0% found this document useful (0 votes)
39 views8 pages

June 2023 BCOS-183

Uploaded by

Binod Roy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
39 views8 pages

June 2023 BCOS-183

Uploaded by

Binod Roy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

No.

of Printed Pages : 8 BCOS-183

om
BACHELOR OF COMMERCE

u.c
(GENERAL) [B.COM(G)]

Term-End Examination

ur
June, 2023

tG
BCOS-183 : COMPUTER APPLICATION IN
BUSINESS
en
Time : 3 Hours Maximum Marks : 100
m

Note : (i) Attempt any five questions.


ign

(ii) All questions carry equal marks.


ss

1. What is computer network ? Briefly discuss the


UA

various types of computer network i.e. PAN,

LAN, MAN, WAN and HAN. Also, compare the


NO

following : Internet, Intranet and


IG

Extranet. 2+15+3

P. T. O.
[2] BCOS-183

2. Compare and contrast the following : 4×5=20

om
(a) Graphical Web Browser and Non-

Graphical Web Browser

u.c
(b) File Storage and File Synchronization

(c) B2B and B2C

ur
(d) Batch Operating System and Real Time

tG
Operating System

(e) Application Software and System Software


en
3. How can we relate Business to Information
m

System ? Discuss the relationship of Business

with Information system, with suitable block


ign

diagram. Also, discuss the Business

Information system architecture. 4+8+8


ss

4. How does File Processing System differ from


UA

Database Management System (DBMS) ? What

are the major functionalities of DBMS ? How is


NO

data abstraction achieved in RDBMS ? Discuss

with suitable diagram for data abstraction.


IG

5+5+10
[3] BCOS-183

5. Explain the principles of cyber security, with

om
suitable example for each. What is

Authentication ? How does Authentication

u.c
differ from Authorization ? Also, explain the

role of Penetration testing as a step towards the

ur
Information security. 9+2+4+5

tG
6. Write short notes on the following : 4×5=20

(a) Mail Merge and its components in MS-


en
Word
m

(b) Word Processing and its attributes


ign

(c) Steps to prepare a presentation for a

project in MS-PowerPoint
ss

(d) Relative and Absolute addressing in Excel


UA

(e) Financial functions in Excel

7. What is Ratio Analysis ? Briefly discuss the


NO

following type of Ratios, with example for

each : 4×5=20
IG

(a) Current Ratio


P. T. O.
[4] BCOS-183

(b) Quick Ratio

om
(c) Gross Profit Ratio

u.c
(d) Operating Cost Ratio

ur
8. What is CAPTCHA ? Briefly discuss the

purpose of CAPTCHA Code. Also, discuss the

tG
various types of CAPTCHA Codes.
en 5+5+10
m
ign
ss
UA
NO
IG
[5] BCOS-183

BCOS-183

om
[ ]

u.c
ur
2023

-183
tG
en
m
ign

(i)

(ii)
ss
UA
NO
IG

2+15+3

P. T. O.
[6] BCOS-183

4×5=20

om
(a)

u.c
(b)

(c)

ur
(d)

tG
en
(e)
m
ign
ss

4+8+8
UA

(DBMS)
NO

RDBMS
IG

5+5+10
[7] BCOS-183

om
u.c
ur
9+2+4+5

tG 4×5=20
en
(a) MS-Word
m
ign

(b)
ss

(c) MS-PowerPoint
UA
NO

(d)
IG

(e)

P. T. O.
[8] BCOS-183

om
4×5=20

u.c
(a)

ur
(b)

tG
(c) en
(d)
m
ign

5+5+10
ss
UA
NO
IG

BCOS–183

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy