Monday, January 30, 2023

IGNOU : BCOM : BCOS 183 - Computer Application in Business ( NOTES FOR FREE )


Commerce ePathshala NOTES (IGNOU)

Important Questions & Answers


IGNOU : BCOM

BCOS 183 – COMPUTER APPLICATION IN BUSINESS



Q –  State the Advantages & Disadvantages of Computer.

Ans. ADVANTAGES AND DISADVANTAGES OF COMPUTERS

Computers link us to the world of unknown. They support us to gather knowledge and to synchronize gigantic information from the internet and storing it at last in a customize format. Computers are multitasking and adequate enough to be used virtually anywhere and ubiquitously. Computers are versatile machines as they are flexible in performance and have made human life much faster because of its incredible speed, accuracy and storage with which humans can perform a variety of tasks. With numerous advantages, computers have got some disadvantages which are explained as follows:

Advantages of Computers: Computers have made human life much faster and easier. It has several advantages:

1) Multitasking: Computers are multitasking in nature. A lot of tasks can be performed on computers with accuracy which leads to the costs and time saving in a way. Computers can perform trillion of instructions per second. With the help of computers, people can perform multiple tasks, including complex calculations within seconds.

2) Speed: One of the major advantages of computer is their incredible speed, which helps us in completing numerous tasks just in few seconds. With the help of computers now operations can be performed in fractions of seconds which otherwise, would have taken a lot of time to perform.

3) Storage: With the help of computers a huge amount of data can be stored on the computers at a very low cost. Centralizes database of storing information is the main advantage which helps in reducing cost.

4) Accuracy: One of the root advantages of computer is that it can perform not only calculations but also with utmost accuracy.

5) Data Security: Data security means protecting the digital data and information from any unauthorised access or breach. Computers with the help of technologies can provide security from destructive forces and from unwanted action of unauthorized users like cyber-attacks or access attacks.

Disadvantages of Computer

As a famous saying states that every coin has two sides, that is equally applicable for computers. With huge advantages computers have got few disadvantages as well. As we know advantage comes with disadvantage, computers are just a machine with no IQ, no feelings, no wisdom and dependency on others is few of the disadvantages of computers rest are explained below:

1) Reduction in employment opportunities: We can surely see a gradual decrease in the employment opportunities with the emergent technologies coming to the field of computers and such as IoT, AI, blockchain, human robots, human assistance etc. As computers become smarter and more capable, these technologies have taken over the traditional jobs and reduced new emerging employment opportunities to a great extent.

2) Potential of loss of privacy: With computers storing so much of personal information is highly at risk of getting into the hands of others. Privacy violation means that someone access users’ data such as private photos, documents and show it to other people without their permission. Once a malicious person has access to someone’s personal information, they can also access their associated online accounts or also can use identity theft to open other accounts, such as a new credit card, debit card under their name.

3) Virus and hacking attacks: Virus is a type of worm and hacking is simply an unauthorized access over computer for some illicit purpose. Virus can be transferred from email attachment, viewing an infected website advertisement, via portable devices like USB, pen drive. Once virus is transferred in the host computer it can infect and overwrite existing files stored on the computer. Cyber-attacks can range from installing spyware on a personal computer to attempting to destroy the infrastructure of entire nations.

4) Cyber Crimes: With the emergent technologies cybercrimes are at a rise in every single field. Cybercrime is basically a crime in which a computer and network is involved. This is the major disadvantage of computers. It includes crimes such as cyber stalking, identity theft, loss of privacy and information etc. repercussions of those can be huge to the users.

 

 

Q –  How are the computers helpful to human beings? State the examples of real world where computers are prominently being used these days.

Ans. APPLICATIONS OF COMPUTERS

Computer is a device which can perform a variety of tasks in our daily life. Computers have their utility and applications in every arena, few of its applications in various fields are explained below:

1.      Business: Business has variety of applications of computers. From individual to multinational companies all are using computers for business purpose like payroll calculations, sales analysis, budgeting, financial forecasting, managing employee’s database and maintenance of stocks etc. Computers have made it possible for the business to grow rapidly and across boundaries.

2.      Education: Computers have completely overhauled the education industry by significantly enhancing the performances and delivery of lectures. Various online courses such as Massive Open Online Courseware (MOOC) and distance learning is in trend by utilizing the efficiencies of computers, hundreds of websites are available on internet to deliver free online education in almost every area. The 'E' in Elearning stands for 'Electronic. Henceforth, the unique term 'electronic learning'. The word 'online,' in this contextual, means with an Internet connection or via the Internet. The pedagogy may also refer to a network that can deliver knowledge and skills to one or more individuals.

3.      Banking: Computers offers various advantages in banking such as selfenquiry facility, signature retrieval facilities, remote banking, centralized information, digital transactions etc. These have helped in minimizing the human efforts, time and cost involved otherwise in doing the transactions in a traditional manner and it makes banking convenient for customers by providing 24×7 access to banking services. Online banking is an electronic payment system that permits its customers to conduct a variety of financial transactions through their respective websites.

4.      Communication: Computers can largely reduce the time taken for communication between different stakeholders. Business can use various methods of communication such as email, live chat tools, whatsapp video or phone conferencing, social networking, web conferencing it in a way improves the functioning of the organisation.

5.      Healthcare: In healthcare, computers offer miraculous therapies to the patients such as ECG, Computed Tomography (CT) scan, X-ray, radiotherapy which was otherwise not possible. With the help of computers most of the medical information from prescription to reports can be digitized. With the help of computers, the record-keeping of medicines as well as patients has become easy. Computer can even keep track of each and everything going inside the patient's body such as blood pressure and heartbeat etc. which would otherwise have been a cumbersome task. Technology and humans’ hand-in-hand for a healthier healthcare.

6.      Personal Use: Computer can also be used for various personal uses. One can use computer system to keep all the day-to-day details that are essential to keep anywhere. Computers can be used for keeping a track on personal things such as investments, incomes, expenditures, savings etc.

7.      Military and Defense: Computers are the major tools which aid in developing missiles and other equipments in the defense system. Construction of weapons and controlling their function is not possible without the aid of computers. Designing and the maintenance are possible only through computers. Computer builds the links between the soldiers and commanders through the satellite. The computers have played a progressively significant role in the military.

8.      Insurance: The emergent technologies those have been enabled by computers only such as Block-chain, Internet of Things (IOT), Artificial Intelligence (AI), Big Data, and Augmented Reality have left a greater impact on the insurance sector. Block-chain, the Distributed Ledger Technology (DLT) ensures that digital data is safe as there are fewer chances of identity theft or fraud. They also make it easier to authenticate transactions, policies for customers. Insurance companies are keeping all records up-to-date with the help of computers. The insurance companies, finance houses and stock broking firms are widely using computers for their concerns. Apart from applications of business explained above in various fields, a detailed description on it is given in the second unit named “Application of Computers”.

 

 

 

Q –  State the Role of Computer in Online banking & finance.

Ans. Online Banking

1)     Plastic Money: Popularity of credit cards or smart cards like Visa/Maestro has made the banking industry more attractive and flexible than ever before. By using online banking services, customers can very easily apply for smart cards or credit by sitting at their homes and the same can conveniently be delivered to them within a few days this do away the hassles of visiting the bank branches. Credit cards help the customers to borrow a specific amount from the bank for purchasing anything and to repay later. Smart card enables customers to instantly pay for anything and money is on the spot deducted from their bank accounts automatically. Smart cards can also be used for same card to depositing or withdrawing money from their accounts using an ATM machine.

2)     Self-Inquiry Facility: Self enquiry facility provided by banks has actually reduced a lot burden of banks. Now instead of lining up or going to the help desks at the physical branches, customers can avail simple self-inquiry facility to get all the latest information by visiting their bank’s website. This saves time on both the sides.

3)     Remote Banking: Banks these days are providing various services online. Customers are no more required to travel for miles and stand in long waiting line to get their banking transactions done such as withdrawals, deposits and another enquiry. Customers now can install various banking app or login to banks website to get their transactions done as per their convenient. Remote banking has immensely help people in rural areas to save their hassles of coming to bank branches and to improve their culture of saving money.

4)     Signature Retrieval Facilities: Computers by using internet technologies have provided services of digital authentication such as E-signature or digital signatures to safeguard the interest of its clients. By using this facility banks verifies customer’s signatures while withdrawing a large sum of money from a specific bank account this reduce the chances of frauds, errors/risks that may arise due to forgery.

5)     Centralized Information Results to Quick Services: Centralized storage of information with the banks enables them to transfer information from one branch to another effortlessly with not much time and costs involved and this results in quick services to customers. For example, if a customer registered his account with a rural branch, he can easily get details of his account at the main branch in an urban area.

Finance

1.     Financial Trading: Computer based trading is useful when a trader has a system that allows profitable trading. Computer systems can even trade on the behalf of the users. A computer system can be programmed automatically to execute buy and sell orders when the price of a stock or bond reaches to a certain predefined level, and automatically closes the order when the target price reached below a certain level.

2.     Financial Information: Through internet computers can have access to wide pool of financial information through. This enables business operators and individual’s access to the information on investment prospects that helps in conducting a detailed research on its profitability. Apart from this various other financial information such as world prices, tax changes, inflation rate and currency exchange rates are also available on internet which make easier for institutions and individuals to make informed financial decisions.

3.     Organizing and Analysing Data and Files: Computers are very useful in organizing the data efficiently. This makes it easier for anyone to organize and find the information with a few clicks. Computers also help in the facilitation of data analysis. Employees can use various technologies available to understand complex spreadsheets. For example, Microsoft Excel can help businesses to visualize their data in charts and graphs so that trends and anomalies present in data can be spotted easily.

4.     Data Storage: Keeping financial records is critical for organizations, as well as individuals, as it allows tracking of payment records, debts owed, purchases done and bank transactions made. Computers make data storage easily manageable and less bulky. Computers can also enable organizations to store large amounts of files in a small space that allows them to have a large track of historical transactions.

5.     Convenience: Personal finance can be simplified by using information technology. Banks provide data on checking and savings deposits and withdrawals in standardized formats. Customer can easily download account transactions and store records on their computers. Personal finance software includes few additional features like charts and reports that show home users what they are spending money on and where their funds are coming from.

6.     Budgeting and Bookkeeping: Computers are immensely helpful for companies considering financial transactions. Computer systems calculate and display the interest and principal of a loan, and estimate the returns on investment when the company borrows money to expand its operations. Companies can securely transfer data online, and the computer system records all transfers, which simplifies bookkeeping.

 

 

 

Q –  Describe the types of Computer Networks.

Ans. Types of Computer Networks There are various types of computer networks. The critical difference in each type lies in the extent of geographical areas they serve and their core purpose. The various types of computer networks are explained below:

1) Personal Area Networks (PAN): Personal Area Networks are interconnected technology devices that serve a single individual within one facility. It is reachable within a distance of 10 meters and is appropriate for small offices or residences. IT enabled devices include telephones, computers, video game and peripheral devices etc.

2) Local Area Network (LAN): Local Area Networks are limited to a single building like an official establishment. It covers a defined area. It is useful for resource sharing including file servers, printers and data storage. LAN hardware such as ether net cables and hubs are affordable to acquire and maintain. Small LANs can efficiently manage two to three computers, and large LANs can host thousands of servers. Internet connectivity can either be wired or wireless. It is popular with many establishments because of its higher speed and lower set up costs.

3) Metropolitan Area Networks (MAN): Metropolitan Area Network covers a much larger area as compared to Local Area Network. MAN includes configured computers covering a town, city or campus. On the basis of connections, MAN can connect either a single area or cross several miles. MAN is basically a series of several LANs linked to create a greater network.

4) Wide Area Networks (WAN): Wide Area Networks cover a larger geographical area as compared to the Metropolitan Area Networks and can connect a country or even continents. The computers are interlinked through various cables, optical fibers or satellites. The users can access the network through modems. WANs basically comprised several smaller networks of LANs and MANs. The internet which consists of networks and gateways is an example of a public WAN.

5) Home Area Network (HAN): Home Area Network is a computer network limited to a defined boundary like a house or home office. It is a type of IP based LAN which can either be wired or wireless. HAN is a broadband connection available to users using a wired or wireless modem. It consists of shared devices like faxes, printers, scanners etc.

 

 

Q –  State the Role of Computer in Business Organisation.

Ans. Some of the applications of computers in business organizations are explained below:  

1) Communication: Computers play a very important role in business organisations to maintain a smooth flow of information and communication between different parties and stakeholders. Business can use various methods of communication such as email, live chat tools, video or phone conferencing, social networking, web conferencing etc. It saves times and also improves the functioning of the organisation. With such advance tools, it also becomes easy for the business to offer customer support to its clients in a timely and efficient manner.

2) Marketing: Organizations can widely use computers for marketing as most of the marketing is done online via social media, blogging, website development, advertising, e-newsletter etc. IT developers can professionally create a website by using various enticing graphics and content with different forms of media, such as text, images, and videos to make the campaign more attractive and lucid for the audience. By using Search Engine Optimization (SEO) and Web Analytics, the website would appear prominently in Google’s search results, which then attracts traffic and ultimately enables the business to sell those products to website visitors.

3) Accounting: Computers can also help organizations in sorting its large financial data in order to obtain their large and small scale financial positions just by few clicks. Computers are also useful for performing various tasks like invoicing clients, maintaining data about debtors and creditors, calculating payroll, calculating and filing tax forms etc. With the computer, accountants can now focus on the higher level picture of a business’s finances, leaving the lower level stuff to the machines.

4) Storage: Businesses can store enormous data on computers. They don't need huge cabinets for storing data now. With computers and server, organizations are capable of storing and sorting billions of files and enable them to access at any time. Digital storage is much larger and more efficient and secure while compared with the physical storage, as it is more difficult to lose or steal files from a well-protected database which is one of the main benefits of the computer.

5) Educational Purposes: With the access of internet on the computers, organizations can reach the pool of world’s information which can be used efficiently to educate its employees such as about the company policies, software use, as well as standard procedure and safety. Instead of hiring teachers’ employees can be educated online. Live webinar, conferences and question and answer sessions can also be conducted. Employees can learn through various media, such as videos, text, etc. which enables them to better understand the subject matter.

6) Research: Computers make business organisations capable of doing a variety of functions, including research about the competition, as well as knowing about the taste and preferences of its customers. With modern data-mining techniques, a business can acquire insightful information about its customers and competition from all kinds of places, including forums, search engines, industry-specific websites and even from social networks. By conducting online surveys, business can know about the public opinions or while launching any new products and public reactions can also be known by reviewing customers review on different sites.

 

 

Q –  State the Types of Operating System. Explain.

Ans. Types of Operating System: There are various types of Operating System which have its utility and explained as follows:

1) Batch Operating System In this, user submits the job to the operator with the help of some offline device like punch cards. The operator then sorts the program/ data on the basis of pre defined sequence of commands as single unit and then collects the data and programs in a batch and processes it for the execution. In this operating system, CPU idle time increases because of the variation in processing speed of different I/O devices. There is a limitation of no interaction between the user and the job. Examples are the operating system used for payroll system, bank statements etc.

2) Real Time Operating System It is a data processing multitasking operating system where the functions are performed with a time constraint. This operating system has very less response time (time taken by the system to respond to an input and display of required information). These are used in scientific experiments, medical imaging systems, industrial control systems, etc. The two types of real OS are:

·       Hard Real Time Operating System: In this real OS, completion time taken by a task can be guaranteed.

·       Soft Real Time Operating System: In this real OS, time is not guaranteed and it gives priority to the task unless it is completed and then moves on to other tasks.

3) Time Sharing Operating System In this operating system, users are allowed to use resources like CPU, memory of a computer system simultaneously. The end users who are located at various terminals can use the same computer resources with the help of time sharing technique. For example, many users are logged on to the same mainframe computer and they all can use the resources like CPU, memory of mainframe computer. The major advantages given this operating system are that it is time saving and simultaneously many people can work on it?

4) Distributed Operating System This operating system uses multiple central processors to serve multiple users with multiple real time applications. The multiple processors which are also termed as nodes, sites communicate with one another with the help of communication lines/ telephone lines, high speed buses. The main objective of distributed system is to share the remote resources in a controlled manner. This operating system which runs on multiple processors tries to make several machines to behave like a single machine. Some of the problems faced by distributed systems are of security related issue, loss of messages in the network and overloading issues. Example where applications of distributed computing are used: WWW, Internet, Intranet etc.

5) Network Operating System In this operating system, activities of multiple computers are coordinated via a network. It is designed to support and manage personal computers, workstations and servers connected to Local Area Network. It helps servers to be remotely accessible by different systems and by different locations. Examples of NOS are Uniplexed Information and Computing Service (UNIX), Lovable Intellect Not Using XP (Linux), Macintosh Operating System (Mac OS) and others.

 

 

Q –  What is Identity Theft ? State the Methods to Prevent Identity Theft.

Ans. IDENTITY THEFT The term identity theft means cyber criminals illegally acquire credentials of innocent users and use these credentials to do online cyber-crime by hiding their actual identity and using the identity of other innocent users. It is the criminal act of illegally and deceptively assuming the identity of another individual without their expressed consent with the intent of committing a crime; it also includes fraudulent and illicit attainment of personal information through the usage of unsecured websites. Through the use of stolen documentation attained upon illicit means of electronic acquisition - individuals can fraudulently assume the identity of others in order to engage in fraudulent purchases and illicit economic gain by using internet. In other words, identity theft is also called as identity fraud and is the act of a person obtaining information illegally about someone else without consent. The Hackers try to find out information about users such as full name, maiden name, and address, date of birth, UID, passwords, phone number, e-mail, and credit card numbers & CVV No. etc. to harm the users.

Methods to prevent identity theft:

i)                At the time of entering any personal information on the Internet, please make sure that connection is encrypted.

ii)              Avoid storing credit card or personal information on any website if you do online shopping over the Internet.

iii)           Do have an active and up-to-date spy ware protection software & antivirus software. iv) Make yourself aware about fake e-mails and phishing e-mails that claim to be a company

iv)            Never use unknown & unsecured systems & smart phones.

v)              Always have strong password & keep answer of secret question unguessable.

 

 

Q –  State Six essential Security Actions.

Ans. SIX ESSENTIAL SECURITY ACTIONS

All the business organisations have to protect their IT security from unauthorized users and need to take steps to protect them from illegal users. The number of cyber attacks is increasing day by day and are affecting businesses of all sizes. In such situations, it is necessary for every company to be aware of the dangers posed by cyber criminals and be ready to safeguards their data from such criminals and having in place proper security mechanisms. There are several approaches for securing the systems in the market and installation cost and time of use is also involved in their selection.

1)     Firewall: Firewall is a type of virtual protection wall which helps to protect network traffic inbound and outbound to any organization. It stops unauthorized hackers from attacking the network by blocking them from the systems of organizations. Firewalls are programmed in such a way that they restrict the network from sending out proprietary data and confidential emails. The present era hackers have become more sophisticated with the state of art hacking technologies due to this reason firewall have become obsolete to stop them from the network of organizations.

2)     Antivirus Software: The Antivirus program is used to remove the virus from system and network of business organizations. It is basic software and should be the part of any cyber security system. In addition to this use of anti-malware software is also essential now days. The antivirus works as the final frontier in securing and defending unwanted attacks from intruding the network of business organizations. The antivirus works by detecting and removing virus and malware, adware and spyware from the network. It also scans & filter out potentially harmful downloads and emails of systems of all the organizations. Install antivirus and anti-spyware software - any computer or network used by an organization should be secured with a good firewall that takes Wi-Fi into consideration.

3)     Use Complex Passwords: The user-id and password is essential to access the resources of business organization over the network. We should always have strong password and keep it confidential from the hackers. The passwords should be changed periodically. Strong password is difficult for users to crack it and thus makes the data secure. We should confidential and complex answers to secret questions, so as to make it difficult for hackers to crack it. We should have strong password on social media sites so that our data on these sites is safe and its security is not compromised.

4)     Regular Backup: The process of saving data regularly and taking backup saves organizations from the risks of data loss. In case of data loss backup is very useful and could be used to restore the data in business organisation. With advancements in hacking technology no network is safe & perfect now days. In present time data hacking and money hacking from banks become headlines in newspapers in which hackers try to bypass the bank network security and steal money illegally. In case of hardware failure backup data is very important to run the business smooth and business interest can be safeguards with regular backup.

5)     Penetration Testing and Limit Access to Critical Data: Testing is used to test the software with the objective of finding faults in it. There are several types of testing in software engineering and penetration testing is one of them. The penetration testing is used to test the security of business organizations by calling security professionals to test the network security of business data. The security professionals; use the same technique which the hackers use to find the potential weakness and vulnerability in the security systems. We should follow the advice of security professionals and add more security tools as per the suggestions to further enhance the security of servers.

6)     Employee Training: All the employees of business organizations handling critical data must be trained before they are given responsibility to secure the data. There are several types of attacks and phishing is one of them. To protect the business organizations from phishing attacks the employees must be trained how to handle keep secure data from such attacks.

 

 

Q -   Comment on Enterprise Resource Planning (ERP).

Ans. ENTERPRISE RESOURCE PLANNING (ERP)

Enterprise Resource Planning (ERP) is a planning system which evolved from Material Resource Planning II (MRP II) which aims at providing integration of information between customer, vendor and manufacturer using networks such as LAN, WAN, Internet etc. MRP II have again evolved from MRP systems which is a technique that explores the end product demands obtained from Master Production Schedule (MPS) for a given product structure. This product structure is taken from Bill of Material (BOM) into a schedule of planned orders considering inventory in hand.

Despite various advantages, MRP II has certain drawbacks:

·       Ineffective integration of multiple functional areas to share resources

·       In application, each transaction is treated separately

·       No generic functionality is provided; specific functions cater to specific applications.

 

For the overall growth of the business environment the demands of the industry need to be understood. These demands could be the cost control initiative, cost analysis (product based or customer based), changing business requirement, effective decision making and many more. To handle such demands many applications or planning systems are available. Some of them are:

·       Management Information System (MIS)

·       Integrated Information System (IIS)

·       Executive Information System (EIS)

·       Corporate Information System (CIS)

·       Enterprise Wide Systems (EWS)

·       Material Resource Planning (MRP)

·       Manufacturing Resource Planning (MRP II)

·       Money Resource Planning (MRP III)

 

In comparison to MRP II, ERP is more effective in predicting and balancing Demand & Supply. In the next section, an introduction to Management Information System (MIS) is provided to gain a better understanding of the working of a management system.

Now by this time, the readers are familiar with Business Intelligence (BI) and ERP. It is the correct time to introduce two very important concepts: On-Line Analytical Processing (OLAP) and On-Line Transactional Processing (OLTP).

 

 

Q –  Describe the effect of Demonetization in Digital Payment.

Ans. Demonetization is the “act of stripping a currency unit of its status as a legal tender”. In other words, it is withdrawal of particular form of currency in circulation. Government of India boldly announced the demonetization on 8 November, 2016. The circulation of `500 and `1000 for any form of liquid transaction was banned from midnight and no more a legal tender from 9th November 2016. The ATM withdrawal limit was set to `2500 for that particular period.

The unexpected announcement of demonetization and prolonged cash shortages helped in increasing the digital transactions. Every sphere of economy ranging from a small shop to big malls witnessed a spurt in digital transactions across the country. After demonetization, switching to cashless payment methods becomes a necessity for both rural and urban populations. Every citizen of the country, be it a farmer, teacher, soldier or even a CEO of a big brand, needs to know about the available methods to make cashless transactions. They become more aware about the existing facilities - how they can perform online transactions such as checking account balance, bill payment, funds transfer, etc. through internet banking. Also, it is available 24x7 for the customer’s convenience. Small sellers also flocked to e-wallet methods – Paytm, Mobikwik, etc. to continue doing their business. These all gave a big push to the overall digital transactions across the country.

Also, to help the citizens with short term cash-crunch in the country, the Indian government aggressively promoted digital modes of banking. The transaction charges were waived off on few payments’ methods. The total electronic and card payments grew 46% by value and 65% by volume in 2016-17 over the previous fiscal year. Some segments like the Unified Payments Interface (UPI, the government’s real-time payments system) and Aadhaar-based payment grew fastest from a very low base. Online banking transactions and debit card payments grew the most. E-wallet companies like Paytm welcomed the decision of demonetization as this gave them an opportunity to increase their customer base. The Paytm wallet went from 125 million wallet customers before demonetization to 185 million in three months and it has continued to grow, with almost 300 million customers bases. In conclusion demonetization gave the digital payment a thrust which led to success of many payment wallet companies along with increase in acceptance of digital mode of payment among the masses.

 

 

Q –  Sate the Types of Internet Services.

Ans. TYPES OF INTERNET SERVICES

As explained in the previous section Internet is the interconnected global computer network which operates through certain set of rules called protocols. From an end-user perspective it’s the services that Internet provides make it popular.

·       E-mail: E-mail is digital form of message exchange between people. The ability to send the message across globe within seconds has made it the most popular form of message communication and has replaced almost every other physical form of communication such as letters in many spheres of life.

·       World Wide Web: Most important service of Internet which is essentially for global information sharing. It is combination of all resources- text pages, digital photographs, music files, videos and through communication model enables the exchange of the information over Internet.

·       Web Services: Web services are the standardized medium for propagation of communication taking place between the client and server applications on the Internet.

·       File Transfer Protocol (FTP): FTP is used for exchange of files across computers through Internet.

·       Chat Rooms: They are the mediums which are used for real time conversations between persons in form of text, voice or video.

·       Mailing list: It is the collection of names or/and addresses for including the people who subscribe to mailing distribution on regular basis.

·       News groups: It is an Internet-based forum for discussion on various topics by remotely connecting different users across the globe.

 

 

Q –  State the Salient Features of MS- Word.

Ans. SALIENT FEATURES OF MS WORD

Among all the popular word processing software, MS Word is used most widely which provides advanced word processing and Desktop Publishing features. The list indicates some of the basic features of MS Word:

i)                It allows you to create and save the document.

ii)              You can add, modify, or delete the text anytime in your document and save it for future reference.

iii)            It enables you to set or change the page margins as required.

iv)            It features various formatting options like and a change of font and its style. Moreover, you can insert Header and footer in the document.

vi)            The Auto Correct feature of MS Word automatically corrects the spellings and also suggests the alternate words.

vii)          It also shows document statistics like word count.

viii)        Text can be written in and a columnar style as written in newspapers. Also, text boxes can be inserted.

ix)             You can create tables in the document.

x)               The image and graphics can also be inserted in the document. MS Word provides its clip arts or the pictures can be imported from outside.

xi)             The Mail Merge feature of MS Word helps you generate multiple copies of a letter with different addresses.

xii)           MS Word also provides Macros that can be created and used in the document.

xiii)         Online help is also available to know more about and the various features and tools of MS Word.

 

 

Important Note –

·       Ask For Practical Classes on Block 3, Block 4, Block 5

·       Block 3-5 Contains, MS-Word , MS PowerPoint & MS – Excel which requires Practical Classes & Practice .

No comments:

Post a Comment