Solved Assignment

BCOS-183 Solved Assignment

Computer Application in Business

  • Course: Computer Application in Business
  • Programme: BAMSME
  • Session / Term: Jan 2025
  • Last updated: January 16, 2026

Q1. Computer networks: meaning, importance, and major categories

Meaning

A computer network is a group of two or more computers (and related devices) connected so that they can communicate and share information/resources through communication links.

Advertisements

Why networks are important in business

  • Resource sharing: hardware (printers, storage), software, and data can be shared instead of duplicating them on every computer.
  • Fast communication and coordination: users can exchange information efficiently over connected systems.
  • Operational efficiency: organisations can support day-to-day activities by enabling information flow across departments and locations.

Common types of networks

  • Personal Area Network (PAN): A very small network built around a single person, typically within about 10 metres inside one place. It can connect everyday IT-enabled devices such as phones, computers, video game devices, and other peripherals.
  • LAN (Local Area Network): covers a small geographical area such as a room, office, building, or campus.
  • MAN (Metropolitan Area Network): spans a city or large campus-sized region.
  • WAN (Wide Area Network): covers a large geographical area, often connecting offices across states/countries.

Practical illustration

In a typical office setup, a LAN can connect employee computers with a shared printer and shared files; a MAN can connect multiple branches within a city; and a WAN can connect head office with branch offices across different regions.

Q2. Active and passive attacks with suitable examples

Core idea

Cyber security aims to maintain confidentiality, integrity, and availability of data and systems. A helpful way to explain passive vs active attacks is to link them with these three principles.

Passive attack

A passive attack focuses on learning/obtaining information without changing it. In practice, it targets confidentiality—i.e., preventing unauthorized disclosure of information. Example: if an unauthorized person gains access to confidential business data (such as CRM information) using stolen credentials, the attacker may only “read/copy” information (disclosure) without altering records.

Active attack

An active attack attempts to change data/systems or disrupt services. It targets integrity (preventing unauthorized modification) and/or availability (ensuring systems remain accessible for authorized users). Examples include:

  • Integrity example: intercepting and modifying email communication while it is in transit, so that information becomes inaccurate or altered.
  • Availability example: a Denial of Service (DoS) attack that creates system unavailability by overloading services.

Business note (student-friendly)

Because businesses operate online and face many cyber threats, organisations are expected to define security policies (user categories and rights) and apply protections like access controls, authentication, encryption, backups, and security mechanisms to reduce attacks and breaches.

Q3. E-wallet: meaning and factors behind its adoption in India

Meaning

An e-wallet (electronic wallet) is an electronic facility used for online transactions through a computer or smartphone. It is used to pay for goods/services and other payments in a cashless manner.

How it works in simple terms

  • Users keep money/credentials in the wallet and use it for quick payments.
  • It reduces the need to carry physical cash and makes transactions faster.

Key factors that supported adoption in India

  • Telecom revolution + smartphone growth: more people began using smartphones for everyday digital activity.
  • Cheaper internet and better connectivity: affordable data and improved telecom infrastructure increased online usage.
  • Improved payment infrastructure: digital payment systems and online transaction facilities expanded.
  • Government push for digital payments: initiatives encouraging cashless payments strengthened adoption.
  • User convenience + incentives: faster payments and promotional benefits (like offers/discounts) encouraged regular use.

Practical illustration

For routine student/household use, e-wallets are commonly used for small, frequent payments (recharges, local purchases, bill payments), where speed and convenience matter most.

Q4. Mail Merge and the difference between “Merge” and “Query” in Mail Merge Helper

Meaning of Mail Merge

Mail Merge is the process of transferring selected information from one document to another so that a single “main document” can produce many personalised outputs (such as letters/labels) for multiple recipients.

Key parts used in Mail Merge

  • Main document: the letter/notice format that stays mostly the same.
  • Data source: the list of recipients and fields (name, address, etc.), usually arranged with a header row.
  • Merged output: personalised copies created by combining both.

How the Mail Merge process typically runs (student-friendly steps)

  • Start Mail Merge through the Mailings tab (wizard/step-by-step method), select recipients, and insert fields.
  • Preview the letters and then complete the merge (print one record or print all).

Merge option vs Query option (Mail Merge Helper)

  • Merge option: used to generate the final merged documents—e.g., to create/print the personalised letters for recipients (current record or all records).
  • Query option: used before merging to work with the recipient list (data source) so that only the required records are selected for the merge. In practical terms, it helps you choose “which recipients should be included” instead of merging for everyone.

Example (easy to relate)

If an office needs to send a reminder letter to many people, the “Query” step helps select only the relevant recipients (for example, only those who should receive that reminder). Then the “Merge” step produces and prints all personalised letters for the selected recipients.

Q5. Business presentation: meaning and different types

Meaning

A business presentation is a planned, structured communication used to share information with an audience. Depending on purpose, it may inform, influence, or persuade stakeholders.

Common types of business presentations

  • Informative presentation: focuses on facts, data, reporting results, and explaining business situations.
  • Persuasive presentation: aims to convince the audience (e.g., to approve a proposal or accept a recommendation).
  • Instructional / training presentation: teaches a process or trains employees/users on procedures.
  • Sales / marketing presentation: presents a product/service to customers and explains value.
  • Proposal / project presentation: used to present new plans, budgets, or project ideas to management/investors.
  • Status / review presentation: used internally to update progress, outcomes, or performance.

Internal vs external (simple classification)

  • Internal presentations: meant for employees/management (training, reviews, status reports).
  • External presentations: meant for customers, partners, investors, or the public (sales pitch, investor proposal, client briefing).

Q6. Operating system and its types

Meaning

An operating system (OS) is system software that manages the computer’s hardware and software resources and provides services for computer programs. It also acts as an interface between the user and the computer system.

Key functions (in simple words)

  • Manages processes/program execution
  • Manages memory and files
  • Controls input/output devices and overall system operations

Types of operating systems

  • Batch operating system: jobs are collected and processed in batches.
  • Time-sharing operating system: CPU time is shared among multiple users/programs to provide interactive use.
  • Real-time operating system: responds within a strict time limit for time-critical tasks.
  • Distributed operating system: coordinates a group of computers and makes them appear as one system to users.
  • Multi-user OS: supports multiple users accessing a computer system.

Q7. Centralized vs decentralized information in business: benefits and limitations

Context (business information system)

Modern organisations work like open systems and need the right information at the right time. For decision-making, information is gathered, organised, processed, and evaluated in an effective form.

Centralized information (meaning)

Centralized information means that data/information processing is primarily managed and controlled from a central point (for example, a central system that supports transaction processing, maintains master files, and provides standard reports and inquiry responses).

Decentralized information (meaning)

Decentralized information means information processing and access are distributed across locations/work groups to support flexibility and teamwork, especially in a changing business environment.

Benefits

  • Benefits of centralized information: supports organised processing such as transaction processing, maintaining master files, generating reports, and responding to inquiries from a central arrangement—helpful when management needs consistent reporting and control.
  • Benefits of decentralized information: enterprise transformation is associated with decentralization, location independence, flexibility, empowerment, collaborative teamwork, and lower transaction/coordination costs.

Limitations (practical risks to manage)

  • Security and confidentiality risk (especially when information is valuable): business data is “money” and is vulnerable to online frauds; therefore, policies, access controls, and security measures become necessary. Centralized information requires strong controls because a large amount of confidential data may be accessible through networked/remote technologies if protections fail.
  • Controls needed in distributed access: when information is accessed across systems/locations, organisations must ensure confidentiality, integrity, and availability through measures like authentication/authorization, encryption, backups, and security policy implementation.

Q8. Main menu options in MS Word

Modern MS Word (Ribbon tabs) – key options

  • File tab: commands like New, Open, Save/Save As, and Print, along with document information.
  • Home tab: commonly used formatting and editing features (font settings, paragraph formatting, styles, etc.).
  • Insert tab: insert pictures, clip art, shapes, charts, and other objects into the document.
  • Page Layout tab: page setup and layout-related controls (margins, orientation, etc.).
  • References tab: features like citations, table of contents, footnotes, and related reference tools.
  • Mailings tab: tools such as Envelopes and Labels; also used for mail merge tasks.
  • Review tab: proofing tools like Spelling & Grammar, Thesaurus, and Word Count.
  • View tab: document views such as Print Layout, Web Layout, Outline, and Draft, plus display options like ruler.

Classic menu-bar wording (often seen in older versions)

In older interface style, the main menu bar options are commonly presented as File, Edit, View, Insert, Format, Tools, Table, Window, and Help (used for document commands, editing, viewing, inserting objects, formatting, tools/utilities, table actions, window management, and help).

Q9. Creating a chart in PowerPoint with an example

Process (step-by-step)

  1. Open the slide where the chart is needed.
  2. Go to the Insert tab and choose Chart.
  3. Select the chart type (such as Column, Line, Pie, Bar, etc.) and confirm.
  4. An Excel sheet (datasheet) opens; enter or replace the sample data with your own values.
  5. Close the Excel datasheet; the chart updates automatically on the slide.
  6. Use chart formatting/design options to adjust layout, labels, and appearance for clarity.

Example (business-friendly)

To show quarterly sales, enter quarters (Q1–Q4) and corresponding sales figures in the datasheet. Then use a Column or Line chart so the audience can quickly understand comparison and trend.

Q10. How Pivot charts help interpret cross-tabulation results

Cross-tabulation (simple meaning)

Cross-tabulation summarises data to show relationships among variables and supports analysis of how categories interact.

Role of Pivot tables and Pivot charts

  • Pivot tables: help rearrange/organise variables and generate the required summary report (cross-tab output).
  • Pivot charts: convert the cross-tab (pivot table) summary into a visual form, making the outcome easier to understand, compare, and present.

Why this helps (student-friendly)

  • Visuals make it easier to see comparisons across categories at a glance.
  • Patterns and relationships in cross-tabulated data become clearer when summarised graphically.
  • This supports business reporting and decision-making where a quick understanding of results is required.

Q11. Google Sheets and its usability

Meaning

Google Sheets is a web-based spreadsheet application provided through Google’s cloud environment (commonly accessed via Google Drive). It allows users to create and work on spreadsheets online.

Usability (how it is useful)

  • Create and edit spreadsheets online: work from a browser without needing a local installation.
  • Access anywhere: because it is cloud-based, it supports access from different devices/locations with internet connectivity.
  • Sharing and collaboration: useful for teamwork because files can be shared and worked on collaboratively.

Practical illustration

For student group work or small business tasks (like maintaining records), Google Sheets supports quick sharing and collective updates, helping teams keep one consistent spreadsheet instead of multiple versions.

Q12. Options to protect a document while sharing it with others

1) Control access before sharing

  • Keep credentials/keys secure: safeguarding keys and login credentials prevents unauthorized access.
  • Use encryption where appropriate: encrypting data helps protect confidential content over insecure networks.

2) Make the document read-only / restrict editing

  • Mark as read-only / final: helps reduce unintended changes when sharing a final version.
  • Restrict editing: allow only limited actions (for example, comments or specific edits) depending on document needs.

3) Password protection

  • Password to open / modify: password protection ensures only authorized users can open the file or make changes.

4) Safe collaboration controls

  • Track changes and review: use review features so edits are visible and can be accepted/rejected before finalising.
  • Backups: maintain backups of important files so data can be restored in case of loss or failure.

5) Permission-based sharing (cloud sharing idea)

When sharing through online platforms, set permissions carefully so that people receive the appropriate level of access (view/comment/edit) rather than full control by default.

Q13. SLN vs DB depreciation methods and their implementation in MS Excel

Difference between SLN and DB (concept)

  • SLN (Straight-line method): depreciation is calculated evenly; the depreciation amount per period is the same each period.
  • DB (Declining balance method): depreciation is calculated using a fixed declining balance approach; depreciation is typically higher in earlier periods and reduces later, based on a fixed rate.

Implementation in MS Excel

SLN function (straight-line depreciation per period):

  • Syntax: SLN(cost, salvage, life)
  • Use: returns the straight-line depreciation amount for each period.

DB function (fixed declining balance depreciation for a specified period):

  • Syntax: DB(cost, salvage, life, period, [month])
  • Use: returns depreciation for the specified period using a fixed rate; month is optional for first-year calculation details.

Important calculation idea used by DB

$$ \text{Rate} = 1 – \left(\frac{\text{salvage}}{\text{cost}}\right)^{\left(\frac{1}{\text{life}}\right)} $$

Simple “how to do it” in a worksheet

  1. Enter asset cost, salvage value, and life in separate cells.
  2. For straight-line depreciation, apply =SLN(cost_cell, salvage_cell, life_cell).
  3. For declining balance depreciation, specify the period (e.g., 1, 2, 3…) and apply =DB(cost_cell, salvage_cell, life_cell, period_cell, month_cell_if_needed).

Q14. LOOKUP, VLOOKUP and HLOOKUP with examples

Rewritten question: Explain LOOKUP, VLOOKUP and HLOOKUP functions used in spreadsheets, and show simple examples of how each is applied.

1) LOOKUP: LOOKUP searches for a value in a one-row or one-column range and returns a value from the same position in another one-row or one-column range.

Example (practice): If A1:A5 contains Student IDs and B1:B5 contains names in the same order, LOOKUP can be used to find an ID in A1:A5 and return the corresponding name from B1:B5 (same position).

2) VLOOKUP (Vertical Lookup): VLOOKUP looks for a value in the first column of a table and returns a value from a specified column in the same row.

Example (as illustrated): If a table has employee ID in the first column and salary in another column, you can use:

=VLOOKUP(lookup_value, table_array, col_index_num, [range_lookup])

to fetch the salary of the employee whose ID you enter as the lookup value.

3) HLOOKUP (Horizontal Lookup): HLOOKUP searches for a value in the top row of a table and returns a value from a specified row in the same column (i.e., horizontal matching).

Example (practice): Suppose Row 1 contains months (Jan, Feb, Mar, …) across columns B to M, and Row 2 contains monthly sales. If you want sales for “Mar”, you can use:

=HLOOKUP("Mar", B1:M2, 2, FALSE)

This searches “Mar” in the first row and returns the corresponding value from the 2nd row.


These solutions have been prepared and corrected by subject experts using the prescribed IGNOU study material for this course code to support your practice and revision in the IGNOU answer format.

Use them for learning support only, and always verify the final answers and guidelines with the official IGNOU study material and the latest updates from IGNOU’s official sources.