top of page
BCOS-183: Computer Application in Business

BCOS-183: Computer Application in Business

IGNOU Solved Assignment Solution for 2021-22

If you are looking for BCOS-183 IGNOU Solved Assignment solution for the subject Computer Application in Business, you have come to the right place. BCOS-183 solution on this page applies to 2021-22 session students studying in BCOMG, BSCG, BAVTM, BAG, BAVMSME, BAGS, BAECH, BAHIH, BAPSH, BAPCH, BAPAH, BASOH, BSCANH, BAEGH courses of IGNOU.

Looking to download all solved assignment PDFs for your course together?

BCOS-183 Solved Assignment Solution by Gyaniversity

Assignment Solution

Assignment Code: BCOS-183/TMA/2021-22

Course Code: BCOS-183

Assignment Name: Computer Application in Business

Year: 2021-2022

Verification Status: Verified by Professor


Note: Attempt all the questions.




(This section contains five questions of 10 marks each)


Q.1 How are the computers helpful to human beings? State the examples of real world where computers are prominently being used these days. 5, 5

Ans) Computers connect us to the unknown. They help us obtain information and synchronise it from the internet, finally storing it in a customised way. Computers are multifunctional and can be utilised nearly anywhere. Computers, with their tremendous speed, accuracy, and storage, have made human life considerably easier.


Advantages of Computers

Computers have made human life much faster and easier. It has several advantages:


1) Multitasking: Computers naturally multitask. Many jobs can be completed accurately by computers, reducing expenses and saving time. There are trillions of instructions per second. Computers enable humans to do several jobs, including difficult calculations, in seconds.


2) Speed: One of the main benefits of computers is their tremendous speed, which allows us to finish jobs in seconds. Computers now allow processes that would have taken hours to complete in fractions of seconds.


3) Storage: Computers can store a large amount of data at a minimal cost. The main benefit of centralising data storage is cost reduction.


4) Accuracy: One of the root advantages of computer is that it can perform not only calculations but also with utmost accuracy.


5) Data Security: Data security is preventing unauthorised access to digital data and information. Computers and technologies can protect against damaging forces and undesired user actions like cyber-attacks or access attacks.


Use of Computers in Real World

A computer is a device that can do many things in our daily lives. Computers are useful in many fields, some of which are listed here.


1) Business: Computers are widely used in business. From individuals to international corporations, computers are used for payroll, sales analysis, budgeting, financial forecasts, employee database management, and stock maintenance. Computers have enabled rapid and global company expansion. Accounting software like Tally is widely used to manage company finances and inventory.


2) Education: Computers have revolutionised education by improving lecture performances and delivery. Hundreds of websites are accessible on the internet to give free online education in practically every area.


3) Banking: Computers provide self-service, signature retrieval, remote banking, consolidated data, and digital transactions. These have reduced the human effort, time, and expense required in traditional banking transactions, and make banking accessible for users by enabling 24/7 access to banking services. Through these websites, users can undertake a range of financial activities using online banking.


4) Communication: Computers can greatly shorten the time required for stakeholder contact. Businesses can use tools like email, live chat, WhatsApp video or phone conferencing, social networking, and web conferencing to better their operations.


5) Healthcare: Computers in healthcare enable patients to receive treatments like ECG, CT scan, X-ray, and radiotherapy that were previously impossible. Computers can digitise most medical information from prescriptions to reports.


6) Personal Use: A computer can be used for personal purposes. A computer can save all daily details that are required to be kept anyplace. Computers can track personal stuff like investments, income, expenses, and savings.


7) Military and Défense: Computers are the main tools used in producing missiles and other equipment. Computers are required to design and control weapons. Only computers can design and maintain. The satellite connects soldiers and commanders. Computers have grown in importance in the military. Computers track and destroy incoming missiles. Computers in tanks, planes, and ships help target opposing forces and diagnose platform issues.


8) Insurance: Blockchain, Internet of Things (IOT), Artificial Intelligence (AI), Big Data, and Augmented Reality (AR) are emerging technologies that have a significant impact on the insurance market. Blockchain, or Distributed Ledger Technology (DLT), protects digital data from identity theft and fraud. They also help clients authenticate transactions and policies. Computers assist insurance companies maintain all records current.


Q.2 What are active and passive attacks? Explain with suitable examples. 6 , 4

Ans) Active attacks: An active attack tries to change the system's resources or activities. An active attack involves changing the data stream or making a misleading statement. The following are examples of active attacks:


1. Masquerade

Masquerade attack takes place when one entity pretends to be a different entity. A Masquerade attack involves one of the other forms of active attacks.

2. Modification of messages

It means that some portion of a message is altered or that message is delayed or reordered to produce an unauthorized effect. For example, a message meaning “Allow JOHN to read confidential file X” is modified as “Allow Smith to read confidential file X”.

3. Repudiation

This attack is done by either sender or receiver. The sender or receiver can deny later that he/she has send or receive a message. For example, customer ask his Bank “To transfer an amount to someone” and later the sender(customer) deny that he had made such a request. This is repudiation.


4. Replay

It involves the passive capture of a message and its subsequent transmission to produce an authorized effect.


5. Denial of Service

It prevents normal use of communication facilities. This attack may have a specific target. For example, an entity may suppress all messages directed to a particular destination. Another form of service denial is the disruption of an entire network either by disabling the network or by overloading it by messages so as to degrade performance


Passive attacks: A passive attack tries to learn or use information from the system without causing any damage to the system's resources. Eavesdropping or monitoring of transmissions are examples of passive attacks. The opponent's purpose is to intercept the information being transmitted. The following are examples of passive attacks:


1. The release of message content

Telephonic conversation, an electronic mail message, or a transferred file may contain sensitive or confidential information. We would like to prevent an opponent from learning the contents of these transmissions.

2. Traffic analysis –

Suppose that we had a way of masking (encryption) information, so that the attacker even if captured the message could not extract any information from the message.

The opponent could determine the location and identity of communicating host and could observe the frequency and length of messages being exchanged. This information might be useful in guessing the nature of the communication that was taking place.

Q.3 What is the generic structure of generic structure of business report? 10

Ans) The report format may differ from one organisation to the next, however a business report will often follow the following pattern:


1) Purpose of the Report: It's critical to comprehend why we're composing this report. There are several different types of reports utilised in business, all of which are used for either information or perusing. A report might be a technical report that describes the process and provides background information, or it can be a project status report. It's critical to clarify what the report is for and why it's being written.


2) Audience of` Report: It is critical to assess the audience. The material you create or the type of information you aim to provide will be heavily influenced by the reader's expertise of the subject. It is critical to assess the audience. The material you create or the type of information you aim to provide will be heavily influenced by the reader's expertise of the subject.


3) Knowledge of the Topic: It is obvious we must have a thorough knowledge of the topic for which you are writing the report. It is important to research the topic and include all relevant information to prove your point. You can use a variety of resources like journals, newspaper articles, books, web etc.


4) Outline of the Report: The structure of a business report can include the following essentials

Title Page

Executive Summary

Table of Content


The Body of the Report




Bibliography and Reference.


5) Write, Edit, Proofread and Finish: Once you have structured your report, fill out the headers with content. Once most of your text is written read through it and make sure it flows well. Check for grammar and spelling and double-check all relevant information and its logical flow.


Q.4 What is a business presentation? State its importance and various factors determining the effectiveness of business presentations. 2,2,6

Ans) Any formal information about the business, goods, or processes that is intended to enlighten, educate, motivate, or persuade internal and external audiences is referred to as a business presentation. These presentations are typically delivered using audio or visual presentation materials such as statistical documents, projectors, flip charts, whiteboards, and other similar tools. Firms typically use presentations into sales, training, and internal communication initiatives, relying on the power of words and visuals to captivate and retain their audience.


Importance of Business Presentations:

Businesses frequently use business presentations to sell their idea or product and persuade the audience to accept their offer. An efficient business presentation assists a company in obtaining market and competitive intelligence, which in turn aids in the improvement of its commercial performance. Presentations can be used to educate executives and managers about key markets and competitive strategies, which can aid management in formulating strategies and marketing plans for various markets. Managers can also learn more about marketing tactics that are competitive. Executives can use business presentations to provide information about their company's success. Details about a company's sales and profits, market share, and earnings per share, among other things, can be found in performance data. Managers can establish plans to boost sales by presenting sales data.


Factors that Determine the Effectiveness of Business Presentation

Some of them are stated below:

  1. Connecting: A business presentation must be connecting; it should be interactive to hold a memorable bonding experience between the audience and the presenter to deliver the overall message.

  2. Informative: A business presentation must convey a good piece of information to the audience and must be eye-opening and enlightening.

  3. Inspiring: A business presentation must be able to grab the attention of the audience by focusing on the important points.

  4. Appealing: The overall impact of a business presentation is also affected by using visual or physical props. Some of the factors that mostly appeal the audience are screen projectors, handouts, slides, and body language of the presenter.


Q.5 Explain the utilities of computers in online Banking and Finance. 5, 5

Ans) The banking business has been revolutionised by developing technology from paper and pen to computerised and networked services. Technology has revolutionised banking operations' accounting and management systems, and it is now focusing on transforming how banks deliver services to their clients. Computers have also revolutionised the banking industry and the way commercial agreements are handled, moving away from face-to-face meetings and into online areas. Rather than storing data in books, accountants can now save vast amounts of data on computers to do sophisticated computations and manage financial transactions. The following are some examples of computer applications in online banking and finance:


Explain the utilities of computers in online Banking and Finance

A bank can be defined as a financial institution, organisation, or location that provides financial services. A bank can also be defined as a government-authorized establishment that accepts deposits, pays interest, clears checks, makes loans, acts as an intermediary in financial transactions, allows the purchase of bills and checks, or the purchase and sale of securities, and provides other financial services to its customers.


In the banking sector use of computers are -

Computers are utilised in banks to maintain track of customer account information.

Banks rely on technology to make payments more efficient and successful.

Computers make it considerably easier for bankers to keep track of and check financial documents.

ATMs, which are machines that allow clients to save time, may be found nearly on every lane in today's world.

Individuals can also use online banking to make purchases or check their balance at any time.


In the financial industry, computers play an important role. It goes on to say how important it is for banks to adopt Micro Computers for data storage and optimal data usage. In the banking industry, computers can be an effective tool for speeding up the process and lowering the cost of developing and completing figure work. There are various advantages to using a computer in the banking industry, including: In terms of a stressful situation, bring about simplicity. Workplace stress can be reduced by spending less money. This work on the effective use of computers in delivering precise data would be extremely beneficial to the financial sector.


These banking services include

  1. Acceptance of deposits from customers.

  2. Banking payments locally or internationally

  3. Granting loans and advances.

  4. Trading in securities

  5. Clearing of cheques and similar instruments

  6. Phone banking and internet banking facility

  7. Mobile banking and Real-Time Gross Settlement (RTGS).





(This section contains five short questions of 6 marks each)


Q6. “Multimedia components are very important tools for better communication”. Comment. 6

Ans) Multimedia components are essential instruments for improved communication. To make a PowerPoint presentation more successful, they are frequently utilised. PowerPoint is used to create a variety of presentations, including instructional, business, and social awareness presentations. Microsoft PowerPoint provides a variety of perspectives that can be utilised at different times for various purposes such as slide preparation, alteration, presentation, and printing.


One of the three methods listed below can be used to add a new slide to a presentation: To insert a slide, use the New Slide tab on the Home Menu. To insert a slide, press the shortcut key "CTRL+M" You can insert a slide by clicking in the gap between the two sides where a new slide should be put, then hitting the Mouse Right-Button and selecting the new slide option to insert slide.


Multimedia components such as graphs, diagrams, charts, photos, audios, and videos can be used to make a multimedia presentation appealing, effective, and entertaining. Presentations can be copied and saved in the cloud and external memory.


Q.7 Distinguish between Public key and Private Key. 6

Ans) Private Key: A private key is a tiny bit of code that is paired with a public key to set off algorithms for text encryption and decryption.


Public Key: Public-key cryptography, or asymmetric cryptography, is a cryptographic system that uses pairs of keys: public keys which may be disseminated widely, and private keys which are known only to the owner.


Q.8 How to make Google forms? 6

Ans) This functionality is excellent for creating forms that collect information from employees, customers, and other stakeholders about a company's products, services, and other policies.

  1. Go to for more information.

  2. Choose between a template and a blank form. There are a variety of templates to pick from, including event registration forms, event feedback forms, and job application forms.

  3. The top of the Google forms page has two tiles: one for questions and the other for responses.

  4. The Google form editor is incredibly straightforward and simple to use. It is self-explanatory and provides directions if a problem arises.

  5. After adding the questions, the user can select from a variety of answer categories in a drop-down menu. This drop-down allows the user to choose the best choice for the questions in the form.

It assists the user in gathering data while also displaying the results in the shape of a pie chart. This also allows users to copy responses into a spreadsheet, saving time.


Q.9 “All the business organisations need to protect their IT security from unauthorized users”. Comment. 6

Ans) The following six procedures must be implemented to safeguard the firm from cyber-attacks.


1) Firewall: A firewall is a form of virtual protection wall that protects network traffic entering and leaving a company. It prevents unauthorised hackers from attacking networks by limiting their access to systems. Firewalls are set up to prevent the network from transferring proprietary data or private emails. Hackers have become more sophisticated with modern hacking methods, making firewalls outdated to block them from entering an organization's network.


2) Antivirus Software: Antivirus software removes viruses from computer systems and networks. It is essential software for any cyber security system. Using anti-malware software is also crucial nowadays. The antivirus serves as the last line of defence against unwanted intrusions into the company network. Adware and spyware are removed from the network by the antivirus. It also analyses and filters potentially hazardous files and emails from all systems. Employers should secure any computer or network used by their employees with a good firewall that includes Wi-Fi.


3) Use Complex Passwords: A user-id and password are required to access networked company resources. We must always use strong passwords and keep them secret from hackers. Pseudo-passwords should Strong passwords are difficult to crack and hence secure data. We should give complex answers to secret questions to thwart hackers. We need strong passwords on social media platforms to keep our data secure. Using spaces before or after passwords will deter hackers from compromising the system. Keeping space makes password guessing difficult. If someone has your password but doesn't know it has space, they can't access your data. We should employ upper and lowercase characters as well as unusual characters to make it difficult to guess or crack. A strong password could also contain alphanumeric letters and symbols.


4) Regular Backup: Regular data backups protect enterprises against data loss. In the event of data loss, backups can be utilised to restore data in businesses. Now that hacking technology has advanced, no network is 100% secure. Nowadays, hackers aim to circumvent bank network security and take money illegally. Regular backups protect corporate interests and provide seamless operation in event of hardware failure.


5) Penetration Testing and Limit Access to Critical Data: Penetration testing is one way to improve data security in businesses. Employees should also be restricted from accessing essential corporate data. Only authorised people should be able to access essential data. Unauthorized or outsiders should not be able to access critical data and should be prevented from doing so.


6) Employee Training: All staff of companies managing sensitive data must be taught before being trusted with it. Phishing is one of the many sorts of attacks. To safeguard commercial organisations from phishing attempts, staff must be trained.


Q.10 Distinguish between NEFT and RTGS. 6

Ans)  When it comes to money transfers between bank accounts, the phrases 'NEFT' and 'RTGS' are frequently employed. Both NEFT and RTGS are electronic payment systems that allow you to move money from one bank account to another. The Reserve Bank of India (RBI) maintains both channels for individuals to transfer money.


Key Differences between NEFT and RTGS

Few key differences between NEFT and RTGS are listed below:

  1. NEFT is a short form of 'National Electronic Fund Transfer', whereas RTGS is a short form of 'Real-Time Gross Settlement'.

  2. The funds are processed in batches in NEFT mode, and the process of fund-transfer is slower. Besides, the funds are instantly transferred in RTGS mode, making it faster than NEFT.

  3. NEFT has no minimum transfer limit for fund transfer, while RTGS requires at least two lakhs to be transferred between bank accounts.

  4. NEFT is beneficial for small money transfers. RTGS, on the other side, is beneficial for large money transfers.

  5. The settlements of funds in NEFT happens on a half-hourly basis, while the settlements in RTGS is instantaneous and happens in real-time.





(This section contains four short questions of 5 marks each)


Q.11 “For organizations the role of computer is to support the key aspects of running them”. Comment. 5

Ans) Communication, record keeping, decision making, data analysis, and many other vital components of running an organisation are all supported by computers in one way or another. The use of computers has made every area of the modern workplace more efficient and productive. Products, marketing, bookkeeping, and administration are all areas in which they are employed in a business's operations. Computers have made it possible to improve every area of the modern job. It is now feasible to have flexible working schedules and remote work forces because of the advancement of technology, which allows employees to work from wherever they want and at whatever times they want.


Q.12 Write a short note on Uniform Resource Locator (URL). 5

Ans) A Uniform Resource Locator (URL), otherwise known as a Universal Resource Locator, is the address of a resource on the Internet and the protocol used to access it.


It indicates the location of a web resource like a street address indicates where a person lives physically — because of this, an URL is often referred to as: “web address”.


A URL contains the following information:

  1. The protocol used to access the resource.

  2. The location of the server (whether by IP address or domain name).

  3. The port number on the server (optional).

  4. The location of the resource in the directory structure of the server.

  5. A fragment identifier (optional).


A URL is a type of uniform resource identifier (URI). In common practice, the term URI isn't used, or is used synonymously with URL, even though this is technically incorrect.


Q.13 How is E-payment system better than traditional payment system? 5

Ans) E-payment system is rapidly replacing the traditional payment system. For example, if we are making cash payment for our purchase; then we will have to withdraw cash from our account, make payment using this cash, which in turn will be deposited by the shopkeeper in his account at the end of the day. This time-consuming process has been made simple with E-Payment system wherein the amount to be paid can be directly transferred to the shopkeeper’s account. The E-payment system involves several different technologies.


Compared with traditional payment systems, e-payment has the following features:

  1. E-payment introduces digital circulation to realize information transmission, so all means of e-payment are digitalized. But traditional payment is realized through physical circulation such as cash circulation, bill transfer and bank exchange.

  2. The working environment of e-payment is based on an open system platform i.e., internet, while the traditional payment is operated in a relatively closed system.

  3. E-payment uses most advanced communication means, such as the internet and extranet. Whereas traditional payment uses traditional communication media.

  4. E-payment has a very high requirement for both hardware and software facilities, generally including online terminals, relevant software and some other supporting facilities, while traditional payment does not have such a high requirement.

  5. E-payment enjoys advantages for it is convenient, fast, efficient and economic. As long as the user has a computer connecting to the internet, he will be able to stay indoors and complete the whole payment within a very short time. The cost is even less than one percent of that of the traditional way.


Q.14 What is use of slide sorter view?

Ans) In the Slide Sorter view, you see a miniature of each slide. The Slide Sorter view not only gives you a great view of your presentation as a whole, but it also lets you rearrange and hide your slides. If you wish to increase or decrease the size of the slides you are reviewing, you can adjust the view by zooming in and out as necessary.


The Slides tab slides tab in the Normal view functions the same way as the Slide Sorter view and can perform the functions of rearranging slides as described in this document. The Slides tab also allows you to hide or display text formatting and to see whether slides are hidden.


Using the Slide Sorter view allows you to easily rearrange your slides by dragging and dropping, cutting and pasting, or copying and pasting.

100% Verified solved assignments from ₹ 40  written in our own words so that you get the best marks!
Learn More

Don't have time to write your assignment neatly? Get it written by experts and get free home delivery

Learn More

Get Guidebooks and Help books to pass your exams easily. Get home delivery or download instantly!

Learn More

Download IGNOU's official study material combined into a single PDF file absolutely free!

Learn More

Download latest Assignment Question Papers for free in PDF format at the click of a button!

Learn More

Download Previous year Question Papers for reference and Exam Preparation for free!

Learn More

Download Premium PDF

Assignment Question Papers

Which Year / Session to Write?

Get Handwritten Assignments

bottom of page