Bachelor of Computer Applications (1)
Bachelor of Computer Applications (1)
Course Objectives:
The objectives of the course are:
• The students are able to recognize the theories influencing Human Computer Interaction(HCI)
• The students are able to recognize how the requirements and challenges in developing computers with good level of HCI.
• The students think about how advanced computing facilities can be used to design one system which is capable of serving a large diverse population.
Course Contents/Syllabus:
Weightage (%)
Module I : Introduction 20%
Introduction to Interaction Design, I/O channels – Memory – Reasoning and problem solving; The computer: Devices –
Memory – processing and networks; Interaction: Models – frameworks – Ergonomics – styles – elements –
interactivity- Paradigms.
Design, Process of Design, Screen Design and Layout, Universal design Principles, Iteration and Prototyping. Human
Computer Interaction in the software process-The software life cycle, Usability Engineering, Iterative design and
prototyping. Design Rules-Standards, Guidelines, Golden Rules and Heuristics. HCI Patterns - Task centred System
Design and User Centred Design & Prototyping.
Module III : Evaluation 10%
Goals of Evaluation, Evaluation through Experts, Evaluation through users. Choosing an Evaluation method.
Course Objectives:
The objective of this course module is to acquaint the students with the basics of computers system, its components, data representation inside computer and
to get them familiar with various important features of procedure oriented programming language i.e. C. This Course guides the students to read, write and
modify C programs and to implement basic projects
Pre-requisites: Basic Computer Knowledge
Course Title
Weightage (%)
Module I : Introductions 15
Descriptors/Topics :
Basic Computer Organization, Computer Hardware Components, Primary Memory – RAM, ROM,
Secondary Memory, Types of Softwares, Introduction to Compilers, Interpreters, Assembler, Linker,
Loader, Introduction to C compilier and its different versions, Basic Operating System Concepts,
Functions of Operating system
Types of Operating System.
Module II: Programming in C 20
Descriptors/Topics
History of C, Introduction of C, Basic structure of C program, Concept of variables, constants and data
types in C, Operators and expressions: Introduction, arithmetic, relational, Logical, Assignment,
Increment and decrement operator, Conditional, bitwise operators, Expressions, Operator precedence and
associativity. Managing Input and output Operation, formatting I/O.
Module III : Fundamental Features in C 20
C Statements, conditional executing using if, else, nesting of if, switch and break Concepts of loops,
example of loops in C using for, while and do-while, continue and break. Storage types (automatic,
register etc.), predefined processor, Command Line Argument.
Module IV : Arrays and Functions 20
Descriptors/Topics
One dimensional arrays and example of iterative programs using arrays, 2-D arrays Use in matrix
computations. Concept of Sub-programming, functions Example of user defined functions. Function
prototype, Return values and their types, calling function, function argument, function with variable
number of argument, recursion.
Module V: Advanced features in C 20
Descriptors/Topics
Pointers, relationship between arrays and pointers Argument passing using pointers, Array of pointers.
Passing arrays as arguments. Strings and C string library. Structure and Union. Defining C structures,
Giving values to members, Array of structure, Nested structure, passing strings as arguments. File
Handling
Selfwork/PSDA
s.no.
Activities
1
For each of the statement below assuming y=20 before of the statement, what are the values of x after execution.
(i) x=y==y--;
(ii) x=5*y++
For (i) y-- gives 20 then decreases the value of y to 19. So y==y-- is false and gives 0 which is assigned to x. Therefore value of x is 1.
For (ii) y++ gives 20 which is multiplied by 5 and assigned to x. Therefore value of x is 100.
2
Build a program in c to find the simple interest when the principle amount and number of years is entered through keyboard. The rate of interest is 5.75 fixed,
Build a Calendar in C programming language is a console application without graphics. To make the calendar look colorful, many windows properties have
been used in this project. Besides the color used in backgrounds, the days of the month are white and the vacations (Sundays) are indicated using the red
foreground color.
In this mini project, we should be able to find out the day corresponding to a given date and view the days and dates corresponding to a particular month+year.
Using C program build a Employee Management system.In this project, you can manage employee records – add, list, modify and delete records.
Understanding this project will help you learn how to add, view, change and remove data using file handling.Here, you can list the employees’ record but
search employee by employee Id.
Student Record System uses files as database to perform file handling operations such as add, search, modify and delete records to manage students’ records. In
this project, you can also generate mark-sheet for students.
8
Build the Telecom Billing System, to perform and manage billing operations like they do in Telecom companies. Here, you can add records with name, phone
number and the amount of payment. You can view, modify, search and delete existing records.
C Snake Game is a simple console application without graphics. In this project, you can play the popular “Snake Game” just like you played it elsewhere. You
have to use the up, down, right or left arrows to move the snake.
Foods are provided at the several co-ordinates of the screen for the snake to eat. Every time the snake eats the food, its length will by increased by one element
along with the score.
10
The Tic-Tac-Toe game is very popular. It’s fun when you play with paper and pencil. Develop a mini project in C Tic Tac Toe game – a simple console
application without graphics.
It is the same noughts and crosses or the Xs and Os, the other names for Tic-Tac-Toe, you’ve played with paper and pencil. This mini game project is written in
C language in a very simple manner; it is complete and totally error-free.
11
Build a project for Billing System in a School. We should perform billing or accounting operations under two account types: one for the students and one for
teachers and staffs. School Billing System is a console application without graphic. In this project, you can add, record, modify, search and delete the records of
both account types. In addition to that, this mini project in C allows you to display fees, dues, total and advance of students, and salary-related information of
teachers and staffs.
For the entry of records, current date and month is asked. Then, you can select the account type, and perform billing operations like I mentioned above. In the
add record, the name, class and roll no. of the student is asked, and it is similar for all other functions as well as the teachers account
12
In this project, a number of questions are asked, and the user is awarded cash prize for each correct answer given. In quiz game, questions are chosen in such a
a way that they cover all fields of a typical quiz contest. The user’s general knowledge is tested with quiz questions regarding science, technology, movies,
sports, general health, geography and many more
Text:
E. Balagurusamy, “Problem Solving through C language”, TMH publication, Fourth Edition, 2008.
Peter Nortons, “Introduction to Computers”, TMH, Sixth Edition,2006.
Brian W. Kernighan, Dennis M. Ritchie, “C Programming Language”, 2nd Edition,1988.
References:
Course Objectives:
The course objective is to
Pre-requisites: None
Module V: 20
Descriptors/Topics :
Introduction to Programming Concepts – Define program; Process of programming; Algorithms; Introduction to
flowcharts; Basic symbols and drawing of flow charts; Advantages and limitations of flow charts; Pseudocodes –
Sequence logic, Selection logic, Iteration logic, Advantage and disadvantages;
Text Books:
1. Gill, Nasib S.: Essentials of Computer and Network Technology, Khanna Book Publishing Co., New Delhi.
2. Gill Nasib Singh: Computing Fundamentals and Programming in C, Khanna Books Publishing Co., New Delhi.
3. Chhillar, Rajender S.: Application of IT in Business, Ramesh Publishers, Jaipur.
4. Donald Sanders: Computers Today, McGraw-Hill Publishers.
5. Davis: Introduction to Computers, McGraw-Hill Publishers.
6. V. Rajaraman : Fundamental of Computers, Prentice-Hall India Ltd., New Delhi.
7. Learning MS-Office2000 by R Bangia (Khanna Book Pub)
8. Teach yourself MS-Office by Sandlers (BPB Pub).
9. Using MS-Office by Bott( PHI). Note: Latest and additional good books may be suggested and added from time to time , covering the syllabus
Course Name: Basic Mathematics
Course Objective:
Pre-requisites:
Basic knowledge of Mathematics
Course Contents/Syllabus:
Weightage (%)
Basic Concepts, Propositions or Statements, Truth Table, Connectives and Compound Propositions, Implication, Bi- 20
conditional of Connectives, Converse, Inverse and Contra positive of an Implication, Tautology, Logical Equivalence,
Switching Circuits
20
Binary Operations, Properties of Binary Operations, Semi group, Monoid, Group, Subgroups and other Groups
Graph, Multi Graph, Complete Graph, Bi Graph, Degree, isomorphic Graph, Euler Graph, Hamiltonian Graph, Bipartite 20
Graph.
Data and Statistical Data, Frequency Distribution, Graphical Representation, Measure of the Central Tendency, 15
Measure of Dispersion, Kurtosis, skewness.
Text:
Business Mathematics, Sancheti & Kapoor, S.Chand & Sons
References:
2nd Semester
Course Contents: -
Weightage (%)
Module I: Introduction to Data Structures 15
Definition, Types. Algorithm design, Complexity, Time-Space Tradeoffs. Use of pointers in data structures.
Array Definition and Analysis, Representation of Linear Arrays in Memory, Traversing of Linear Arrays, Insertion And
Deletion, Single Dimensional Arrays, Two Dimensional Arrays, Multidimensional Arrays, Function Associated with
Arrays, Character String in C, Character String Operations, Arrays as parameters, Implementing One Dimensional
Array, Sparse matrix.
Module IV :Trees 20
Trees: Basic Terminology, Binary Trees and their representation, expression evaluation, Complete Binary trees,
extended binary trees, Traversing binary trees, Searching, Insertion and Deletion in binary search trees, General trees,
AVL trees, Threaded trees, B trees.
Insertion Sort, Bubble sort, Selection sort, Quick sort, Merge sort, Heap sort, Partition exchange sort, Shell sort,
Sorting on different keys, External sorting. Linear search, Binary search, Hashing:,Hash Functions, Collision Resolution
Techniques.
Pedagogy for Course Delivery: - Subject will be taught based on lectures and practical will be conducted in blended/flipped mode. Particular emphasis
will be given on practical explaining use case scenario for various algorithms. Focus will be on student’s involvement while imparting the course contents.
6. Using the following binary tree traverse it into inorder, preorder and postorder:
7. Write an algorithm to delete an element x from a binary search tree t. Discuss your method with an example.
8. Write a program to create a Binary Search Tree and display its contents using preorder, postorder and inorder traversal.
Module 4 Searching and Sorting Techniques
1. Write down complexity of all sort and in which situation those sorts should be used?
2. Which sorting techniques is an application of recursion?
3. Use the selection sort to put the number 3, 2, 4, 1, 5 into increasing order. Illustrate the output returned in each pass clearly.
Also, write the pseudo algorithm to it.
4. Write a program to sort the given array using MergeSort.
5. Write a program of Graph traversal-Depth first search and Breadth first search.
6. Trace quick sort on the list L= {11, 34,67, 78, 78, 78, 99}.What are your observations?
7. Write the program for heap sort.
8. What is hashing and hash function in data structure explain in detail.
9. What is a collision resolution technique in data structure?
List of Experiments:
1. Write a program to search an element using Linear Search.
2. Write a program to search an element using Binary Search.
3. Write a program to sort the given array using Bubble Sort.
4. Write a program to sort the given array using Selection Sort.
5. Write a program to sort the given array using Insertion Sort.
6. Write a program to sort the given array using QuickSort.
7. Write a program to sort the given array using MergeSort.
8. Write a program to insert a new element in the given unsorted array at kth position.
9. Write a program to delete an element from given sorted array.
10. Write a program to merge to given sorted arrays.
11. Write a program to implement Stack using array, also show overflow and underflow in respective push and pop operations.
12. Write a program to implement Queue using array, which shows insertion and deletion operations.
13. Write a program to implement Circular Queue using array, which shows insertion and deletion operations.
14. Write a program to implement Linear Linked List, showing all the operations, like creation, display, insertion, deletion and searching.
15. Write a program to implement Stack, using Linked List. Implement Push, Pop and display operations.
16. Write a program to implement Queue, using Linked List. Implement Insertion, deletion and display operations.
17. Write a program to count the number of times an item is present in a linked list.
18. Write a program to increment the data part of every node present in a linked list by 10. Display the data both before incrimination and after.
19. Write a program to implement Doubly Linked List, showing all the operations, like creation, display, insertion, deletion and searching.
20. Write a program to create a Binary Search Tree and display its contents using recursive preorder, postorder and inorder traversal.
21. Write a program to implement deletion of a node in binary search tree.
22. Write a program to implement Binary tree and display the contents using non-recursive preorder, postorder and inorder traversal techniques.
23. Write a program to sort the given array using HeapSort.
24. Write a program of Graph traversal-Depth first search and Breadth first search.
25. Write a program to implement Prim’s algorithm
26. Write a program to implement Kruskal algorithm.
Text:-
● Yashwant Kanetkar,”Data Structure using C”, BPB Publication, 5th Edition ,2011
● A.Tannenbaum,Y. Lanhgsam and A.J. Augenstein ,” Data Structures Using C And C++ “,Prentice Hall of India,2nd Edition,2009.
● Jean-Paul Tremblay, P.G Sorenson, “An Introduction to Data Structures with applications”, Mcgraw-Hill ,2nd Edition ,1984.
References:-
● Robert L Kruse, “Data Structure and Program Design in C”, Prentice Hall (1991).
● Noel Kalicharan ,“Data Structure in C” ,Ist Edition Create space publisher, 2008.
● Mark Allen Weiss,“Data Structure and algorithm Analysis in C”,2nd Edition AddisonWesley,1996.
● E. Balagurusamy, “Problem Solving through C language”, TMH publication, Fourth Edition, 2008.
● R.S Salaria ,“Data Structures & Algorithms using C”,Khanna Publication,4th Edition,2009
● E.Horowitz and S.Sahni,”Fundamentals of Data Structures in C “,2nd Edition, Universities Press,2008.
Course Title: Environmental Studies
Course Objectives:
The goal of this course is to provide students with the scientific background needed to understand how the Earth works and how we, as human beings,
fit into that. At the end of the course, it is
expected that students will be able to identify and analyze environmental problems as well as the risks associated with these problems and understand
what it is to be a steward in the
environment, studying how to live their lives in a more sustainable manner.
Course Contents/Syllabus:
Module I : Multidisciplinary nature of environmental studies
Introduction, definition and importance of environmental studies, need for public awareness, sensitisation and participation
Module II : Natural Resources
Types of natural resources, natural resource conservation, Role of an individual in conservation of natural resources, Equitable use of resources for sustainable
lifestyles. 2. Land resources: Land as a resource, land degradation, man induced landslides, Land resources: soil erosion and desertification. 3. Natural
Resources: Forest resources: Use and over-exploitation, deforestation, case studies. Timber extraction, mining, dams and their effects on forests and tribal
people. 4. Natural Resources: Water resources: Use and over-utilization of surface and ground water, floods, drought, conflicts over water, dams-benefits and
problems. 5. Natural Resources: Mineral resources: Use and exploitation, environmental effects of extracting and using mineral resources, case studies. 6.
Natural Resources: Food resources: World food problems, changes caused by agriculture and overgrazing, Food resources effects of modern agriculture,
fertilizerpesticide problems, water logging, salinity, case studies. 7. Natural Resources: Energy resources: Growing energy needs, Energy resources renewable
and non-renewable energy sources, Energy resources use of alternate energy sources, case studies. 8. Role of individual in conservation of natural resources 9.
Equitable use of resources for sustainable lifestyles.
Module III : Ecosystems
1. Concept of an ecosystem, 2.Types of ecosystem, 3.Structure and function of an ecosystem, Producers, consumers and decomposers. 4.Energy flow in
the ecosystem, Food chains, food webs and ecological pyramids. 5.Ecological succession. 6. Introduction, types, characteristic features, structure and
function of Forest ecosystem, Grassland ecosystem and Desert ecosystem, Aquatic ecosystems (ponds, streams, lakes, rivers, ocean estuaries)
Module IV : Environmental Pollution
Definition Cause, effects and control measures of :- a. Air pollution b. Water pollution c. Soil pollution d. Marine pollution e. Noise pollution f. Thermal
pollution g. Nuclear hazards Solid waste Management : Causes, effects and control measures of urban and industrial wastes. Role of an individual in
prevention of pollution. Pollution case studies. Disaster management : floods, earthquake, cyclone and landslides
Module V : Social Issues and the Environment
Environment From Unsustainable to Sustainable development Urban problems related to energy Water conservation, rain water harvesting, watershed
management Resettlement and rahabilitation of people; its problems and concerns. Case Studies Environmental ethics : Issues and possible solutions. Climate
change, global warming, acid rain, ozone layer depletion, nuclear accidents and holocaust.
Case Studies. Wasteland reclamation. Consumerism and waste products. Environment Protection Act. Air (Prevention and Control of Pollution) Act. Water
(Prevention and control of Pollution) Act Wildlife Protection Act Forest Conservation Act Issues involved in enforcement of environmental legislation. Public
awareness.
Module VI: Human Population and the Environment
Population growth, variation among nations. Population explosion – Family Welfare Programme. Environment and human health.
Human Rights. Value Education. HIV/AIDS. Women and Child Welfare. Role of Information Technology in Environment and human health. Case Studies.
Module VII: Field Work
Visit to a local area to document environmental assets-river/forest/grassland/ hill/mountain. - Visit to a local polluted siteUrban/Rural/Industrial/Agricultural. -
Study of common plants, insects, birds. - Study of simple ecosystems-pond, river, hill slopes, etc.
Module VIII: Biodiversity
Introduction - Definition: genetic, species and ecosystem diversity 2. Biogeographical classification of India 3. Value of biodiversity: consumptive use,
productive use, social, ethical aesthetic and option values 4. Biodiversity at global, national and local levels, India as a mega-diversity nation 5. Hot-spots of
biodiversity, 6. Threats to biodiversity: habitat loss, poaching of wildlife, man wildlife conflicts 7. Endangered and endemic species of India 8. Conservation
of biodiversity: In-situ and Ex-situ conservation of biodiversity 9. Biological Diversity Act, 2002
Student Learning Outcomes:
Student can recognize the environmental problem associated with development
Apply the gained knowledge for the environmental conservation and its sustainability
Demonstrate an integrative approach to deal with environmental issues with a focus on sustainable environmental management.
Develop an ability to integrate the disciplines related to environmental concerns.
Formulate the critical thinking skills for environmental protection
Text & References:
Gauba Dhawan and Bisht Environmental Studies, Challenges & Solutions A quick Compendium.
Somvanshi and Dhupper, Fundamentals of Environmental Studies.
Kaushik and Kaushik, Fundamentals of Environmental Studies.
Asthana and Asthana, A textbook of Environmental Studies.
Course Title: INDIVIDUAL EXCELLENCE AND SOCIAL DYNAMICS
Credit Units: 3
Course Level: UG
Course Objectives:
To understand attitudes and its relevance with personality
To relate Emotional Competency with Power of Motivation
To explain of Values, Ethics & Morality among students
To discuss cultural and social dynamics
Pre-requisites: ----
Course Contents/Syllabus:
Weightage (%)
Module I: Understanding Self for Effectiveness
Descriptors/Topics
Descriptors/Topics
Understanding Emotions 20%
Types of Emotions
Function of Emotions
Positive emotions and Personal development
Creating healthy organizational climate
Emotional Intelligence – Meaning, components, Importance and Relevance
Managing Emotions
Motivation; Meaning, Types of Motivation, Components of Motivation
Source of Motivation
Module III: Social and Behavioral Issues
Descriptors/Topics
Social issues in Community
Healthy management of Social Issues:
Social and Psychological Stigma 15%
Strategies to overcome Social Stigma
Behavioural Problems
Rumors; Social Media, Electronic Media
Nature of Socialization
Types of Socialization
Agents of Socialization and their Contribution
Social Inhibition and Social facilitation
Descriptors/Topics
Personal values-Empathy, honesty, courage, commitment
Core Values 15%
Values Clarification & Acceptance
Nurturing Good values
Professional Values-Work ethics, respect for others
Its role in personality development
Moral Dilemma’s
Value Prioritization
Learning based on project work on Scriptures like- Ramayana, Mahabharata, Bible, Quran, Gita etc.
Descriptors/Topics
Types of Judgment (Factual Aesthetic, Moral)
Domains in study of Ethics (Applied, Normative & Meta Ethics) 15%
Ethics in Technological Era
Meaning, Types of Organizational Justice,
Implications of Organizational Justice
Consequences of Organizational injustice
Pedagogy for Course Delivery: Lectures, PPT Presentation, Activities, Psychometric testing, Group Discussion, Role Plays, Situational Analysis,
Project etc.
PSDA 1: The students will project the skills acquired while steering through the course content in the form of learning journal.
PSDA 2: The students will be given real life situation for reflection of behavioural Skills and developing solutions. They will be evaluated on analytical skills
and applicability of the solution.
PSDA 3: The students will make a minor project to reflect how behavioural skills and their technical skills make a perfect blend for achieving success.
Course Name: Software Engineering and Modelling
Course Objective:
The Objective of this course is to
To describe how a given software implementation will affect its surroundings.
To address the requirements and planning of an Information System.
To acquire knowledge about design and development of various software process models and Information system tools.
To apply standard coding practice in developing of software project.
To expose the students to a variety of topics such as software testing methods, costing techniques.
To know about planning and management of software projects as per industry standard.
Pre-requisites:
NIL
Course Contents/Syllabus:
Weightage (%)
Module 1: Introduction to Software Engineering.
What and Why Software Engineering,
Software Crisis–Problem and Causes. 15
Responsibility of Software Engineering,
Fundamental Qualities of a Software Product,
Kinds of Software Life-Cycle Models and Case Study
20
Introduction to Software Testing
Level of Testing 20
Characteristics of software testing,
Black-Box Testing and White-Box Testing,
Alpha, Beta and Gamma testing
Module VI: Software Project Planning and Management
LAB EXERCISE
Reference Books:
Software Engineering, A Practitioner’s Approach – Roger S. Pressman.2015
Course Objectives:
The course objective is to
Provide the basic knowledge of the concepts involved in designing and working of an operating system
Understand how it acts as a resource manager of the system as a whole.
Describe how CPU management takes place through multiprocessing and switching between various processes.
Discuss various issues such as Memory conflicts and how these conflicts are resolved by an operating system
Prerequisites:
NIL
Text:
:
Silberschatz Galvin Gagne, Operating Systems Concepts, Wiley Publication, Nine Edition, 2012.
A S Tanenbaum, Modern Operating Systems, Prentice Hall of India New Delhi, Fourth Edition, 2015.
References:
Maurice J. Bauch , Design of UNIX Operating System, Prentice Hall of India, Third Edition, 2007
SibsankarHaldar Operating Systems,Pearson Publications, First Edition, 2010
Garry Nutt, Operating Systems, Pearson Publications, Third edition, 2004
Andrew S. Tanenbaum, Modern Operating Systems, 2nd Edition; GOAL Series, 2004.
Evi Nemeth, Garth Snyder, The UNIX System Administration Handbook, Prentice Hall, First Edition, 2014
Iain D. Craig , virtual machines, First Edition, Springer, 2005
Module I FUNDAMENTALS
Descriptors/Topics Green IT Fundamentals: Business, IT, and the Environment – Green computing: carbon
foot print, scoop on power – Green IT Strategies: Drivers, Dimensions, and Goals – Environmentally
Responsible Business: Policies, Practices, and Metrics.
2. Woody Leonhard, Katherrine Murray, “Green Home computing for dummies”, August 2009.
REFERENCES:
1. Alin Gales, Michael Schaefer, Mike Ebbers, “Green Data Center: steps for the Journey”, Shoff/IBM
rebook, 2011.
2. John Lamb, “The Greening of IT”, Pearson Education, 2009.
3. Jason Harris, “Green Computing and Green IT- Best Practices on regulations & industry”, Lulu.com,
2008.
4. Carl speshocky, “Empowering Green Initiatives with IT”, John Wiley & Sons, 2010.
5. Wu Chun Feng (editor), “Green computing: Large Scale energy efficiency”, CRC Press, 2012.
3rd Semester
Course Objectives:
After studying the concept of random variables in probability theory, the knowledge of Statistical distributions as well as the parameters determining them are of
paramount significance. It gives the idea, how the total probability is distributed among the possible values of random variables. The main objective of the course is to
provide the detailed knowledge of the characterization of all the useful discrete, absolutely continuous and singular distributions. Interrelations of various Statistical
Models producing different families require further investigations. With the exploration of the concepts the students will be able to formulate the mathematical/statistical
models for real data set arising in various fields. Also characterize a property which is possessed by a distribution and that distribution alone.
Prerequisites:
NIL
Course Objectives:
This course is aimed to provide a fundamental understanding of Computer Networking, Operating System, Connecting to the networks, network
addressing, network services and Wireless technologies etc.
After the completion of the course you will understand the core concepts around which computer networks revolve.
Course Contents/Syllabus:
Weightage (%)
Module I Exploring the Network 5
Introduction, Communicating in a Network-Centric World, The Network as a Platform, Converged Networks, LANs, WANs, and the
Internet, The Expanding Network, Network Architectures.
Course Learning Outcomes: After completion of this course students should able to
Set up a personal computer system including operating system, interface card and peripheral devices.
Plan and install a home and small business network and connect to the internet. Verify and troubleshoot network and internet connectivity. Configure
basic IP services via GUI interface.
Recognize and mitigate security threats to the home network.
Configure and verify basic internet application.
Configure and verify basic router and switches.
Troubleshooting of basic network problems.
List of Experiments:
Text Reading:
Network Basics companion guide by Cisco Networking Academy, Cisco Press, Edition 1, December 2013
Mark Dye , Rick McDonald , Antoon Rufi “Network Fundamentals, CCNA Exploration Companion Guide”, Cisco Press; Edition 1 December 2011
References:
Behrouz Forouzan., “Data Communication and Networking” McGraw-Hill Higher Education; 4 edition,2006
William Stallings “ Data and Computer Communication” Prentice Hall; 10 edition, 2013
Andrew S. Tanenbaum “ Computer Networks” Prentice Hall; 5 edition ,2010
Web References:
https://cisco.netacad.com/
http://10.0.2.19/ccna4.html
Course Title: INTRODUCTION TO DATABASE MANAGEMENT SYSTEMS
Course Objectives:
The objectives of this course is to:
To expose the students to the fundamentals & basic concepts in Data Base Management Systems.
To discusses architecture of Database Systems with concept of relational model & ER model.
To explain techniques for database design, Normalization and database recovery and protection.
Pre-requisites:
Basic Knowledge of Programming Language
Course Contents/Syllabus:
Weightage (%)
Module I Introduction to DBMS 20%
Descriptors/Topics
Definition of DBMS, Data Independence, DBMS Architecture, Levels, Database Administrator, File System Approach Vs DBMS Approach,
Advantages of Using a DBMS, Data Models , Schemas, and Instances.
Domains and Relations, Relational Data Integrity ; Primary Key, Candidate Key , Foreign Key and their rules; Relational operators, Relational
Algebra, Relational Calculus, SQL Language, Data definition, Data retrieval and update operations.
Activity 1 Self-Work activities can be conducted by dividing the class into group of 3-4 students and same will be evaluated by board of
faculty members along with the group report. Some of the suggested activities are:
1 Case study on Banking system
2.Case study on Automation system of marketing company
3. Case study on Healthcare system
4. Case study on Normalization
5. Case study on Airline company
1. A publishing company produces scientific books on various subjects. The books are written by authors who specialize in
one particular subject. The company employs editors who, not necessarily being specialists in a particular area, each take
sole responsibility for editing one or more publications. A publication covers essentially one of the specialist subjects and
is normally written by a single author. When writing a particular book, each author works with on editor, but may submit
another work for publication to be supervised by other editors. To improve their competitiveness, the company tries to
employ a variety of authors, more than one author being a specialist in a particular subject.
2. A General Hospital consists of a number of specialized wards (such as Maternity, Paediatry, Oncology, etc). Each ward
hosts a number of patients, who were admitted on the recommendation of their own GP and confirmed by a consultant
employed by the Hospital. On admission, the personal details of every patient are recorded. A separate register is to be
held to store the information of the tests undertaken and the results of a prescribed treatment. A number of tests may be
conducted for each patient. Each patient is assigned to one leading consultant but may be examined by another doctor, if
required. Doctors are specialists in some branch of medicine and may be leading consultants for a number of patients, not
necessarily from the same ward.
3. A database is to be designed for a Car Rental Co. (CRC). The information required includes a description of cars,
subcontractors (i.e. garages), company expenditures, company revenues and customers. Cars are to be described by such
data as: make, model, year of production, engine size, fuel type, number of passengers, registration number, purchase
price, purchase date, rent price and insurance details. It is the company policy not to keep any car for a period exceeding
one year. All major repairs and maintenance are done by subcontractors (i.e. franchised garages), with whom CRC has
long-term agreements. Therefore the data about garages to be kept in the database includes garage names, addressees,
range of services and the like. Some garages require payments immediately after a repair has been made; with others CRC
has made arrangements for credit facilities. Company expenditures are to be registered for all outgoings connected with
purchases, repairs, maintenance, insurance etc. Similarly the cash inflow coming from all sources - car hire, car sales,
insurance claims - must be kept of file.CRC maintains a reasonably stable client base. For this privileged category of
customers special credit card facilities are provided. These customers may also book in advance a particular car. These
reservations can be made for any period of time up to one month. Casual customers must pay a deposit for an estimated
time of rental, unless they wish to pay by credit card. All major credit cards care accepted. Personal details (such as name,
address, telephone number, driving licence, number) about each customer are kept in the database.
4. A database is to be designed for a college to monitor students' progress throughout their course of study. The students are
reading for a degree (such as BA, BA(Hons) MSc, etc) within the framework of the modular system. The college provides
a number of module, each being characterised by its code , title, credit value, module leader, teaching staff and the
department they come from. A module is co-ordinated by a module leader who shares teaching duties with one or more
lecturers. A lecturer may teach (and be a module leader for) more than one module. Students are free to choose any
module they wish but the following rules must be observed: some modules require pre-requisites modules and some
degree programmes have compulsory modules. The database is also to contain some information about students including
their numbers, names, addresses, degrees they read for, and their past performance (i.e. modules taken and examination
results).
Activity 3 Implementation and description of SQL Functions: Date, Numeric, Character, Aggregate &etc.
Activity 4 Implementation of database query in the form of relational algebra and relational calculus
List of Experiments:
1) Create a table “PRODUCTS” with the below mentioned structure:
Product ID NUMBER(11)
Supplier ID NUMBER(11)
Category ID NUMBER(11)
Quantity Per Unit VARCHAR2(20)
Unit Price NUMBER(11)
Units In Stock NUMBER(11)
Units On Order NUMBER(11)
Product ID should be the Primary Key.
3) Create table EMP and DEPT with the below mentioned structure
Structure for EMP table
EmpID NUMBER(4)
DeptID VARCHAR2(10)
EmpName CHAR(10)
Job CHAR(10)
HireDate DATE
Salary NUMBER(7, 2)
Commission NUMBER (7, 2)
Structure for DEPT table
DeptId VARCHAR2(10)
Deptname VARCHAR2(20)
No_of_Faculties NUMBER(2)
In table EMP : EmpID should be the Primary Key and DeptID should be the foreign
key.
In table DEPT : DeptId should be the primary key.
5) Considering the above table i.e EMP write the queries for the following:
a) Find out the number of employees having “manager” as job.
b) Display only the jobs with maximum salary greater than or equal to 3000
c) Find all those employees whose job does not start with ‘M’.
d) Find the names of the employees whose name starts with ‘S’.
e) Find the names of the employees who are Managers and their date of joining is after
“02-Jan-2006”.
f) For describing the structure of the EMP table and DEPT table.
g) For getting the average salary of the employees from EMP table.
h) For displaying the current date and give the column a name “DATE”.
i) For converting the name of the employee into uppercase where the employee name
is “Santy”
j) Create a sequence with name SEQ_EMP , which will generate numbers from 1 to 99
in ascending order with an interval of 1. The sequence must
start from 1 after generating the number 99.
k) Displaying the names of the employees who have an a and an e in their names.
6. Considering the table DEPT in question 3, find the total number of departments.
7. Alter the EMP table for the changing the width of the field EmpID from 4 to 10.
8. .Alter the DEPT table for changing the width of the field No_of_Faculties from 2 to
4.
9. Delete all the records from the EMP table where the EmpName starts with “S”,
10. Insert some values in the PRODUCTS table created in Question 1 and then DROP
the table PRODUCTS.
13. Write a query to select all the records from the EMP table.
14. Write a query to select all the records from the DEPT table.
15. Write a query to select the distinct deptid from EMP table.
16. Write a query to find the name and salary of the employee from EMP table where
the salary is maximum.
17. Create a view amed v_EMP on the table EMP,DEPT by selecting the following
fields
Emp ID, Dept ID, Emp Name, Job
Where the EMP.Dept ID = DEPT. DeptId.
20. Create a trigger named “Client_Master” which keeps track of records deleted or
updated when such operations are carried out. Records in this table are
inserted into table “Audit” when database trigger fires due to an update or delete
statement fired on this table “Client”.
Table: Client
Column name Data type Size
Client_no Varchar2 6
Name Varchar2 20
Address Varchar2 30
Balance_Due Number 10,2
Write a sql query to drop the table EMP, can we drop a table with data in it.
Text Reading:
Elmasri & Navathe,” Fundamental of Database Systems”, Pearson Education, Seventh Edition, 2016
Korth & Sudarshan,” Database System Concepts”,TMH, Sixth Edition, 2010
C.J.Date,” An Introduction to Database System”, Pearson Education, Eighth Edition, 2009
References:
Bipin C Desai,” Introduction to Database Systems”, Galgotia publications, Revised Edition, 2010
Kevin Loney & Geroge Koch ,“Oracle 9i :The Complete Reference”, TMH Edition 2002
Ivan Bayross,” SQL,PL/SQL The Programming Language Of Oracle”, BPB Publications, Third Revised Edition, 2009.
Course Objectives :
The Objective of this course is to expose the students to the fundamentals and the concepts of Unix Operating System.
This course will prepare the students to work on UNIX ENVIRONMENT as a technical user or system administrator of a powerful, fast growing,
multitasking, open operating system which is currently used on all types of computers from micros to mainframes.
This course introduces students to the fundamentals of the UNIX/Linux operating system and shell programming. It provides an overview of the
history of UNIX/Linux and an explanation of operating systems. The course covers in detail basic commands, the vi editor ,the file structure, the
shell environment and shell scripts.
Pre-requisites:
Concepts of Operating System
Course Contents/Syllabus:
Weightage (%)
Module I : INTRODUCTION 15
Introduction to Operating System , History of Unix ,UNIX Family, Unix System Layered and Detailed Architecture: Concept of Files
in UNIX, Absolute Path and Relative Path , UNIX file system structure, Types of shells (Bourne, BASH, KORN,C), Process and
Process States , Inode, Introduction of basic system calls
Module II : UNIX COMMANDS 30
Telnet connect: Login, password, shell and commands, logout, current working directory, referring to home directories, Commands to
move around by path concept, creating new directories, creating files –touch , cat ; copying files; moving files, Deleting files and
directories; looking at files: cat, more, pg, less , head , tail; Cal, banner, file, wc, sort, cut, grep ,cmp, comm., diff ;Calculator: expr , bc
;Getting online help; manual pages ; listing commands , meta characters ,Wildcards; hidden files; Standard input and output;
redirecting input and output; filter; pipes; file permissions; user and group; Interpreting file permissions; Permission Dependencies;
Changing permissions, Setting Permissions. Managing file links; hard links; symbolic links; jobs and process: process ID; foreground
and background jobs; suspend and interrupt a process; killing jobs; changing password, exit.
Command mode, insert mode and last line mode; command to delete character, insert line; deleting text, command for moving the
cursor; including other files; running shell commands; getting vi help; search and replace commands; changing and deleting text,
Change word, Change line, Delete current line, Delete n lines, Delete remainder of Lines; copying and moving; Saving and Exiting.
Module IV : SHELL PROGRAMMING 30
Adding and Removing Users, Starting up and Shutting down the System, Disk Management, File System Mounting and Unmounting,
Monitoring System Usage, Ensuring System Security
List of Experiments:
1. Write a Shell Script that takes a search string and filename from the terminal & displays the results.
2. Write a Shell Script that takes pattern and filename as command line arguments and displays the results appropriately i.e. pattern found/pattern not
found.
3. Write a Shell Script that accepts only three arguments from the command line. The first argument is the pattern string, the second argument is the
filename in which the pattern is to be searches and the third argument is the filename in which the result is to be stored.
4. Write a Shell Script that accepts a filename as a command line argument and finds out if its a regular file or a directory. If its a regular file, then
performs various tests to see if it is readable, writeable, executable etc.
5. Write a Shell Script which creates the following menu and prompts for choice from user and runs the chosen command.
Today's date
Process of user
List of files
Quit to UNIX
6. Write a Shell Script that computes the factorial of a given number.
7. Write a Shell Script that works like a calendar reminding the user of certain things depending on the day of the week.
8. Write a Shell Script that changes the extension of a group of files from txt to doc
9. Write a Shell Script that accepts both filename and a set of patterns as positional parameters to a script.
10. Write a Shell Script which will redirect the output of the date command without the time into a file.
11. Write a Shell Script (using while loop) to execute endlessly (until terminated by user) a loop which displays contents of current directory, disk
space status, sleep for 30 seconds and display the users currently logged in on the screen.
12. Write a Shell Script that receives two filenames as arguments. It should check whether content of the two files is same or not. If they are same,
second file should be deleted.
13. If a number is input through the keyboard, WASS to calculate sum of its digits.
14. Write a Shell Script that performs a count-down either from 10 (default) or from the value that is entered by the user.
15. Write a Shell Script which takes a command line argument of Kms and by default converts that number into meters. Also provide options to
convert km to dm and km to cm.
16. Write a Shell Script using for loop, which displays the message "Welcome to the UNIX System"
17. Write a Shell Script to change the filename of all files in a directory from lower-case to upper-case.
18. Write a Shell Script that examines each file in the current directory. Files whose names end in old are moved to a directory named old files and
files whose names end in .c are moved to directory named programs.
19. Write a shell script to give the result of the student. Take marks of the five subjects , student name, roll no , percentage and show a message
whether a student gets division as per the following rules:
70% and above ---- distinction
60%-70% ------first division
40%-59% -----second
division Less than
40% ----- fail
20. Write a shell script which reports names and sizes of all files in a directory (directory would be supplied as an argument to the shell script)
whose size is exceeding 1000 bytes. The filenames should be printed in descending order of their sizes. The total number of such files should
also be reported.
21. WASS for renaming each file in the directory such that it will have the current shell PID as an extension. The shell script should ensure that the
directories do not get renamed.
22. WAP to calculate and print the first m Fibonacci numbers.
23. WASS that will receive any number of filenames as arguments. The shell script should check whether such files already exist. If they do, then it
should be reported. The files that do not exist should be created in a sub-directory called mydir. The shell script should first check whether the
sub-directory mydir exists in the current directory. If it doesn’t exist, then it should be created. If mydir already exists, then it should be
reported along with the number of files that are currently present in mydir.
24. A shell script receives even number of filenames. Suppose four filenames are supplied, then the first file should get copied into second file, the
third file should get copied into fourth and so on. If odd number of filenames is supplied then no copying should take place and an error
message should be displayed.
25. WASS to identify all zero-byte files in the current directory and delete them. Before proceeding with deletion, the shell script should get a
confirmation from the user.
26. WASS to compute the GCD and LCM of two numbers.
27. Two numbers are entered through the keyboard. WAP to find the value of one number raised to the power of another.
28. WASS that prompts the user for the password. The user has maximum of 3 attempts. If the user enters the correct password, the message
“Correct Password” is displayed else the message “Wrong Password”.
29. WASS that repeatedly asks the user repeatedly for the “Name of the Institution” until the user gives the correct answer.
30. WAP to generate all combinations of 1, 2 and 3 using for loop.
Text Books :
Reference Books :
2. “Unix: Concepts and Application”, Sumitabha Das, TMH, Second Edition, 1998
3.“Linux Programming by Examples: The Fundamentals”, Arnold Robbins, Pearson Education, First
Edition, 2004 4.“Design of the Unix operating System” , Maurice J. Bach ,PHI, First Edition, 1986
5.Unix Shell Programming, by Stephen G. Kochan and Patrick Wood , Pearson Education ,3rd edition , 2007
6. Introduction to UNIX , David I. Schwartz , Pearson Education , Second Edition , 2009
7. UNIX SHELLS by Example, Ellie Quigley , Prentice Hall, Fourth Edition, 2008
Course Title: PYTHON PROGRAMMING
Course Contents/Syllabus:
Weightage (%)
Module I: Introduction 15
Basic concepts: Functional Programming, OOPS and Data Structures
Getting Started: Running Code in the Interactive Shell, Input, Processing and Output, Editing, Saving and Running a Script, Working of
Python.
Variables, Expressions and Statements: Values and Data Types, Variables, Keywords, String Literals, Escape Sequences, Operators and
Operands, Expressions and Statements, Interactive mode and Script mode, Order of Operations, Comments
Module II: Conditional Statements and Loops 15
Modulus Operator, Boolean Expressions, Logical Operators, Conditional Execution “if statement”, Alternative
Execution “else clause”, Chained Conditionals “elif clause”, Nested Conditionals, while statement, For loop, Break and
Continue Statement
Module III: Functions and Recursion 25
Function Calls, Type Conversion Functions, Math Functions, Composition, Adding new functions, Parameters and 25
Arguments, Stack Diagrams, Importing modules with “from”, Recursion, Stack Diagram for Recursive Functions,
Infinite Recursion
String Functions: Traversal, Comparison, Searching, Counting, Pre-defined String Functions, In Operator
Module V: Files 20
Text files and their Formats, Reading from a file, Writing to a file, Accessing and Manipulating Files and Directories on
the Disk, Format Operator, Filenames and paths Exception Handling: Errors, Exceptions, Handling Exceptions, Raising Exceptions, Try.
Finally, The with Statement, Catching Exceptions, Databases, Pickling, Pipes
Lab/Practical details:
List of Experiments:
1. Start the Python interpreter and type help(‘print’) to get information about the print statement.
2. If you run a 10-kilometer race in 43 minutes 30 seconds, calculate your average time per mile and your average speed in miles per hour using
Python
Calculator. (Hint: there are 1.61 kilometers in a mile).
3. Write a function to calculate the square of first n natural numbers.
4. Write a function that draws a grid like the following:
+ - - - -+ - - - -+
| | |
| | |
| | |
| | |
+ - - - -+ - - - -+
| | |
| | |
| | |
| | |
+ - - - -+ - - - -+
5. Write a function that takes four parameters—a, b, c and n—and then checks to see if Fermat’s theorem, an + bn = cn, holds. If n is greater than
2 and it
turns out to be true then the program should print, “Holy smokes, Fermat was wrong!” Otherwise the program should print, “No, that doesn’t
work.”
6. Write a function that takes a string argument and returns true if it is a palindrome and False otherwise.
7. A number, a, is a power of b if it is divisible by b and a/b is a power of b. Write a function that takes parameters a and b and returns True if a
is a power
of b.
8. Write a recursive function to calculate the factorial of a given number.
9. Write a function that takes a string as a parameter. Calculate the length of a string without using len function. Print the length concatenated
with the
string and aligned towards the extreme right of the output screen.
10. ROT13 is a weak form of encryption that involves “rotating” each letter in a word by 13 places. To rotate a letter means to shift it through the
alphabet,
wrapping around to the beginning if necessary, so ’A’ shifted by 3 is ’D’ and ’Z’ shifted by 1 is ’A’. Write a function that takes a string and
an integer
as parameters, and then returns a new string that contains the letters from the original string “rotated” by the given amount. Use the built-in
functions
ord, which converts a character to a numeric code, and chr, which converts numeric codes to characters.
11. Write a function that takes a nested list of integers and add up the elements from all of the nested lists.
12. Write a function called middle that takes a list and returns a new list that contains all but the first and last elements. So middle ([1, 2, 3, 4])
should return
[2, 3].
13. Write a program to print the keys of the dictionary and their values in an alphabetical order.
14. Write a function that takes any number of arguments and returns their sum.
15. Write a program that reads words.txt and prints only the words with more than 20characters (not counting white space).
Kenneth A. Lambert, The Fundamentals of Python: First Programs, 2011, Cengage Learning, ISBN: 978-1111822705.
Python Crash Course: A Hands-On, Project-Based Introduction to Programming (2nd Edition) Author: Eric Matthes.
Head-First Python: A Brain-Friendly Guide (2nd Edition)
Learn Python the Hard Way: 3rd Edition.
Python Programming: An Introduction to Computer Science (3rd Edition)
Course Title: IT Project Management
Course Objectives:
1. The course presents a new management framework uniquely suited to the complexities of modern software development.
2. The course provides a clear and proactive discussion of the economic, metrics and management strategies needed to plan and execute a
software project successfully.
3. This course also covers all the qualitative and quantitative aspects of project management with a practical treatment (case studies) of many
managerial issues.
4. Knowledge of Project Risk Management
5. Knowledge of Quality Assurance related to Project implementation
Descriptors/Topics
Descriptors/Topics
Level of Responsibility for Control- Business & Product Quality Controls,
Integrated change control during the life of the project,
Performance reporting, Deviation from specification,
Errors & Quality Control
Text Reading:
1. Launching New Ventures: An Entrepreneurial Approach, 5th Edition, Kathleen R. Allen University of Southern California, ISBN-
13: 9780547014562
2. Entrepreneurship: creating and managing new ventures, Bruce Lloyd, Pergamon Press, ISBN 0080371086
3. Start Run & Grow: A Successful Small Business, CCH, CCH Tax and accounting ,ISBN 0808012010
4. Managing New Ventures: Concepts and Cases in Entrepreneurship, By Anjan Raichaudhur, PHI, ISBN 978-81-203-4156-2
5. Technology Ventures: From Idea to Enterprise, Thomas H. Byers, Richard C. Dorf, Andrew Nelson, Science Engineering & Math;
Pre-requisites: None
Course Contents/Syllabus:
Weightage (%)
Module I: Introduction 20
Defining the cloud for the Enterprise: Database as a service, Governance/Management as a service, Testing as a
service, Storage as a service , Cloud service development, Cloud Computing Challenges Layers of Cloud
Computing, types of cloud computing, Cloud Computing Features, Cloud Computing Security requirements, pros
and cons, benefits
Module II: Cloud Computing For Everyone 25
Centralizing email communications, cloud computing for community Collaborating on Schedules, Collaborating on
Grocery Lists, Collaborating on To-Do Lists Collaborating on Contact Lists, Collaborating on schedules,
collaborating on group projects and events, cloud computing for corporation, mapping ,schedules managing
projects, Collaborating on Marketing Materials, Collaborating on Expense Reports, Collaborating on Budgets,
Collaborating on Financial Statements, Presenting on the Road, Accessing Documents on the Road.
Module III: Brining Governance to the clouds 15
People and processes, Governance for the clouds, Creating the Governance model: Define Polices, design Polices, Implement policies,
Governance technology.
Module IV: Working from your Services to Clouds and Cloud Services 25
Descriptors/Topics Descriptors/Topics
Defining Meta Services and Service, Creating the service directory, Collaborating on calendars, Schedules and task
management, exploring on line scheduling and planning, collaborating on event management, collaborating on
contact management, collaborating on project management, collaborating on word processing, spreadsheets, and
databases.
Module V: Outside Cloud Storing and Sharing 15
Evaluating on line file storage ,Evaluating web conference tools ,Evaluating web mail services, Evaluating instant
messaging, creating groups on social networks, Evaluating on line groupware, collaborating via blogs and wikis ,
Understanding cloud storage, exploring on line book marking services, exploring on line photo editing applications,
exploring photo sharing communities, controlling it with web based desktops.
# Course Title
1 Course Objectives:
This course is aim to produce graduates with a broad range of digital marketing, in
addition to an in-depth understanding of how digital marketing is revolutionizing the
current industry. The focus of the course is on how to make students more effective in
how they conduct business in the digital age. This requires a fundamental understanding of
the technologies and platforms that form the backbone of electronic commerce.
Search Engine Optimisation - Site Supports, Sitemaps, XML Sitemap, Webmaster Tools, Website
Engagement, User Experience, User Engagement, Site Speed, 404 errors , SEO Tools
Search Marketing (PPC)-Quality score explained, conversion tracking, Understanding CPA
Issues, Ad positioning strategy Bidding approaches
6 Module III: Digital Display Marketing
How to find suitable websites, researching publishers and websites, Google Display Planner tool,
publisher and website resources, match audience with publisher
7 Module IV: Email Marketing, Social Media Marketing and Mobile Marketing
Email Marketing - Section 4 - When to Deliver, Email Reports and Analytics
Social Media Marketing - Google+, Circles, Google+ Hangouts, Google+ Communities, +1
Button Google+ Definition, Google+ Chat, Google+ Business Pages, Google+ Plugins, Facebook
Pages, Business Advertising using Facebook, Google Analytics
Mobile Marketing - mobile search analytics, in-app analytics, mobile site analytics, flurry,
distimo, google, analytics dashboard, mCommerce, voice input, geo-location, privacy, data
protection, copyrights, information sources, mobile events.
8 Module V: Analytics and Strategy & Planning
Analytics - PPC conversion rate?, PPC Geo Locations, PPC Ecommerce report, What PPC
phrases are working?, PPC phrases assisting conversions, PPC Analysis
Strategy & Planning
Text & References:
Audience: Marketing in the Age of Subscribers, Fans and Followers [Kindle Edition] by Jeffrey K. Rohrs.
Understanding Digital Marketing: Marketing Strategies for Engaging the Digital Generation Paperback – Import, 3 Jun 2014
by Damian Ryan
The Art of Social Media “Power Tips for Power Users” by Guy Kawasaki and Peg Fitzpatrick
http://digitalmarketinginstitute.com/subject-matter-experts/barry-adams
http://digitalmarketinginstitute.com/topics/introduction-to-digital-marketing
http://digitalmarketinginstitute.com/courses/pay-per-click-marketing-google-adwords
5th Semester
Course Title: Introduction to Artificial Intelligence
Course Objectives: The primary objective of this course is to provide an introduction to the basic principles, techniques, and applications of
Artificial Intelligence.The emphasis of the course is on teaching the fundamentals and not on providing a mastery of specific commercially
available software tools or programming environments.
Upon successful completion of the course, students will have an understanding of the basic areas of artificial intelligence search, knowledge
representation, learning and their applications in design and implementation of intelligent agents for a variety of tasks in analysis, design, and
problem- solving. Aim of this course is to know about Lisp and Prolog and use of these languages in AI. Graduate students are expected to develop
some familiarity with current research problems and research methods in AI by working on a research or design project
Pre-requisites:
Course Contents/Syllabus:
Weightage (%)
Module I Introduction to AI and Problem Representation: 25%
Descriptors/Topics
:
Introduction: Artificial Intelligence (AI) and its importance, AI Problems (tic tac toe problem, water jug problems),
Application area of AI. Problem
Heuristic Search Techniques :AI and search process, brute force search, depth-first search, breadth-first search, time
and space complexities, heuristics search, hill climbing, best first search, A* algorithm and beam search, AO search,
constraint satisfaction.
Descriptors/Topics
. Game Playing: AI and game playing, plausible move generator, static evaluation move generator, game playing
strategies,problems in game playing.
Logic: Prepositional logic: syntax and semantics, First Order Predicate Logic (FOPL): Syntax and semantics,
conversion to clausal form, inference rules, unification, and the resolution principles
Text Reading:
i. Elaine Rich, Kevin Knight, Artificial Intelligence TMH (Any Edition).
ii. Max Barber,Logic Programming with Prolog,Springer,2013
References:
iii. Dan W. Patterson, Introduction to AI and Expert System, PHI
iv. V S Janakiraman, K Sarukesi, P Gopalakrishan, Foundations of Artificial Intelligence and Expert Systems, Macmillan India Ltd
v.
Additional Reading:
i. Introduction to Artificial Intelligence by Wolfgang Ertel and Nathanael T. Black ,springer ,2017
ii. V S Janakiraman, K Sarukesi, P Gopalakrishan, Foundations of Artificial Intelligence and Expert Systems, Macmillan India Ltd.
Course Objectives:
Aim of this course is to discuss and explain about the basics of the Internet and Internet of Things.
Some of the major topics which are included in this course are overview, applications, potential & challenges, and architecture of Internet of
Things with Privacy and Ethical issues.
This course will examine and discuss IoT technology and market specific topics, relevant case studies of IoT.
Course Contents/Syllabus:
Weightage (%)
Module 1: Introduction
IoT definitions: overview, applications, potential & challenges, and architecture, The IoT paradigm - Smart objects,
20%
Related Technologies, Ubiquitous Computing, Pervasive Computing, Ambience Intelligence.
PDSA-1
Module 2: Internet in general and Internet of Things
Layers, protocols, packets, services, performance parameters of a packet network as well as applications such as 20%
web, Peer-to-peer, sensor networks, and multimedia.
PDSA-II
References:
https://www.cisco.com/web/about/ac79/docs/innov/IoE.pdf
http://www.ipso-alliance.org/wp-content/media/6lowpan.pdf
Course Objectives:
The course provides students with:
1. The basic concepts of ERP systems for manufacturing or service companies, and the differences among ( Material Requirement Planning)
MRP, MRP II, and ERP systems;
2. Thinking in ERP systems: the principles of ERP systems, their major components, and the relationships among these components;
3. in-depth knowledge of major ERP components, including material requirements planning, master production scheduling, and capacity
requirements planning;
4. Knowledge of typical ERP systems, and the advantages and limitations of implementing ERP systems.
5. Knowledge of SCM, BPR
Pre-requisites: Nil
Course Contents/Syllabus:
Weightage (%)
Module I Introduction to Enterprise Resource Planning
Descriptors/Topics 20%
Introduction of the term Business Process Reengineering(BPR) ,BPR Methodology, Current BPR Tools
,Introduction to material requirement planning (MRP), Definition of Enterprise Resource Planning (ERP); Evolution
of ERP; Characteristics, Features, Components and needs of ERP; ERP Vendors; Benefits & Limitations of ERP
Packages
Module II Enterprise Modeling and Integration of ERP 20%
Descriptors/Topics
Need to focus on Enterprise Integration/ERP; Information mapping; Role of common shared Enterprise database;
System Integration, Logical vs. Physical System Integration, Benefits & limitations of System Integration, ERP’s
Role in Logical and Physical Integration
Module III ERP Architecture and Implementation Methodology of ERP 20%
Descriptors/Topics
Generic Model of ERP system; Core Modules functionality; Types of ERP architecture, Client Server Architecture,
Web-based Architecture, Service Oriented Architecture (SOA) ; Difficulty in selecting ERP, Approach to ERP
selection, Request for Proposal approach, Proof-of-Concept approach; General Implementation Methodology of
ERP, Vanilla Implementation; Evaluation Criteria of ERP packages; Project Implementation Team Structure
Definition of Supply Chain Management (SCM); Stevens Model of Supply Chain Management; Aims of SCM;
SCM Key Drivers; Key Issues, Benefits of SCM; ERP Vs SCM, Key SCM Vendors.
Module V 20%
Descriptors/Topics
Introduction to SAP; SAP architecture, Scalability, SAP R/3 System and mySAP; Integrated SAP Model; A
Comparative assessment of ERP Packages
Text Reading:
1. Enterprise Systems For Management, Luvai F. Motiwalla, Jeff Thompson, Pearson Education., 2nd Ed., 2011.
2. Enterprise Resource Planning, Ravi Shankar, S.Jaiswal, Galgotia Publication Pvt. Ltd., 1st Ed., 1999.
3. Enterprise Resource Planning – Concepts and Practices by Vinod Kumar Garg & N K Venkatakrishna, PHI
4. Textbook of Enterprise Resource Planning by Mahadeo Jaiswal & Ganesh Vanapalli, Macmillan, 1/e 20
References:
1. CRM at the speed of Light : Social CRM strategies, tools and techniques for engaging your customers : 4th edition by Paul Greenberg ,
McGraw Hill ,2009
2. Supply Chain Management Casebook : The Comprehensive Coverage and Best Practices in SCM , by Chuck Munson , Pearson FT Press
2013
3. Definitive Guide to Supply Chain Best Practices, The Comprehensive Lessons and Cases in Effective SCM , by Robert Frankel , Pearson
FT Press , 2014
5. Supply Management, David Burt, McGraw Hill Publications, 8th Ed., 2010
Additional Reading:
1. www.sap.com
2. www.oracle.com
3. www.microsoftdynamic.com
4. www.ssagglobal.com
5. www.epicor.com
Any other Study Material:
“ The Mobile ERP Revolution” , Compare Business Products
“ Solving Real Business Issues During the ERP Selection Process” , Sage
http://www.erpgenie.com/publications/magazines.htm
Additional study materials if required and found suitable will circulated in the form of cases from HBS, and other selected sources, relevant
videos of solutions providers and from other sources as selected by the faculty
Course Contents/Syllabus:
Weightage (%)
Module I Data Warehouse fundamentals 20
Defining the cloud for the Enterprise: Database as a service, Governance/Management as a service, Testing as a
service, Storage as a service, Cloud service development, Cloud Computing Challenges Layers of Cloud
Computing, types of cloud computing, Cloud Computing Features, Cloud Computing Security requirements, pros
and cons, benefits
Module II Principles of dimensional modeling 20
Identifying Facts and Dimensions, Designing Fact Tables, Designing Dimension Table, Data Warehouse Schemas,
OLAP Operations, Data Extraction, Cleanup & Transformation, Star, snowflake and galaxy schemas for
multidimensional databases.
Architecture for a warehouse, Steps for construction of Data Warehouses, Data Marts, Metadata. Different OLAP
operations, OLAP Server: ROLAP, MOLAP and HOLAP
Course Objectives :
This course intends to describe that the scope of e-Commerce market has evolved beyond the narrow buying and
selling of goods to include services of all kinds including entertainment and communications that is making e-Commerce
an integral part of everyone’s dailylife.
This course will help the students to recognize that today the extended scope of eCommerce provides the
opportunity to substantially enhance the daily lives of all individuals.Case studies based on Internet Marketing ,
Mobile Commerce, On-line education , EDI , e-banking understanding will prepare the students for current and
futurescenario
The course is designed to help the student use theoretical frameworks of e-Commerce Infrastructure and major
trends in e- Commerce virtual world to interpret case studies and implement the learnings in real-life scenarios on
day to daybasis.
Pre-requisites: Student should be interested in surfing Internet and should have a willingness to develop the awareness and
understanding of current and future market when technology is in the palm/pocket.
Course Contents/Syllabus:
Weightage (%)
Module I 15%
E-Commerce : A Revolution
Traditional commerce – an overview, Growth of Internet and the web, What is E-commerce? Origin and growth of e-commerce ,
Comparison between Traditional and Electronic commerce, advantages and Issues in electronic commerce , relation between e-
Commerce and e-Business , digital convergence, Unique features of E-commerce technology: Ubiquity,Global reach, Universal
standards, Richness ,Interactivity, Information Density,Personalization/customization,Social technology , Introducing Types of e-
commerce , case study of traditional commerce vse-commerce
Module II 25%
E-commerce business Models and concepts :
Eight key elements of a Business model: value proposition, Revenue model, Market opportunity, competitive environment,
competitive advantage, market strategy, organizational development, management team ; Business –to – Consumer (B2C) Business
Model :e-tailer ,Business-to –Business (B2B) business model : E-distributor, e-Procurement, introduce supply chain management
(SCM) ,Consumer-to-Consumer (C2C) Business Model , case study on Peer-to-Peer(P2P) Business model, Introduction of M-
Commerce business models, Government –to – Citizenmodel.
Ecommerce framework, Terms related to Internet Technology : Internet protocols, DNS, URLs, Client/Server computing ,
Markup languages, Web servers and clients , web browsers, search engine, Intelligent agents (Bots), online forums and chat ,
blogs, podcasting, Internet telephony, Video
Conferencing.
What is Information Super highway? Components of I-Way(Information Super Highway) , Public policy issues shaping the I-
Way , Internet , Intranet and Extranet. How and why wireless technology is employed? Wireless
Application Protocol benefits and limitations, mobile banking , case study of mobile commerce
Module IV 20%
Module V 10%
E-Commerce PaymentSystems:
Traditional payment methods, Online Credit card Transactions, Credit card E-Commerce enablers, digital wallets, digital cash,
digital signatures ,electronic billing presentment and payment , Introduction to Electronic DataInterchange(EDI)
Course Learning Outcomes:
By the end of this course , student would be able to :
o Identify the nature ofe-Commerce
o Recognize the business impact and potential ofe-Commerce
o Explain the technologies required to make e-Commerceviable
o Discuss the current drivers and inhibitors facing the business world in adopting and usinge-Commerce
o Explain the economic consequences ofe-Commerce
o Discuss the trends in e-Commerce and use of Internet for Communication, shopping and socialnetworking
Text Books :
1. E-Commerce Essentials by Kenneth Laudon and Carol Traver ISBN-10 :0133544982 Prentice Hall,2013
References :
rd
1. The Social Media Bible : Tactics, Tools and Strategies for Business Success 3 edition by
Lon Safko Publisher : Wiley,2012
2. Introduction to E-Commerce : 3rd Edition by Efraim Turban, David King, Judy Lang ; Publisher
Prentice Hall,2010
3. CRM at the speed of Light : Social CRM strategies, tools and techniques for engaging your
customers : 4thedition by Paul Greenberg , McGraw Hill,2009
4. E-Business and e-Commerce How to Program : 1st edition byy Harvey M. Deitel Publisher :
Prentice Hall,2000
5. Digital Capital : Harnessing the Power of Business Webs : 1st edition by Cheryl Kimball
publisher: EntrepreneurPress,2000
6. E-Business Strategies for Virtual Organizations by Janice Burn , Publisher Taylor andFrancis,2001
7. E-Enterprise : Business Models, Architecture , and Components :1st edition by Faisal Hoque ,
Publisher : Cambridge UniversityPress,2000
IEEE Xplore: Business Models for Mobile Commerce services” requirement , design and the
Future by UpkarVarshney ,Georgia Stateuniversity
Course Title:Cyber and Information Security
Course Objectives:
To provide a broad understanding of Cyber and Information Security.
To provide the student with basic knowledge of cybercrime dynamics, cyber law & Intellectual property
issues; explore legal & policy developments for dealing fraud using Cyber space.
Pre-requisites: NIL
Course Contents/Syllabus:
Weightage (%)
Module I Introduction
Descriptors/Topics
Introduction to Information, Computer and Network Security,
Security Concepts, kinds of security breaches,
Threats and Risks, Point of vulnerability, 10%
Attacks- Passive and Active, Security Services, Confidentiality, Authentication, Non-Repudiation,
Integrity, Access Control, Availability,
Model for Internetwork Security, Internet Standards and RFCs
Module II Cyber security
Descriptors/Topics
Sources of security threats, Motives, Target Assets, 20%
Consequence of threats, E-mail threats, Web threats, Hacking, Intruders, Insider threats
Cyber Squatting, Cyber Stalking, Crime of deception, Content Oriented Online Crime, Malicious
Software use and detection,
Cyber Terrorism, Information warfare and surveillance, Virtual Crime, Online Frauds
Identity Theft and Intellectual property theft, Network threats-Worms, Virus, Spam’s, Ad-ware, Spy ware,
Trojans and convert Channels, Backdoors, Bots, IP spoofing, ARP spoofing,
Session hijacking, Sabotage, phishing, Zombie/Zombie Drone.
Module IV Cryptography
Descriptors/Topics
Introduction to Cryptography
E-Commerce Security
Message Authentication, Hash functions, Hashes and Message Digests
Number Theory for Information Security 20%
Public Key Algorithms, Public-key Infrastructure, PKI Applications
Cryptographic Protocols, Digital Signature
Digital Watermarking and Steganography
Biometric Security
Encryption, Symmetric Key Encryption, Data Encryption Standard (DES), Kerberos
Module V Security Risk Management
Descriptors/Topics
Introduction to Security Risk Management, risk assessment,
Security Assurance Approaches: OCTAVE and COBIT approaches.
Security Management of IT Systems: Network security management, Firewalls, IDS and IPS 20%
configuration management.
Web and wireless security management.
Security Models, Access control models, role-based and lattice models.
Computer security log management, malware handling and vulnerability management programs.
Specifying and enforcing security policies,
Information security audit and principles of audit.
Information Security Standards and Compliance: Overview of security standards ISO 17799 Standard,
Legal and Ethical issues, PCI DSS, ISO27001.
Module VI Case Studies 10%
Descriptors/Topics
Case Studies: Ransomware Evolution, AI Expansion, IOT Threats, Blockchain Revolution, Serverless
Apps Vulnerability etc.
Course Objectives: Electronic Governance (e-Governance) seeks to transform public service delivery and citizens' participation in
government decision processes for both social and economic benefits.
This course aims to appraise the role of latest technologies in empowering Digital India Initiative
Pre-requisites: NIL
10%
Module V : E-Governance Portals around the Globe
Study of e-Governance models of different countries
Case Studies of e-Governance outside India
Pedagogy for Course Delivery: The course joins together Highly Interactive Lectures, Case studies, Quiz, interacting with e-Governance project experts in the
field /through guest lectures /seminars/workshops and understudy presentations. Blended /Flipped mode of discussions form an important part of the learning experience.
The readings for the course are attracted from text books , journals and new innovative ideas /articles published by experts of the e-Governance technical and administration
experts.
Text Books:
1. E-governance for Development: A Focus on India , Shirin Madon , Palgrave Macmillan , 2009
2. eGov 2.0 Policies, Processes & Technologies ,JaiJit Bhatacharya , Tata McGraw Hill , 2012
3. E-governance: case studies, Ashok Agarwal, University Press India, 2007
4. E-government: from vision to implementation: a practical guide with case studies, Subhash C. Bhatnagar, SAGE , 2004
5. E-Governance: Concepts And Case Studies, C.S.R. Prabhu ,PHI ,2011
6. E-Government: The science of the Possible, J. Satyanarayana , PHI, 2006
7. IT-e-Governance in India Kamalesh N. Agarwala, Murli D. Tiwari , Macmillan , 2002
References:
1. Electronic Governance and Cross-Boundary Collaboration: Innovations and Advancing Tools ,Yu-Che Chen (Northern Illinois University,
USA) and Pin-Yu Chu (National Chengchi University, Taiwan), Publisher: Information Science Reference, 2011
2. Public Information Technology and E-Governance: Managing the Virtual State by G. David Garson, Publisher: Jones & Bartlett Learning,
2006
3. Global e-Governance: Advancing e-Governance Through Innovation and Leadership , by J Tubtimhin, Publisher: IOS Press, 2009
4. Innovations In e-Government: Governors And Mayors Speak-Out ,By Erwin Blackstone, Michael Bognanno & Simon Hakim
5. E-governance: A Global Perspective on a New Paradigm , edited by Toshio Obi, Publisher: IOS Press, 2007
6. Governance and Information Technology From Electronic Government to Information Government edited by Viktor Mayer-
Schönberger and David Lazer, Publisher: Massachusetts Institute of Technology, 2007
1 Course Objectives:
Blockchain and Cryptocurrency is vastly discussed now days in all research domains to
bring the decentralization. This course is to understand Blockchain and its main
application cryptocurrency. Students will learn how this system works and how can
they utilize and what application can be build. After successful completion of this
course, students will be familiar with blockchain and cryptocurrency concepts.
2 Pre-requisites: Networks
4 Weightage (%)
Module I : Introductions 20
Basics: Distributed Database, Two General Problem,
Byzantine General problem and Fault Tolerance, Hadoop
Distributed File System, Distributed Hash Table, ASIC
resistance, Turing Complete. Cryptograpy: Hash function,
Digital Signature - ECDSA, Memory Hard Algorithm, Zero
Knowledge Proof.
Course Objective:
The aim of the course is to
Introduce students to rapidly growing field and equip them with some of its basic principles and tools as well as its general mindset.
To learn concepts, techniques and tools they need to deal with various facets of data science practice, including data collection and
integration, exploratory data analysis, predictive modeling, descriptive modeling, data product creation, evaluation, and effective
communication.
Application to solving problems.
Prerequisites:
Basic knowledge of algorithms and reasonable programming experience
Basic linear algebra (solution of linear systems and eigenvalue/vector computation)
Basic probability and statistics
Describe what Data Science is and the skill sets needed to be a data scientist.
Explain in basic terms what Statistical Inference means. Identify probability distributions commonly used as foundations for statistical
modeling. Fit a model to data.
Explain the significance of exploratory data analysis (EDA) in data science.
Describe the Data Science Process and how its components interact.
Apply basic machine learning algorithms (Linear Regression, k-Nearest Neighbors (k-NN), k-means, Naive Bayes) for predictive
modeling.
Identify common approaches used for Feature Generation.
Identify and explain fundamental mathematical and algorithmic ingredients that constitute a Recommendation Engine
Create effective visualization of given data (to communicate or persuade).
Work effectively in teams on data science projects.
Reason around ethical and privacy issues in data science conduct and apply ethical practices.
Introduction to Data Science, Big Data and Data Science, Statistical Inference - Populations and samples -
Statistical modeling, probability distributions, fitting a model, Introduction to R, Information Visualisation
Module II: (Weightage 20%)
Exploratory Data Analysis and the Data Science Process - Basic tools (plots, graphs and summary statistics) of
EDA, Philosophy of EDA, The Data Science Process Basic, Machine Learning Algorithms - Linear Regression,
- k-Nearest Neighbors (k-NN), k-means, Naive Bayes, SVM
Module III: (Weightage 20%)
Feature Generation (role of domain expertise) and Feature Selection algorithms: Filters; Wrappers; Decision
Trees; Random Forests
Module IV: (Weightage 20%)
Text mining and information retrieval, Big Data Fundamentals and Hadoop Integration with R, Introduction to
Neural Networks, Data Science and Ethical Issues
References Books:
Cathy O’Neil and Rachel Schutt. Doing Data Science, Straight Talk From The Frontline. O’Reilly. 2014.
James, G., Witten, D., Hastie, T., Tibshirani, R. An introduction to statistical learning with applications in R. Springer, 2013.
Han, J., Kamber, M., Pei, J. Data mining concepts and techniques. Morgan Kaufmann, 2011.
Hastie, T., Tibshirani, R., Friedman, J. The Elements of Statistical Learning, 2nd edition. — Springer, 2009.
Course Objectives: The objective of this course is to provide students with the basic principles, issues, trends, and
practices of Human Resource Management and to develop an understanding about how an organization manages its people
effectively.
Pre-requisites: The students should have the knowledge of basic concepts and processes of management. They should
also know the various functions which are performed in an organisation.
Course Contents/Syllabus:
Text
VSP Rao, Human Resource Management, Excel Publications
Shikha Kapoor , Human Resource Management (Text and Cases)Taxmann Publication Pvt Ltd
K Aswathappa; Human Resource and Personnel Management; McGraw- Hill Companies
References:
Garry Dessler, Human Resource Management, Pearson Publications
Edward, B Flippo, Personnel Management, Mc Graw Hill International Ed.
VSP Rao, Human Resource Management, Excel Publications
K Aswathappa; Human Resource and Personnel Management; McGraw- Hill Companies
Dale Yoder, Personnel Management and Industrial Relation,
Monappa & Sayiaddin, Personnel Management, Vikas Publishing Company
Desimone; Human Resource Development, Thomson Learning
Bohlander; Managing Human Resources; Thomson Learning. Ed. 13 2004