Commerce ePathshala NOTES
(IGNOU)
Important Questions & Answers
IGNOU
: BCOM
BCOS 183 – COMPUTER APPLICATION IN BUSINESS
Q – State the Advantages
& Disadvantages of Computer.
Ans.
ADVANTAGES AND DISADVANTAGES OF COMPUTERS
Computers link us to the world of unknown. They support
us to gather knowledge and to synchronize gigantic information from the
internet and storing it at last in a customize format. Computers are
multitasking and adequate enough to be used virtually anywhere and
ubiquitously. Computers are versatile machines as they are flexible in
performance and have made human life much faster because of its incredible
speed, accuracy and storage with which humans can perform a variety of tasks.
With numerous advantages, computers have got some disadvantages which are
explained as follows:
Advantages
of Computers: Computers have made human life much faster
and easier. It has several advantages:
1)
Multitasking: Computers are multitasking in nature. A
lot of tasks can be performed on computers with accuracy which leads to the
costs and time saving in a way. Computers can perform trillion of instructions
per second. With the help of computers, people can perform multiple tasks,
including complex calculations within seconds.
2)
Speed: One of the major advantages of computer is their
incredible speed, which helps us in completing numerous tasks just in few
seconds. With the help of computers now operations can be performed in
fractions of seconds which otherwise, would have taken a lot of time to
perform.
3)
Storage: With the help of computers a huge amount of data can
be stored on the computers at a very low cost. Centralizes database of storing
information is the main advantage which helps in reducing cost.
4)
Accuracy: One of the root advantages of computer is that it can
perform not only calculations but also with utmost accuracy.
5)
Data Security: Data security means protecting the digital
data and information from any unauthorised access or breach. Computers with the
help of technologies can provide security from destructive forces and from
unwanted action of unauthorized users like cyber-attacks or access attacks.
Disadvantages
of Computer
As a famous saying states that every coin has two
sides, that is equally applicable for computers. With huge advantages computers
have got few disadvantages as well. As we know advantage comes with disadvantage,
computers are just a machine with no IQ, no feelings, no wisdom and dependency
on others is few of the disadvantages of computers rest are explained below:
1)
Reduction in employment opportunities: We can surely see a
gradual decrease in the employment opportunities with the emergent technologies
coming to the field of computers and such as IoT, AI, blockchain, human robots,
human assistance etc. As computers become smarter and more capable, these
technologies have taken over the traditional jobs and reduced new emerging
employment opportunities to a great extent.
2)
Potential of loss of privacy: With computers storing so
much of personal information is highly at risk of getting into the hands of
others. Privacy violation means that someone access users’ data such as private
photos, documents and show it to other people without their permission. Once a
malicious person has access to someone’s personal information, they can also
access their associated online accounts or also can use identity theft to open
other accounts, such as a new credit card, debit card under their name.
3)
Virus and hacking attacks: Virus is a type of worm and hacking
is simply an unauthorized access over computer for some illicit purpose. Virus
can be transferred from email attachment, viewing an infected website
advertisement, via portable devices like USB, pen drive. Once virus is
transferred in the host computer it can infect and overwrite existing files
stored on the computer. Cyber-attacks can range from installing spyware on a
personal computer to attempting to destroy the infrastructure of entire
nations.
4)
Cyber Crimes: With the emergent technologies cybercrimes
are at a rise in every single field. Cybercrime is basically a crime in which a
computer and network is involved. This is the major disadvantage of computers.
It includes crimes such as cyber stalking, identity theft, loss of privacy and
information etc. repercussions of those can be huge to the users.
Q – How are the computers
helpful to human beings? State the examples of real world where computers are
prominently being used these days.
Ans.
APPLICATIONS OF COMPUTERS
Computer is a device which can perform a variety of
tasks in our daily life. Computers have their utility and applications in every
arena, few of its applications in various fields are explained below:
1. Business:
Business has variety of applications of computers. From individual to
multinational companies all are using computers for business purpose like
payroll calculations, sales analysis, budgeting, financial forecasting,
managing employee’s database and maintenance of stocks etc. Computers have made
it possible for the business to grow rapidly and across boundaries.
2. Education:
Computers have completely overhauled the education industry by significantly
enhancing the performances and delivery of lectures. Various online courses
such as Massive Open Online Courseware (MOOC) and distance learning is in trend
by utilizing the efficiencies of computers, hundreds of websites are available
on internet to deliver free online education in almost every area. The 'E' in
Elearning stands for 'Electronic. Henceforth, the unique term 'electronic
learning'. The word 'online,' in this contextual, means with an Internet
connection or via the Internet. The pedagogy may also refer to a network that
can deliver knowledge and skills to one or more individuals.
3. Banking:
Computers offers various advantages in banking such as selfenquiry facility,
signature retrieval facilities, remote banking, centralized information, digital
transactions etc. These have helped in minimizing the human efforts, time and
cost involved otherwise in doing the transactions in a traditional manner and
it makes banking convenient for customers by providing 24×7 access to banking
services. Online banking is an electronic payment system that permits its
customers to conduct a variety of financial transactions through their
respective websites.
4. Communication:
Computers can largely reduce the time taken for communication between different
stakeholders. Business can use various methods of communication such as email,
live chat tools, whatsapp video or phone conferencing, social networking, web
conferencing it in a way improves the functioning of the organisation.
5. Healthcare:
In healthcare, computers offer miraculous therapies to the patients such as
ECG, Computed Tomography (CT) scan, X-ray, radiotherapy which was otherwise not
possible. With the help of computers most of the medical information from
prescription to reports can be digitized. With the help of computers, the
record-keeping of medicines as well as patients has become easy. Computer can
even keep track of each and everything going inside the patient's body such as
blood pressure and heartbeat etc. which would otherwise have been a cumbersome task.
Technology and humans’ hand-in-hand for a healthier healthcare.
6. Personal Use:
Computer can also be used for various personal uses. One can use computer
system to keep all the day-to-day details that are essential to keep anywhere.
Computers can be used for keeping a track on personal things such as
investments, incomes, expenditures, savings etc.
7. Military and Defense:
Computers are the major tools which aid in developing missiles and other
equipments in the defense system. Construction of weapons and controlling their
function is not possible without the aid of computers. Designing and the
maintenance are possible only through computers. Computer builds the links
between the soldiers and commanders through the satellite. The computers have
played a progressively significant role in the military.
8. Insurance:
The emergent technologies those have been enabled by computers only such as
Block-chain, Internet of Things (IOT), Artificial Intelligence (AI), Big Data,
and Augmented Reality have left a greater impact on the insurance sector.
Block-chain, the Distributed Ledger Technology (DLT) ensures that digital data
is safe as there are fewer chances of identity theft or fraud. They also make
it easier to authenticate transactions, policies for customers. Insurance
companies are keeping all records up-to-date with the help of computers. The
insurance companies, finance houses and stock broking firms are widely using
computers for their concerns. Apart from applications of business explained
above in various fields, a detailed description on it is given in the second
unit named “Application of Computers”.
Q – State the Role of
Computer in Online banking & finance.
Ans.
Online Banking
1) Plastic Money:
Popularity of credit cards or smart cards like Visa/Maestro has made the
banking industry more attractive and flexible than ever before. By using online
banking services, customers can very easily apply for smart cards or credit by
sitting at their homes and the same can conveniently be delivered to them
within a few days this do away the hassles of visiting the bank branches.
Credit cards help the customers to borrow a specific amount from the bank for
purchasing anything and to repay later. Smart card enables customers to
instantly pay for anything and money is on the spot deducted from their bank
accounts automatically. Smart cards can also be used for same card to
depositing or withdrawing money from their accounts using an ATM machine.
2) Self-Inquiry Facility:
Self enquiry facility provided by banks has actually reduced a lot burden of
banks. Now instead of lining up or going to the help desks at the physical
branches, customers can avail simple self-inquiry facility to get all the
latest information by visiting their bank’s website. This saves time on both
the sides.
3) Remote Banking:
Banks these days are providing various services online. Customers are no more
required to travel for miles and stand in long waiting line to get their
banking transactions done such as withdrawals, deposits and another enquiry.
Customers now can install various banking app or login to banks website to get
their transactions done as per their convenient. Remote banking has immensely
help people in rural areas to save their hassles of coming to bank branches and
to improve their culture of saving money.
4) Signature Retrieval Facilities:
Computers by using internet technologies have provided services of digital
authentication such as E-signature or digital signatures to safeguard the
interest of its clients. By using this facility banks verifies customer’s
signatures while withdrawing a large sum of money from a specific bank account
this reduce the chances of frauds, errors/risks that may arise due to forgery.
5) Centralized Information Results to
Quick Services: Centralized storage of information with
the banks enables them to transfer information from one branch to another
effortlessly with not much time and costs involved and this results in quick
services to customers. For example, if a customer registered his account with a
rural branch, he can easily get details of his account at the main branch in an
urban area.
Finance
1.
Financial
Trading: Computer based trading is useful when a trader has a
system that allows profitable trading. Computer systems can even trade on the
behalf of the users. A computer system can be programmed automatically to
execute buy and sell orders when the price of a stock or bond reaches to a
certain predefined level, and automatically closes the order when the target
price reached below a certain level.
2.
Financial Information: Through internet
computers can have access to wide pool of financial information through. This
enables business operators and individual’s access to the information on
investment prospects that helps in conducting a detailed research on its
profitability. Apart from this various other financial information such as
world prices, tax changes, inflation rate and currency exchange rates are also
available on internet which make easier for institutions and individuals to
make informed financial decisions.
3.
Organizing
and Analysing Data and Files: Computers are very useful
in organizing the data efficiently. This makes it easier for anyone to organize
and find the information with a few clicks. Computers also help in the
facilitation of data analysis. Employees can use various technologies available
to understand complex spreadsheets. For example, Microsoft Excel can help
businesses to visualize their data in charts and graphs so that trends and
anomalies present in data can be spotted easily.
4.
Data
Storage: Keeping financial records is critical for
organizations, as well as individuals, as it allows tracking of payment
records, debts owed, purchases done and bank transactions made. Computers make
data storage easily manageable and less bulky. Computers can also enable
organizations to store large amounts of files in a small space that allows them
to have a large track of historical transactions.
5.
Convenience:
Personal finance can be simplified by using information technology. Banks
provide data on checking and savings deposits and withdrawals in standardized
formats. Customer can easily download account transactions and store records on
their computers. Personal finance software includes few additional features
like charts and reports that show home users what they are spending money on
and where their funds are coming from.
6.
Budgeting
and Bookkeeping: Computers are immensely helpful for
companies considering financial transactions. Computer systems calculate and
display the interest and principal of a loan, and estimate the returns on
investment when the company borrows money to expand its operations. Companies
can securely transfer data online, and the computer system records all
transfers, which simplifies bookkeeping.
Q – Describe the types of
Computer Networks.
Ans.
Types
of Computer Networks There are various types of computer networks. The critical
difference in each type lies in the extent of geographical areas they serve and
their core purpose. The various types of computer networks are explained below:
1)
Personal Area Networks (PAN): Personal Area Networks
are interconnected technology devices that serve a single individual within one
facility. It is reachable within a distance of 10 meters and is appropriate for
small offices or residences. IT enabled devices include telephones, computers,
video game and peripheral devices etc.
2)
Local Area Network (LAN): Local Area Networks are limited to a
single building like an official establishment. It covers a defined area. It is
useful for resource sharing including file servers, printers and data storage.
LAN hardware such as ether net cables and hubs are affordable to acquire and
maintain. Small LANs can efficiently manage two to three computers, and large
LANs can host thousands of servers. Internet connectivity can either be wired
or wireless. It is popular with many establishments because of its higher speed
and lower set up costs.
3)
Metropolitan Area Networks (MAN): Metropolitan Area Network
covers a much larger area as compared to Local Area Network. MAN includes
configured computers covering a town, city or campus. On the basis of
connections, MAN can connect either a single area or cross several miles. MAN
is basically a series of several LANs linked to create a greater network.
4)
Wide Area Networks (WAN): Wide Area Networks cover a larger
geographical area as compared to the Metropolitan Area Networks and can connect
a country or even continents. The computers are interlinked through various
cables, optical fibers or satellites. The users can access the network through
modems. WANs basically comprised several smaller networks of LANs and MANs. The
internet which consists of networks and gateways is an example of a public WAN.
5)
Home Area Network (HAN): Home Area Network is a computer
network limited to a defined boundary like a house or home office. It is a type
of IP based LAN which can either be wired or wireless. HAN is a broadband
connection available to users using a wired or wireless modem. It consists of
shared devices like faxes, printers, scanners etc.
Q – State the Role of
Computer in Business Organisation.
Ans.
Some
of the applications of computers in business organizations are explained below:
1)
Communication: Computers play a very important role in
business organisations to maintain a smooth flow of information and
communication between different parties and stakeholders. Business can use
various methods of communication such as email, live chat tools, video or phone
conferencing, social networking, web conferencing etc. It saves times and also
improves the functioning of the organisation. With such advance tools, it also
becomes easy for the business to offer customer support to its clients in a
timely and efficient manner.
2)
Marketing: Organizations can widely use computers for marketing
as most of the marketing is done online via social media, blogging, website
development, advertising, e-newsletter etc. IT developers can professionally
create a website by using various enticing graphics and content with different
forms of media, such as text, images, and videos to make the campaign more
attractive and lucid for the audience. By using Search Engine Optimization
(SEO) and Web Analytics, the website would appear prominently in Google’s
search results, which then attracts traffic and ultimately enables the business
to sell those products to website visitors.
3)
Accounting: Computers can also help organizations in
sorting its large financial data in order to obtain their large and small scale
financial positions just by few clicks. Computers are also useful for
performing various tasks like invoicing clients, maintaining data about debtors
and creditors, calculating payroll, calculating and filing tax forms etc. With
the computer, accountants can now focus on the higher level picture of a
business’s finances, leaving the lower level stuff to the machines.
4)
Storage: Businesses can store enormous data on computers. They
don't need huge cabinets for storing data now. With computers and server,
organizations are capable of storing and sorting billions of files and enable
them to access at any time. Digital storage is much larger and more efficient
and secure while compared with the physical storage, as it is more difficult to
lose or steal files from a well-protected database which is one of the main
benefits of the computer.
5)
Educational Purposes: With the access of internet on the
computers, organizations can reach the pool of world’s information which can be
used efficiently to educate its employees such as about the company policies,
software use, as well as standard procedure and safety. Instead of hiring
teachers’ employees can be educated online. Live webinar, conferences and
question and answer sessions can also be conducted. Employees can learn through
various media, such as videos, text, etc. which enables them to better
understand the subject matter.
6)
Research: Computers make business organisations capable of doing
a variety of functions, including research about the competition, as well as
knowing about the taste and preferences of its customers. With modern
data-mining techniques, a business can acquire insightful information about its
customers and competition from all kinds of places, including forums, search
engines, industry-specific websites and even from social networks. By
conducting online surveys, business can know about the public opinions or while
launching any new products and public reactions can also be known by reviewing
customers review on different sites.
Q – State the Types of
Operating System. Explain.
Ans. Types of Operating System: There are
various types of Operating System which have its utility and explained as
follows:
1) Batch Operating System In this, user submits the job
to the operator with the help of some offline device like punch cards. The
operator then sorts the program/ data on the basis of pre defined sequence of
commands as single unit and then collects the data and programs in a batch and
processes it for the execution. In this operating system, CPU idle time
increases because of the variation in processing speed of different I/O
devices. There is a limitation of no interaction between the user and the job.
Examples are the operating system used for payroll system, bank statements etc.
2) Real Time Operating System It is a data processing
multitasking operating system where the functions are performed with a time
constraint. This operating system has very less response time (time taken by
the system to respond to an input and display of required information). These
are used in scientific experiments, medical imaging systems, industrial control
systems, etc. The two types of real OS are:
· Hard
Real Time Operating System: In this real OS, completion time taken by a task
can be guaranteed.
· Soft
Real Time Operating System: In this real OS, time is not guaranteed and it
gives priority to the task unless it is completed and then moves on to other
tasks.
3) Time Sharing Operating System In this operating
system, users are allowed to use resources like CPU, memory of a computer
system simultaneously. The end users who are located at various terminals can
use the same computer resources with the help of time sharing technique. For
example, many users are logged on to the same mainframe computer and they all
can use the resources like CPU, memory of mainframe computer. The major
advantages given this operating system are that it is time saving and
simultaneously many people can work on it?
4) Distributed Operating System This operating system
uses multiple central processors to serve multiple users with multiple real
time applications. The multiple processors which are also termed as nodes,
sites communicate with one another with the help of communication lines/
telephone lines, high speed buses. The main objective of distributed system is
to share the remote resources in a controlled manner. This operating system
which runs on multiple processors tries to make several machines to behave like
a single machine. Some of the problems faced by distributed systems are of
security related issue, loss of messages in the network and overloading issues.
Example where applications of distributed computing are used: WWW, Internet,
Intranet etc.
5) Network Operating System In this operating system,
activities of multiple computers are coordinated via a network. It is designed
to support and manage personal computers, workstations and servers connected to
Local Area Network. It helps servers to be remotely accessible by different
systems and by different locations. Examples of NOS are Uniplexed Information
and Computing Service (UNIX), Lovable Intellect Not Using XP (Linux), Macintosh
Operating System (Mac OS) and others.
Q – What is Identity Theft ?
State the Methods to Prevent Identity Theft.
Ans.
IDENTITY THEFT The term identity theft means cyber
criminals illegally acquire credentials of innocent users and use these
credentials to do online cyber-crime by hiding their actual identity and using
the identity of other innocent users. It is the criminal act of illegally and
deceptively assuming the identity of another individual without their expressed
consent with the intent of committing a crime; it also includes fraudulent and
illicit attainment of personal information through the usage of unsecured
websites. Through the use of stolen documentation attained upon illicit means
of electronic acquisition - individuals can fraudulently assume the identity of
others in order to engage in fraudulent purchases and illicit economic gain by
using internet. In other words, identity theft is also called as identity fraud
and is the act of a person obtaining information illegally about someone else
without consent. The Hackers try to find out information about users such as
full name, maiden name, and address, date of birth, UID, passwords, phone
number, e-mail, and credit card numbers & CVV No. etc. to harm the users.
Methods
to prevent identity theft:
i)
At the time of entering any personal
information on the Internet, please make sure that connection is encrypted.
ii)
Avoid storing credit card or personal
information on any website if you do online shopping over the Internet.
iii)
Do have an active and up-to-date spy
ware protection software & antivirus software. iv) Make yourself aware
about fake e-mails and phishing e-mails that claim to be a company
iv)
Never use unknown & unsecured
systems & smart phones.
v)
Always have strong password & keep
answer of secret question unguessable.
Q – State Six essential
Security Actions.
Ans.
SIX ESSENTIAL SECURITY ACTIONS
All the business organisations have to protect their IT
security from unauthorized users and need to take steps to protect them from
illegal users. The number of cyber attacks is increasing day by day and are
affecting businesses of all sizes. In such situations, it is necessary for
every company to be aware of the dangers posed by cyber criminals and be ready
to safeguards their data from such criminals and having in place proper
security mechanisms. There are several approaches for securing the systems in
the market and installation cost and time of use is also involved in their
selection.
1)
Firewall:
Firewall is a type of virtual protection wall which helps to protect network
traffic inbound and outbound to any organization. It stops unauthorized hackers
from attacking the network by blocking them from the systems of organizations.
Firewalls are programmed in such a way that they restrict the network from
sending out proprietary data and confidential emails. The present era hackers
have become more sophisticated with the state of art hacking technologies due
to this reason firewall have become obsolete to stop them from the network of
organizations.
2) Antivirus Software:
The Antivirus program is used to remove the virus from system and network of
business organizations. It is basic software and should be the part of any
cyber security system. In addition to this use of anti-malware software is also
essential now days. The antivirus works as the final frontier in securing and
defending unwanted attacks from intruding the network of business
organizations. The antivirus works by detecting and removing virus and malware,
adware and spyware from the network. It also scans & filter out potentially
harmful downloads and emails of systems of all the organizations. Install
antivirus and anti-spyware software - any computer or network used by an
organization should be secured with a good firewall that takes Wi-Fi into
consideration.
3) Use Complex Passwords:
The user-id and password is essential to access the resources of business
organization over the network. We should always have strong password and keep
it confidential from the hackers. The passwords should be changed periodically.
Strong password is difficult for users to crack it and thus makes the data
secure. We should confidential and complex answers to secret questions, so as
to make it difficult for hackers to crack it. We should have strong password on
social media sites so that our data on these sites is safe and its security is
not compromised.
4) Regular Backup:
The process of saving data regularly and taking backup saves organizations from
the risks of data loss. In case of data loss backup is very useful and could be
used to restore the data in business organisation. With advancements in hacking
technology no network is safe & perfect now days. In present time data
hacking and money hacking from banks become headlines in newspapers in which
hackers try to bypass the bank network security and steal money illegally. In
case of hardware failure backup data is very important to run the business
smooth and business interest can be safeguards with regular backup.
5) Penetration Testing and Limit Access
to Critical Data: Testing is used to test the software with
the objective of finding faults in it. There are several types of testing in
software engineering and penetration testing is one of them. The penetration
testing is used to test the security of business organizations by calling
security professionals to test the network security of business data. The
security professionals; use the same technique which the hackers use to find
the potential weakness and vulnerability in the security systems. We should
follow the advice of security professionals and add more security tools as per
the suggestions to further enhance the security of servers.
6) Employee Training:
All the employees of business organizations handling critical data must be
trained before they are given responsibility to secure the data. There are
several types of attacks and phishing is one of them. To protect the business
organizations from phishing attacks the employees must be trained how to handle
keep secure data from such attacks.
Q - Comment on Enterprise
Resource Planning (ERP).
Ans.
ENTERPRISE RESOURCE PLANNING (ERP)
Enterprise Resource Planning (ERP) is a planning system
which evolved from Material Resource Planning II (MRP II) which aims at
providing integration of information between customer, vendor and manufacturer
using networks such as LAN, WAN, Internet etc. MRP II have again evolved from
MRP systems which is a technique that explores the end product demands obtained
from Master Production Schedule (MPS) for a given product structure. This
product structure is taken from Bill of Material (BOM) into a schedule of
planned orders considering inventory in hand.
Despite various advantages, MRP II has certain
drawbacks:
· Ineffective
integration of multiple functional areas to share resources
· In
application, each transaction is treated separately
· No
generic functionality is provided; specific functions cater to specific
applications.
For the overall growth of the business environment the
demands of the industry need to be understood. These demands could be the cost
control initiative, cost analysis (product based or customer based), changing
business requirement, effective decision making and many more. To handle such
demands many applications or planning systems are available. Some of them are:
· Management
Information System (MIS)
· Integrated
Information System (IIS)
· Executive
Information System (EIS)
· Corporate
Information System (CIS)
· Enterprise
Wide Systems (EWS)
· Material
Resource Planning (MRP)
· Manufacturing
Resource Planning (MRP II)
· Money
Resource Planning (MRP III)
In comparison to MRP II, ERP is more effective in
predicting and balancing Demand & Supply. In the next section, an
introduction to Management Information System (MIS) is provided to gain a
better understanding of the working of a management system.
Now by this time, the readers are familiar with
Business Intelligence (BI) and ERP. It is the correct time to introduce two
very important concepts: On-Line Analytical Processing (OLAP) and On-Line
Transactional Processing (OLTP).
Q – Describe the effect of
Demonetization in Digital Payment.
Ans.
Demonetization
is the “act of stripping a currency unit of its status as a legal tender”. In
other words, it is withdrawal of particular form of currency in circulation.
Government of India boldly announced the demonetization on 8 November, 2016.
The circulation of `500 and `1000 for any form of liquid transaction was banned
from midnight and no more a legal tender from 9th November 2016. The ATM
withdrawal limit was set to `2500 for that particular period.
The unexpected announcement of demonetization and
prolonged cash shortages helped in increasing the digital transactions. Every
sphere of economy ranging from a small shop to big malls witnessed a spurt in
digital transactions across the country. After demonetization, switching to
cashless payment methods becomes a necessity for both rural and urban
populations. Every citizen of the country, be it a farmer, teacher, soldier or
even a CEO of a big brand, needs to know about the available methods to make
cashless transactions. They become more aware about the existing facilities -
how they can perform online transactions such as checking account balance, bill
payment, funds transfer, etc. through internet banking. Also, it is available
24x7 for the customer’s convenience. Small sellers also flocked to e-wallet
methods – Paytm, Mobikwik, etc. to continue doing their business. These all
gave a big push to the overall digital transactions across the country.
Also, to help the citizens with short term cash-crunch
in the country, the Indian government aggressively promoted digital modes of
banking. The transaction charges were waived off on few payments’ methods. The
total electronic and card payments grew 46% by value and 65% by volume in
2016-17 over the previous fiscal year. Some segments like the Unified Payments
Interface (UPI, the government’s real-time payments system) and Aadhaar-based
payment grew fastest from a very low base. Online banking transactions and
debit card payments grew the most. E-wallet companies like Paytm welcomed the
decision of demonetization as this gave them an opportunity to increase their
customer base. The Paytm wallet went from 125 million wallet customers before
demonetization to 185 million in three months and it has continued to grow, with
almost 300 million customers bases. In conclusion demonetization gave the
digital payment a thrust which led to success of many payment wallet companies
along with increase in acceptance of digital mode of payment among the masses.
Q – Sate the Types of
Internet Services.
Ans.
TYPES OF INTERNET SERVICES
As explained in the previous section Internet is the
interconnected global computer network which operates through certain set of
rules called protocols. From an end-user perspective it’s the services that
Internet provides make it popular.
· E-mail:
E-mail is digital form of message exchange between people. The ability to send
the message across globe within seconds has made it the most popular form of
message communication and has replaced almost every other physical form of
communication such as letters in many spheres of life.
· World
Wide Web: Most important service of Internet which is essentially for global
information sharing. It is combination of all resources- text pages, digital
photographs, music files, videos and through communication model enables the
exchange of the information over Internet.
· Web
Services: Web services are the standardized medium for propagation of
communication taking place between the client and server applications on the
Internet.
· File
Transfer Protocol (FTP): FTP is used for exchange of files across computers
through Internet.
· Chat
Rooms: They are the mediums which are used for real time conversations between
persons in form of text, voice or video.
· Mailing
list: It is the collection of names or/and addresses for including the people
who subscribe to mailing distribution on regular basis.
· News
groups: It is an Internet-based forum for discussion on various topics by
remotely connecting different users across the globe.
Q – State the Salient
Features of MS- Word.
Ans.
SALIENT FEATURES OF MS WORD
Among all the popular word processing software, MS Word
is used most widely which provides advanced word processing and Desktop
Publishing features. The list indicates some of the basic features of MS Word:
i)
It allows you to create and save the
document.
ii)
You can add, modify, or delete the text
anytime in your document and save it for future reference.
iii)
It enables you to set or change the page
margins as required.
iv)
It features various formatting options like
and a change of font and its style. Moreover, you can insert Header and footer
in the document.
vi)
The Auto Correct feature of MS Word
automatically corrects the spellings and also suggests the alternate words.
vii)
It also shows document statistics like word
count.
viii)
Text can be written in and a columnar style
as written in newspapers. Also, text boxes can be inserted.
ix)
You can create tables in the document.
x)
The image and graphics can also be inserted
in the document. MS Word provides its clip arts or the pictures can be imported
from outside.
xi)
The Mail Merge feature of MS Word helps you
generate multiple copies of a letter with different addresses.
xii)
MS Word also provides Macros that can be
created and used in the document.
xiii)
Online help is also available to know more
about and the various features and tools of MS Word.
Important Note –
· Ask For Practical
Classes on Block 3, Block 4, Block 5
· Block 3-5 Contains,
MS-Word , MS PowerPoint & MS – Excel which requires Practical Classes &
Practice .
No comments:
Post a Comment