0% found this document useful (0 votes)
29 views42 pages

Diploma CSE Syllabus 3rd, 4th

Diploma CSE Syllabus 3rd, 4th

Uploaded by

allthing8789
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
29 views42 pages

Diploma CSE Syllabus 3rd, 4th

Diploma CSE Syllabus 3rd, 4th

Uploaded by

allthing8789
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 42

Jharkhand University of Technology

Ranchi, 834010

Diploma – Computer Science Engineering

SYLLABUS
For Diploma Program in
Computer Science Engineering
(Effective from 2024-25)

DEPARTMENT OF COMPUTER SCIENCE ENGINEERING


(3rd – SEMESTER)
Python Programming
Subject code – CSE301

1. Rationale
Computer programming is the core of the computer science and strong fundamentals of programming can give
competitive edge in this technology driven world. It not only instils coding skills but also enhances problem
solving ability. Python is one of the programming languages which is versatile and feature rich yet simple and easy
to learn, has applications in various domains. Python programming sets the basis for further study of web
development, data science, IoT, machine learning etc.

2. Course Outcomes: At the end of the Course, the student will be able to:
Install the latest version of python distribution and configure it for an appropriate workspace
CO-01
as needed for a given project.
Write a program by selecting python constructs needed to solve a given problem and then code,
CO-02
execute, test and debug the program to obtain the desired result.
CO-03 Demonstrate how a program can be optimized by using modular programming approach.
CO-04 Identify and resolve both syntactical and semantic errors in a given code snippet.

3. Course Content
Tutorial
Lecture Practice
(Activity
(Knowledge Criteria) Criteria) (Performance Criteria)
Week CO PO
Fundamental Concepts:
brief history; features; applications of
python; python distributions; versions;
1. Setup python
python IDEs; Python interpreter;
environment
Execution of python programs,
2. Executing python:
debugging python code; Indentation,
1 1,2 1,4 explore different
Comments; best practices for python
ways to run python
programming;
program
Character set; tokens; keywords,
3. debug python code
variables, naming rules for variables,
Assignment,
Refer Table 1

Basics I/O operations


1. Code, execute and
Input- input (), raw_input() ; output –
2 2,4 1,2,4 debug programs that
print (), formatting output.
a) Use i/o statements
Datatypes
Scalar type: Numeric (int, long, float, b) Evaluate expressions
complex), Boolean, bytes, None; Type and displays
casting formatted output
Operators c) Evaluate expressions
Arithmetic, Comparison/Relational, to examine the
Logical/Boolean, Bitwise; string operator precedence
operators; Expressions and operator
precedence 2. Identify and resolve
syntactic and semantic
issues in the
given code snippet
1. Identify and Code,
execute and debug
programs using
Control Flow: Conditional blocks If
conditional
statement: general format; Multiway
3 2,4 1,2,4 statements.
branching; Sufficient examples;
2. Identify and resolve
syntactic and semantic
issues in the
given code snippet
1. Code, execute and
debug programs
using loops.
Control Flow: Loops
2. Code, execute and
While loop: general format; examples
debug programs
For loop: general format, examples.
using loops and
4 2,4 1,2,4 Range();nesting loops and conditional
conditional
statements;
statements
Controlling loop execution: Break,
3. Identify and resolve
continue, pass statements;
syntactic and semantic
issues in the
given code snippet
1. Code, execute and
debug programs to
perform following
Data Collections  set operations
Concept of mutability  set
Set – features, declaration, comprehension
initialization, operations, 2. Code, execute and
comprehension; debug programs to
5 2,4 1,2,4 Tuple-features; declaration, perform following
initialization, basic operations;  basic operations
indexing; slicing; built in functions; on tuples
Nested tuples;  tuple indexing
and slicing
3. Identify and resolve
syntactic and
semantic issues in the
given code snippet
List
1. Write code snippet to
features; declaration, initialization,
perform following on
basic operations; indexing;
List
List iterations; Slicing; built in
6 2,4 1,2,4  basic operations
functions; Nested Lists;
on List
Comprehensions; Applications
 indexing and
slicing
 comprehension
2. Identify and resolve
syntactic and semantic
issues in the
given code snippet
1. Code, execute and
debug programs to
perform basic
operations on
Dictionary Dictionary
features; declaration, initialization, 2. Code, execute and
basic operations; indexing; debug programs to
7 2,4 1,2,4 adding and removing keys, iterating perform Dictionary
through dictionaries; built in indexing
functions; Comprehensions; Iterating
Applications comprehension
3. Identify and resolve
syntactic and
semantic issues in the
given code snippet

1. Code, execute and


debug programs to
perform string
Arrays and Strings manipulation
Arrays: features; create, initialize, 2. Code, execute and
8 2,4 1,2,4 indexing, traversal, manipulation; debug programs to
Strings: create, assign, indexing, built perform array
in functions; manipulation
3. Identify and resolve
syntactic and semantic
issues in the
given code snippet
1. Code, execute and
debug programs to
solve the given
problem using built in
functions
2. Code, execute and
debug programs to
solve the given
Functions
problem by defining a
Need of function; types; define
function
function, calling function, function 3. Code, execute and
9 2,3,4 1,2,4 arguments; return and yield; None debug programs to
keyword; Scope of variables; solve the given
Recursion; anonymous functions; problem using
sufficient examples; recursion
4. Define anonymous
function and code to
solve the given
problem
5. Identify and resolve
syntactic and
semantic issues in the
given code snippet
1. Create Modules and
10 2,3,4 1,2,4 Modules and Packages Packages
Why modules? Module creation; 2. Code, execute and
Importing modules; Module debug programs using
Namespace; built in modules
Packages: basics; path setting;
Package init .py Files;
Commonly used modules: Math,
random; Emoji;
1. Code, execute and
debug programs using
NumPy NumPy module.
Brief about NumPy module; NumPy 2. Code, execute and
arithmetic functions; NumPy array debug programs
manipulation functions; NumPy using series.
11 2,3,4 1,2,4 statistical functions; 3. Code, execute and
Pandas debug programs
Introduction, series, data frame; using dataframes.
Create dataframes; formatting data; 4. Identify and resolve
fundamental data frame operations; syntactic and semantic
issues in the
given code snippet
1. write code snippet to
perform following
operations on different
types of files
Files  read file
Concept; features; file operations;  write to file.
2. Write code to
Opening Files; Closing Files; Writing
12 2,3,4 1,2,4 perform file
to Files; operations using
Reading to Files; File methods; dataframes on
Working with files using data frame. different file types.
3. Identify and resolve
syntactic and semantic
issues in the
given code snippet
1. Integrate exception
handling into above
Error and Exception Handling:
code
Python errors; exceptions: built in,
2. Write code snippet to
user defined. How to catch
13 2,3,4 1,2,4 raise exceptions
exceptions?
Raising exceptions; 3. Identify and resolve
syntactic and
semantic issues in the
given code snippet
Total in hours 39 13 52
*PO = Program outcome as listed and defined in year 1 curriculum

Table 1: Suggestive activities for tutorials (the list is only shared as an example and not inclusive of all
possible activities for that course. Student and faculty are encouraged to choose activities that are relevant to the
topic and the availability of such resources at their institution)
Sl no Activity
1. Compare and contrast excel and python
1
2. Identify various python IDEs and identify differences between them.
1. Identify use cases like reading student name and contact details and display in a required
2 format
2. Compare and contrast input () and raw_input() and identify its appropriate use.
3. Identify use of operators and develop algorithms to solve the same
4. Compare and contrast different types of operators
3 1. Identify use cases that involve decision making and develop algorithms to solve the same
1. Identify common syntactical errors when using control flow statements
1. Identify use cases that involve iteration and develop algorithms to solve the same
4 2. Compare and contrast different types of loops
2. Identify common syntactical errors when using loops
1. Identify use cases and solve them using sets
5 2. Identify use cases and solve them using tuples
3. Identify common syntactical errors when working with sets and tuples
1. Identify use cases and solve them using List
6 2. Identify common syntactical errors when working with List
3. Reimplement built in list functions
1. Identify use cases and solve them using dictionary
7 2. Reimplement built in dictionary functions
3. Identify common syntactical errors when working with dictionary
1. Identify use cases and solve them using arrays
8 2. Reimplement built in string functions
3. Identify common syntactical errors when working with arrays and strings
9 1. Optimize previously written programs by using modular programming approach
10 1. Identify and present pros and cons of modules and packages
1. Explore and present python built in modules.
11 1. Identify the applications of Pandas
2. Perform data analysis using Pandas module on a dataset such as .
12 1. Identify use cases on files concept and develop algorithms to solve the same
2. Explore regular expressions and present how they can be used for file manipulation
13 3. Compare and contrast error and exception.
4. Rewrite the programs using exceptions if needed

4. Reference:
Sl. No. Description
1 Core python programming, Wesley J. Chun Publisher: Prentice Hall PTR
2 Fluent Python by Luciano Ramalho
3 https://www.softcover.io/read/e4cd0fd9/conversational-python
4 https://realpython.com/
5 https://www.python-course.eu/
6 https://www.datacamp.com/
7 https://www.w3schools.com/
Computer Hardware, Maintenance and Administration
Subject code – CSE302

1. Rationale
Professional computer maintenance ensures computer hardware and software systems run efficiently to increase
productivity while lowering the chances of downtime. This course aims to help understand the internal working of
computers/laptops and prepare the student for a role as an entry-level IT support technician. This course sets a basis
for different facets of information technology like computer hardware, software, trouble shooting and customer
service.

2. Course Outcomes: At the end of this course, students will be able to:
CO-01 Assemble a computer as per given technical specifications following all necessary safety protocols and
install, configure and setup an administrator for a Windows Operating System.
CO-02 Diagnose a computer using the right diagnostic tools, identify the hardware problem and
troubleshoot to resolve the problem following all safety protocols.
CO-03 Diagnose an installed software using the right diagnostic tools, identify the bug/issue, troubleshoot to
resolve bugs/issues and ensure all data and applications are backed up before
troubleshooting.
CO-04 Explain e-waste protocols to be followed while disposing computer hardware, to ensure compliance
with all required state pollution control board regulations.

3. Course Content
Tutorial
Lecture Practice
(Activity
Week CO PO (Knowledge Criteria) Criteria) (Performance Criteria)
I/O devices and Interfaces Types 1. Hardware Identification:
of I/O devices and ports on  Computer Case- Types,
astandard PC for connecting I/O Features- Front panel, back
devices. panel; A look inside the
Function of serial port, parallel computer case.
port, and brief principle of  Identify the front and rear
communication through these panel controls andports on a
1,
1 01 ports,types of devices that can be PC cabinet.
4
connected and interface  Identify and understand different
standards. Explain basic cable
Refer Table 1

cables and connectors:Video


types, features and their cables- VGA, HDMI, Mini-
purposes. HDMI, Display port, DVI;
Importance of USB and HDMI Peripheral cables- Serial; Hard
interfaces- Types and Features. drive cables- SATA, PATA, IDE,
Working of Common
Input/Outputdevices- Keyboard, SCSI; Adapters-DVI to
Mouse, display monitor, printer HDMI, USB to ethernet, DVI
and speaker. to VGA.
• Installation of a localprinter.
• Shared printer.
 Installing wireless andcloud
printers.
Power supplies
Safety Basics: safety protocols;
anti- static basic hand tools, Know
the danger of static electricity,
power variation; Precautions to be
taken while mounting and
unmounting power supply into/ 1. Unmount the power supply
from the cabinet;DC power source from PC cabinet.Identify the
to PC - Need for SMPS, types of output connectors.
Specifications, Ratingof SMPS 2. Identify output voltagesusing
based on type of motherboard and color coding.
devices used (AT/ATX, Micro 3. Measure voltage levelsusing
ATX, mini ATX, higher watts multi meter.
2 01 1,4 PSU for gaming PC), color coding
4. Mount the power supply into
adopted, Types of connectors
the PC cabinet, connect
used- ATX, ATX12V, Molex,
different componentsand test
SATA, PCIe;
PC.
Output voltage levels, measuring
5. Trouble shoot Power supply
technique; choosing power
through SMPS fan.
supply based on wattage rating;
6. Diagnose power supply faults
Heat sink; 80 plus rating system;
using PSU Tester.
Modular power supply.
Symptoms of SMPS failure;
Commonproblems from a faulty
SMPS.
Trouble shooting Power supplies.

1. Identify the electrical and


electronic components used in a
Basic Electronics –Electricity,
computer and tabulatethem as
Electrical quantities- Voltage,
active and passive components.
current and resistance; Active
components: Diodes- PN junction 2. Identify the working and non-
working stateof basic
diodes, biasing conditions-
forwardbias and reverse bias, components and semiconductor
devices.
3 1 1,4 transistors- BJT, MOSFET; Passive
components-Resistors, capacitors, 3. Using multi meter- Check
inductors, transformers, sensors, Output voltage ofbasic
and transducers; Integrated Circuits components and
Digital Electronics- PWM, opto- semiconductor devices.
coupler; checking AC to DC 4. Check different voltage levels
converter. of opto-coupler, PWM and
rectifier.

Mother board – Example


Motherboards; Functional 1. Precautions to be takenbefore
description of mother board; removing the mother board
specification and variation. from PC cabinet.
01,03 01, 2. Using the CPUID CPU-Ztool,
4 Form factor- what is
04 find different features of CPU.
Motherboard Form factor?
Types and features of 3. Check the Electric flowpath
Motherboard formfactors- and data flow path
ATX, Micro-ATX, Mini-ITX, 4. Windows resourcemonitor
Nano-ITX, andPico-ITX. 5. Using the CPUID CPU-Ztool,
Functional components of identify the CPU cache features
Motherboard; CPU and CPU of your working system.
socket-Types of sockets; Overview
of microarchitecture of
INTEL and AMD CPU.
1. Identify system faults using
Chipsets- Function, POST diagnosticscard.
Types andFeatures. 2. Understand basic onboard
Buses- System bus architecture configurationsthrough UEFI.
Importance of POST; UEFI – 3. Test different motherboards to
why is itrequired, possible determine support forUEFI
01, 01,
5 configurations through UEFI. 4. Replace the CMOS battery in a
03 04
IDE ports; Methods of adding computer following the
SCSIdrives. procedures.
CMOS battery: Why? Its 5. Understand and modifyBIOS
specifications. Impact of settings and observe the
removingthe battery from mother consequences of CMOS
board. failure.
1. Identify RAM chips and
Memory– Memory Units (B,
HDD/SSD, study their features
KB, MB,GB, TB), memory
and note their technical
locations and address space,
specifications.
01, Access methods, Memory
01, 2. Identify SIMM and DIMM
6 03 Classification.
04 memory modules, their number
Main memory Types and
of pins, specs and type.
Features.Auxiliary memory –
Types and features. Memory 3. Identify the interface type of a
modules. hard drive andconnect it to a
PC for data recovery.

RAM Technology- SDRAM,


DDR, DDR2, DDR3, DDR4 – 1. Use CPUID-CPUZ tool
Clock toidentify capacity,
speed, Bandwidth, Memory speed,technology, and related
speed rating, PCspeed rating; features of RAM.
RAM capacity- single- sided and
double-sided RAM, Channels; 2. Check for RAM and
RAM features- Parity/ECC Motherboard compatibility and
01, RAM, SODIMM, SPDR chip. install additional RAMstick.
7 01,03
04 Mass storage media- Hard
drive, Principle of working, 3. Find on Windows system
reliability, performance, SSD, properties tocheck the RAM for
optical drive; Logical Block correct installation.
Addressing (LBA); Memory
capacity- physical and logical 4. Query the SPD RAM chip to
addressing; M.2 drives, SATA, identify all
NVMe. 5. possible informationusing
Causes of Hard drive failure; CPUID CPUZ.
Signs offailure; Backup and
recovery of data;
Windows Installation –
Overview windows 10; 1. Windows Installation Inspect
general features; Versions; prerequisites for
architecture;prerequisites windows 10 installationon a given
02, computer.
8 for windows 10 installation:
03 2. Perform cleaninstallation.
hardware
compatibility,BIOS 3. Upgrade to windows10.
compatibility, driver 4. Create dual boot for a given
requirements. Clean install of system, learn andrectify errors
windows 10; upgrade to in dual boot.
windows 10; disk partitioning; 5. Practice on recoverypartition.
troubleshooting installation 6. Practice 10 registrytweaks.
problems; Multiple boot 7. Practice disk management
options; windows service packs. utilities.
Imaging: create a Windows
system image; How to
Backup/Restore your Windows
partition with the bootable
image.

File system overview, types,


properties, conversion from
one filesystem to another,
configuration.
Configuring system and data
1. Practice data recoverymethods
recovery: Recover files,
2. Working with task manager to
recover apps and the registry;
01, troubleshoot configuration and
recover windows 10.
otherperformance related issues.
02, Configure and manage
9 3. Working with taskscheduler.
03 windows updates:
4. Customizing windows
auto/manually; testing and
desktop.
troubleshooting updates.
Monitor and manage:
Performance monitoring;
optimizewindows services;
tune scheduled tasks.
Customizing windows desktop.

1. Execute basic commands in


Windows using command
prompt and PowerShell like
Windows Command line; listing the drives in a system,
01, PowerShell; basic commands;
01, creating a new file, removing a
10 04, writing simple PowerShell
03 file or directory, retrieving the
07 scripts. list of processes and services,
File security. etc.,
2. Use command line to encrypt
and decrypt files and folders.
1. Observe the layout of a laptop
and compare it with a desktop.
2. Follow/review manufacturer
Portable computing- maintenance guide forrepair
Troubleshooting and maintenance.
Laptops- I 3. Power Issues: Battery not
Difference between laptop and charging, No power.
desktop Motherboards; Checking 4. Trouble shoot computer hardware
02, Power connector and adaptor pins, issues in the following scenarios-
01,
11 03, AC adapter of Laptop circuit -Unexpected shutdowns.
04
04 diagram, Fault finding; trouble- -Lockups
shooting voltage transfer section, -POST & Boot
AC-DC conversion, Generation of -Continuous reboot
stand by voltage, fault finding- No -No Power
power ON, power switch, Battery -Loud Noises.
charging circuit; -Intermittent devicefailure
-Smoke and burning smell
5. -Indicator lights.
Troubleshooting Laptops- II
Dual MOSFET pin details, Two
N- channel MOSFET in place of 1. Perform the same operations in
dual MOSFET, one p-channel week#7on a laptop.
and one N- channel MOSFET, 2. LCD display trouble-shoot: No
problems and faultfinding; CPU display/dim video/flickering
voltage generation circuits, video.
01, keyboard interface, problem and 3. Wireless troubleshooting:
12 03,
04 fault finding. Touch pad Multiple antennae, check
04,
connector, BIOS details, SATA presence of wireless cards.
HDD 4. Scan and remove malwares in
details, Audio section, internal eachcomputer or mobiledevice.
display, LED screen pin details. 5. Perform Antivirus and anti-
Malware mitigation: introduction, malware updates.
types, symptoms, malware
removal;
E-waste management:
What is EEE and E-waste?
Different scenarios of E-waste
management, StEP initiatives to
solve e-waste problems, impact
of e-waste on health of children  Visit https://greene.gov.in and
and workers. https://kspcb.karnataka.gov.in/ to
E-waste management in find the latest regulations and
India: policies taken up by the
01,
13 EPR and e-waste, the informal Government of India.
04, 04
sector in e-waste management,  Visit a nearby e-waste
Technologies for e-waste management plant and
management, Financing e- understand the management
waste management systems- process.
Key steps, milestones to
achieve a robust
E-waste system.
Case studies.

Total in hours 39 13 52
*PO = Program outcome as listed and defined in year 1 curriculum

Table 1: Suggestive activities for tutorials (the list is only shared as an example and not inclusive of all
possible activities for that course. Student and faculty are encouraged to choose activities that are relevant to the
topic and the availability of such resources at their institution)
SL
Activity
NO
1. Study multipurpose cables used with different models of computers and their
applications.
2. Identify the cables and list the devices that can be connected to computer using these
1
cables.
3. Identify commercially available brands of keyboard, mouse and monitor and their
distinguishable features.
1. Identify preventive measures that help to eliminate or reduce electrostatic discharge.
2. Describe effective ways to reduce the risk of injury or damage while working with respect to
powersupply in computer systems.
2 3. Make your observations on why a technician may choose to use a UPS instead of a surge
suppress or to protect a computer.
4. Identify the components that are powered by the PSU.
5. Identify the common causes of PSU/SMPS failure and explainhow it can be maintained in a
healthy state.
6. Explain the factors on which the PSU wattage is decided.
7. Describe the features of different Power supplies available commercially that support a gaming PC.

1. Calculate the value of resistors onboard using the color code.


3
2. Identify the terminals of a BJT and MOSFET.
1. Identify the units MHz and GHz with respect to CPU.
2. Compare and contrast the characteristics of different motherboard formfactors.
3. Identify and present the factors to select an appropriate Motherboard based on the purpose-Basic
applications, Gaming, Workstations/servers.
4
4. Study the features and specifications of the processors (Intel: Pentium family, dualcore, quad
core, core 2 duo, i3, i5, i7, i9 and AMD processors).
5. Study the CPU benchmarks of the trending processors.
6. Compare features of CPU and GPU.
1. Explain bus standards with respect to evolution, speed, and recent trends (ISA, PCI, AGP).
2. Explain how to clear CMOS password.
3. Explain the importance of UEFI and configuration settings for –
5
a. Overclocking of CPU frequencies
b. Set RAM timings
4. Setting BIOS passwords Specify boot options.
1. Describe the classification of memories.
6
2. Study different types of memory devices and features that are commercially available.
1. Study the characteristics of different types of SSDs.
7 2. Compare DDR4 and DDR5 memory.
3. Study and identify what happens when the hard drive fails.
1. Identify system requirements for Windows 10 installation.
8 2. Study and list the features of different versions of windows 10.
3. Explore file backup in Windows file history feature.
1. Study best practices followed in scheduled backups and scheduled disk maintenance.
9
2. Study the necessity of TPM in Windows 11.
10 1. Compare relative merits and demerits of the two command shells.
1. Relate the components of a laptop to a desktop and compare their features.
11
2. Identify the upgradable and non- upgradable components in laptops.
12 1. Document the common faults that may occur on the motherboard.
1. Study the e-waste rules 2016 and their amendments there-off as prescribed by the Karnataka state
pollution control board and explain the process for the polytechnic to follow safe disposal of e-waste.
2. Study the global e-waste key statistics.
13
3. Sketch the e-waste policies and regulations, you think, must be regulated at each stakeholder’s
level.

4. Reference:
Sl. No. Description
https://www.dell.com/support/kbdoc/en-in/000139662/what-does-the-msconfig-utitility-
1
do-in-windows-7-on-your-dell-pc#TOC
https://www.google.co.in/amp/s/www.ufsexplorer.com/amp/articles/how-to/connect-sata-
2
disks-instruction.php
3 http://www.qiguaninc.com/met/faq/faq35_en.html
4 https://www.ciscopress.com/articles/article.asp?p=2999386&seqNum=3
5 https://www.crucial.in/articles/pc-builders/what-is-computer-hardware
6 https://www.udemy.com
7 https://www.pluralsight.com
Computer Networks
Subject code – CSE303

1. Rationale
The computer networking skills are essential in today's information and communication technology driven world.
It enables students with essential skills and knowledge to explore the world of communication and networking for
further study and career.

2. Course Outcomes: At the end of the course, the student will be able to:
Select an appropriate communication technology for a given network and ensure optimal
CO-01
performance by addressing issues arising from transmission impairments.
CO-02 Design a network for a given specification by using the right network components, devices,
topologies, protocols and software.
CO-03 Design, build, test and troubleshoot a SOHO network for a given premises.
Demonstrate the configuration of IP address, routing, subnetting, client-server interaction (TCP,
CO-04 UDP) and DNS for a given WAN network using a network simulator and troubleshoot common
network issues

3. Course Content
Tutorial
Lecture Practice
(Activity
Week CO PO (Knowledge Criteria) (Performance Criteria)
Criteria)
Electromagnetic waves - Generation of
electromagnetic waves and their
properties
Electromagnetic spectrum -
classification and its applications
Communication Systems - Basic
elements of communication systems 1.Build a circuit to Generate
1, 2 with block diagram, List commonly used and detect of BASK signal
1 01
terms in electronic communication and BFSK signal using
systems, Data representation, Data flow, communication kit.
Modulation, Demodulation
Analog and Digital Signals, Periodic and
Non-Periodic Signals, Sine Wave, Phase,
Wavelength, Digital Signals, Bit-
Refer Table 1

rate, Bit-length.

1. Explore all ISP in your


Transmission Impairment –
2 01 1,2 area/locality and select
Attenuation, Distortion and Noise,
best internet ISP/plan
Performance - Bandwidth, based on cost and
Throughput, Latency, Jitter (Basic performance.
concepts only). 2. Test the download/upload
Transmission Modes – Parallel and speed in your
Serial Transmission. Asynchronous computer/mobile phone also
and Synchronous Transmission. check type, bandwidth and
Satellite communication- ISP.
Introduction, advantages and 3. Explore Bluethooth, Wifi,
disadvantages NFC in your smartphone and
note their key technical
attributes (Radio spectrum
band, range,
pathloss, throughput, mode
etc)
1. My Protocol Rules
Objectives
a) Relate computer network
protocols to the rules that
you use every day for
various forms of
Perspectives on Networking – communication.
End user perspectives on Networking b) Define the rules that
and Internet, Overview of Networking. govern how to
Categories of networks - LAN, MAN, communicate in a group
WAN, Internetworking (Illustrate of students.
Network from LAN connected using a c) Play the communication
HUB to Internetwork). game.
01, 1,
The communication rules (Method, d) List what would happen if
3 language, Confirmation) – Protocols, the sender and receiver did
02 2, 3
the Internet. not agree on the details of
The Network Standard Organizations, the protocol.
Protocol Stack. 2. Manual and Automatic
OSI Model : OSI Layers and Their address assignment
Functions, OSI Layering Concepts and (Windows)
Benefits, OSI Encapsulation a) IPv4 address
Terminology. b) Subnet mask
c) DNS
3. Manual and Automatic
address assignment
(Android)
a) IPv4 address
b) Subnet mask
c) DNS
TCP/IP Networking Model - History
Leading to TCP/IP, Overview of the 1. Organize and play games
TCP/IP Networking Model. to understand working of
TCP/IP Application Layer, HTTP TCP/IP like:
Overview, HTTP Protocol Mechanisms. Create 2 group of students,
TCP/IP Transport Layer, TCP Error each playing role of a layers
Recovery Basics, Same-Layer and of TCP/IP (intermediate
01, 1,
4 Adjacent-Layer Interactions. network devices roles can
02 2, 3
TCP/IP Network Layer, Internet Protocol also be considered).
and the Postal Service, Internet Protocol Start the communication
Addressing Basics, IP Routing Basics. between two with a sender
TCP/IP Link Layer (Data Link Plus and receiver.
Physical), TCP/IP Model and 2. Determine the IP Address
Terminology, Data Configuration of a
Encapsulation Terminology. Computer (Windows) and
Names of TCP/IP Messages. Test the Network Interface
TCP/IP Stack (Ping).
1. Demonstrate working of
Hardware and Software components of common network devices.
Network - Common network devices - 2. Demonstrate different
Computers, Access points, Hub, Switch, network cables and
Router, repeaters, NIC, Modem. connectors.
1,
02, LAN Cables – Co-axial, twisted pair, 3. Install and configure NIC.
5 2,
03 optical fibre, LAN connectors- co-axial 4. Crimping of RJ45: Straight
4,
cable, and twisted pair cable, optical and Cross.
fibre, Connectors, Firewall, Firm wares, a) Punching Cat 6 cable to
ISPs. I/O Box. Use punching tool.
b) Check connectivity
using LAN tester
Overview of network topologies -
Basic topologies- bus, ring, star, mesh 1. Install Network simulator
and hybrid. like Cisco packet tracer.
1, 2. Create simple network in
01, Network Simulator: Network
2, simulator.
6 02 simulator like Packet Tracer,
3, 3. Create and Demonstrate all
Installation, User Interface.
4, possible network topologies
Deploy devices and cables
GUI and CLI Configuration. using simulator.
Configure end Devices
An Overview of LANs - Typical 1. Build a physical Ethernet
SOHO LANs, Typical Enterprise LANs, LAN Network and
The Variety of Ethernet Physical Layer demonstrate file sharing,
Standards, Consistent Behaviour over printer sharing.
All Links Using the Ethernet Data Link
Layer. 2. Install and configure
1, Building Physical Ethernet Networks wireless access point over
02, 2, with UTP - Transmitting Data Using the LAN.
7
03 3, Twisted Pairs, Breaking Down a UTP 3. Use pathping command to
4, Ethernet Link, UTP Cabling Pinouts for find actual path between
10BASE-T and 100BASE-T, Straight- source to destination with
Through Cable Pinout, Crossover Cable information about network
Pinout, Choosing the Right Cable
Pinouts, UTP Cabling Pinouts for latency/delay & network
1000BASE-T, Sending Data in Ethernet loss.
Networks.
Ethernet Data Link Protocols – The 1. Determine the MAC
Rise of Ethernet, The Ethernet MAC Address of a Host(PC and
address and Ethernet Addressing, Phone).
Identifying Network Layer Protocols
with the Ethernet Type Field, Error 2. View Wireless and Wired
Detection with FCS. NIC Information and make a
Encapsulation, Ethernet Frame. table explaining each.
1,
Hierarchical Network Design –
02, 2, 3. Configure and install a
8 Physical and logical addresses, Benefits
03 3, ethernet switch/Hub (Use
of a Hierarchical Design, Access,
4, simulator if hardware
Distribution, and Core layers Sending
devices are not available)
Ethernet Frames with
Switches and Hubs, Sending in Modern 4. Create/model a simple
Ethernet LANs Using Full-Duplex, Ethernet network using 3
Using Half-Duplex with LAN Hubs. hosts and a switch, Observe
Ethernet access layer devices – Hub, traffic behavior on
Switch, The MAC address table, the network and Observer
Ethernet Broadcast and Broadcast data flow of ARP
domain, ARP. broadcasts and pings.

Routing: The Need for Routing - Criteria


1. Build a simple peer-to-
for Dividing the Local Network
peer network and verify
- Now We Need Routing
physical connectivity and
Overview of Network Layer Functions -
Assign various IPv4
Network Layer Routing (Forwarding)
addresses to hosts and
Logic, Host Forwarding Logic: Send the
observe the effects on
Packet to the Default Router, Routing
network communication
Data Across the Network, Delivering
2. Configure IP addresses of a
1, Data to the End Destination, How
02, network (real or simulated)
2, Network Layer Routing Uses LANs and
9 03, and ping across to test and
3, WANs, IP Addressing and How
04 troubleshoot.
4, Addressing Helps IP Routing, Routing
3. Subnetting of a network
Protocols.
(either using real network or
IPv4 Addressing - Rules for IP
in Simulator).
Addresses, Rules for Grouping IP
4. Connect to web server
Addresses, Class A, B, and C IP
using simulator, Observe
Networks, The Actual Class A, B, and C
how packets are sent across
IP Networks, IP Subnetting, How to
the Internet using IP
create subnets, Subnet mask, CIDR,
addresses.
variable length subnet mask.
IPv4 Routing - IPv4 Host Routing,
Router, Forwarding Decisions and the IP
Routing Table, The default gateway, A 1. Implement simple static
Summary of Router Forwarding Logic, routing.
A Detailed Routing Example. 2. Troubleshooting of IP
1, Routing Protocols - IPv4 Routing Addressing-
02, 2, Protocols – static and dynamic. a) Change a routing table
10 03, 3, Other Network Layer Features - entry
04 4, Using Names and the Domain Name b) Wrong address
7 System, The Address Resolution c) incorrect subnet mask
Protocol, ICMP Echo and the ping 3. Configure and test DHCP
Command. on a wireless router (real or
DHCP – Static address assignment, simulated)
Dynamic address assignment, DHCP
servers.
1. Packet Tracer - Examine
Pv4 and IPv6 Address Management - NAT on a Wireless Router
Network Boundaries -Gateways to Other 2. Identify IPv6 Addresses
Networks, Routers as Gateways. a) Identify the different
1, Network Address Translation - types of IPv6 addresses.
02,
11
2, Introduction, NAT operation. b) Examine a host IPv6
03,
3, IPv4 Issues - Need of IPv6, Ipv4 vs network interface and
04
4, IPv6, IPv4 and IPv6 Coexistence. address.
IPv6 features - IPv6 Address c) Practice IPv6 address
Representation. abbreviation.
Concept of Virtual LAN’s(VLAN’s) 3. Setup, configure and test
VPN in your smartphone.
The Client Server relationship –
1. Create a client – server
Client Server interaction. URI, URN,
model in simulator and
URL
1, observe the client
02, TCP/IP Layer 4 Protocols: TCP and
2, interaction between the
12 03, UDP - Transmission Control Protocol,
3, server and PC using packet
04 Multiplexing Using TCP Port Numbers,
4, tracer.
Popular TCP/IP Applications,
2. Observe DNS Name
Connection Establishment and
Resolution
Termination, User Datagram Protocol.
Port Numbers – TCP and UDP. a) Observe the conversion
Socket pairs, the netstat command. of a URL to an IP address.
Application Layer Services - b) Observe DNS lookup
Common Network Application using the nslookup
Services, Domain Name System, command.
Domain Name Translation, DNS 3. Use simulator to
Servers, HTTP, Web Clients and demonstrate Telnet and
Servers, FTP, Virtual Terminals, SSH
Remote Access with Telnet or SSH,
Telnet, Security Issues with Telnet,
SSH, Email- Email protocols, Simple
Mail Transfer Protocol (SMTP), Post
Office Protocol (POP3), Internet
Message Access Protocol (IMAP4).
1. Demonstrate
troubleshooting
Commands with a
scenario- ipconfig, ping ,
netstat, tracert, nslookup.
Troubleshoot Common Network
2. Interpret the output of
Problems - The Troubleshooting
commonly used network
Process, Network Troubleshooting
command line utilities and
Overview, Gather Information - Nature of
Determine which network
problem, Equipment, Configuration and
utility can provide the
Topology, Previous Troubleshooting.
Structured Troubleshooting Methods - necessary information to
1, perform troubleshooting
02, Bottom-Up, Top-Down, Divide-and-
2, activities in a bottom-up
13 03, Conquer, Follow-the-Path, Substitution,
3, troubleshooting strategy
04 Comparison, Educated Guess.
4, 3. Physical Layer
Guidelines for Selecting a
Problems - Common Layer
Troubleshooting Method Troubleshoot
Wireless Issues - Causes of Wireless 1 Problems, how to use the
Issues, Authentication and Association five senses to troubleshoot,
Wireless Router LEDs,
Errors.
Cabling Problems
4. Common Internet
Connectivity Issues - DHCP
Server Configuration Errors,
Check Internet
Configuration, Check
Firewall Settings.

Total in hours 39 13 52
*PO = Program outcome as listed and defined in year 1 curriculum

Table 1: Suggestive activities for tutorials (the list is only shared as an example and not inclusive of all possible
activities for that course. Student and faculty are encouraged to choose activities that are relevant to the topic and
the availability of such resources at their institution)
Sl.
Activity
No
Prepare a report on advanced communication systems and suggest best way to connect remote
1
villages of India.
2 Prepare a report on Communication satellites of Indian Space Research Organization.
3 Prepare a presentation on 5 networking protocols being used in your smart phone.
My Protocol Rules Objectives
4 a) Relate computer network protocols to the rules that you use every day for various forms of
communication.
b) Define the rules that govern how you send and interpret text messages.
c) Explain what would happen if the sender and receiver did not agree on the details of the
protocol.
My Local Network
a) Record all the different network-attached devices in your home or classroom.
5 b) Investigate how each device connects to the network to send and receive information.
c) Create a diagram showing the topology of your network.
d) Label each device with its function within the network.
6 Detailed study of Packet tracer and present the same.
Trace a Route
7 a) Determine network connectivity to a destination host
b) Trace a route to a remote server using tracert
8 Presentation on wireless Ethernet protocols
1. Calculate whether destination address is local or remote using IP address.
9 2. Calculate whether destination address is local or remote using mask.
3. Use logical AND to determine network address
Identify IPv6 Addresses
10 a) Identify the different types of IPv6 addresses.
b) Examine a host IPv6 network interface and address.
c) Practice IPv6 address abbreviation.
11 Prepare a report on ICANN
List the popular port numbers with their use.
12 Prepare e report on popular application layer protocols and present the same.
Identify and correct any misconfiguration of a wireless device ( Scenario : A small business
13 owner learns that a wireless user is unable to access the network. All the PCs are configured with static
IP addressing. Identify and resolve the issue)

4. Reference:
Sl. No. Description
1 www.netcad.com
2 Computer Networks - Behrouz A. Forouzan
3 www.howtonetwork.com
4 vlab.co.in
Database System Concepts and PL/SQL
Subject code – CSE304

1. Rationale
Data, factual information, is the main driving force that is changing the face of our world. Database is an organized
collection of related data which is stored and accessed electronically using a computer. Database management has
evolved from a specialized computer application to a central component of virtually all enterprises, and, as a result,
knowledge about database systems has become an essential part of an education in computer science. SQL is a
powerful language for both querying and updating data in relational databases. Study of SQL empowers students to
implement and work with relational data model.

2. Course Outcomes: At the end of the course, the student will be able to:
Identify the elements of ER model for a given requirement, draw ER diagram and validate with the
CO-01
given requirement.
Translate the given ER diagram to a relational model and verify against integrity constraints. Also
CO-02
refine and normalize the relational database design against first three normal forms.
CO-03 Use appropriate SQL statements to create a database and other DB objects using a DBMS software.
Perform insert, delete and/or update operations on the database and query the database to
CO-04
retrieve the required information using appropriate SQL statements and clauses.

3. Course Content
Tutorial Practice
Lecture
(Activity (Performance
(Knowledge Criteria)
Week CO PO Criteria) Criteria)
Introduction
Overview of DB: why a database? Purpose of
1. Install and setup
database; Classification; Application; DBMS:
DBMS software
features, providers;
such as MySQL,
Functional components of DBMS; Types of
PostgreSQL
1 1 1,4 DBMS architecture;
2. Learn the interface
View of data in DBMS; Database users; Role
and explore the
and responsibilities of DBA;
features of installed
Case study: Example of any database
Refer Table 1

DBMS
application, recruitment database

Database design 1. Identify and ER-


2 1 1,3,4 Data model; types; importance of data modeling; model elements
Overview of database design; phases and draw ER
of database design; database development life diagram for the
cycle; given specifications
Conceptual design: ER-Model: entity: types; using tools.
attribute: types; relationships: types,
constraints, Symbols and Notations;
Case study: conceptual design for a set of
specifications
i. Restaurant
ii. Retail shop
iii. Recruitment
iv. College
v. Library
Relational model: Overview; characteristics; 1. Map ER Model to
Constraints: types; Operations; relational model
3 2 1,3
Advantages and Disadvantages; applications; 2. Identify various
Design anomalies; Features of good DB design; constraints
Functional dependency: overview, rules, types;
Normalization: normalization process; 1. Normalize the
4 2 1,3
importance of normalization;1NF,2NF,3NF above design
Sufficient examples to understand the concept
1. Validate the above
database languages: types, commands/tasks in
design against
each type; Integrity constraints;
5 3 1,4 integrity constraints
MySQL/PostgreSQL: overview; features;
datatypes; Standardization guidelines;
1. Use
MySQL/PostgreSQL
Defining Data: DDL
DDL statements to
CREATE, ALTER, DROP different DB
6 3 1,3,4 create database and
objects; Temporary tables: types, create and
other DB
use; external tables; Managing constraints
objects for above
design
1. Perform single
table and multi
Insert, delete and update data
table insertion
Modifying data: UPDATE and
2. Perform delete and
DELETE
7 3,4 1,3,4 update operations
Update anomalies; impact of constraints Querying
of available data: SELECT; Aliases; sorting data: 3. Querying single
ORDER BY table
4. Sort the result set
of a query
1. Querying single
filtering data: WHERE, AND, OR, row limiting table
8 4 1,4 clause, IN, BETWEEN, LIKE; 2. Filtering data
Joining table: INNER JOIN, LEFT JOIN, 3. query multiple
tables with joins
1. Queries that use set
Grouping data: Aggregate functions, GROUP operators
9 4 1,4 BY, HAVING; 2. Report aggregated
Set operators: UNION, INTERSECT, MINUS; data using group
functions
Subqueries: 1. Write sub queries
Comparator operators; subqueries: Single Row to retrieve
10 4 1,4 Subqueries; Multiple Row Subqueries; correlated information from
subqueries; EXISTS, NOT EXISTS, the created
ANY, ALL, SOME; database
Views: create, drop and update; realization of 1. Create view and
11 4 1,4
views based on single and multiple tables; query
DCL: Controlling user access: Differentiating 2. Create users and
system privileges from object privileges; assign privileges for
Granting privileges on tables DB operations
PL/SQL: variables, datatypes; control
statements (decision making); Stored
1. Create and execute
procedures and Functions
store procedures
12 4 1,4 Concept; syntax and structure of store
2. Create and execute
procedure;
functions
syntax and structure of functions; calling a
function; Examples;
Managing and controlling transactions: 1. Create and execute
Introduction of transaction, ACID properties; transactions
states of transaction; Transaction control; 2. Call previously
Overview of transaction management, using created store
13 4 1,4
transaction control commands: COMMIT, procedure or
ROLLBACK, SAVE POINT, SET function in
transaction
TRANSACTION;
sufficient examples;
Total in hours 39 13 52
*PO = Program outcome as listed and defined in year 1 curriculum

Table 1: Suggestive activities for tutorials (the list is only shared as an example and not
inclusive of all possible activities for that course. Student and faculty are encouraged to
choose activities that are relevant to the topic and the availability of such resources at their
institution)

1. Identify the drawbacks of file system and how DB enables us to overcome them. Identify
1
distinguishable features of each of DBMS available in the market.
1. Transform given n-ary relationship to binary relationship
2 2. Document the steps to create ER diagram.
3. Identify the components of ER model in the given requirements.

3 1. Document the steps to create logical design


2. Discuss and document Codd's 12 rules
4 1. Explore and document other normal forms

5 1. study and present the working of SQL optimizer


2. Learn and report optimization techniques
1. Learn and demonstrate use of DISTINCT, ALL, IS NULL;
6
2. Learn and present RIGHT JOIN;
7 1. Identify the advantages of Cascading Referential Integrity Constraints
8 1. Identify need of subqueries
9 1. identify the advantages and disadvantages of store procedure and functions,
10 1. presentation on the latest developments in research and industry related to this course
11 1. Learn and present need of scalar subqueries
12 1. Learn iterative statements in PL/SQL
1. Does Relational model support storage of unstructured data, if no, what are the alternatives to
13
store unstructured data.

4. Reference:
Sl. No. Description
1 Database System Concepts by Abraham Silberschatz, Henry F. Korth, S . Sudarshan
2 https://binaryterms.com/
3 https://beginnersbook.com/
4 https://www.oracletutorial.com/

5. Equipment/software list

Sl.
Particulars Specification Quantity
No.

1 Computers 20

MySQL workbench/ or equivalent software; Lucid chart,


2
draw.io
(4th – SEMESTER)
Data Structures with Python
Subject code – CSE401

1. Rationale
Data structures are the techniques organizing data and of designing the algorithms for real-life projects. Knowledge
of data structures is essential for software design and development. Learning data structures with Python offer
flexibility and ease of programming with many built in data structures and libraries.

2. Course Outcomes: At the end of the Course, the student will be able to:
CO-01 Explain data structures types, list their applications.
CO-02 Apply the right Algorithm design strategies to solve a given problem.
CO-03 Choose the right data structure to develop solution to a given computing problem.
CO-04 Analyse space and time complexities of the algorithm used and plot a graph.

3. Course Content
Tutorial
Lecture Practice
(Activity
Week CO PO (Knowledge Criteria) (Performance Criteria)
Criteria)
Introduction to Data Structures, operations,
classification, Characteristics.
Primitive types – primitive data structures, 1. Python program to
python examples. Non primitive types - Non Use and demonstrate
primitive data structures, python examples. basic data structures.
1,
1 01 Linear and nonlinear data structures – with 2. Implement an ADT
2, 3
python examples. with all its
Introduction, Abstractions, Abstract Data Types, operations.
An Example of Abstract Data Type (Student,
Date, Employee), Defining the ADT,
Using the ADT, Implementing the ADT.
1. Implement an ADT
and Compute space
and time
1, Algorithm Analysis – Space Complexity,
complexities.
01, 2, Time Complexity.
2. Implement above
Refer Table 1

2 02, 3, Run time analysis.


solution using array
04 4, Asymptomatic notations, Big-O Notation,
and Compute space
7 Omega Notation, Theta Notation.
and time complexities
and compare two
solutions.
1. Implement Linear
Search compute
space and time
complexities, plot
graph using
Algorithm design strategies: asymptomatic
1,
notations.
01, 2, Brute force – Bubble sort, Selection Sort, 2. Implement Bubble,
3 02, 3, Linear Search. Selection, insertion
04 4,
Decrease and conquer - Insertion Sort. sorting algorithms
7 compute space and
time complexities,
plot graph using
asymptomatic
notations.

1. Implement Binary
Search using
recursion Compute
space and time
complexities, plot
graph using
asymptomatic
Divide and conquer - Merge Sort, Quick Sort, notations and
Binary search. compare two.
1, Dynamic programming - Fibonacci sequence 2. Implement Merge
01, 2, Backtracking – Concepts only (Implementation and quick sorting
4 02, 3, examples with recursion in week 9). algorithms compute
04 4, Greedy – Concepts only. space and time
7 complexities, plot
graph using
asymptomatic
notations and
compare all
solutions.
3. Implement Fibonacci
sequence with
dynamic
programing.
Linear(arrays) vs nonlinear (pointer) 1. Implement Singly linked
01, 1, structures – Run time and space list (Traversing the
02, 2, requirements, when to use what? Nodes, searching for a
5
03, 3, Introduction to linked list, Examples: Image Node, Prepending
04 4, viewer, music player list etc. (to be used to Nodes,
explain concept of list), applications. Removing Nodes)
1,
01, The Singly Linked List- Creating Nodes,
2,
02, Traversing the Nodes, searching for a Node, 1. Implement linked list
6 3,
03, Prepending Nodes, Removing Nodes. Iterators.
4,
04 Linked List Iterators.
The Doubly Linked List, Examples: Image
01, 1,
viewer, music player list etc. (to be used to
02, 2, 1. Implement DLL.
7 explain concept of list).
03, 3, 2. Implement CDLL
DLL node, List Operations – Create,
04 4,
appending nodes, delete, search.
The Circular Linked List-Organization, List
Operations – Appending nodes, delete,
iterating circular list.
Last In First Out (Stack) Data structures –
Example: Reversing a word, evaluating an
01, 1, expression, message box etc. (to be used to 1. Implement Stack Data
02, 2, explain concept of LIFO). Structure.
8
03, 3, The Stack implementation – push, pop, 2. Implement bracket
04 4 display. matching using stack.
Stack Applications- Balanced Delimiters,
Evaluating Postfix Expressions.
Recursion. 1. Program to
Properties of Recursion. demonstrate recursive
01, 1,
Recursive functions: Factorials, Recursive Call operations (factorial/
02, 2,
9 stack, The Fibonacci Sequence. Fibonacci)
03, 3,
How Recursion Works- The Run Time Stack. 2. Implement solution
04 4,
Recursive Applications- Recursive Binary for Towers of Hanoi.
Search, Towers of Hanoi.
The First In First Out (Queue) Data structure
– Example: Media player list, keyboard buffer
01, 1,
queue, printer queue etc. (to be used to explain 1. Implement Queue.
02, 2,
10 concept of FIFO). 2. Implement priority
03, 3,
Implementing the Queue and its operations queue
04 4,
using Python List.
Priority Queues, Implementation.
The Tree data structure – Example: File
explorer/Folder structure, Domain name
1, server.
01, 1. Implement Binary
2, Tree Terminologies, Tree node
02, search tree and its
11 3, representation.
03, operations using list.
4, Binary trees, Binary search trees, Properties,
04 Implementation of tree operations – insertion,
deletion, search, Tree traversals
(in order, pre order and post order).
1, 1. Implementations of
01, Depth-first traversal
2, BFS.
12 02, Breadth-first traversal
3, 2. Implementation of
04 Tree applications: Expression evaluation.
4, DFS.
Introduction to Hashing.
1,
01, Hashing - Perfect hashing functions. 1. Implement Hash
2,
13 03, Hash table functions.
3,
04 Hash Functions, Operations, Hash collision,
4,
Application.
Total in hours 39 13 52

*PO = Program outcome as listed and defined in year 1 curriculum

Table 1: Suggestive activities for tutorials (the list is only shared as an example and not inclusive of all possible
activities for that course. Student and faculty are encouraged to choose activities that are relevant to the topic and
the availability of such resources at their institution)
Sl.
Activity
No
1 Design a Data structure for handling Student Records- Designing a Solution, Implementation
(Using Basic DS).
2 Design a Data structure for handling Student Records- Designing a Solution, Implementation
(Using ADT).
3 Optimize your solution (Bubble sort, selection sort and Insertion sort)
4 Implement Radix sort.
5 Prepare report on nonlinear data structures.
6 Design and implement sparse matrix representation using linked list.
7 Design and implement simple application that require DLL data structure.
8 Implement and demonstrate evaluating postfix expression.
9 Presentation on run time stack.
10 Design and implement priority queue data structure.
11 Prepare a Report on balanced trees.
12 Implement expression evaluation tree.
13 Prepare a report on hashing and analyze time complexity.

4. Reference:
Sl. No. Description
1 Data Structures and Algorithms using Python by Rance D. Necaise
2 Python Data Structures and Algorithms by Benjamin Baka
3 www.geeksforgeeks.com

5. Equipment/software list
Sl.
Particulars Specification Quantity
No.

1 Computers 20

2 Python 3.6 20

3 Editor such as iPython, Jupyter, spider, PyCharm 20


Operating System and Administration
Subject code – CSE402

1. Rationale
The Operating System knowledge and skill is an integral part in the study of computer science. It provides the
platform for all other application to run on the machine, thus knowledge of operating system and administration
becomes indispensable for understanding computing environment. It is essential to have knowledge of operating
system’s services and utilities to develop, deploy and maintain the software and hardware. The students will also be
skilled in operating system virtualization, to create and manage virtual computing environment.

2. Course Outcomes: At the end of the course, the student will be able to:

CO-01 Explain functions and services of an operating system.

CO-02 Create a virtual environment and configure it to meet a specific application requirement.

Identify and use Linux commands to create and manage simple file processing operations,
CO-03
organize directory structures, and develop shell script to automate given simple task.

Demonstrate the role and responsibilities of a Linux system administrator and analyse problems
CO-04
using suitable diagnostic tools and resolve issues.

3. Course Content
Tutorial
Lecture Practice
(Activity
Week CO PO (Knowledge Criteria) (Performance Criteria)
Criteria)
Overview of Operating System, Need for
OS, Structure, OS Types, Examples of
1. Types of OS installation
OS (desktop and mobile)
2. Boot methods
Dual mode operation, Kernel and
1 1 1,7 3 . File System and
microkernel, Functions of OS User
Refer Table 1

formatting
interfaces; Corporate Vs
4. Post installation tasks
Personal needs; Types of OS
installation
1, Virtualization technology, working,
2 1, 7
2 types 1. Install and configure
virtual machine-
Virtual box/VMware,
Potentials and challenges of VMware player
Virtualization, Virtual Machines,
Containers. station.
Linux Boot process. 2. Download and install a
Linux command line - Interpreter, shell, terminal emulator and
CLI over GUI, Types of users- super and connect Linux VM via
normal, Linux user manual. TE(optional).
Significance of man
command.
3 1,3 1, 7 File system - Pathnames, File system File and Directory
structure and its description, commands:
navigating the file system. 1. Create and delete
File types, attributes, Access Control directories and files,
List (ACL), Adding text to file. File movement, copy
Pipes, File Comparison, Filters / commands, Pipes
Text Processing Commands. (named & unnamed)
2. Commands for viewing
File, File comparison,
File manipulation,
Altering file permission,

Refer Table 1
File compression and
decompression.
3. Text processing
commands.

Process Management – 1. Linux commands related


Process, daemon, process to process creation and
states, PCB; Process management- system
scheduling Queue calls fork() and exec();
1,2,3,7 Operations on Processes - bg, fg, nohup, pkill, nice,
4 1,
Process creation, Process top, ps;
termination, 2. cron and at commands
Interprocess communication. to schedule tasks.
Scheduling - Long term, short
term,and medium term; Context
switch; Different types of CPU
schedulers
(Basic concept), Process priority;
debugging (system hang)
Process synchronization- 1. Demonstration through
1,2,3
critical section problem, videos.
5 1,3 4, 7
Semaphores; Deadlock- System 2. Commands to exhibit
model, methods for handling thread concepts.
deadlocks, deadlock prevention,
avoidance, detection, recovery
from deadlocks.
Threads - Multithreading
models,Threads, and processes.
Types of threads - Kernel level and
User level
Refer Table 1

1. Demonstration through
Memory management -
videos.
1,2,3 Process address space, static vs
6 1 2. Commands to view
4, 7 dynamic linking and loading.
memory consumption
Swapping, Memory allocation,
Fragmentation, Paging,
Segmentation; Virtual memory,
Demand paging, Page replacement
algorithm (concept only)
Shell Programming: 1. Write shell scripts to
2, 3
Basics of shell programming, types illustrate decision
4, 7
of shell in Linux, Basic Shell scripts- making and different
Shebang or Hashbang, Input & types of
7 1
Output, decision making and iterative iterations; Ex- to
scripts. perform string
operations; to perform
file operations;
Automation of system tasks: Writing 1. Illustrate automation of
2, 3
scripts to automate common tasks. basic tasks like

Refer Table 1
4, 7
monitoring memory
8 1 consumption, check
remote servers’
connectivity, etc., at
different frequencies.
Network Management 1. Enable internet on
Network components- IP address, Linux VM.
2, 3,4 subnet mask, gateway. 2. Test and manage
Network Interface management;
network using
Communication.
Data transfer facilitation. following commands
Diagnosis and troubleshooting; ifconfig, iwconfig,
Resource analysis. ethtool, arpwatch, bmon
9 1
,telnet, ssh, sendmail,
mailstats, w
cURL, wget, ftp, rcp, scp,
Refer Table 1

rsync, sftp. netstat, ping,


traceroute, iftop, nload,
ss.
tcpdump, dstat.
User authentication 1. Work on user
2,4 User and Group account accounts useradd,
management. passwd, userdel,
Working on interface. usermod,
Linux Directory Service - Account groupadd, groupmod,
Refer Table 1

10
Authentication, what is LDAP and gpasswd, groupdel;
2,4,7
Active Directory? LDAP structure, system-config.
working. 2. OpenLDAP Installation
3. LDAP server and client
configuration.
System monitoring, Log monitoring 1. System monitoring
2, 3
System maintenance, System commands top, df,
4, 7
information. dmesg, iostat 1, free,
System architecture, Linux Boot cat /proc/cpuinfo,
4 process and System run levels, cat/proc/meminfo;
11 System updates and repositories. 2. Work on log directory
-
/var/log;
3. System maintenance
commands-
shutdown, reboot,
halt, init.
4. System update &
repositories- yum &
rpm.
2, 3, Server setup: DNS- Introduction, Install and configure:
4, 7 Configuration, creating DNS zone, 1. DNS server with a
2,4
using DNS tools; FTP- Installation domain name of your
process, configuration and choice.
securing; setting up an Apache 2. FTP server on
12

Refer Table 1
Web Server(http) LINUX and transfer
files to demonstrate
it’s working.
3. Apache web server and
create virtual hosts.
Storage management: 1. Basic commands for
2,4 2, 3 Disk partition, formatting, storage partitions.
4, 7 mounting; Logical Volume 2. Install and configure
Management (LVM)- Use of LVM, LVM.
creating Volume groups, logical 3. Add Disk and
volume and disk mirroring, Extend CreateStandard
13
Disk using LVM, Adding Swap & LVM
Space Introduction to RAID – Partition.

Refer Table 1
Hardware & Software, RAID levels. 4. Add virtual disk and
create a new LVM
partition(pvcreate,
vgcreate, lvcreate)
5. Extend disk using LVM
Total in hours 39 13 52
*PO = Program outcome as listed and defined in year 1 curriculum
Table 1: Suggestive activities for tutorials (the list is only shared as an example and not inclusive of all possible
activities for that course. Student and faculty are encouraged to choose activities that are relevant to the topic and
the availability of such resources at their institution)
1. Compare features of different OS(windows, Linux, RTOS- Vxworks/android)
1 2. Study the evolution of OS to recognize the importance of current OS
trends.
3. Explain the different flavors of LINUX.
2 1. Explain OS level virtualization and state its benefits.
2. Compare VMs and Containers
3. Identify the difference between hypervisors and Linux containers.
4. Comprehend the benefits of virtualization.
3 1. Compare ex2/ex3 filesystem attributes.
2. Discuss the file- mount and unmount system calls.
4 1. Compare Linux fork () and Windows createprocess () functions.
5 1. Study probable conditions for deadlock occurrence and how to overcome it.
2. Identify relationship between threads and processes.
3. Comprehend the differences between types of threads
6 1. Compare the features of swapping and paging.
7 1. Compare different Linux shells.
8 1. Write a cron job that runs all essential apps. on an hourly/ daily/weekly/monthly basis. (for ex.
Executing Antivirus)
9 1. Compare static and DHCP IP addresses and check whether these can be switched over.
2. Study different options offered by Linux for package management.
10 1. Identify few alternatives to openLDAP and make a comparison.
11 1. Explore other network commands required for a sysadmin and interpret their functions and
usage.
12 1. Study the difference between application server and web server.
2. Identify the role of virtual host.
3. Explain different types of Apache virtual hosts and how they are set up.
13 1. Compare the features between RAID and SSD.

4. Reference:
Sl.
No Description
.
1 Operating System internal and Design Principles, William Stallings
2 Operating System, Garry Nut
3 https://www.redhat.com/en/topics/virtualization
4 Virtual Machine - an overview | ScienceDirect Topics
5 DNS: https://www.youtube.com/watch?v=TiWs9n4fhys&list=RDCMUCQSpnDG3YsFNf5-qHocF-WQ &inde
x

6 Linux system admin requirements: https://www.temok.com/blog/linux-system-administration/


7 Linux commands for modern sysadmins- N/W related - https://www.ubuntupit.com/useful-linux-
network-commands-for-modern-sysadmins/
8 DNS Technology: https://www.digitalocean.com/community/tutorials/an-introduction-to-dns-
terminology-components-and-concepts
9 Commands for Disk Management: https://www.programmersought.com/article/55913754022/

5. Equipment/software list

Sl.
Particulars Specification Quantity
No.

1 Computers

2
VirtualBox, Ubuntu or any other Linux OS image.
Object Oriented Programming and Design with Java
Subject code – CSE403

1. Rationale
Object oriented programming paradigm with object-oriented design principles are vital in design and
development of today’s complex computing solutions. OOD principles provide valuable standards and
guidelines to create clean and modular design and avoid code smells. Java being the popular object-
oriented programming language that empowers the innovation in this digital world, students will have
sound knowledge of object-oriented programming concepts and design principles with java.

2. Course Outcomes: At the end of the course, the student will be able to:
Design a solution for a given problem using object-oriented programming concepts and apply
CO-01
all appropriate object-oriented design principles
CO-02 Write and test the code for a designed solution using java OOP concepts.
CO-03 Identify exceptions in the designed or given solution and explain how to resolve them.
CO-04 Demonstrate with an example a java application's connection with a database.

3. Course Content
Tutorial
Lecture Practice
PO (Activity
Week CO (Knowledge Criteria) (Performance Criteria)
* Criteria)
1. Install and Setup java
Introduction to Java environment
Brief history; features; java architecture; 2. Install java editor
components: JVM, JRE, JDK; (Eclipse for Enterprise
1, Applications;
Refer Table 1

Java) and configure


1 1,2
4 Java environment setup; Structure workspace
of java program; Compilation and 3. Execution of first java
execution of java program; Clean program
coding in java. 4. Java code execution
process
1, 1. Code, execute and
Introduction to OOP:
2, debug programs that
Building blocks: class, object,
2 1,2 3, uses different
attributes, methods; Class and objects in
4, types of variables and
java;
7 datatypes;
Variable: Types (local, instance, static); 2. Identify and resolve issues
declaration, initialization; in the given code
comments; ‘Data types; snippet
1. Code, execute and
debug programs
a. that uses different
Constructors: rules for defining
types of constructors
1, constructor; types; Destructor; Access
b. for expression
2, modifiers; this’ keyword; Autoboxing
3 1,2 evaluation
3, and unboxing; Operators; Expressions;
c. to perform autoboxing
4 Evaluation of expressions;
and unboxing
2. Identify and resolve
issues in the given code
snippet
1. Install memory
monitoring tool and
1,
observe how JVM
2, Memory allocation in java; garbage
allocates memory
4 1,2 3, collection: concept, working, types,
2. Memory allocation
4, advantages finalize () method;
explanation through
7
the programs

Conditional and Iterative


1. Code, execute and
statements
debug programs that
1, Decision making: if, if..else, switch
uses different
2, Iterative: need of iterative statements;
5 1,2 control statements.
3, types of loops in java; how to use them;
2. Identify and resolve
4 Break and continue statements;
issues in the given code
snippet
1. Code, execute and
debug programs
OOP concepts: Encapsulation
1, 2. that uses encapsulation
Concept; What is encapsulation? How
2, concept.
to achieve encapsulation in java;
6 1,2,3 3, 3. Define class &
Packages;
4, implement like simple
Single Responsibility Principle:
7 calculator or text
Intent; Rules; Benefits; example
processing and check
compliance with SRP.
1. Code, execute and
debug programs that
1, Arrays: Why arrays? Features, types,
uses array concept
2, Declaration, array creation with new
7 1,2 2. Code, execute and
3, operator, working with arrays; Strings:
debug programs to
4 creation, string methods;
perform string
manipulation.
1. Code, execute and
debug programs that
Refer Table 1

1, OOP concepts: Inheritance


uses inheritance
2, Inheritance concept; types;
concept
8 1,2 3, Inheritance in java; Examples;
2. Design a class &
4, Open Closed principle: Intent; Rules;
implement like file
7 Benefits; example
parser and check
compliance with OCP.
1. Code, execute and
1, OOP concepts: Polymorphism
debug programs that
2, Polymorphism concept; types: method
uses
9 1,2 3, overloading and overriding;
a. static binding
4,7 application; polymorphism in java;
b. dynamic binding
sufficient examples;
1. Code, execute and
debug programs that
OOP concepts: Abstraction Overview; uses
implementation of abstraction in java: 2. abstract class to
1, achieve abstraction
abstract class and interface; Relationship
2,
10 1,2
between class and interface; inheritance 3. interface to achieve
3, in interface; Examples to substantiate the
4, abstraction
understanding of concepts; Eg. File 4. Verify whether the
7 parser; message logger
given code snippet is
correct according to
abstraction or not

1. Code, execute and


debug programs in
java to
Files and Exception handling a. handles checked and
Files and I/O streams: File reader and unchecked exceptions
1, b. read the content of the
writer;
2,
Exception concept; exceptions in java; file and write the
11 1,2,3 3,
classification: checked and unchecked; content to another file
4,
exception handling in java; 2. Incorporate exception
7
handling in
programs/applications
developed in previous
sessions.

1, Design principle: 1. Design an interface &


2, Interface Segregation principle: implement it like one
12 1,2,3 3, Intent; Rules; Benefits; examples; that builds different
4, Enums; Overview of java annotations; types of toys and check
7 compliance with ISP.
1. Code, execute and
Refer Table 1

1, Database Connectivity Introduction debug programs to


2, to JDBC; JDBC components; How connect to database
13 1,2,3,4 3, JDBC works? JDBC through JDBC and
4, connections; Connect java application to perform basic DB
7 database using JDBC; operations

Total in hours 39 13 52
*PO = Program outcome as listed and defined in year 1 curriculum

Table 1: Suggestive activities for tutorials (the list is only shared as an example and not inclusive of all possible
activities for that course. Student and faculty are encouraged to choose activities that are relevant to the topic and
the availability of such resources at their institution)
Sl.
Activity
No
1 1. Identify various java IDEs and identify differences between them.
2. Compare and contrast Java with Python
1. Study and present
2 a. type casting in java
b. what are command line arguments in java?
c. java keywords and their usage
1. Compare and contrast
3 a. method and constructor;
b. constructor and destructor
4 1. Study and present how does bytecode work in java.
5 1. Present nesting of conditional and iterative statements considering a use case.
Identify advantages and disadvantages of
a. Encapsulation.
6 b. Inheritance
c. Abstraction
d. Polymorphism
Study and report
7 a. java Arrays class their methods
b. java String class their methods
Identify and document how these principles help to avoid code smells.
8 a. SRP
b. OCP
c. ISP
Compare and contrast
9 a. static and dynamic binding and identify usage of each
b. abstract class and interface, identify usage of each
10 1. Differentiate error and exception
2. Identify and document system exceptions
11 Study DRY principle, identify the benefits.
12 Identify how OOD principles violations impact the quality of code.
13 Identify java ORM frameworks and their features.
14 Study and find the inclusions in latest java versions.

4. Reference:
Sl. No. Description
1 https://docs.oracle.com/javase/tutorial/java/concepts/
2 www.edureka.co
3 Clean Code by Robert C Martin
4 https://www.javabrahman.com/programming-principles/
5 https://medium.com/

5. Equipment/software list

Sl.
Particulars Specification Quantity
No.

1 Computers

2 Java 8.0 and above, eclipse


Software Engineering Principles and Practices
Subject code – CSE404

1. Rationale
Digital reality has become an integral part of human life with software tools being used to deal with
virtually every part of life. A process is key to develop a quality software successfully. Principles and practices of
software engineering blends engineering, computing, project management and software development. It’s essential
to understand the life cycle of software development and the process followed to develop a quality software. Design
thinking methodology encourages identifying alternative strategies and solutions to solve a problem in best possible
way.

2. Course Outcomes: At the end of the Course, the student will be able to:
Explain the typical software development life cycle (SDLC), list and differentiate the various
CO-01
SDLC models along with identifying where each model could be beneficial when applied.
Demonstrate the application of design thinking as a process, explain how it helps in
CO-02
requirement engineering and mitigate risks.
Study a given application requirement, create user stories, draw the appropriate UML diagram
CO-03
and validate to ensure user story/UML diagram meet with the given requirement.
Document standard test procedures and test cases for a given requirement to ensure the
CO-04
software gives the desired results for which it is built.

3. Course Content
Tutorial Practice
Lecture
(Activity (Performance
(Knowledge Criteria)
Week CO PO Criteria) Criteria)
Overview
Software engineering; Need of software
1. Discuss success
engineering; Software paradigms; Software
and failure stories
product types: generic, customized; 2. Presentation of
characteristics of good software; collected case
1 1 1
Challenges in software projects; Factors that studies
Refer Table 1

influence software development; 3. Enact the


understanding success importance of
Software process; need of process, ethical practices
components of process, process
activities; Differentiate product, project and
process; process assessment and
improvement; Software engineering ethics.

SDLC and Process Models 1. Case study to


SDLC; Software process model; How to understand the
choose process model? Comparison between a SDLC
defined process and an empirical process; 2. Organize and play
Traditional process models: waterfall; games to
Incremental; understand the
Agile process- manifesto; principles; agile process like,
practices; A paradigm shift from plan driven morning wake up
mentality. game
 the
1,
2 1 marshmallow
5
challenges
 White Elephant
Sizing
 Easter Egg
Challenge
3. Create JIRA
(similar tool)
account and learn
interface

1. Play and act agile


Agile frameworks; Ceremonies; Roles; ceremonies
Overview of XP – XP practices 2. Play different agile
1, Scrum: Overview; framework; ceremonies
3 1 roles
5 and artifacts Eg. Product owner,
business analyst

Risk 1. case study to


Risk, characteristics, categories; why risk understand the
management is critical; risk management importance of risk
framework; Activities; management and
Principles of risk management, Risk mitigation of risk
4 1,2 1 identification, Risk assessment – risk analysis; 2. How to use tools to
risk prioritization; Risk Mitigation; need and manage and
importance of risk mitigation; Risk Control – mitigate risks
planning, resolution, monitoring; How to use [eg. Logicgate,
tool to manage and AuditBoard etc]
mitigate risks in an organization.
Design Thinking 1. Conduct warmup
Introduction, 5 stages of design thinking activities to Ignite
Understand the process of design thinking Design Thinking
1,
5 2 using an example 2. Organize and
2
Case Study conduct design
thinking exercises
and games
Requirement Engineering & Modeling 1. Organize role play
Overview; what is requirement? Importance; for requirement
Requirement types; Sources of requirements; activities
Requirement engineering Process; 2. Identify a problem
Feasibility study; Typical Requirements and prepare
Engineering Problems; requirement
Requirement modeling strategies; document or Epics
1,
6 1,3 Overview of UML; types of diagrams; and user stories
2
Note: Take a case study to understand 3. Configure JIRA for
requirement engineering and prepare use the managing the
cases or user stories project to solve the
identified problem
4. Draw UML diagram
for given use case

User stories
What are user stories? Why user story? 1. Create detailed user
Basic concepts; Characteristics; How to stories for the above
write/create user stories? Steps; 3C’s in identified problem
1,
user stories; Life cycle of user story. User 1.Organize and play
7 1,3 2,
story map. planning poker to
4
Estimation: decide on user
User story point: basics; components of points.
story point estimation; Steps involved in
estimation;
Design
Objectives; design Concepts; Levels of
design; 1.Create sitemap and
Architectural styles; Monolithic and wireframe for above
1, Microservices; created user stories.
8 1,2 2, UI and UX: Overview of UI and UX, UI (Tools such as
3 types, essential properties, elements of UI sketch, Adobe XD,
design; relationship between UI and UX; Figma, etc can be
Importance of good UI/UX. Wireframes: used)
overview, purpose, benefits;

Development 1. Create Git (similar


Overview of DevOps; working principle; tool) account and
Benefits; DevOps culture; DevOps practices: configure
1, continuous integration, continuous delivery, repository
2, version control, configuration management, 2. Upload the artifacts
9 1
3, Build process; created to Git
4 Learn version control
and configuration
management with Git

Code quality and code security: overview; 1. Install and


importance; issues caused by poor code; tools configure Jenkins
to check code quality Containerization: 2. Create a container
1,
Container, why container, containerization; image for Hello
2,
10 1 working principle; benefits; Hello world world project
3, example Note: Docker or similar tool can be 3. Setup build for
4
used container image
to explain the containers. using Jenkins (Hello
world application)
Testing 1. Prepare Test plan
Principles of testing; Need of testing; stages; for the user stories
Testing process and activities; classification; using JIRA
Testing strategies; Levels of software testing; 2. Prepare RTM for
1,
11 1,4 Software testing types; the user stories
4
(Integration testing, functional testing, end-to- created using JIRA.
end testing need to be explained in detail) Create test cases for
the user stories
created.
Software Measurement and Metrics 1. Use JIRA or similar
Measurement; need of Measurement; types; tool to capture agile
Metrics: characteristics; classification; Agile metrics
12 1,4 1
metrics; Application monitoring. 2. Use SonarQube to
capture code quality
metrics
Quality Control and Assurance
Concept of software quality, Compliance,
1. Organize Roleplay
Quality Standards, quality control, quality
to understand the
assurance; Difference between QC & QA.
roles and
Need for auditing.
responsibilities of
13 1,4 1 Auditing fundamentals: auditing, elements of
QA and QC team.
auditing; audit types; auditing methods,
2. Audit the artifacts
benefits of auditing.
produced in previous
Quality and Process improvement tools and
sessions
techniques– pareto chart, PDCA cycle, Six
sigma and Lean process
Total
in 39 13 52
hours
*PO = Program outcome as listed and defined in year 1 curriculum

Table 1: Suggestive activities for tutorials (the list is only shared as an example and not inclusive of all possible
activities for that course. Student and faculty are encouraged to choose activities that are relevant to the topic and the
availability of such resources at their institution)
Sl
Activity
No
1 Study the traffic signal and the importance of rules and process.
2 Visit various consulting company web portals and collect case studies.
3 Document the roles and responsibilities of different agile ceremonies
4 Identify cost of risk;
Identify commonly used risk management tools.
5 Identify a problem and explain how design thinking can be applied to solve it.
Design a shopping cart to achieve ease of use, applying design thinking.
Prepare RPM requirement traceability matrix for shopping cart List
6 the criteria to select the requirement management tools.
Identify different requirement management tools and list their features.
Identify frequently used UML diagrams and also identify tools used to draw them.
7 Explore agile estimation techniques and prepare a report.
8 Study boiler plate and present necessary characteristics of boiler plate for a large and small project
Identify different DevOps Tools and list their features
Study and report OWASP coding guidelines
9 Learn and report Twelve Factor App methodology
Identify different version control and configuration management tools and report their market share
Compare and contrast containerization and virtualization and identify importance of these in
10 software development
Identify container providers
11 Study and prepare report on testing tools.
Compare manual and automation testing
12 Study and prepare report on widely used software metrics.
13 Identify different quality tools and report their features and usage

4. Reference:
Sl. No. Description
1 Agile Software Development, principles, patterns and practices by Robert Martin
2 Art of agile development by James Shore & Shane Warden
3 Extreme programming explained: embrace change
4 Software-Engineering-9th-Edition-by-Ian-Sommerville
5 RPL-7th_ed_software_engineering_a_practitioners_approach_by_roger_s._pressman_
6 Becoming Agile..in an imperfect world by Greg Smith, Ahmed Sidky
7 scaledagileframework.com
8 Continuous Delivery Principles | Atlassian
9 www.agilealliance.org/
10 www.udemy.com
11 www. tutorialride.com
12 www.interaction-design.org/
13 www.digite.com

5. Equipment/software list

Sl.
Particulars Specification Quantity
No.

1. Computers

2. Git, Jira, SonarCube, Lucidchart or any other UML design tool

You might also like