BCOS 183 Important Questions
BCOS 183 Important Questions
BCOS 183 Important Questions
1.) Communication
2.) Marketing
3.) Accounting
4.) Storage
5.) Educational purposes
6.) Research
Role of computers in business, trade and commerce
In business, trade and commerce, computers are helpful in research, production,
distribution, marketing, banking, team management, business automation, data storage,
employee management and to increase productivity at a lower cost in less time with
higher quality. The various advantages of computers in business, trade and commerce
are :
1.) Inventory Management
2.) Easier Financial Record Keeping
3.) Budgeting and Forecasting
4.) Storage
5.) Efficiency of Operations
6.) Streamlining Business Communications
7.) Managing Customer and Partner Relationships
Role of computers in online banking and finance
Technology has revamped the accounting and management system of banking operations and it is now also focusing
on changing the way how banks are delivering services to their customers. Along with these, computers have also
transformed the financial industry and the way business deals are conducted from offline meeting to the online
spaces. Accountants can now keep large amount of data to conduct complex calculations and manage financial
transactions all from a computer than storing the data in books. Various applications of computers in online banking
and finance are :
Plastic Money Financial Trading
Financial
Self-Enquiry Information
Facility Organizing and
Analyzing Data and
Online Files
Remote Banking Finance
Banking Data Storage
Digital
Authentication Convenience
Q3. ( i.) What is Computer software and its types ? Explain methods to prevent identity
theft.
Ans. Software : software consists of a set of instructions that directs computer to perform
the designated / specific task . it is a common term used to describe various programmes
used for computer and related devices operations . the variable and non- physical
instructions given with the help of scripts , applications and programmes of computer are
used to describe software.
Types of Software
software
system application
software software
Digital Wallets
Banking cards
Internet Banking
Q4. What are the six essential security actions and impact of digitalization in business
world?
Ans. Six essential security Actions
1. Firewall: Firewall is a type of virtual protection wall which helps to protect network
traffic inbound and outbound to any organization. It stops unauthorized hackers from
attacking the network by blocking them from the systems of organizations. Firewalls
are programmed in such a way that they restrict the network from sending out
proprietary data and confidential emails.
2. Antivirus Software: The Antivirus program is used to remove the virus from system
and network of business organizations. It is basic software and should be the part of
any cyber security system. The antivirus works as the final frontier in securing and
defending unwanted attacks from intruding the network of business organizations.
The antivirus works by detecting and removing virus and malware, adware and
spyware from the network. It also scans & filter out potentially harmful downloads
and emails of systems of all the organizations.
3. Use Complex Passwords: The user-id and password is essential to access the
resources of business organization over the network. We should always have strong
password and keep it confidential from the hackers. The passwords should be
changed periodically. Strong password is difficult for users to crack it and thus makes
the data secure.
4. Regular Backup: : The process of saving data regularly and taking backup saves
organizations from the risks of data loss. In case of data loss backup is very useful and
could be used to restore the data in business organisation. To reduce the risk, regular
back of data is very much essential.
5. Penetration Testing and Limit Access to Critical Data: Testing is used to test the
software with the objective of finding faults in it. There are several types of testing in
software engineering and penetration testing is one of them. The penetration testing
is used to test the security of business organizations by calling security professionals
to test the network security of business data. The security professionals; use the
same technique which the hackers use to find the potential weakness and
vulnerability in the security systems.
6. Employee Training: All the employees of business organizations handling critical data
must be trained before they are given responsibility to secure the data. There are
several types of attacks and phishing is one of them. To protect the business
organizations from phishing attacks the employees must be trained how to handle
keep secure data from such attacks.
Impact of Digitalization in Business world
Digitalization: The term digitization is used to convert paper based data and information
into electronic way of saving, so that it can be retrieved, processed and updated by using
computer system. The integration of digital technologies into computer readable format is
known as digitization.
Impacts:
1.) Artificial Intelligence (AI): Artificial intelligence is the design and development of
artificially intelligent machines which can do the work the way human do AI has
already changed the business world to such an extent, that all the business
organizations are using AI in their products.
2.) Flexible work
3.) Innovation
4.) New Business Models
5.) Communication
Q5. Explain the impact of Demonetization on E-wallets.
OR
How is e-payment system better than traditional payment system?
Ans. E-Wallet: An Electronic Wallet is any device or software which allows a user to store,
manipulate, and pay with various types of payment instruments such as electronic cash and
credit cards. They make it unnecessary to retype credit card numbers and addresses each
time a purchase is made.
Impact of Demonetization on E-Wallets
➢ Demonetization is withdrawal of particular form of currency in circulation.
Government of India boldly announced the demonetization on 8 November, 2016.
The circulation of C500 and C1000 for any form of liquid transaction was banned
from midnight and no more a legal tender from 9th November 2016. The ATM
withdrawal limit was set to C2500 for that particular period.
➢ The unexpected announcement of demonetization and prolonged cash shortages
helped in increasing the digital transactions. Every sphere of economy ranging from a
small shop to big malls witnessed a spurt in digital transactions across the country.
➢ Every citizen of the country, be it a farmer, teacher, soldier or even a CEO of a big
brand, needs to know about the available methods to make cashless transactions.
They become more aware about the existing facilities - how they can perform online
transactions such as checking account balance, bill payment, funds transfer, etc.
through internet banking.
➢ it is available 24x7 for the customer’s convenience. Small sellers also flocked to e-
wallet methods – Paytm, Mobikwik, etc. to continue doing their business. These all
gave a big push to the overall digital transactions across the country.
➢ E-wallet companies like Paytm welcomed the decision of demonetization as this gave
them an opportunity to increase their customer base.
In conclusion demonetization gave the digital payment a thrust which led to success
of many payment wallet companies along with increase in acceptance of digital mode
of payment among the masses.
Q5. Explain salient features of MS Word and different types of Text case. What is Generic
structure of Business Report ?
Ans. Salient features of MS Word
i. It allows you to create and save the document.
ii. You can add, modify, or delete the text anytime in your document and save it for
future reference.
iii. It enables you to set or change the page margins as required.
iv. It features various formatting options like and a change of font and its style.
Moreover, you can insert Header and footer in the document.
v. The Auto Correct feature of MS Word automatically corrects the spellings and also
suggests the alternate words.
vi. It also shows document statistics like word count.
vii. Text can be written in and a columnar style as written in newspapers. Also, text
boxes can be inserted.
viii. You can create tables in the document.
ix. The image and graphics can also be inserted in the document. MS Word provides its
clip arts or the pictures can be imported from outside.
x. The Mail Merge feature of MS Word helps you generate multiple copies of a letter
with different addresses.
xi. MS Word also provides Macros that can be created and used in the document.
xii. Online help is also available to know more about and the various features and tools
of MS Word.
Different types of Text Case
a) Sentence case: This option will make the first letter of each sentence in upper case.
b) Lower case: If you select the “Lower Case” option, all the characters of the selected
text would be changed in the lower case
c) Upper case: If you select the “Upper Case” option, all the characters of the selected
text would be changed in the lower case
d) Title case: The “Title Case” makes the first character of each word in the Upper Case.
e) Toggle case: The Toggle Case makes all the lower case characters into upper case and
all the upper case characters into the lower case for the selected paragraph.
Generic Structure of Business Report
The structure of business report includes the following essentials:
• Title Page
• Executive Summary
• Table of Content
• Introduction
• The Body of the Report
• Conclusion
• Recommendation
• Appendix
• Bibliography and Reference
Q7. What are the challenges faced in implementing multimedia tool in business? Explain
main functions and application of Youtube in business.
Ans. Challenges faced in implementing multimedia tool in business
i. Information security (including data privacy, storage, and management)
ii. Social media
iii. Risk management and governance
iv. Regulatory compliance
v. Technology integration and upgradation
vi. Resource management
vii. Infrastructure management etc.
Main functions of Youtube
1) Users can search for and watch videos of their interest
2) A personal YouTube channel can be created to reach to a large group of people
3) Upload videos to your channel
4) Video uploaded on YouTube can be watched and shared with others free of cost
5) Users can subscribe and follow other YouTube channels and users to get updated with
any further notification by them
6) Various playlists can be created as per the need to organize and group videos together
Application of Youtube in business
1.) Using youtube for brand awareness
2.) Using youtube for advertising products
3.) Using youtube for retail promotion
4.) Using youtube for sales
5.) Using youtube for product/ customer support
6.) Using youtube for training purpose
Q8. Explain importance and various factors determining the effectiveness of business
presentations. Define types of business presentations.
Ans. Importance of Business Presentations
• Business presentations are often utilized by the business as a way to sell its idea or
product for motivating the audience to accept their offering.
• An effective business presentation helps the business to obtain market and
competitive information that in a way helps them to improve their business
performances.
• Presentations can be used to inform executives and managers about the key markets
and competitive strategies this can help the management in developing strategies
and marketing plans for different markets as the needs.
• Managers can also learn more about competitive marketing strategies. Business
presentations are important because they enable executives to share details on a
company's performance.
Factors determining the effectiveness of a business presentation
• Connecting: A business presentation must be connecting; it should be interactive to
hold a memorable bonding experience between the audience and the presenter to
deliver the overall message.
• Informative: A business presentation must convey a good piece of information to the
audience and must be eye-opening and enlightening.
• Inspiring: A business presentation must be able to grab the attention of the audience
by focusing on the important points.
• Appealing: The overall impact of a business presentation is also affected by using
visual or physical props. Some of the factors that mostly appeal the audience are
screen projectors, handouts, slides and body language of the presenter.
Types of Business Presentation
1) Group Presentations: Group presentations are informational in structure; they seek
to convince the audience to accept new strategies and programs. These presentations
effectively communicate the findings of a team. These are often used at large
corporate meetings where a senior executive presents the overall corporate direction
followed by a series of staff members who present detailed strategies.
2) Presentation Aids: Nowadays, the computer programs such as Flash and PowerPoint
are used by the presenters for enhancing their presentation. PowerPoint
presentations are simple, cheap and easy to edit and are an effective visual tool. Flash
presentations, while more expensive, can help the audience to experience the
presentation via video excerpts.
3) Persuasive Presentations: Persuasive presentations seek to convince the audience to
support a certain viewpoint. Generally, it outlines an organization goal or problem
and then follows it by the statements for detailing the present state of affairs. The
presentation will lead the audience to that solution favored by the presenter using
facts as well as examples from similar business situations. For example, presentation
to introduce a new product or service or expand plant or equipment.
4) Informative Presentations: An informative business presentation plays a vital role in
the advancement of any organization and focuses on educating the audience. It
consists of marketing plan summaries and status report. Such presentations generally
begin with an overall mission statement or goal, followed by specifics and action
plans.
Difference between:
1) Android Operating System and Windows Operating System
Basis of distinction Android operating system Windows operating system
User Interface touch-based user traditional desktop user
interface interface with a mouse
and keyboard
App store Google Play Store Microsoft Store
File formats .apk file format .exe file format.
Hardware Less powerful than windows Changing with new
generation of device
customization high less
security More secure than windows Fair share of security issues
updates Released sooner than Takes time
windows
cost cheaper Expensive
compatibility Compatible with wider Less compatible than
range of apps android
Ecosystem Part of google ecosystem Part of Microsoft ecosystem
5) Out of syllabus
• Active and passive attacks private
Short Notes
i) Components of computer hardware
Ans. Hardware: Hardware is basically the physical element of a computer. It is also called as
the machinery or the equipment of the computer. However, most of a computer's
hardware cannot be seen; in other words, it is not an external element of the computer. A
computer's hardware is consisted of various different parts, but the most vital of all these is
the motherboard.
Software: Software is known as programs or apps, comprising of all the instructions that
direct the hardware in performing tasks. These instructions come from a software
developer in the form and are accepted by the platform (operating system + CPU) that they
are based on. Software is capable enough to perform numerous tasks, compared to
hardware that can only perform mechanical tasks they are designed forPractical computer
systems divide software systems into two parts:
1) System Software: System software is designed for controlling and working with
computer hardware. It allow users to interact directly with hardware functionality,
like the device manager and many of the utilities found in the control panel. It
consists of operating systems, device drivers, diagnostic tools, etc. and is almost
always pre-installed in computers and smartphones, examples are Windows 10, Linux,
Macintosh, Android.
2) Application Software: Application software is capable of dealing with user inputs and
helping them to complete tasks. It resides above the system software and allows
users to accomplish one or more tasks. It is programmed for simple as well as
complex tasks. It can either be a single program or a group of programs that are
referred to as an application suite.
ii) Types and Advantages of Computer Network
Ans. Types of Computer Network
1) Personal Area Networks (PAN): Personal Area Networks are interconnected
technology devices that serve a single individual within one facility. It is reachable
within a distance of 10 meters and is appropriate for small offices or residences. IT
enabled devices include telephones, computers, video game and peripheral devices
etc.
2) Local Area Network (LAN): Local Area Networks are limited to a single building like an
official establishment. It covers a defined area. It is useful for resource sharing
including file servers, printers and data storage. LAN hardware such as ether net
cables and hubs are affordable to acquire and maintain. Small LANs can efficiently
manage two to three computers, and large LANs can host thousands of servers.
Internet connectivity can either be wired or wireless. It is popular with many
establishments because of its higher speed and lower set up costs.
3) Metropolitan Area Networks (MAN): Metropolitan Area Network covers a much
larger area as compared to Local Area Network. MAN includes configured computers
covering a town, city or campus. On the basis of connections, MAN can connect either
a single area or cross several miles. MAN is basically a series of several LANs linked to
create a greater network.
4) Wide Area Networks (WAN): Wide Area Networks cover a larger geographical area as
compared to the Metropolitan Area Networks and can connect a country or even
continents. The computers are interlinked through various cables, optical fibers or
satellites. The users can access the network through modems. WANs basically
comprised several smaller networks of LANs and MANs. The internet which consists of
networks and gateways is an example of a public WAN.
5) Home Area Network (HAN): Home Area Network is a computer network limited to a
defined boundary like a house or home office. It is a type of IP based LAN which can
either be wired or wireless. HAN is a broadband connection available to users using a
wired or wireless modem. It consists of shared devices like faxes, printers, scanners
etc.
Advantages of Computer Networking
1) Overcoming Geographic Distances
2) Allowing Information Sharing
3) Supporting Distributed Processing
iii) Web Browser and its types
Web browser, in short browser, is special application software designed to enable the users
to view and read hypertext documents. The user can also navigate from one web page to
another web page with minimal effort. There are two types of web browsers:
Graphical Web Browser: It allows using point and click method to view, read, and jump
from one web page to another web page. For example, Internet Explorer, Google Chrome.
Google Chrome is a crossplatform web browser developed by Google. It was first released
in 2008 for Microsoft Windows, and was later ported to Linux, MacOS, iOS, and Android
where it is the default browser built into the OS.
Non Graphical Web Browser: In character based method, it doesn’t allow the same method
as allowed by the graphical web browser. For view, read and navigate from one web page
to another web page keyboard is used instead of mouse. For example, it allows user to
highlight the word by using arrow up and down keys and then press the enter key.
iv) Google (docs, sheets and forms)
Google Docs
Google Docs is a free web- based application in which documents and spreadsheet can be
created, edited and stored online. Files can be accessed through a network of networks i.e.
internet. It is a part of a comprehensive package of online applications offered by and
associated with Google.
Users of Google Docs can import, create, edit and update documents and spreadsheets in
various fonts and file formats, combining text with formulas, lists, tables and images. It is
compatible with most presentation software and word processor applications. Work can be
published as a Web page or as a print-ready manuscript for further reading.
Google Sheets
This application was added by Google for its users in 2006. This is a simple and inclusive
way of creating datasheets for business purposes as compared to Microsoft Excel wherein
the features and functions are quite complex. Google sheets help you in performing these
tasks:
• Create basic spreadsheets from scratch x Upload spreadsheets in XLS or CVS format
(basic formats of spreadsheet files)
• Easy to edit the spreadsheets because of familiar user interface
• Sharing spreadsheets with others is easy.
• Edit the sheets with others in real time
Google Forms
This feature is useful to make forms for collecting various inputs from employees,
customers on the products, services and other policies which are part of an organization.
v) Types and functions of Operating System
Types of Operating System
1) Batch Operating System: In this, user submits the job to the operator with the help of
some offline device like punch cards. The operator then sorts the program/ data on the
basis of pre defined sequence of commands as single unit and then collects the data
and programs in a batch and processes it for the execution. In this operating system,
CPU idle time increases because of the variation in processing speed of different I/O
devices. There is a limitation of no interaction between the user and the job. Examples
are the operating system used for payroll system, bank statements etc.
2) Real Time Operating System: It is a data processing multitasking operating system
where the functions are performed with a time constraint. This operating system has
very less response time (time taken by the system to respond to an input and display of
required information). These are used in scientific experiments, medical imaging
systems, industrial control systems, etc. The two types of real OS are: x Hard Real Time
Operating System: In this real OS, completion time taken by a task can be guaranteed. x
Soft Real Time Operating System: In this real OS, time is not guaranteed and it gives
priority to the task unless it is completed and then moves on to other tasks.
3) Time Sharing Operating System: In this operating system, users are allowed to use
resources like CPU, memory of a computer system simultaneously. The end users who
are located at various terminals can use the same computer resources with the help of
time sharing technique. For example, many users are logged on to the same mainframe
computer and they all can use the resources like CPU, memory of mainframe
computer.
4) Distributed Operating System: This operating system uses multiple central processors
to serve multiple users with multiple real time applications. The multiple processors
which are also termed as nodes, sites communicate with one another with the help of
communication lines/ telephone lines, high speed buses. The main objective of
distributed system is to share the remote resources in a controlled manner. This
operating system which runs on multiple processors tries to make several machines to
behave like a single machine. Some of the problems faced by distributed systems are of
security related issue, loss of messages in the network and overloading issues. Example
where applications of distributed computing are used: WWW, Internet, Intranet etc.
5) Network Operating System: In this operating system, activities of multiple computers
are coordinated via a network. It is designed to support and manage personal
computers, workstations and servers connected to Local Area Network. It helps servers
to be remotely accessible by different systems and by different locations. Examples of
NOS are Uniplexed Information and Computing Service (UNIX), Lovable Intellect Not
Using XP (Linux), Macintosh Operating System (Mac OS) and others.
Functions of Operating system
• User interface
• Process management
• File management
• Memory management
• Utilities and other functions
• Security management
• CPU time management
• Device Management
• Job Accounting
• Error Detecting aids
• Virus protection
vi) Key Security Principles
Identification
The term Identification in computer science is used to define and manage the roles
and access privileges of individual users on the network. It also deals with the
circumstances in which users are granted (or denied) those privileges. The user may
be either customers or employee of the company. Identification is used to give the
digital identity per individual, &once that digital identity has been established, it must
be updated, maintained, and monitored throughout each user’s “access lifecycle”.
Authentication
Authentication is the process to check the credentials of users before they are given
access to use the resources of the system. It is the ability to prove that a user or
application is genuine & on this basis it can use the resources of the organization or
network. Authentication Identification is done on the basis of the identity of the user.
Authorization process involves by giving username, a process ID, a smart card, or
anything else that can uniquely identify that object at the time of authentication. If a
user wants to access the information system which is available on a server then it
must show its identity. In authentication, the user has to prove its identity to the
server or client before it is allowed to use resources.
Authorization
The name authorization is methodology adopted by software companies to allow
lawful users to system resources including files, services, computer programs, data
and application programs. It is the process to grant or deny access to a network
resource based on the user's identity.
vii) CAPTCHA Code and its types
CAPTCHA Code
Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA)
is a method used to protect websites against spam. The goal is to stop interactive websites
from being spammed by filtering out automatically generated input. The full form of
CAPTCHA is to differentiate between humans and computers.
Types of CAPTCHA
1) Text-based CAPTCHA: The oldest form of Human Verification is the text-based
CAPTCHA. Known words or random combinations of letters and digits are alienated.
In order to continue, a user has to decipher the code represented in the CAPTCHA
box and enter the solution into the text box. Classic techniques used to create text-
based CAPTCHA are Gimpy, ez-Gimpy, Gimpy-r, and Simard’s HIP.
2) Image-based CAPTCHA: An alternative to text CAPTCHA is the image-based method.
Instead of presenting users with an alienated solution comprising of numerals and
letters, image-based CAPTCHA are based on quickly recognizable graphical elements.
3) Audio CAPTCHA: So that visually impaired people can also successfully solve
CAPTCHA codes, text-based or image-based test methods are usually combined with
so-called audio CAPTCHA. There’s often an extra button that the user can press in
order to hear an audio recording.
4) Mathematical tasks and logic CAPTCHA: A CAPTCHA alternative, which also takes
into account the needs of the visually impaired, relies on mathematical tasks or
puzzles to filter out spam bots. A task like the following can be read out with a screen
reader, if required, meaning that it can also be used by users with non-visual output
devices. To verify themselves as human beings, users have to solve a mathematical
problem.These mathematical equations are simple to solve.
viii) IMAP or POP3
IMAP: The IMAP stands for “Internet Mail Access Protocol” which deals with managing and
retrieving email from receiving servers. These protocols are used only while receiving the
email and they cannot be used for sending the email. The emails will be present in the
server and not get downloaded to the user’s device and they can be edited as if they are on
the user’s device. The user can also simultaneously connect with the server from multiple
devices.
POP: POP stands for “Post Office Protocol” which is also used for incoming emails. The
current version is 3 and POP3 is most widely used version. Unlike IMAP it downloads the
entire email into the local user device. Once the mail is downloaded on the user system, it
would delete the data on the server which is quite helpful in a server with less free
memory. It works like a post office where letters are temporarily stored before being
delivered to the end user.
ix) Word Processing and Ribbon
Word Processing
Word Processing is an idea which talks about creating or developing a document.
When we use and a computer to do so, we require software which can provide a
platform for it known as word processing software. The word processing software
helps us creating a document using computer with lots of tools and functionalities.
Ribbon
In MS Word, the menus and toolbars are replaced with the Ribbon. The objective of
Ribbon is to give you quick access to the commands by displaying them upfront while
you work on the document.
x) Meaning and Components of Mail Merge
Mail Merge
In an office environment, many times a similar type of letter or document is needed to be
sent to many individuals at different destinations. These documents may contain the
receivers’ information like name, address, phone number, etc. with the main content. The
purpose is to individualize the information for example a personal invitation to meeting or
function. If the recipients are smaller in number it can be done by typing the information of
each individual and making copies of the same letter. But if the number of recipients
intended ate huge than manual typing may be time-consuming and prone to errors. Mail
merge eliminates such issues and hundreds of letters can be created with individualize
content with the main content within minutes. The volume of the recipients becomes
immaterial Mail merge.
Components of Mail Merge
1) Main Document In mail merge, Main document is the common letter, which contains the
common content for each of the merged documents. It contains field names which are
inserted at required places in the document, which contains the instruction for carrying out
the merge.
2) Data Source Data source is the records of individuals to who letters to be sent also called
Data File. The information stored in the data files is brought into main document by mail
merge. The data file table should contain a column for each category of information’s like
for name one column, for phone no another column. Header row the first row of the table.
It contains field names which indicate the type of information in each column. Each filed
name must be unique and must begin with an alphabet letter.
3) Form Letter Form letter is the document created out of mail merge, which contains the
content of the main document with each piece of information from the data source. So, if
we have 50 rows of information in the data source form letter will be of 50 pages with the
same content but changed field information from the data source.
xi) Outline of Report and Report Finalization
Outline of Report
The structure of a business report can include the following essentials
• Title Page
• Executive Summary
• Table of Content
• Introduction
• The Body of the Report
• Conclusion
• Recommendation
• Appendix
• Bibliography and Reference
Report Finalization
Finalization is the security measures to protect the report from unauthorized changes and
plagiarism. These security measures will give an extra level of authenticity to your
electronic file before you share it. This section will cover:
• Signatures
• Insert watermarks
• Make the document ‘read-only’
• Password protect your document
• Print your document to PDF
xii) Google AdSense
There are many ways to monetize the website traffic, and most of them are related to
advertising third-party products or services to website visitors. There are many advertising
programs that can help to earn money now a days, but the most popular is Google
AdSense. Once $100 are accumulated in earnings, Google will issue a payment to the
registered users bank account. The user can choose to be paid either via direct deposit (not
available in all countries) or by cheque, out of both the options direct deposit is the fastest
method and has no fee. The Advantages of Google AdSense:
1) A huge number of publishers and advertisers: As of today, over 10 million websites
are using it.
2) High level of security, safety and transparency for both advertisers and publishers:
This is another good feature of AdSense. Google acts as an intermediary between the
two sides and is mindful of the whole process being transparent and clear for
everyone. All the necessary metrics can be tracked within Google Analytics Account.
3) Variety of ad formats: In AdSense, advertisers can run text, images, HTML ads, video
ads and much more, and in many different sizes. A publisher can experiment with
different ad types and figure out which ones drive the most revenue.
xiii) Features of AI in Animation
Automation and artificial intelligence (AI) are transforming businesses and will underwrite
to economic growth via contributions to productivity. In Animation and multimedia, it has
created a wonder.
• AI automation with train deep learning algorithms to accomplish routine tasks like
creating a digital character look lifelike.
• AI facilitates fast formation of varied game elements like 3D models and animations,
game pure mathematics, story integration and texturing
• AI tools, and robots can begin dominating the industry, simply the approach they
took over the factories and therefore the client service duties
• Inventive artists to devote fewer time on the labor-intensive setting by frame
redaction method and to target additional fascinating things.
• Norah AI software came with Auto Rig tool, human motion simulation and blending
as well as a Motion Editor that can grip a wide range of 3D animation and game
design requirements
xiv) Steps in preparing a project presentation
step5-
step3-define step4-
step1- prepare the
step2- select the objective prepare the
Analyse your introduction
a topic of body of the
audience and
presentation presentation
conclusion
You can also open and edit documents after previewing them. To open files with Box Tools
from the preview screen:
• AutoSum;
• IF function;
• LOOKUP function;
• VLOOKUP function;
• HLOOKUP function;
• MATCH function;
• CHOOSE function;
• DATE function;
• DAYS function;
• FIND & FINDB functions;
• INDEX function;