GE6151 Uw
GE6151 Uw
GE6151 Uw
MCA Structure
Scheme of Instruction and Evaluation
I-VI Semester of MCA Programme
Choice Based Credit System
1st year MCA
Sixth Semester
Training cum Project Evaluation Scheme
Code Course Name Hours/week Credit Total Marks
L/T Theory Marks
MCA Industrial 30 20 1000 Evaluation by the 500
601 Training cum Industry
Project/
Entrepreneurship
Training cum Evaluation by the 500
Project Institute
(Report & Institute Viva)
Total 30 20 1000 1000
Total Marks:1000
Total Credits:20
Note- Minimum Pass Mark from Industry Evaluation is 300 (i.e. 60%).
Reference Books:
1. William Stalling,“Computer Organization and Architecture”, Pearson Education
2. J. P. Hayes, “Computer Architecture and Organization",MGH
3. A.S. Tananbaum, “Structured Computer Organization”, Pearson Education
FIRST SEMESTER MCA SYLLABUS FOR ADMISSION BATCH 2016-17
This course will give a high level understanding of what information is, what business is and how information is
key to successful execution of a business. It will help understanding the evolution of information system from a
traditional way of dealing with information to a level how information is a business enabler. It also covers the
tools and techniques deployed to expedite the information processing and controlled dissemination of
information.
References
1. Management Information Systems by Kenneth C Laudon- Prentice Hall.
2. Business Information Systems by Robert C Nickerson, Prentice Hall
FIRST SEMESTER MCA SYLLABUS FOR ADMISSION BATCH 2016-17
References:
1. Numerical Methods for Scientific and Engineering Computation by M.K. Jain, SRK
Iyengar and R.K.Jain
2. Numerical Methods for Engineers by S.C. Chopra and Raymond P. Canale
3. Introductory Methods of Numerical Analysis by Sastry
4. Numerical Analysis by E.W. Cheney and D.R.Kincaid
FIRST SEMESTER MCA SYLLABUS FOR ADMISSION BATCH 2016-17
Module 1 (8 Hours)
Introduction to Economics: definition, scope and nature of economics, consumption laws,
demand & supply analysis, elasticity of demand, indifference curve analysis, consumer
surplus and its application.
References:
1. Koutsoyiannis, A., ‘Modern Microeconomics’, English Language Book Society,
Macmillan.
2. Pindyck, R S, Rubinfeld, D L &Mehta , ‘Microeconomics’, 6 th Edition, Pearson
Education India.
3. Varian, H R, ‘Intermediate Microeconomics’, 7th edition, East West Press India.
4. Samuelson, Paul A, ‘Economics’, 5th edition, McGraw Hill New York.
5. Basics of Engineering Economy; Leland Blank and Anthony Tarquin, TMH
6. Contemporary Engineering Economics, Chan. S Park, Pearson
7. Engineering Economics, Paneerselvam, PHI
8. Engineering Economics; Sasmita Mishra, PHI
FIRST SEMESTER MCA SYLLABUS FOR ADMISSION BATCH 2016-17
Objectives:
To develop communication skills and soft skills of students
To enhance the ability of students to participate in group discussions and personal interviews
Practical
MCA 101 PROGRAMMING IN C LABORATORY
I–CYCLE: DigitalLogicDesignExperiments:
II–CYCLE: 8085AssemblyLanguageProgramming:
1. 8085AssemblyLanguageProgrammingaccordingtotheorycourse microprocessors-
usingthefollowingtrainers:KeyboardMonitorof8085µPTrainer.SerialMonitorof8085µPTraine
rwithTerminal
8085LineAssemblerof8085µPTrainerwithPCasTerminal8085CrossAssemblerusingIn-
CircuitEmulator(ICE)with8085µPTrainerandPCasTerminalGradedProblemsaretobeusedacc
ordingtothesyllabusof
2. COMPUTER ORGANIZATION
PentiumclassPCarchitecturefamiliarizationhardware&softwarepartsdemonstration,
Troubleshooting of PC,Laptops, Server and Loading of Operating System, Antivirus and
other software packages
FIRST SEMESTER MCA SYLLABUS FOR ADMISSION BATCH 2016-17
COURSE/LAB OUTLINE
1. Understanding business communication
2. Work-team communication
3. Communication technology
4. Developing business writing skills
5. Writing basic correspondence (routine, persuasive, and bad-news messages)
6. Report writing
7. Oral and employment communication
SECOND SEMESTER MCA SYLLABUS FOR ADMISSION BATCH 2016-17
Exceptions: Using assert signal. throwing exceptions, Try Blocks, handlers, Exception
specification, standard exceptions and uses.
I/O streams: Output and Input class streams, Ostream, Istream, File handling, using strings
as streams
Portion covered can be tested through Internal evaluation only not to be included in
University examination)
TEXTBOOKS
1.ObjectOrientedProgrammingusingC++,IraPohl,PEARSONEDUCATION
2.ObjectOrientedProgramminginC++,RobertLafore
3.UMLin21Days,Tech Media
SECOND SEMESTER MCA SYLLABUS FOR ADMISSION BATCH 2016-17
Note: Latest and additional good books may be suggested and added from time to time
SECOND SEMESTER MCA SYLLABUS FOR ADMISSION BATCH 2016-17
Portion covered can be tested through Internal evaluation only not to be included in
University examination)
Reference Books:
1. Stephen P. Robbins, David A. Decenzo, Sanghmitra Bhattacharya, Madhushree
Nanda Agarwal, Fundamentals of Management, Pearson Education, 2009
2. Kreitner, Management Theory and Applications, CengageLearning,India, 2009
3. Robbins, Management, 9th edition Pearson Education, 2008,
4. Griffin, Management Principles and Applications, CengageLearning,India First
Edition
5. Harold Koontz, O'Donnell and Heinz Weihrich, Essentials of Management. New
Delhi, Tata McGraw Hill, 2006
6. Stoner, Management, PHI Learning, 2008
7. Richard L. Daft, Principles Of Management, Cengage Learning,India, 2009
8. Principles of Management, Meenakshi Gupta, PHI
9. Principles of Management, RN Gupta, S.Chand
SECOND SEMESTER MCA SYLLABUS FOR ADMISSION BATCH 2016-17
REFERENCES:
1. Kenneth H.Rosen, “ Discrete Mathematics and Its Applications”, Tata McGraw Hill, Fourth
Edition, 2002 (Unit 1,2 & 3).
2. Hopcroft and Ullman, “Introduction to Automata Theory, Languages and Computation”,
Narosa Publishing House, Delhi, 2002. ( Unit 4,5)
3. A.Tamilarasi&A.M.Natarajan, “Discrete Mathematics and its Application”, Khanna
Publishers,2nd Edition 2005.
4. M.K.Venkataraman “Engineering Mathematics”, Volume II, National Publishing ompany, 2nd
Edition,1989.
5. JurajHromkovic, “Theoretical Computer Science”, Springer IndianReprint, 2010.
6. David Makinson, “Sets, Logic and Maths for Computing”, Springer Indian Reprint, 2011.
7. Maple 14 at the Maple soft web store
SECOND SEMESTER MCA SYLLABUS FOR ADMISSION BATCH 2016-17
Practical
MCA201 Data Structure Lab
LIST OF EXPERIMENTS.
1 ADT Stack implementation and use it for evaluation of post-fix expression.
2 Conversion of prefix expression into post-fix form using recursion.
3 Implementation of circular queue (using array) with menu options like insert, delete,
display and exit.
4 Implementation of a priority queue (using pointers) and use it to organize student
records prioritized by marks.
5 Implementation of ADT doubly linked circular list to hold strings and use it for
organizing a sequence of cities constituting at our program.
6 Implementation of a binary search tree with menu options: Construct a tree, insert
anode, delete anode, traverse and display preorder, in order and post order sequence
of its nodes.
7 Implementation of di-graphs using adjacency matrix and find the transitive closure
using Warshall’s algorithm.
8 Implementation of a weighted graph and find minimal cost spanning tree using
PRIM’s Algorithm.
9 Generate 70 random integers in a given range and sort them using quick sort. Apply
both binary search and Interpolation search to locate a given integer and compare the
search algorithms based on the number of comparisons / probes required or a
successful as well as unsuccessful search..
10 Heap Sort
11 Merge Sort.
12 Implementation of a small Real World Application illustrating DS usage
SECOND SEMESTER MCA SYLLABUS FOR ADMISSION BATCH 2016-17
LIST OF EXPERIMENTS:
Reference:
Object Oriented Programming with C++, M.P.Bhaveand S.A.Patekar, Pearson
Education
SECOND SEMESTER MCA SYLLABUS FOR ADMISSION BATCH 2016-17
INTRODUCTION
ITERATIVE IMPROVEMENT
Module 5 (6 Hours)
Portion covered can be tested through Internal evaluation only not to be included in
University examination)
Text Books:
1. Thomas H.Cormen, Charles E.Leiserson, Ronald L. Rivest and Clifford Stein,
“Introduction to Algorithms”, Third Edition, PHI Learning Private Limited, 2012.
REFERENCES:
1. Alfred V. Aho, John E. Hopcroft and Jeffrey D. Ullman, “Data Structures and
Algorithms”, Pearson Education, Reprint 2006.
2. Donald E. Knuth, “The Art of Computer Programming”, Volumes 1& 3 Pearson
Education, 2009. Steven S. Skiena, “The Algorithm Design Manual”, Second
Edition, Springer, 2008
3. http://nptel.ac.in/
THIRD SEMESTER MCA SYLLABUS FOR ADMISSION BATCH 2016-17
Module 5 (6 Hours)
(as per choice of faculty)
Portion covered can be tested through Internal evaluation only not to be included in
University examination)
Text Books:
1. Introduction to Automata Theory, Languages and Computation: J.E. Hopcroft and
J.DUllman, Pearson Education, 3rd Edition.
2. Introduction to the theory of computation: Michael Sipser, Cengage Learning
Reference Books:
1. Automata Theory: Nasir and Srimani , Cambridge University Press.
2. Introduction to Computer Theory: Daniel I.A. Cohen, Willey India, 2nd Edition.
THIRD SEMESTER MCA SYLLABUS FOR ADMISSION BATCH 2016-17
Module 5 (6 Hours)
(as per choice of faculty)
Portion covered can be tested through Internal evaluation only not to be included in
University examination)
Preferably use of NetSim, NS2
TEXT BOOK :
1. Larry L. Peterson, Bruce S. Davie, “Computer Networks: A Systems Approach”,
Third Edition,Morgan Kauffmann Publishers Inc., 2003.
REFERENCES:
1. JamesF.Kuross,KeithW.Ross,“Computer Networking,ATop
DownApproachFeaturingtheInternet”,Third Edition,Addison Wesley, 2004.
2. NaderF.Mir,“Computer andCommunicationNetworks”,PearsonEducation,2007
3. Comer, “ComputerNetworks andInternetswithInternetApplications”,Fourth Edition,
PearsonEducation,2003.
4. Andrew S.Tanenbaum,“Computer Networks”,FourthEdition,2003.
5. William Stallings, “Data and Computer Communication”, Sixth Edition, Pearson
Education,2000
THIRD SEMESTER MCA SYLLABUS FOR ADMISSION BATCH 2016-17
Module1 :( 10Hours)
Introductory concepts of DBMS:
Introduction and applications of DBMS, Purpose of data base, Data, Independence,
Database System architecture- levels, Mappings, Database, users and DBA
Relational Model:
Structure of relational databases, Domains, Relations, Relational algebra – fundamental
operators and syntax, relational algebra queries, tuple relational calculus
Transaction Management:
Transaction concepts, properties of transactions, serializability of transactions, testing
for serializability, System recovery, Two- Phase Commit protocol, Recovery and
Atomicity, Log-based recovery, concurrent executions of transactions and related
problems, Locking mechanism, solution to concurrency related problems, deadlock, ,
two-phase locking protocol, Isolation, Intent locking
correlated sub-queries, Use of group by, having, order by, join and its types, Exist, Any,
All , view and its types. transaction control commands – Commit, Rollback, Savepoint
Distributed Data Base concepts.
PL/SQL Concepts:
Cursors, Stored Procedures, Stored Function, Database Triggers
Module 5 (6 Hours)
(As per choice of faculty)
(Portion covered can be tested through Internal evaluation only not to be included in
University examination)
Text Books:
1. Abraham Silberschatz, Henry F. Korth and S. Sudarshan, “Database Systems
Concepts”, McGraw-Hill Education , New Delhi
2. RamezElmasri and Shamkant B. Navathe, “Fundamentals of Database
Systems”, Pearson Education Inc., New Delhi.
Reference Books:
1. Hector Garcia-Molina, Jeffret D. Ullman, JennifferWidom, “Database Systems: A
Complete Book”, Pearson Education Inc., New Delhi.
2. C. J. Date “An introduction to Database System”, Pearson Education Inc., New
Delhi.
3. Bipin Desai, “An introduction to Database System”, Galgotia Publications.
4. Peter Rob & Carlos Coronel, “Database Systems: Design, Implementation, and
Management”, CENGAGE Learning India Pvt. Ltd., New Delhi.
5. Mark L. Gillenson, “Fundamentals of Database Management Systems”, Wiley
India Pvt. Ltd., New delhi.
6. Raghu Ramakrishnan, Johannes Gehrke, “Database Management Systems”,
McGraw-Hill Education (India), New Delhi.
THIRD SEMESTER MCA SYLLABUS FOR ADMISSION BATCH 2016-17
Introduction to OR
Concepts, genesis, Art of modeling, components of model, Types of OR models, effect
of data availability on modeling, Computations in OR, Phases of OR study
Network Analysis
Network Definition, Minimal spanning tree problem, shortest route problem, Maximal
flow problem concepts and solution algorithm as applied to problems. Project planning
and control by PERT/CPM network, Probability assessment in PERT network.
Queuing Models
Concepts relating to Queuing systems, types of queuing system ( use of six character
code ), Basic elements of Queuing Model, Role of Poison & Exponential Distribution,
Concepts of Birth and Death process, Steady state measures of performance, M/M/1
THIRD SEMESTER MCA SYLLABUS FOR ADMISSION BATCH 2016-17
model with and without limitation of q-size M/G/1, single channel with Poisson arrival
rate and general service time.
Use of Computer in modeling real life situations, Distribution functions, Random number
generation, Selection of input probability distribution, Design of simulation models
Experimental design, output analysis variance reduction techniques. Introduction to
simulation languages Programming tools for developing simulation models.
Module 5 (6 Hours)
Portion covered can be tested through Internal evaluation only not to be included in
University examination)
Books:
Protection and security -preliminaries, the access matrix model and its
implementations.-safety in matrix model- advanced models of protection. Data security
–cryptography:Model of cryptography, conventional cryptography- modern
cryptography, privatekey cryptography, data encryption standard- public key
cryptography – multiple encryption –authentication in distributed systems.
THIRD SEMESTER MCA SYLLABUS FOR ADMISSION BATCH 2016-17
Module 5 (6 Hours)
Text Book:
References:
Practical
Design, develop and implement the specified algorithms for the following problems
using C/C++ Language in LINUX /Windows environment.
1. Sort a given set of elements using the Quicksort method and determine the time
required to sort the elements. Repeat the experiment for different values of n, the
number of elements in the list to be sorted and plot a graph of the time taken versus
n.The elements can be read from a file or can be generated using the random number
generator.
2. Using OpenMP, implement a parallelized Merge Sort algorithm to sort a given set of
elements and determine the time required to sort the elements. Repeat the experiment
for different values of n, the number of elements in the list to be sorted and plot a graph
of the time taken versus n. The elements can be read from a file or can be generated
using the random number generator.
5. From a given vertex in a weighted connected graph, find shortest paths to other
vertices using Dijkstra's algorithm.
6. Find Minimum Cost Spanning Tree of a given undirected graph using Kruskal's
algorithm.
7. a. Print all the nodes reachable from a given starting node in a digraph using BFS
method.
b. Check whether a given graph is connected or not using DFS method.
THIRD SEMESTER MCA SYLLABUS FOR ADMISSION BATCH 2016-17
8. Find a subset of a given set S = {sl, s2,.....,sn} of n positive integers whose sum is
equal to a given positive integer d. For example, if S={1, 2, 5, 6, 8} and d = 9 there are
two solutions{1,2,6}and{1,8}.A
suitable message is to be displayed if the given problem instance doesn't have a
solution.
9. Implement any scheme to find the optimal solution for the Traveling Salesperson
problem and then solve the same problem instance using any approximation algorithm
and determine the error in the approximation.
10. Find Minimum Cost Spanning Tree of a given undirected graph using Prim’s
algorithm.
11. Implement All-Pairs Shortest Paths Problem using Floyd's algorithm. Parallelize this
algorithm,
implement it using OpenMP and determine the speed-up achieved.
c) Backtracking algorithm.
d) Branch and bound algorithm.
8. Write a C++ program that uses dynamic programming algorithm to solve the optimal
binary
search tree problem.
9. Write a C++ program for solving traveling sales persons problem using the following:
a) Dynamic programming algorithm.
b) The back tracking algorithm.
c) Branch and Bound.
REFERENCEBOOKS :
1.1 PC-to-PCCOMMUNICATIONSUNDERWIN98/WIN2000’sDIRECTCABLE
CONNECTIONwithNULLMODEM
a)Using Serial PortsandRS-232CCable Connection
b)UsingParallelPortsandDirectParallelCableConnection
LIST OF EXPERIMENTS:
ReferenceBooks:
TheCompleteReferenceSeries:WIN98/WIN2000/UNIX/REDHATX/Networking,TMH
Edition
THIRD SEMESTER MCA SYLLABUS FOR ADMISSION BATCH 2016-17
CourseDescription:Thiscourseexploresdatabaseprogrammingusingbothnativeand
embeddedANSI-standardStructuredQueryLanguage(SQL).Topicsincludeenterprise
databasemanagementsystems,databasemiddleware,datadefinitionlanguage,data
manipulationlanguage,datacontrollanguage,databasequeriesreporting,query
optimization,anddatabaseviews.Studentassignmentsincludedatabasecreation,query
designandprogramming,anddatabasemanipulationviaembeddedSQLcallsfroma
programminglanguage.
CourseGoal:Successfulgraduatesofthiscourseshouldbeableto:
1. Understandthefundamentalsofarelationaldatabase
2. Understandthefundamentalsofclient-server and multi-tieredapplications
3. UnderstandtheuseofStructuredQueryLanguage(SQL)asadatadefinitionlanguage,data
manipulationlanguage,anddatacontrollanguage
4. Understand and write SQL/PL_SQLqueriestocreate,report,andupdatedatain
arelationaldatabase
5. Understandthepurposeofandbeabletocreateviews,scripts,triggers,and transactions
6. Understandandbeabletoimplementthefundamentalsofsecurityand
permissionsinSQLServer
7. Designentityrelationshipmodelsforabusinessproblemanddevelopa
normalizeddatabasestructure
LIST OF EXPERIMENTS:
1. Creation of a database and writing SQL queries to retrieve information from the
database.
7. Write a PL/SQL block to satisfy some conditions by accepting input from the
user.
9. Creation of Procedures.
12. Using Oracle or DB2 under Windows platform and MySQL under Linux/Unix
platform
ReferenceBooks:
1. IntroductiontoRelationalDatabasesandSQLProgramming,ChristopherAllen,
SimonChatwin,CatherineA.VrearyTataMcGraw-Hill
2. OracleSQLandPL/SQLHandbook,JohnAdolphPalinski,PearsonEducation
3. Oracle11iPL/SQLProgramming,ScottUrman,TataMcGraw-Hill
4. MySQL:TheCompleteReference,VikramVaswani,TataMcgraw-Hill
5. MySQLBible,SteveSuehring,Wiley
FOURTH SEMESTER MCA SYLLABUS FOR ADMISSION BATCH 2016-17
Module 5 (6 Hours)
(as per choice of faculty)
Portion covered can be tested through Internal evaluation only not to be included in
University examination)
Text Books:
1. Herbert Schildt, The Complete Reference Java 2, Fourth Edition, Tata McGraw
Hill-2001
2. Liang Y.Daniel, Introduction to Java Programming (7th Edition), 2009, Pearson
Education.
Reference Books:
1. Steven Holzner, Java 1.2, BPB-1998
2. E. Balaguruswami, Programming with Java - Second Edition, Tata McGraw Hill-
1998.
3. Mughal K.A., Rasmussen R.W., A Programmer‟s Guide to Java Certification,
Addison-Wesley, 2000 `
FOURTH SEMESTER MCA SYLLABUS FOR ADMISSION BATCH 2016-17
Output Primitives and Attributes of Output Primitives : Output Primitive Points and Lines,
Line Drawing Algorithms, Circle Generating Algorithms, Scan-Line Polygon Fill
Algorithm, Inside-Outside tests, Boundary-Fill Algorithm, Flood Fill Algorithm, Cell Array,
Character Generation, Attributes of Output Primitives : Line Attributes, Color and
Grayscale Levels, Area fill Attributes, Character Attributes, Bundled Attributes, Anti-
aliasing.
Module 5 (6 Hours)
Portion covered can be tested through Internal evaluation only not to be included in
University examination)
FOURTH SEMESTER MCA SYLLABUS FOR ADMISSION BATCH 2016-17
Text Books:
1. Donald Hearn & M. Pauline Baker, “Computer Graphics with OpenGL”, Third
Edition, 2004, Pearson Education, Inc. New Delhi.
Reference Books:
Note : Latest and additional good books may be suggested and added from time
FOURTH SEMESTER MCA SYLLABUS FOR ADMISSION BATCH 2016-17
Responsibilities of a Software project manager, project planning, Metrics for project size
estimation, Project estimation techniques, Empirical estimation techniques, COCOMO
models, Scheduling, Organization &team structure, Staffing, Risk management,
Software configuration management.
Overview of design process: High-level and detailed design, Cohesion and coupling,
Modularity and layering, Function–Oriented software design: Structured Analysis using
DFD Structured Design using Structure Chart, Basic concepts of Object Oriented
Analysis & Design. User interface design, Command language, menu and iconic
interfaces.
Coding, Code Review, documentation. Testing: - Unit testing, Black-box Testing, White-
box testing, Cyclomatic complexity measure, coverage analysis, mutation testing,
Debugging techniques, Integration testing, System testing, Regression testing.
FOURTH SEMESTER MCA SYLLABUS FOR ADMISSION BATCH 2016-17
Emerging Topics:
Module 5 (6 Hours)
Portion covered can be tested through Internal evaluation only not to be included in
University examination)
Text Books:
Syntax directed translation: Study of syntax directed definitions & syntax directed
translation schemes, implementation of SDTS, intermediate notations: postfix, syntax
tree, TAC, translation of expression, controls structures, declarations, procedure calls,
Array reference.
Storage allocation & Error Handling: Run time storage administration, stack allocation,
symbol table management, Error detection and recovery: lexical, syntactic, semantic.
Text Books:
Module 5 (6 Hours)
(Portion covered can be tested through Internal evaluation only not to be included in
University examination)
Text Books
Reference Books
1. Lex and Yacc by Johan R. levine, Tonny Mason, et. al. O” Reilly and Assosiates.
2. “Compilers Design in C” Allen I. Holub, PHI eastern economy edition 2003.
FOURTH SEMESTER MCA SYLLABUS FOR ADMISSION BATCH 2016-17
REFERENCES:
1. Simon Sweeny, “English for Business Communication”, CUP, First South Asian Edition,
2010.
2. M. Ashraf Rizvi, “Effective Technical Communication”, Tata McGraw-Hill Publishing
Company Ltd. 2005.
3. Dr A Ramakrishna Rao, Dr G Natanam& Prof SA Sankaranarayanan, “English
Language Communication: A Reader cum Lab Manual”, Anuradha Publications,
Chennai, 2006.
4. Dr. ShaliniVerma, “Body Language- Your Success Mantra”, S. Chand, 2006.
5. Andrea J. Rutherford, “Basic Communication Skills for Technology”, 2nd Edition,
Pearson Education, 2007.
6. Sunita Mishra & C. Muralikrishna, “Communication Skills for Engineers”, Pearson
Education, 2007.
7. Jolene Gear & Robert Gear, “Cambridge Preparation for the TOEFL Test”, 2010.
FOURTH SEMESTER MCA SYLLABUS FOR ADMISSION BATCH 2016-17
ExamplesofEmbeddedsystemsandTypicalhardware
HardwareFundamentalsforSoftwareEngineerandAdvancedHardwareFundamentals
InterruptsandSurveyofsoftwarearchitectures. Introduction to RTOS and More Operating
System Services BasicDesignusingRTOS
EmbeddedSoftwaredevelopmenttoolsandDebuggingTechniques
TextBooks:
1.AnEmbeddedSoftwarePrimer,DavidA.Simon,PearsonEducation,Inc.,1999
2.EmbeddedRealTimeSystemsprogramming,SriramVIyerandPankajGupta,TMH,
2004
ReferenceBooks:
1.EmbeddedSystemsDesign–AUnifiedHardware/SoftwareIntroduction,Frank
Vahid/TonyGivargis,JohnWiley&Sons,Inc.,2002
2.EmbeddedSystems,Architecture,ProgrammingandDesign,RajKamal,TMH,2003
Mining Multimedia Data, Data-Mining and the worldWide Web, Web Data Mining,
mining, Mining and Meta-Data, Data Visualization & overall Perspective,Data
Visualization, Application of Data-MiningIntroduction to Data Mining and knowledge
discovery in databases (KDD); Data miningprimitives, concepts, tasks and
functionalities - concept learning, classification and prediction,association rule mining,
clustering and anomaly detection; Data preparation - cleaning,transformation, reduction,
discretization; Techniques, approaches and evaluation: Credibility,evaluation and
comparison of data mining models; Association rule mining techniques -
Apriori,Partition-based, FP-tree, Pincer-search; Supervised (inductive) learning -
Decision table, rule,tree; Model tree, Baye‟s theorem, k-nearest neighbour, Regression,
SVM; Unsupervised learning– Clustering Techniques - Partition, k-d tree, Hierarchical,
Density, Grid, Advanced Databases:Text, Sequence, Image, etc.
References:
Mobile radio systems-, Paging systems, cordless telephone system, cellular telephone
system,Cellular Concept: Frequency reuse, channel assignment, hand off, Interference
and cell splitting,sectoring, Improving Coverage and capacity in Cellular systems.
Propagation modeling:Outdoor/ Indoor Propagation models, Small scale Multipath
propagation- Rayleigh fading,Ricean Fading, Nakagami fading, Shadowing, lognormal
shadowing fading model, outageprobability, coverage estimation under shadowing, and
multipath fading. Wireless Networks802.11, frequency-hopping, encoding and
modulation, MAC Layer Protocol Architecture
Multiple access with collision avoidance protocol, Virtual Carrier-Sensing, DCF Protocol,
PCFOperation.
References:
UNIT-I
Introduction
UNIT-II
Mobile Commerce
Introduction to Mobile Commerce, Mobile Computing Application, Wireless Application
Protocols, WAP Technology, Mobile Information Devices, Web Security
Introduction to Web security, Firewalls & Transaction Security, Client Server Network,
Emerging Client Server Security Threats, firewalls & Network Security.
UNIT-III
Encryption
World Wide Web & Security, Encryption, Transaction security, Secret Key Encryption,
Public
Key Encryption, Virtual Private Network (VPM), Implementation Management Issues.
UNIT – IV
Electronic Payments
UNIT-V
Net Commerce
FOURTH SEMESTER MCA SYLLABUS FOR ADMISSION BATCH 2016-17
Books:
Introduction to PHP
Evaluation of PHP, Basic Syntax, Defining variable and constant, Php Data type,
Operatorand Expression.
UNIT-2:
Function
What is a function, Define a function, Call by value and Call by reference, Recursive
function, StringCreating and accessing, String Searching & Replacing String, Formatting
String, StringRelated Library function
Array
Anatomy of an Array, Creating index based and Associative array Accessing array,
ElementLooping with Index based array, Looping with associative array using each ()
and foreach(),Some useful Library function.
UNIT-3:
Understanding file& directory, Opening and closing, a file, Coping, renaming and
deleting afile, working with directories, Creating and deleting folder, File Uploading &
Downloading.
UNIT-4:
UNIT-5:
Exception Handling
Understanding Exception and error, Try, catch, throw. Error tracking and debugging.
References:
TEXT BOOK
REFERENCE BOOKS
1. Program using OpenGL library functions, to implement the basic primitives such
as POINT, LINES, QUAD, TRIANGLES and POLYGON etc.
2. Program using OpenGL library functions, to implement the line chart as per user
input. Input monthly data for period of one year.
3. Program to draw hard wired house by using basic primitives of OpenGL library
functions.
4. Program by using OpenGL library functions, to implement the Digital Differential
Analyser line drawing algorithm.
5. Program by using OpenGL library functions, to implement the Bresenham‟s Line
drawing, Circle drawing, Mid-point Circle drawing and Mid-point Ellipsedrawing
algorithms.
6. Program by using OpenGL library functions, to implement the Cohen-Sutherland
Line clipping algorithm.
7. Program by using OpenGL library functions, to implement the Liang-Barsky Line
clipping algorithm..
8. Program to demonstrate 2D and 3D transformations.
9. Window to Viewport Transformation
10. Splines Using OpenGL, 2D Animation
Objectives:
11. To perform various testing using the testing tool unit testing, integration testing
EXPERIMENT-1
EXPERIMENT-2
EXPERIMENT-3
EXPERIMENT-4
Aim: To perform the function oriented diagram : DFD and Structured chart
Tools/Apparatus: Rational Rose Software.
Procedure:
1) Identify various processes, data store, input, output etc. of the system and
askstudents to analyse.
2) Use processes at various levels to draw the DFDs.
3) Identify various modules, input, output etc. of the system and ask students to
analyse.
4) Use various modules to draw Structured charts.
EXPERIMENT-5
FOURTH SEMESTER MCA SYLLABUS FOR ADMISSION BATCH 2016-17
EXPERIMENT-6
Aim: To draw the structural view diagram : Class diagram, object diagram
Tools/Apparatus: Rational Rose Software.
Procedure:
1) Identify various elements such as classes, member variables, member functions etc.
of the class diagram
2) Draw the class diagram as per the norms.
3) Identify various elements such as various objects of the object diagram
4) Draw the object diagram as per the norms.
EXPERIMENT-7
Aim: To draw the behavioral view diagram : Sequence diagram, Collaboration diagram
Tools/Apparatus: Rational Rose Software.
Procedure:
1) Identify various elements such as controller class, objects, boundaries, messages
etc.
of the sequence diagram
2) Draw the sequence diagram as per the norms.
3) Identify various elements such as for the sequence diagram of the collaboration
diagram
4) Draw the collaboration diagram as per the norms.
EXPERIMENT-8
Aim: To draw the behavioral view diagram : State-chart diagram, Activity diagram
Tools/Apparatus: Rational Rose Software.
Procedure:
1) Identify various elements states and their different transition of the state-chart
diagram
2) Draw the state-chart diagram as per the norms.
3) Identify various elements such as different activity their boundaries etc. of the activity
diagram
4) Draw the activity diagram as per the norms.
EXPERIMENT-9
FOURTH SEMESTER MCA SYLLABUS FOR ADMISSION BATCH 2016-17
EXPERIMENT-10
EXPERIMENT-11
Aim: To perform various techniques for testing using the testing tool : unit testing,
Integrationtesting
Tools/Apparatus: Winrunner.
Procedure:
1) Identify various modules of the system so that they can be tested stand alone.
2) Identify the groups of the module that can be tested together in integration.
3) Perform the testing of the modules as a unit and in integration by using the testing
tool.
EXPERIMENT-12
EXPERIMENT-13
4 to 10.
Reference books:
Practice of LEX and YACC in windows/Linux OS. Practice of writing of programs either
in C/C++/JAVA for implementation.
List of Experiments:
1. Design a lexical analyzer for given language and the lexical analyzer should
ignoreredundant spaces, tabs and new lines. It should also ignore comments.
Although thesyntax specification states that identifiers can be arbitrarily long, you
may restrict thelength to some reasonable value. Simulate the same in C/LEX
language.
2. Write a program to identify whether a given line is a comment or not.
3. Write a program to recognize strings under 'a', 'a*b+', 'abb'.
4. Write a program to test whether a given identifier is valid or not.
5. Write a program to simulate lexical analyzer for validating operators.
6. Implement the lexical analyzer using JLex, flex or other lexical analyzer
generating Tools.
7. Write a program for implementing the functionalities of predictive parser for the
miniLanguageas specified in Note 1.
8. Write a program for constructing of LL (1) parsing
9. Write a program for constructing recursive descent parsing.
10. Write a program to implement LALR parsing.
11. Write a program to implement operator precedence parsing
12. Write a program to implement Program semantic rules to calculate theexpression
that takes an expression with digits, + and * and computes the value.
13. Convert the BNF rules into Yacc form and write code to generate abstract syntax
treefor the mini language
14. Write a program to generate machine code from abstract syntax tree generated
by theparser. The instruction set specified in Note 2 may be considered as the
target code.
Note 1:
{int a[3],t1,t2;
T1=2;
A[0]=1;a[1]=2;a[t]=3;
T2=-( a[2]+t1*6)/(a[2]-t1);
If t2>5then
Print(t2)
Else{
Int t3;
T3=99;
T2=25;
Print(-t1+t2*t3);/*this is a comment on 2 lines*/
}endif
}
Experiment with:
E→ TE'
E' →+TE'/î
T →FT‟
T'→*FT'/î
F→ (E)/i
S→iCtSS‟
S‟→eS/ î
3. Write a program to construct predictive parsing table for the following grammar?
S→iCtSS‟
S‟→eS/ î
Note 2:
FOURTH SEMESTER MCA SYLLABUS FOR ADMISSION BATCH 2016-17
Consider the following mini language, a simple procedural high –level language, only
operating on integer data, with asyntax looking vaguely like a simple C crossed with
Pascal. The syntax of the language is defined by the followinggrammar.
<program>::=<block>
<block>::={<variable definition><slist>}
|{<slist>}
<variabledefinition>::=int<vardeflist>
<vardec>::=<identifier>|<identifier>[<constant>]
<slist>::=<statement>|<statement>;<slist>
<statement>::=<assignment>|<ifstament>|<whilestatement>
|<block>|<printstament>|<empty>
<assignment>::=<identifier>=<expression>
|<identifier>[<expression>]=<expression>
<if statement>::=if<bexpression>then<slist>else<slist>endif
|if<bexpression>then<slisi>endif
<whilestatement>::=while<bexpreession>do<slisi>enddo
<printstatement>:;=print(<expression>)
<expression>::=<expression>::=<expression><addingop><term>|<term>|<addingop>
<term>
<bexprssion>::=<expression><relop><expression>
<relop>::=<|<=|==|>=|>|!=
<addingop>::=+|-
<term>::=<term><multop><factor>|<factor>
<Multop>::=*|/
<factor>::=<constant>|<identifier>|<identifier>[<expression>]
|(<expression>)
<constant>::=<digit>|<digit><constant>
<identifier>::=<identifier><letter or digit>|<letter>
<letter or digit>::=<letter>|<digit>
<letter>:;=a|b|c|d|e|f|g|h|I|j|k|l|m|n|o|p|q|r|s|t|u|v|w|x|y|z
<digit>::=0|1|2|3|4|5|^|7|8|9
<empty>::=has the obvious meaning
Experiment with:
1. Write a program to generate the code for the following three address code
statements?
A=B+C
W=X-Y
2 Write a program to generate the code for the following three address code
statements?
W=(A+B)*C
FOURTH SEMESTER MCA SYLLABUS FOR ADMISSION BATCH 2016-17
Tasks:
Read voraciously
Make a habit of reading voraciously on every subject. This will keep you ready for any
topic for a discussion in GD Your knowledge is your most important weapon in a
discussion.
Most of us have a misconception that initiating the discussion would give you an
advantage over others. It does give you an advantage but only if you know the subject
well and have something relevant to start the discussion otherwise it is a disadvantage.
For e.g. when a group was given a subject “Is Capital punishment right?” some
members of the group heard the word punishment and jumped at starting the discussion
without understanding the meaning of Capital Punishment. The evaluators kept hearing
for 2 minutes after which they intervened and asked the group if they knew the meaning
of Capital Punishment. Not to say, the members who initiated were quite looking at each
other‟s faces. That is when a quite member of the group got up and explained the
meaning of the topic. From this incidence, you can easily tell who must have succeeded
in the GD, the ones who initiated the discussion or the one who explained the topic and
gave it a right direction.
They say, “Speaking just for the sake of speaking is noise”. So, don‟t create noise in the
GD rather make some useful and resourceful contributions to get noticed in the
discussion.
As you speak make sure that you do not speak at the top of your voice. You should be
audible and clear. Remember that you are participating in a discussion which is different
from a speech given out by the leaders in their rallies. Even if you disagree with the
other‟s point of view, disagree politely. Use phrases like, I would like to disagree a bit
here, I am sorry but I think I have a slightly different point of view here.
Be précised
Abstain from using irrelevant information and data from your talks during a GD Speak
precisely so that others also get a chance to put across their point of view.
Stay attentive to the ideas put forward by other group members and keep writing the
important points discussed during the GD As you get a chance to speak, put forward
your views about the topic. You can also agree or disagree with other‟s ideas, based on
your knowledge about the subject.
Don‟t take a stand on either extreme when the discussion begins. It might happen that
you get convinced by other‟s argument and want to change your stand. Respect other‟s
opinion as well and agree with what is right, even if you initially had a different opinion.
Speak confidently
Maintain your confidence as you speak. Establish eye contact with other members of
the group and do not let your voice tremble.
Moderate
Try to moderate the discussion if any arguments arise. This is necessary to ensure that
the group doesn‟t wander from the goal of the GD
Your body language should not demonstrate dominance or low self-confidence. Show
your interest in the discussion through your gestures like bending forward a bit, nodding
your head.
Be a team player
Last but not the least; be a team player as this is a group activity. Be comfortable with
the group members and vice versa.
FOURTH SEMESTER MCA SYLLABUS FOR ADMISSION BATCH 2016-17
Sample GD topics
Important:
report and presentation in fifth semester. The internship shall be evaluated in fifth
semester.
Course Structure for 5th Semester MCA of BPUT
Code Subject Theory Practical
No Lecture Credit Universit Internal Hours / Credit Marks
Hrs/We Theory y Marks Evaluation Week Practical
ek L/T
Semester-5
MCA Artificial 3 3 100 50 2 1 50
501 Intelligence &
Expert System
MCA Object Oriented 3 3 100 50 2 1 50
502 Analysis &
Design with
UML
MCA Internet 3 3 100 50 2 1 50
503 Technology &
Enterprise Java
MCA Accounting 3 3 100 50 2 1 50
504 Information
System
MCA Elective-II 3 3 100 50
505
MCA Elective-III 3 3 100 50
506
MCA Elective-IV 3 3 100 50
507 (open)
MCA Minor in-house 6 3 150
508 Project and Viva
MCA Summer 0 2 100
509 Internship
Evaluation
Total 21 21 700 350 14 09 450
Total Marks: 1500
Total Credits: 30
4. Michael Negnevitsky, “Artificial Intelligence: A Guide to Intelligent Systems”, Second Edition, 2005,
Pearson Education, Inc. New Delhi.
5. Dan W. Patterson, “Introduction to Artificial Intelligence and Expert Systems”, 1stEdition, 1996, PHI
Learning Pvt. Ltd., New Delhi.
6. Ben Coppin, “Artificial Intelligence Illuminated”, 2005, Narosa Publication, New Delhi. ISBN: 978-
81-7319-671-3
MCA 502
OBJECT ORIENTED ANALYSIS AND DESIGN WITH UML
Module-I
Introduction: Object orientation & Object oriented development, Modeling Concepts: Modeling as a design
technique, Class Modeling, advanced class modeling, State Modeling, advanced State Modeling, Interaction
Modeling, advanced Interaction Modeling. Collaboration Diagrams: Terms, Concepts, depicting a message,
polymorphism in collaboration diagrams
Module-II
Analysis and Design: Process overview, system Conception, Domain Analysis, System Design, Class design.
Module-III
Implementation: Implementation Modeling, Object Oriented (OO) Languages, Databases, Programming Style.
Module-IV
Management of Object-Oriented Software projects, Object oriented analysis, domain analysis and generic
components of object- oriented analysis model, object behavior model. The intent of object-oriented metrics,
the distinguishing characteristics and metrics for the object-oriented design model, class oriented metrics,
operation oriented metrics, metrics for object oriented testing, metrics for object-oriented projects.
Text Books:
1. Michael R. Blaha and James R Rambaugh, “Object-Oriented Modeling and Design with UML”, Second
Edition, 2005, Pearson Education, Inc. New Delhi.
Chapters: 1 to 8, 10, 11, 12, 14, 15, 17, 18, 19, 20.
2. Mark Priestley, “Practical Object-Oriented Design with UML”, Second Edition, 2006, McGraw-Hill
Education, India. New Delhi.
Reference Books:
1. Grady Booch, “Object-Oriented Analysis and Design with Applications”, Third Edition, 2007, Pearson
Education, Inc. New Delhi.
2. Craig Larman, “Applying UML and Patterns: An Introduction to Object-Oriented Analysis and Design
and Iterative Development”, Third Edition, 2005, Pearson Education, Inc. New Delhi.
3. Mike O'Docherty, “Object Oriented Analysis and Design: Understanding System Development with UML
2.0”, 2005, Wiley India Pvt. Ltd., New Delhi.
4. John W. Satzinger, Robert B. Jackson, Stephen D. Burd, “Object-Oriented Analysis and Design with the
Unified Process”, 2006, CENGAGE Learning India Pvt. Ltd., New Delhi.
5. James Rumbaugh, Grady Booch, Ivar Jacobson, “The Unified Modeling Language
MCA 503
INTERNET TECHNOLOGY AND ENERPRISE JAVA
Module-I (10 hours)
Internet and Web Technology: Introduction and overview, Internetworking concept and architectural
model,World wide web ,Web 2.0, Web Browsers, Web Servers, URLs, URN, URIclassful internet addresses,
classless and subnet address extensions (CIDR)
Web Programming:-, Basics of HTML & XHTML Programming: Syntax, Document structures, images,
hyperlinks, List, Tables, Forms, Frames, CSS, Basic JavaScript Programming: DOM, Loops, function and
arrays,Formdesign,Event handling. XML: Document structure, DTD, Namespaces, XML Schema, and Parsing
XML documents.
Enterprise Java Programming: Concept of Swing Package , Java EE 6 API, Web Applications, Java Servlet
Technology: - Lifecycle of a Servelet, Servelet API, Servlet Packages, Types of servlets, Stateless and Stateful
protocols ,Session tracking in Servlet ,Cookie ,Session variable
Database Programming :Concept of JDBC ,JDBC drivers ,connecting to database ,Database Access using
Servlet.
JSP Technology: - Architecture & Anatomy of JSP Page, JSP life cycle, JSP with MVC Architecture, Dynamic
webpage Creation, Scripting Elements, Directive tags ,Action tags , Session Tracking, Database access using
JSP page, JSTL, concept of Ajax. Introduction to JavaServer Faces (JSF) Technology, Introduction to Facelets,
Module-IV(10 hours)
Enterprise JavaBeans Technology: EJB Component Architecture, Role of EJB & its life cycle, Types of Beans,
Stateless and stateful beans, Simple program using stateless and stateful beans ,Security features of EJB,
Contexts and Dependency Injection for the Java EE Platform; Java Persistence API, Security in Java EE, Java
EE Supporting Technologies: Introduction, Transactions and Resource Connections.
Module-V(6 hours)
(As per choice of faculty)
Portion covered can be tested through internal evaluation only not to be included in university examination .
Recommended Books:
1. Douglas E. Comer, “Internetworking with TCP/IP, Volume 1: Principles, Protocols and Architecture”,
Fifth Edition, 2006, PHI Learning Pvt. Ltd., New Delhi.
Chapters: 1, 3, 4, 9, 10, 18, 20, 27, 28.
2. Ralph Moseley, “Developing Web Applications”, 2008, Wiley India, New Delhi.
3. Eric Jendrock, D. Carson, I. Evans, D. Gollapudi, K. Haase, C. Srivastha, “The Java EE6 Tutorial”,
Volume-1, Fourth Edition, 2010, Pearson India, New Delhi.
Chapters: 1, 3, 4, 5, 7, 9 to 12, 14 to 16, 17, 19, 23, 26, 27, 28.
4.H. M.Deitel, P. J. Deitel, S. E. Santry“Advanced Java 2 Platform HOW TO PROGRAM” , Prentice
Hall, 2001
References:
1. Joe Wigglesworth, Paula McMillan, “Java Programming: Advanced Topics”, 3rd Edition, 2009,
CENGAGE Learning India Pvt. Ltd., New Delhi.
2. William Stallings, “Computer Networking with Internet Protocols and Technology”, 2004, Pearson
education, New Delhi.
3. Kongent S., “Java Server Programming (JEE 6) Black Book, Platinum Edition”, 2008, Dreamtech /
Wiley India Pvt. Ltd.
4. David Geary, Cay S. Horstmann, “Core JavaServer Faces”, Second Edition, 2007, Pearson Education,
Inc. New Delhi.
5. Adrian Farrel, “The Internet and its Proto
MCA 504
ACCOUNTING INFORMATION SYSTEM
Course objective and outcomes:
The subject introduces and familiarizes with the application of accounting principles and concepts in a
computerized environment.Students pursuing computer application course need to know the
concepts of accounting and developing an accounting system for a business with an objective of
preparing computerized financial statements and reports.
MODULE-I
Need of Accounting for as a language of business, Accounting an information system, Accounting
Concepts, Accounting Equations, Basic Terminology used in Profit/Loss A/c and Balance Sheet,
Accounting Cycle, Recognition of Revenue and Expenditures, Advantages of computerized
accounting system over conventional accounting practices.
MODULE-II
Classification of Accounts, Golden Rules of Accounting, Preparation of vouchers, Journals, Posting in
Subsidiary books of accounts, Cash Book, Trial Balance.
MODULE-III
Financial Statements and its preparation, Income Statement, Balance Sheet, Adjustment
Entries(simple numerical problems to be taught), Basics of company accounts: Sources of funds,
Accounting for issue of different shares.Director’s Reports of companies.
MODULE-IV
Practice of final accounts through Tally Package.
Text Book :
1. Computerised Accounting with Quick Books – 2015- Mc grawHill
2. Financial Accounting, Satpathy, Mohapatra,Patra- Vrinda
Financial Accounting, Goyal and Goyal, PHIFinancial Accounting and Analysis, Athma,HPH
MCA505 A-CRYPTOGRAPHY AND CYBER LAW
Module – 1 Introduction - Cyber Attacks, Defence Strategies and Techniques, Guiding Principles,
Mathematical Background for Cryptography - Modulo Arithmetic’s, The Greatest Common Divisor, Useful
Algebraic Structures, Chinese Remainder Theorem
Basics of Cryptography - Preliminaries, Elementary Substitution Ciphers, Elementary Transport Ciphers, Other
Cipher Properties, Secret Key Cryptography – Product Ciphers, DES Construction.
Module – 2 Public Key Cryptography and RSA – RSA Operations, Why Does RSA Work?, Performance,
Applications, Practical Issues, Public Key Cryptography Standard (PKCS), Cryptographic Hash - Introduction,
Properties, Construction, Applications and Performance, The Birthday Attack, Discrete Logarithm and its
Applications - Introduction, Diffie-Hellman Key Exchange, Other Applications.
Module – 3 Key Management - Introduction, Digital Certificates, Public Key Infrastructure, Identity–based
Encryption, Authentication–I - One way Authentication, Mutual Authentication, Dictionary Attacks,
Authentication – II – Centralized Authentication, The Needham-Schroeder Protocol, Kerberos
Intrusion Prevention and Detection - Introduction, Prevention Versus Detection, Types of Instruction Detection
Systems, DDoS Attacks Prevention/Detection,
Web Service Security – Motivation, Technologies for Web Services, WS- Security, SAML, Other Standards.
Module –4
Concepts of Cyber Crime and the IT ACT-2000,Hacking,Teenage Web Vandals,Cyber Fraud and Cyber
Cheating,Nature of Cyber criminality,Strategies to tackle cyber crime and trends,Criminal justice in India and
implications on Cyber Crime
Copyright Ownership and Assessment,License of CopyRight,CopyRight Term and respect for foreign
Work,Copy Right Infringement,Remedies and Offers,Computer Software piracy
TextBooks:
1. Cryptography, Network Security and Cyber Laws – Bernard Menezes, Cengage Learning, 2010
2.Cyber Law simplified- VivekSood, Mc-GrawHill, 11th reprint , 2013
Reference Books: 1. Cryptography and Network Security- Behrouz A Forouzan, DebdeepMukhopadhyay, Mc-
GrawHill, 3rd Edition, 2015
2. Cryptography and Network Security- William Stallings, Pearson Education, 7th Edition
MCA 505 B
Information Security and Management
Module-I (10 Hours)
The Security Problem in Computing:The meaning of computer Security, Computer Criminals,
Methods of Defense; Elementary Cryptography: Substitution Ciphers, Transpositions, Making
“Good” Encryption Algorithms, Private-Key Cryptosystems, The Data Encryption Standard, The
AES Encryption Algorithm, Public-Key Cryptosystems, Public Key Encryptions,
Usesof Encryption, Pseudo-randomness, and Hashing.
Legal and Ethical Issues in Computer Security: Protecting Programs and data, Information and the law, Rights
of Employees and Employers, Software failures, Computer Crime, Case studies of Ethics.
Module-V ( Portion covered can be tested through internal evaluation not to be included in the university
examination)
Textbooks:
1.
Charles P. Pfleeger& Shari Lawrence Pfleeger, “Security in Computing”, Fourth
Edition, 2007, Pearson Education, Inc. New Delhi. Pvt. Ltd., New Delhi.
2.William Stallings&Lawrie Brown, “Computer Security: Principles and Practice”, First Edition, 2008, Pearson
Education, Inc. New Delhi.
Reference Books
1.Charlie Kaufman, Radia Perlman& Mike Speciner, “Network Security: Private Communication in a Public
World”, 2ndEdition, 2003, PHI Learning. New Delhi.
2.ChuckEasttom, “Computer Security Fundamentals”, First Edition, 2006, Pearson
Education, Inc. New Delhi.
3Alfred Baasta, “Computer Security”, First edition, 2008, CENGAGE Learning.
MCA 505C
CLOUD COMPUTING
UNIT I:
UNIT II:
Implementation: Study of Cloud computing Systems like Amazon EC2 and S3, Google App Engine,
and Microsoft Azure, Build Private/Hybrid Cloud using open source tools, Deployment of Web
Services from Inside and Outside a Cloud Architecture. MapReduceand its extensions to Cloud
Computing, HDFS, and GFS.Interoperability and Service Monitoring: Issues with interoperability,
Vendor lock-in, Interoperability approaches. SLA Management, Metering Issues, and Report
generation.
UNIT III:
Resource Management and Load Balancing: Distributed Management of Virtual Infrastructures,
Server consolidation, Dynamic provisioning and resource management, Resource Optimization,
Resource dynamic reconfiguration, SchedulingTechniques for Advance Reservation, Capacity
Management to meetSLA Requirements, and Load Balancing, various load balancing techniques.
Migration and Fault Tolerance: Broad Aspects of Migration into Cloud, Migration of virtual Machines
and techniques. FaultTolerance Mechanisms.
UNIT IV:
Security: Vulnerability Issues and Security Threats, Application-level Security, Data level Security,
and Virtual Machine level Security, Infrastructure Security, and Multi-tenancy Issues.IDS: host-based
and network-based, Security-as-a-Service. Trust Management, Identity Management, and Access
Controls TechniquesAdvances: Grid of Clouds, Green Cloud, Mobile Cloud Computing
TEXT BOOKS:
REFERENCES:
Introduction to The DOT NET:DOT NET Languages, DOT NET Framework , User and Program
Interfaces, Windows Forms, Web Forms, Console Applications, Web Services, CLR ,CTS, MSIL tools
,NET Assemblies,
Introduction to C#.net:Data types, Operators, Branching, Looping, Methods, Array, Strings, C# Types:
Value Type, reference type, struct Type.
Introduction to windows forms in C#: layout, forms and controls, creating GUI, Event handling,Built-in
dialog boxes.
UNIT-IV(10 Hours)
Adding controls to a web form in ASP.NET, Buttons, Text Box, Labels, Checkbox, Radio Buttons, List
Box, image controls, data controls, file uploading & downloading. Running web application using
ASP.NET, Creating a multiform web project. Form Validation: Client side validation, server Side
validation,State management.
Text Books:
Reference books:
1. HagitAttiya, Jennifer Welch, “Distributed Computing: Fundamentals, Simulations, and
Advanced Topics”, 2nd Edition, 2005, Wiley India Pvt. Ltd., New Delhi.
2. Mordechai Ben-Ari, “Principles of Concurrent and Distributed Programming”, 2nd Edition,
2006, Pearson Education, Inc. New Delhi.
3. Mei-Ling Liu, “Distributed Computing: Principles and Applications”, 2004, Pearson Education,
Inc. New Delhi.
4. Gerard Tel, “Introduction to Distributed Algorithms”, Second edition, 2002, Cambridge
University Press / Foundation Books India, New Delhi.
5.Ajay D. Kshemkalyani, MukeshSinghal, “Distributed Computing: Principles, Algorithms, and
Systems”, 2008, Cambridge University Press / Foundation Books India, New Delhi.
PARALLEL COMPUTING ( MCA 506B)
Module-I (10 hours)
Introduction to Parallel Computing; Motivating Parallelism, Scope of Parallel Computing; Parallel Programming;
Platforms : Implicit parallelism, Limitation of Memory System Performance, Dichotomy of Parallel Computing
Platforms, Physical Organization of Parallel Platforms: PRAM Model, Interconnection network, network topology,
Evaluation of interconnection network.
Module-II (10 hours)
Communication Costs of Parallel Machines, Routing Mechanism for Interconnection Networks, Impact of Process-
processor Mapping and Mapping Techniques.
Principles of Parallel Algorithm Design : Preliminaries, Decomposition Techniques, Characteristics of Tasks and
Interactions, Mapping Techniques for Load Balancing, Methods for containing interaction Overheads,
Module-III (10 hours)
Parallel Algorithm Models: Basic Communication Operations: One-to-All Broadcast and All-to-One Reduction, All-
to-All Broadcast and Reduction, Scatter and Gather, All-to-All Personalized Communication, Circular Shift. All
reduce and prefix sum.
Reference Books:
1. Calvin Lin, Larry Snyder, “Principles of Parallel Programming”, 1st Edition, 2009, Pearson Education, Inc. New
Delhi.
2. Michael J. Quinn, “Parallel Programming in C with MPI and OpenMP”, 2004, McGraw-Hill Education (India),
New Delhi.
3. Barry Wilkinson, “Parallel Programming: Techniques and Applications Using Networked Workstations and
Parallel Computers”, 2nd Edition, 2005, Pearson Education, Inc. New Delhi.
4. Yves Robert, Henri Casanova, Armand Legrand, “Parallel Algorithms”, 1st Edition, 2009, CRC Press. ISBN-
13:9781584889458.
5. Harry F. Jordan, Gita Alagband, “Fundamentals of Parallel Processing”, first Edition, 2003, PHI Learning
Pvt. Ltd. New Delhi.
MCA 506C
MICROPROCESSOR AND ASSEMBLY LANGUAGE PROGRAMMING
(Portion covered can be tested through Internal evaluation only not to be included inUniversity
examination.)
Text Books:
1. Ramesh S. Gaonkar, “Microprocessor Architecture, Programming and Application with
8085”, 5th edition, Penram International Publishing (India) Pvt. Ltd.
2. D V Hall, “Microprocessor & Interfacing” McGraw Hill Education India.
3. M.A. Mazidi and J.G. Mazidi, “The 8051 Microcontroller and Embedded Systems”, Pearson
Education, India.
Reference Books:
1.A. P. Mathur , “Introduction to Microprocessor” McGraw Hill Education India.
2. B.Ram, “Fundamentals of Microprocessor and Microcomputer” DhanpatRai& Co
Publication.
3. P K Ghosh, P R Sridhar, “0000 to 8085 Introduction to microprocessor to Engineers
&Scientists”Prentice-Hall of India.
4. M.Mano”Logic and Computer Design Fundamentals”Pearson Education/PHI.
MCA506D
STATISTICAL NATURAL LANGUAGE PROCESSING
Module - 1 (10 Hours)
Introduction to Natural Language Understanding: The study of Language, Applications of NLP, Evaluating
Language Understanding Systems, Different levels of Language Analysis, Representations and Understanding,
Organization of Natural language Understanding Systems, Linguistic Background: An outline of English
syntax. Introduction to semantics and knowledge representation, some applications like machine translation,
database interface.
Module- 2 (10 Hours)
Grammars and Parsing: Grammars and sentence Structure, Top-Down and Bottom-Up Parsers, Transition
Network Grammars, Top-Down Chart Parsing. Feature Systems and Augmented Grammars: Basic Feature
system for English, Morphological Analysis and the Lexicon, Parsing with Features, Augmented Transition
Networks.
Module - 3 (10 Hours)
Grammars for Natural Language: Auxiliary Verbs and Verb Phrases, Movement Phenomenon in Language,
Handling questions in Context-Free Grammars. Human preferences in Parsing, Encoding uncertainty,
Deterministic Parser.
Module- 4 (10 Hours)
Ambiguity Resolution: Statistical Methods, Probabilistic Language Processing, Estimating Probabilities, Part-
of Speech tagging, Obtaining Lexical Probabilities, Probabilistic Context- Free Grammars, Best First Parsing.
Semantics and Logical Form, Word senses and Ambiguity, Encoding Ambiguity in Logical Form.
Text Books:
1. James Allen, “Natural Language Understanding”, 2/e, Pearson Education
2. L.M. Ivansca, S. C. Shapiro, “Natural Language Processing and Language Representation”, University Press
Reference Books: 1. T. Winograd, “Language as a Cognitive Process”, Addison-Wesley Publishing.
MCA 506 E
SOFT COMPUTING
Module-I (10 hours)
Introduction to intelligent systems and soft computing: Introduction, Intelligent systems, Knowledge-based
systems, Knowledge representation and processing, soft computing.
Fundamentals of fuzzy logic systems: Introduction, background, fuzzy sets, generalized fuzzy operations,
implication, definitions, fuzziness and fuzzy resolution, fuzzy relations
Text Books:
1. Fakhreddine O. Karray, Clarence De Silva, “Soft Computing and Intelligent Systems Design: Theory,
Tools and Applications”, Pearson Education, New Delhi.
Chapters: 1, 2, 4, 5, 7 and 8.
2. Jyh-Shing Roger Jang, Chuen-Tsai Sun, Eiji Mizutani, “Neuro-Fuzzy and Soft Computing: A
Computational Approach to Learning and Machine Intelligence”, 1996, PHI Learning Pvt. Ltd. New
Delhi.
Reference Books:
1. S. N. Sivanadam, S. N. Deepa, “Principles of Soft Computing”, First Edition, 2008, Wiley India Pvt. Ltd.
New Delhi.
2. Frank Hoffmann, M. Köppen, F. Klawonn, R. Roy, “Soft Computing: Methodologies and Applications”,
2006, Springer, New Delhi.
3. D. K. Prathihar, “Soft Computing”, 2007, Narosa Publication, New Delhi.
4. A. K. Srivastava, “Soft Computing”, 2009, Morgan & Claypool / Narosa, New Delhi.
5. N. K. Sinha, “Soft Computing and Intelligent Systems: Theory and Applications”, 2009, Elsevier India
Pvt. Ltd, New Delhi.
MCA507A INTERNET OF THINGS (IoT)
MODULE I
Introduction to Internet of Things Introduction-Definition & Characteristics of IoT , Physical Design of
IoT- Things in IoT , IoT Protocols, Logical Design of IoT- IoT Functional Blocks, IoT Communication
Models, IoT Communication APIs , IoT Enabling Technologies- Wireless Sensor Networks , Cloud
Computing, Big Data Analytics , Communication Protocols , Embedded Systems, IoT Levels &
Deployment Templates.
MODULE II
Domain Specific IoTs Home Automation: Smart Lighting, Smart Appliances, Intrusion Detection,
Smoke/Gas Detectors, Cities-Smart Parking, Smart Lighting, Smart Roads, Structural Health
Monitoring, Surveillance, Emergency Response, Environment-Weather Monitoring, Air Pollution
Monitoring, Noise Pollution Monitoring, Forest Fire Detection , River Floods Detection , Energy- Smart
Grids , Renewable Energy Systems , Prognostics , Retail-Inventory Management , Smart Payments ,
Smart Vending Machines , Logistics-Route Generation & Scheduling , Fleet Tracking , Shipment
Monitoring , Remote Vehicle Diagnostics, Agriculture-Smart Irrigation ,Green House Control ,Industry
-Machine Diagnosis & Prognosis Indoor Air Quality Monitoring ,Health & Lifestyle -Health & Fitness
Monitoring, Wearable Electronics IoT and M2M Introduction, M2M-Difference between IoT and M2M,
SDN and NFV for IoT-Software Defined Networking , Network Function Virtualization
MODULE III
IoT Platforms Design Methodology IoT Design Methodology-Purpose & Requirements
Specification ,Process Specification, Domain Model Specification, Information Model Specification ,
Service Specifications , IoT Level Specification, Functional View Specification , Operational View
Specification , Device & Component Integration , Application Development, Case Study on IoT
System for Weather Monitoring, Motivation for Using Python IoT Physical Devices & Endpoints What
is an IoT Device-Basic building blocks of an IoT Device, Exemplary Device: Raspberry Pi, About the
Board, Linux on Raspberry Pi , Raspberry Pi Interfaces – Serial, SPI , I2C , Programming Raspberry
Pi with Python-Controlling LED with Raspberry Pi , Interfacing an LED and Switch with Raspberry
Pi ,Interfacing a Light Sensor (LDR) with Raspberry Pi , Other IoT Devices- pcDuino, Beagle Bone
Black , Cubieboard
MODULE IV
IoT & Beyond: Use of Big Data and Visualization in IoT, Industry 4.0 Concepts. Overview of RFID,
Low-power design (Bluetooth Low Energy), range extension techniques (data mining and mesh
networking), and dataintensive IoT for continuous recognition applications. Overview of Android / IOS
App Development tools & Internet Of Everything
Text Books: Internet of Things, A Hand Approach, by Arshdeep Bahga & Vijay audisetti, University
Press.
Reference Books: The Internet of Things, by Michael Millen, Pearson
MCA 507B
MARKETING MANAGEMENT
Module- I: Definition & Functions of Marketing : Scope of Marketing, Core concepts of marketing
such as Need, Want, Demand, Customer Value, Exchange, Customer Satisfaction, Customer Delight,
Customer Loyalty, Marketing v/s Market, Selling versus Marketing, Concept of Marketing Myopia. 80:
20 Principle, Introduction to the Concept of Marketing Mix, Bottom of the pyramid concept
Module-II: Concept of Marketing Environment: Macro and Micro, Need for analyzing the Marketing
Environment. Segmentation: Definition, Need for segmentation, Benefits of segmentation to
marketers, Bases for market segmentation of consumer goods & industrial goods, Criteria for
effective segmentation. Target Market: Concept of Target Market and criteria for selection of target
market.Positioning: Concept of Differentiation & Positioning, Introduction to the concepts of Value
Proposition & USP. Meaning & importance of consumer behavior, Comparison between
Organizational Buying behavior and consumer buying behavior, Buying roles, Five steps buyer
decision process.
Module – III: Product :Meaning of product, Goods & Services Continuum, Classification of consumer
products and industrial products, Product Mix: Length, Width, Depth and Consistency.
New Product Development & Product Life Cycle : New Product Development Process: Idea
Generation to commercialization. Product Life Cycle : Concept & Characteristics of Product Life
Cycle.Relevance of PLC and Strategies across stages of the PLC.Branding: Introduction to
Branding, Product Vs. Brand, Meaning of a brand, brand equity & brand elements. Packaging
&Labeling : Meaning & role of Packaging & Labeling,
Pricing Basics: Meaning, Importance and Factors Influencing pricing decisions. Setting the Price:
Setting pricing objectives, Determining demand, Estimating costs, Analyzing competitors’ pricing,
Selecting pricing method, Pricing approaches
Module-IV: Place: The Role of Marketing Channels: Channel functions & flows, channel levels.
Channel Design Decisions: Analyzing customers’ desired service output levels, establishing
objectives & constraints, Identifying & evaluating major channel alternatives, Channel conflicts and
resolution ( Overview only). Channel Options: Introduction to Wholesaling, Retailing, Franchising,
Direct marketing, E-Commerce Marketing Practices.
Reference Books
Marketing: Baines, Fill and Page ,Sinha , Oxford
Marketing Management – Kotler, Keller, Koshy, Jha, Pearson,
Marketing by Lamb Hair Sharma, Mc Daniel Cengage Learning
Marketing Management, Ramaswamy&Namakumari, McGrawHill
Marketing Management – K Karunakaran, Himalaya Publishing House
Marketing Management – Text and Cases, Tapan K Panda, Excel Books
Marketing Management – J.P Mahajan ,Vikas
Marketing Management -Rudani , Schand
MCA 507C
ENVIRONMENTAL ENGINEERING
Module-I: Definition, Scope and importance, Need for public awareness, Natural Resources and
associated problems, Conservation of natural resources, Equitable use of resources for sustainable
lifestyles.
Module-II: Ecosystem; Concept, structure and function, energy flow in ecosystem, ecological
succession, Food chain, food webs, ecological pyramids; forest ecosystem, Grass land ecosystem,
desert ecosystem, aquatic ecosystem. Biodiversity and its conservation
Module III: Environmental pollution: Definition,Causes and effects and control, Role of individual in
prevention of pollution, Disaster management.
Module IV: Social issues of the environment, Issues involved in enforcement of environmental
legislations. Public awareness, Human population and the environment, environmental reengineering.
Suggested readings:
1. Environmental Studies, Basak
MCA 507 D
ENTREPRENEURSHIP DEVELOPMENT
ModuleI: UnderstandingEntrepreneurship
ConceptofEntrepreneurship,MotivationforEconomicDevelopmentandEntrepreneurial
Achievement,EnterpriseandSocietyEntrepreneurialtraitsandskills,Entrepreneurialsucce
ssandfailures,Mentoring.
ReferenceBooks:
1. EntrepreneurialDevelopment,S.S.Khanka, SChand
2. Entrepreneurship,David H Holt,PHI
3. TheDynamicsofEntrepreneurialDevelopment&Management,VasantDesai,HPH.
4. Entrepreneurship,Roy,Oxford
5. Entrepreneurship,Hisrich,Peters,Shepherd,TMH
MCA507E
SOFTWARETESTING
UNITI:INTRODUCTION
Testing as anEngineeringActivity–RoleofProcessinSoftwareQuality–TestingasaProcess–
BasicDefinitions-SoftwareTestingPrinciples-TheTester’sRoleina
SoftwareDevelopmentOrganization–OriginsofDefects-DefectClasses-
TheDefectRepositoryandTestDesign-
DefectExamples–.Developer/TesterSupportforDevelopingaDefectRepository
UNITII: TESTCASEDESIGN
IntroductiontoTestingDesignStrategies–TheSmarterTesterTestCaseDesign
StrategiesUsingBlackBox ApproachtoTestCaseDesignRandom testing –Requirementsbased
testing positive andnegative testing Boundary Value Analysis–decisiontables-
EquivalenceClass Partitioningstate-basedtesting-cause-
effectgraphingerrorguessingcompatibilitytestinguserdocumentationtesting
domaint estingUsingWhite–BoxApproachtoTestdesign-TestAdequacyCriteria-
statictestingvs.structuraltesting-codefunctionaltestingCoverageandControlFlow
GraphsCoveringCodeLogic-PathsTheirRoleinWhite–boxBasedTestDesign-
codecomplexitytestingEvaluatingTestAdequacyCriteria.
CONTROLLINGANDMONITORING
Softwaretestautomation-skillsneededforautomation-
scopeofautomationdesignandarchitectureforautomation-requirementsforatesttool-
challengesinautomationTestmetricsandmeasurements-
project,MeetingsReportsandControlIssues-
CriteriaandproductivitymetricsStatusprogressforTestCompletion-SCM–Typesofreviews-
Developingareviewprogram-ComponentsofReviewPlans–Reporting
ReviewResults.Evaluatingsoftware qualitydefectpreventiontestingmaturitymodel
TEXT BOOKS:
1. Srinivasan Desikan and Gopalaswamy Ramesh, “Software Testing – Principles andPractic
es”, Pearson education, 2006.
2. Aditya P.Mathur, “Foundations of Software Testing”, Pearson Education,2008.
REFERENCES:
1. Boris Beizer, “Software Testing Techniques”, Second Edition,Dreamtech, 2003
2. Elfriede Dustin, “Effective Software Testing”, First Edition, Pearson Education, 2003.
3. Renu Rajani, Pradeep Oak, “Software Testing Effective Methods, Tools andTechniques”, T
ata McGraw Hill, 2004.
MCA 507 F
UNIT I:
Open Source Definition, The distribution terms of open source software, open source technology
importance, Free and Open Source Software ( FOSS ), LAMP ( Linux, Apache, MySQL, PHP,
Python, and Perl.). Benefits, Perspectives of Open Source software Linux and Open Source, Linux
Usage Basics: Logging into the system, changing users and editing text files. Running Commands
and Getting Help, Browsing the File system, Users, Groups and permissions
UNIT II:
Installation of Linux interactively, Perform user and group administration, Administer the Linux printing
subsystem, Automate tasks with at, cron, Install, update, query and remove software packages with
RPM. Accessing and Running Applications: cc compiler,gcc Compiler,
Mozilla Firefox. Multimedia in Linux: Listening to Audio, Playing video, Using Digital
Camera, Recording music / video CDs. Publishing: Open office, Working with Graphics, Printing
Documents, Displaying documents with Ghostscript and Acrobat, Using Scanners driven by SANE.
UNIT III:
Introduction to Web server.Installing Apache on Linux: httpd service. PHP: Testing Installation. Basics
of PHP scripts, Variables, Data types, Operators and Expressions, Constants, Flow control functions,
If statement, Loops, Arrays, Strings, Dates and Times,Forms
UNIT IV:
MySQL : Configuring MySQL Server, working with MySQL Databases, MySQL Tables, SQL
Commands – INSERT, SELECT, UPDATE, REPLACE, DELETE. Date and Time functions in MySQL.
PHP – MySQL Application Development : Connecting to MySQL with PHP, Inserting data with PHP,
Retrieving data with PHP. Developing PHP scripts for dynamic web page like feed backform,online
admission form,online test.
TOTAL: 40 HOURS
TEXT BOOKS:
1. Open Source Web Development with LAMP: Using Linux, Apache, MySQL, Perl, and PHP
James Lee, Brent Ware. Pub: Addison Wesley
2. Professional LAMP: Linux, Apache, MySQL and PHP5 Web Development, Jason Gerner,
Morgan Owens, Elizabeth Naramore, Matt Warden, Wrox Publication
REFERENCES:
1. Red Hat Linux Bible Christopher Negus Wiley Publishing ISBN : 0-7645-4333-4
2. PHP, MySQL and Apache Julie C Meloni Pearson Education ISBN : 81-297-0443-9
3. The Complete Reference Linux Peterson Tata McGRAW HILL ISBN : 0-07-044489-7
UNIX using Linux Jack Dent, Tony Gaddis, Pub: Course Technolog ( Thomson Learning), ISBN
: 981-240-218-7
MCA 507G
E – GOVERNANCE AND PRACTICES