
to view and read hypertext documents. The user can also navigate from one web page to
another web page with minimal effort. There are two types of web browsers:
Graphical Web Browser: It allows using point and click method to view, read, and jump
from one web page to another web page. For example, Internet Explorer, Google Chrome.
Google Chrome is a crossplatform web browser developed by Google. It was first released
in 2008 for Microsoft Windows, and was later ported to Linux, MacOS, iOS, and Android
where it is the default browser built into the OS.
Non Graphical Web Browser: In character based method, it doesn’t allow the same method
as allowed by the graphical web browser. For view, read and navigate from one web page
to another web page keyboard is used instead of mouse. For example, it allows user to
highlight the word by using arrow up and down keys and then press the enter key.
iv) Google (docs, sheets and forms)
Google Docs
Google Docs is a free web- based application in which documents and spreadsheet can be
created, edited and stored online. Files can be accessed through a network of networks i.e.
internet. It is a part of a comprehensive package of online applications offered by and
associated with Google.
Users of Google Docs can import, create, edit and update documents and spreadsheets in
various fonts and file formats, combining text with formulas, lists, tables and images. It is
compatible with most presentation software and word processor applications. Work can be
published as a Web page or as a print-ready manuscript for further reading.
Google Sheets
This application was added by Google for its users in 2006. This is a simple and inclusive
way of creating datasheets for business purposes as compared to Microsoft Excel wherein
the features and functions are quite complex. Google sheets help you in performing these
tasks:
• Create basic spreadsheets from scratch x Upload spreadsheets in XLS or CVS format
(basic formats of spreadsheet files)
• Easy to edit the spreadsheets because of familiar user interface
• Sharing spreadsheets with others is easy.
• Edit the sheets with others in real time
Google Forms
This feature is useful to make forms for collecting various inputs from employees,
customers on the products, services and other policies which are part of an organization.
v) Types and functions of Operating System
Types of Operating System
1) Batch Operating System: In this, user submits the job to the operator with the help of
some offline device like punch cards. The operator then sorts the program/ data on the
basis of pre defined sequence of commands as single unit and then collects the data
and programs in a batch and processes it for the execution. In this operating system,
CPU idle time increases because of the variation in processing speed of different I/O
devices. There is a limitation of no interaction between the user and the job. Examples
are the operating system used for payroll system, bank statements etc.
2) Real Time Operating System: It is a data processing multitasking operating system
where the functions are performed with a time constraint. This operating system has
very less response time (time taken by the system to respond to an input and display of
required information). These are used in scientific experiments, medical imaging
systems, industrial control systems, etc. The two types of real OS are: x Hard Real Time
Operating System: In this real OS, completion time taken by a task can be guaranteed. x
Soft Real Time Operating System: In this real OS, time is not guaranteed and it gives
priority to the task unless it is completed and then moves on to other tasks.
3) Time Sharing Operating System: In this operating system, users are allowed to use
resources like CPU, memory of a computer system simultaneously. The end users who
are located at various terminals can use the same computer resources with the help of
time sharing technique. For example, many users are logged on to the same mainframe
computer and they all can use the resources like CPU, memory of mainframe
computer.
4) Distributed Operating System: This operating system uses multiple central processors
to serve multiple users with multiple real time applications. The multiple processors
which are also termed as nodes, sites communicate with one another with the help of
communication lines/ telephone lines, high speed buses. The main objective of
distributed system is to share the remote resources in a controlled manner. This
operating system which runs on multiple processors tries to make several machines to
behave like a single machine. Some of the problems faced by distributed systems are of
security related issue, loss of messages in the network and overloading issues. Example
where applications of distributed computing are used: WWW, Internet, Intranet etc.
5) Network Operating System: In this operating system, activities of multiple computers
are coordinated via a network. It is designed to support and manage personal
computers, workstations and servers connected to Local Area Network. It helps servers
to be remotely accessible by different systems and by different locations. Examples of
NOS are Uniplexed Information and Computing Service (UNIX), Lovable Intellect Not
Using XP (Linux), Macintosh Operating System (Mac OS) and others.
Functions of Operating system
• User interface
• Process management
• File management
• Memory management
• Utilities and other functions
• Security management
• CPU time management
• Device Management
• Job Accounting
• Error Detecting aids
• Virus protection
vi) Key Security Principles
Identification
The term Identification in computer science is used to define and manage the roles
and access privileges of individual users on the network. It also deals with the
circumstances in which users are granted (or denied) those privileges. The user may
be either customers or employee of the company. Identification is used to give the
digital identity per individual, &once that digital identity has been established, it must
be updated, maintained, and monitored throughout each user’s “access lifecycle”.
Authentication
Authentication is the process to check the credentials of users before they are given
access to use the resources of the system. It is the ability to prove that a user or
application is genuine & on this basis it can use the resources of the organization or
network. Authentication Identification is done on the basis of the identity of the user.
Authorization process involves by giving username, a process ID, a smart card, or
anything else that can uniquely identify that object at the time of authentication. If a
user wants to access the information system which is available on a server then it
must show its identity. In authentication, the user has to prove its identity to the
server or client before it is allowed to use resources.
Authorization
The name authorization is methodology adopted by software companies to allow
lawful users to system resources including files, services, computer programs, data
and application programs. It is the process to grant or deny access to a network
resource based on the user's identity.
vii) CAPTCHA Code and its types
CAPTCHA Code
Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA)
is a method used to protect websites against spam. The goal is to stop interactive websites
from being spammed by filtering out automatically generated input. The full form of
CAPTCHA is to differentiate between humans and computers.
Types of CAPTCHA
1) Text-based CAPTCHA: The oldest form of Human Verification is the text-based
CAPTCHA. Known words or random combinations of letters and digits are alienated.
In order to continue, a user has to decipher the code represented in the CAPTCHA
box and enter the solution into the text box. Classic techniques used to create text-
based CAPTCHA are Gimpy, ez-Gimpy, Gimpy-r, and Simard’s HIP.
2) Image-based CAPTCHA: An alternative to text CAPTCHA is the image-based method.
Instead of presenting users with an alienated solution comprising of numerals and
letters, image-based CAPTCHA are based on quickly recognizable graphical elements.
3) Audio CAPTCHA: So that visually impaired people can also successfully solve
CAPTCHA codes, text-based or image-based test methods are usually combined with
so-called audio CAPTCHA. There’s often an extra button that the user can press in
order to hear an audio recording.
4) Mathematical tasks and logic CAPTCHA: A CAPTCHA alternative, which also takes
into account the needs of the visually impaired, relies on mathematical tasks or
puzzles to filter out spam bots. A task like the following can be read out with a screen
reader, if required, meaning that it can also be used by users with non-visual output
devices. To verify themselves as human beings, users have to solve a mathematical
problem.These mathematical equations are simple to solve.
viii) IMAP or POP3
IMAP: The IMAP stands for “Internet Mail Access Protocol” which deals with managing and
retrieving email from receiving servers. These protocols are used only while receiving the
email and they cannot be used for sending the email. The emails will be present in the
server and not get downloaded to the user’s device and they can be edited as if they are on
the user’s device. The user can also simultaneously connect with the server from multiple
devices.
POP: POP stands for “Post Office Protocol” which is also used for incoming emails. The
current version is 3 and POP3 is most widely used version. Unlike IMAP it downloads the
entire email into the local user device. Once the mail is downloaded on the user system, it
would delete the data on the server which is quite helpful in a server with less free
memory. It works like a post office where letters are temporarily stored before being
delivered to the end user.
ix) Word Processing and Ribbon
Word Processing
Word Processing is an idea which talks about creating or developing a document.
When we use and a computer to do so, we require software which can provide a
platform for it known as word processing software. The word processing software
helps us creating a document using computer with lots of tools and functionalities.
Ribbon
In MS Word, the menus and toolbars are replaced with the Ribbon. The objective of
Ribbon is to give you quick access to the commands by displaying them upfront while
you work on the document.
x) Meaning and Components of Mail Merge
Mail Merge
In an office environment, many times a similar type of letter or document is needed to be
sent to many individuals at different destinations. These documents may contain the
receivers’ information like name, address, phone number, etc. with the main content. The
purpose is to individualize the information for example a personal invitation to meeting or
function. If the recipients are smaller in number it can be done by typing the information of
each individual and making copies of the same letter. But if the number of recipients
intended ate huge than manual typing may be time-consuming and prone to errors. Mail
merge eliminates such issues and hundreds of letters can be created with individualize
content with the main content within minutes. The volume of the recipients becomes
immaterial Mail merge.
Components of Mail Merge
1) Main Document In mail merge, Main document is the common letter, which contains the
common content for each of the merged documents. It contains field names which are
inserted at required places in the document, which contains the instruction for carrying out
the merge.
2) Data Source Data source is the records of individuals to who letters to be sent also called
Data File. The information stored in the data files is brought into main document by mail
merge. The data file table should contain a column for each category of information’s like
for name one column, for phone no another column. Header row the first row of the table.
It contains field names which indicate the type of information in each column. Each filed
name must be unique and must begin with an alphabet letter.
3) Form Letter Form letter is the document created out of mail merge, which contains the
content of the main document with each piece of information from the data source. So, if
we have 50 rows of information in the data source form letter will be of 50 pages with the
same content but changed field information from the data source.
xi) Outline of Report and Report Finalization
Outline of Report
The structure of a business report can include the following essentials
• Title Page
• Executive Summary
• Table of Content
• Introduction
• The Body of the Report
• Conclusion
• Recommendation
• Appendix
• Bibliography and Reference
Report Finalization
Finalization is the security measures to protect the report from unauthorized changes and
plagiarism. These security measures will give an extra level of authenticity to your
electronic file before you share it. This section will cover:
• Signatures
• Insert watermarks
• Make the document ‘read-only’
• Password protect your document
• Print your document to PDF
xii) Google AdSense
There are many ways to monetize the website traffic, and most of them are related to
advertising third-party products or services to website visitors. There are many advertising
programs that can help to earn money now a days, but the most popular is Google
AdSense. Once $100 are accumulated in earnings, Google will issue a payment to the
registered users bank account. The user can choose to be paid either via direct deposit (not
available in all countries) or by cheque, out of both the options direct deposit is the fastest
method and has no fee. The Advantages of Google AdSense:
1) A huge number of publishers and advertisers: As of today, over 10 million websites
are using it.
2) High level of security, safety and transparency for both advertisers and publishers:
This is another good feature of AdSense. Google acts as an intermediary between the
two sides and is mindful of the whole process being transparent and clear for
everyone. All the necessary metrics can be tracked within Google Analytics Account.
3) Variety of ad formats: In AdSense, advertisers can run text, images, HTML ads, video
ads and much more, and in many different sizes. A publisher can experiment with
different ad types and figure out which ones drive the most revenue.
xiii) Features of AI in Animation
Automation and artificial intelligence (AI) are transforming businesses and will underwrite
to economic growth via contributions to productivity. In Animation and multimedia, it has
created a wonder.
• AI automation with train deep learning algorithms to accomplish routine tasks like
creating a digital character look lifelike.
• AI facilitates fast formation of varied game elements like 3D models and animations,
game pure mathematics, story integration and texturing
• AI tools, and robots can begin dominating the industry, simply the approach they
took over the factories and therefore the client service duties
• Inventive artists to devote fewer time on the labor-intensive setting by frame
redaction method and to target additional fascinating things.
• Norah AI software came with Auto Rig tool, human motion simulation and blending
as well as a Motion Editor that can grip a wide range of 3D animation and game
design requirements
xiv) Steps in preparing a project presentation

step5-
step3-define step4-
step1- prepare the
step2- select the objective prepare the
Analyse your introduction
a topic of body of the
audience and
presentation presentation
conclusion

xv) Different types of ratios


1) Current Ratio : For current ratio, we require the value of Current assets and Current
liabilities.
Current Ratio = Current Assets/Current Liabilities
2) Quick Ratio : For quick ratio, we require the value of Liquid Assets and Current
liabilities.
Liquid Assets = Sundry Debtors + Cash-in-hand + Bank Accounts + BR
Quick Ratio = Liquid Assets/Current Liabilities
3) Debt/Equity Ratio : For debt/equity ratio, we require the value of Total Long-term
debts and Shareholder’s funds.
Long-term Debt = Secured Loans + Unsecured Loans
Shareholder’s Funds = Reserves & Surplus + Capital A/C + P & L A/C
D/E Ratio = Long-term Debt/Shareholder’s Funds
4) Gross Profit Ratio : For gross profit ratio, we require the value of Gross Profit and Total
Sales.
Gross Profit = Sales – COGS
Gross Profit Ratio = Gross Profit/Sales
5) Net Profit Ratio : For net profit ratio, we require the value of Net Profit and Total Sales.
Net Profit = Gross Profit - (Indirect or Operational Expenses) + Indirect Income
Net Profit Ratio = Net Profit/Sales
6) Operating Cost Ratio : For operating cost ratio, we require the value of Operating Cost
and Sales.
Operating Cost = Operating Expenses + COGS
Operating Cost Ratio = Operating Cost/Sales
7) Return on Working Capital : For return on working capital, we require the value of Net
Profit and Working Capital.
Net Profit = Gross Profit - (Indirect or Operational Expenses) + Indirect Income
Working Capital = Current Assets – Current Liabilities
Return on Working Capital = Net Profit/Working Capital
8) Return on Capital Employed : For return on capital employed, we require the value of
Net Profit and Capital Employed.
Net Profit = Gross Profit - (Indirect or Operational Expenses) + Indirect Income
Capital Employed = Reserves & Surplus + Capital A/C + P & L A/C
Return on Capital Employed = Net Profit/Capital Employed
9) Inventory Turnover Ratio : For inventory turnover ratio, we require the value of COGS
and Average Inventory.
COGS = Opening Stock – Closing Stock + Purchases
Average Inventory = (Opening Inventory + Closing Inventory)/2
Inventory Turnover Ratio = Cost of Goods Sold/Average Inventory
10) Working Capital Turnover Ratio : For working capital turnover ratio, we require the
value of Net Sales and Average Working Capital.
Average Working Capital = Current Assets – Current Liabilities
Working Capital Turnover Ratio = Net Sales/Average Working Capital
xvi) Capital Budgeting and its two methods
Capital Budgeting
Capital Budgeting is a process where an organization evaluates a project, mostly long-term.
The evaluation takes in many perspectives of the project, which may include construction
of a new plant or a factory or a long-term investment made in a business model. It includes
the assessment of all the possible cash inflows and cash outflows of the project. It is to
determine whether the actual return on the investment received matches the expected
return from the project and the expenses made are exceeded by the actual return from the
project.
Methods:
1) IRR Method: Internal Rate of Return is a rate at which the NPV – Net Present Value of
both the kinds of cash flows (inflow and outflow) equals to zero. The project is desirable if
the IRR exceeds the Expected Rate of Return from the project.
2) NPV Method: It is the difference between the PV – Present Value of the Cash Inflow and
Present Value of the Cash Outflow, given a period of time.
xvii) lookup- VLookUp and HLookUp
LOOKUP function in MS Excel is used to look in a single row or a column and to find a value
from the same position in another row or a column. Its functionality is limited, because it is
not entirely eligible to handle situations where an array is involved. Therefore, we use the
other two powerful LOOKUP functions. There are mainly two types of Lookup functions in
MS Excel, namely “HLOOKUP” and “VLOOKUP”. HLOOKUP is the Horizontal Lookup and
VLOOKUP is the Vertical Lookup.
The syntax for VLOOKUP is as follows:
=VLOOKUP(lookup_value, table_array, col_index_num, [range_lookup])
The syntax for HLOOKUP is as follows :
=HLOOKUP(lookup_value, table_array, row_index_num, [range_lookup])

xvii) Classification of computers


On the Basis of Purpose
1) General Purpose Computers: General purpose computers fulfill general
requirements such as gaming, word processing, invoicing etc. these are usually
used at home, school, and in offices.
2) Special Purpose Computers: Special purpose computers are designed to perform
specific tasks. These may be used for research activities such as weather
forecasting, space research, defense research etc.
On the Basis of Size and Capacity
1) Micro Computer: Micro computers are the smallest computer system. They are
mostly single user general purpose computers. They are relatively small in size and
inexpensive computer with a microprocessor as its CPU.
2) Mini Computers: Mini computers are larger in size and are suitable for a small
business or for a department in a large organization to be used as servers which
support hundreds of users at a time in file sharing, printer sharing and storing central
information.
3) Mainframe Computers: Mainframe computers are popularly known as big iron, they
are very big in size and very expensive. These computers are capable of supporting
thousands of users at a time and have massive data storage capacity.
4) Super Computers: A super computer is a computer with a high level of performance;
they are most powerful and very expensive. Super computers are at the apex of
computing system as they have ability to perform billions of instructions per second.
On the Basis of Data Handling or Technology Used
1) Analog Computer: Analog computer is a type of computer which uses continuously-
changeable aspects of physical fact such as electrical, mechanical, or hydraulic
quantities to model the problem being solved.
2) Digital Computer: Digital computers take input data in form of numbers and perform
arithmetic and logical operations onto it to get the results. These computers are of
high speed and very accurate. Digital computers count and answer the questions by
the answer of how many.
3) Hybrid Computer: A hybrid computer is a digital computer that accepts analog
signals, converts them to digital and processes them in digital form. These computers
incorporate the technology of both analog and digital computers.
xviii) Steps to open a file for editing
• Right-click a file or click the ellipsis (...) to open the More Options menu.
• Click Open With... If there is more than one application with which you can open the
file, you will have the option to select the appropriate application.

You can also open and edit documents after previewing them. To open files with Box Tools
from the preview screen:

• Click the file to open it in preview


• Click Open. If there is more than one application with which you can open the file,
you will have the option to select the appropriate application.

xix) Functions of MS Excel

• AutoSum;
• IF function;
• LOOKUP function;
• VLOOKUP function;
• HLOOKUP function;
• MATCH function;
• CHOOSE function;
• DATE function;
• DAYS function;
• FIND & FINDB functions;
• INDEX function;

You might also like