BCA - V and VI Sem 2021-2022 Schema
BCA - V and VI Sem 2021-2022 Schema
BCA - V and VI Sem 2021-2022 Schema
Scheme of Scheme of
Course Contact
S.No Course Title Exam Examination
Code Hour/week No. of
Category Duration(hrs) (Max Marks)
Credits
THEORY L T P SEE CIE SEE CIE
PRACTICALS
6 BCA350 OOSD Lab LTC 0 0 4 2 3 1 50 25
7 BCA351 Unix Programming Lab LPC 0 0 4 2 3 1 50 25
8. BCA 352 DOT NET Lab LCC 0 0 4 2 3 1 50 25
TOTAL 20 0 12 26 500 225
UNIT-I
Asp.Net Overview- Introduction to ASP.Net, Introduction to web Applications with web servers,
web server role-IIS,APACHE etc, Web-browsers, web support languages, understanding ,http,
TCP/IP role in web development.ASP.Net role:-ASP.Net framework, Name spaces ,New scenario in
development process with IDE.
UNIT-II
ASP.Net web forms-Introduction to web forms, page directives and its use, separating code &
design, new code behind techniques, ASP.Net server controls-Working with server controls,
applying styles to controls, themes, skins etc.
UNIT-III
Web form validation controls-Required field validation Control Computer Validation Control,
Custom Validation Control, Group Validation and Accounting Validation.ADO.Net Database
Services- Overview of ADO.Net XML, XML to HTML, XML & Databases XML Support in .Net
retrieve data with datasets & Data Adapters.
UNIT-IV
Presenting Data Using ASP.Net-Bound Controls- Data Source Controls, Repeater and its uses, Data
list control, data grid control view and its importance, form view detail’s view, list view. User
controls- Adding member to user controls , registering user control ,properties & methods
,Dynamically loading user controls, master pages.
UNIT-V
ASP .Net Error Handling & Debug- Error handling & .Net returns, Structured Error handling,
Catching General Exception, Catching Specific Exceptions, Throwing Exception Custom Exceptions
,Page level Error handling, Application level Error Handling. Configuring ASP.Net- Web machine
Configuration, Global Assembly cache, working with Assembling information, Managing
Application State, Http handlers, Applications & Server Events.
Suggested Readings:
Credits: 4
UNIT-I
Unix: Introduction, commands, file system, security and file permission, regular expression and
grep, shell programming, awk
UNIT-II
The Unix Model, signal, process control, daemon process. Inter process Communication:
Introduction, file and record locking, other Unix locking techniques, pipes, FIFOs, streams
and messages, namespaccs, message queues, semaphores and shared memory.
UNIT-III
Socket programming, Socket address, elementary socket system calls, advanced socket system calls,
reserved ports, socked options, asynchronous I/O, Input/ Output Multiplexing, out-off band. data,
sockets and signals, Internet super server.
UNIT-IV
Introduction to PHP: Overview, syntactic characteristics, primitives, operations and expressions,
output, control statements, arrays, functions. pattern matching, form handling files, cookies and
session tracking.
UNIT-V
Python Basics, Python Objects, Numbers, Sequences: Strings, Lists, and Tuples, Mapping and Set
Types, Conditionals and Loops, Files and Input/ Output, Errors and Exceptions, Functions and
Functional Programming, Modules, Object oriented programming.
Suggested Readings:
1. Behrouz A. Forouzan and Richard F. Gilberg, "Unix and Shell Programming: a Text book"
Cengage learning, 2008.
2. W. Richard Stevens, "Unix Network Programming", Pearson Education, 2009.
3. Robert W. Sebesta, "Programming the World Wide Web", Pearson Education, 2008.
4. Wesley J. Chun, "Core Python Programming", Prentice Hall.
5. Sumitabha Das, "Unix concepts & Applications", Fourth Edition, Tata McGraw hill, 2006.
BCA 503 OBJECT ORIENTED SYSTEM DEVELOPMENT
Credits: 4
UNIT-I
UML Introduction : Why we model, Introducing the UML, Hello World. Basic Structural
Modeling Classes, Relationships, Common Mechanisms, Diagrams, Class Diagrams. Advanced
Structural Modeling : Advanced Classes, Advanced Relationships, Relationships, Interfaces, Types
and Roles, Packages, Instances, Object Diagrams , Components.
Unit-II
Basic Behavioral Modeling: Interactions, Use Cases, Use Case Diagrams, Interaction Diagrams,
Activity Diagrams. Advanced Behavioral Modeling: Events and signals, State Machines,
Processes and Threads, Times and space, State Chart Diagrams.
Unit-III
Architectural Modeling: Artifacts, Deployment Collaborations, Patterns and Frame works, Artifact
diagrams, Deployment diagrams, Systems and models.
Unit-IV
Unified Software Development Process: The Unified Process, The Four Ps, A Use- Case- Driven
Process, An Architecture, An Architecture – Centric Process, An Iterative and incremental Process.
Unit-V
Core Workflows: Requirements Capture , Capturing Requirements as Use Cases, Analysis, Design,
Implementation, Test.
Suggested Reading:
1. Grady Booch, James Rumbaugh, Ivor Jacbson, The Unified Modeling Language –
User Guide,(Covering UML 2.0) 2nd Edition , Pearson Education, India, 2007.
2. Ivor Jacbson, Grady Booch, James Rumbaugh, The Unified Software Development Process,
Pearson Education, India, 2008.
BCA504 SOFTWARE QUALITY AND TESTING
Credits: 4
UNIT I
INTRODUCTION TO SOFTWARE QUALITY Ethical Basis for Software Quality – Total Quality
Management Principles – Software Processes and Methodologies – Quality Standards, Practices &
Conventions –Improving Quality with Methodologies – Structured/Information Engineering – Measuring
Customer Satisfaction– Software Quality Engineering – Defining Quality.
UNIT II
SOFTWARE QUALITY METRICS AND RELIABILITY Writing Software Requirements and Design
Specifications – Analyzing Software Documents using Inspections and Walkthroughs – Software Metrics –
Lines of Code, Cyclamate Complexity, Function Points, Feature Points – Software Cost Estimation.
UNIT III
TEST CASE DESIGN Testing as an Engineering Activity – Testing Fundamentals – Defects – Strategies and
Methods for Black Box Test Case Design – Strategies and Methods for White-Box Test Case Design – Test
Adequacy Criteria – Evaluating Test Adequacy Criteria – Levels of Testing and different Types of Testing .
UNIT IV
TEST MANAGEMENT Testing and Debugging Goals and Policies – Test Planning – Test Plan Components
– Test Plan Attachments – Locating Test Items – Reporting Test Results – The Role of Three Groups in Test
Planning and Policy Development – Process and the Engineering.
UNIT V
CONTROLLING AND MONITORING Measurement and Milestones for Controlling and Monitoring –
Status Meetings – Reports and Control Issues – Criteria for Test Completion – SCM – Types of Reviews –
Developing a Review Program – Components of Review Plans – Reporting Review Results.
Suggested Readings:
UNIT-I
Applications, history of mobile communications, reference model Wireless transmission - Frequencies,
Signals, Antennas, Signal propagation, Multiplexing Modulation, Spread spectrum, cellular systems
Medium access layer - Motivation, SOMA, FDMA, COMA Wireless LAN - Infrared vs radio
transmission, infrastructure, IEEE802.11. HIPERLAN, Bluetooth
UNIT-II
Key services for mobile internet. Mobile IP - Goals, assumptions, requirements, entities, IP packet
delivery. Agent advertisement and discovery, Registration. Tunneling. Optimization, reverse tunneling,
DHCP, Adhoc networks, Mobile transport Layer - Traditional TCP, Indirect TCP .Snooping TCP, Mobile
TCP, Fast transmit Fast recovery, Transmission timeout freezing, transaction oriented TCP
UNIT-III
Wireless Application Protocol - Overview of WAR WAP architecture, components. Network
infrastructure Design principles WML - Document model, Basics, basic content, events, tasks and
binding, variables, other content, controls, application security, other data
UNIT-IV
Wireless binary extensible markup language WML Script - language basics, standard libraries, script
libraries, script development User interface design - structured usability methods, design guidelines - user
interface, selected WML elements
UNIT-V
Tailoring content to client Push messaging Wireless telephony applications Building and deploying
End-to-End WAP services
Suggested Reading
1. Sundeep Singh etc. Wireless Application Protocal - Addison Wesley 2001
2. Jochen Schiller - Mobile communications, Addison-Wesley 2001
BCA 511 INTERNET PROTOCOLS
Credits 4
Instruction: (4L) hrs per week Duration of SEE: 3 hours
CIE: 30 marks SEE: 70
marks
UNIT-I
UNIT-II
Internet Protocol - Datagram, Fragmentation, Options, Checksum.
ARP and RARP –ARP, Packet Format, Encapsulation, Operation, Proxy ARP, RARP Packet
Format.
Internet Control Message Protocol (ICMP) - Types of Messages, Message Format, Error
Reporting, Query.
Transmission Control Protocol (TCP) - Process To Process Communication, Services, Segment,
Options, Checksum, Flow Control, Error Control, Timers, Connection.
UNIT-III
Routing Protocols:
OSPF- Areas, Metric, Link State Routing, Types of Links.
BGP-Path Vector Routing-Path Vector Messages.
Client-Server Model - Concurrency, BOOTP, DHCP.
Domain Name System (DNS) - Name Space, Domain Name Space, Distribution, DNS in Internet.
UNIT-IV
Telnet- Concepts, NVT, Options, Escape Character, Mode of Operation, User Interface, Rlogin.
File Transfer Protocol (FTP)-Connections, Communication, Command Processing, File Transfer.
Simple Mail Transfer Protocol (SMTP) - User Agent, Addresses, Delayed Delivery, Aliases,
MTA, Commands and Responses, Mail Transfer Phases, Mime, Pop.
Next Generation Ipv6:Ipv6, Addresses, Packet Format, Comparison between Ipv4 and Ipv6
Headers
Suggested Readings:
1. Behrouz A. Forouzan - TCP/IP Protocol suite, McGraw 2000.
2. Douglas E .Comer, TCP/IP Protocol suite, 2004, Prentice Hall India Publications.
3. Libor Dostalele, TCP/IP Protocol suite, 2006, Pearson New International Edition.
BCA 512 DATA MINING
Credits 4
Instruction: (4L) hrs per week Duration of SEE: 3 hours
CIE: 30 marks SEE: 70
marks
UNIT I
UNIT II
UNIT III
UNIT IV
UNIT V
APPLICATIONS AND TRENDS IN DATA MINING: Applications and Trends in Data Mining:
Data Mining Applications – Products And Research Prototypes – Additional Themes on Data Mining
– Social Impacts of Data Mining
Suggested Readings:
1. Jiawei Han and Micheline Kamber, “Data Mining – Concepts and Techniques”,
Second Edition, Morgan Kaufmann Publishers, 2006.
Students have to perform the following OOSD steps for the given List of Programs:
Select one Information System/Approach and device the following using UML
tool:
1. Structured Diagrams (Data Flow Diagrams, Entity-Relationship Diagrams etc..)
2. Preparation of Software Requirement Specification Document for a given Case Study.
UML Diagrams
1. Use Case Diagrams
2. Class Diagrams
3. Object Diagrams
4. Sequence Diagrams
5. Collaboration Diagrams
6. Activity Diagrams
7. State Chart Diagrams
8. Component Diagrams
9. Deployment Diagrams
BCA 551 UNIX PROGRAMMING LAB
Credits: 2
SEMESTER - VI
Scheme of Scheme of
Course Contact
S.No Course Title Exam Examination
Code Category Hour/week Credits Duration(hrs) (Max Marks)
Theory L T P SEE CIE SEE CIE
1 BCA601 Information Security ETC 4 0 0 4 3 1 70 30
2 BCA602 Advanced JAVA ETC 4 0 0 4 3 1 70 30
Elective-II
BCA 604
Big Data Analytics
3 BCA# PEC 4 0 0 4 3 1 70 30
BCA 605 Artificial
Intelligence
BCA 606 Cloud Computing
PRACTICALS
Advanced Java
4 BCA680 LTC 0 0 4 2 3 1 50 25
Programming-Lab
6 BCA682 Project work PC 0 0 14 7 - - 100 50
TOTAL 16 0 16 21 360 165
BCA 601 INFORMATION SECURITY
Credits: 4
UNIT-I
Introduction: History, Critical characteristics of information, NSTISSC security model, Components
of an information system, Securing the components, Balancing security and access, The SDLC, The
security SDLC. Need for Security: Business needs, Threats, Attacks- secure software development.
UNIT-II
Legal, Ethical and professional Issues: Law and ethics in information security, Relevant U.S
laws international laws and legal bodies, Ethics and information security.
Risk Management: Overview, Risk identification, Risk assessment, Risk control strategies, selecting
a risk control strategy, Quantities versus qualitative risk control practices, Risk management
discussion points, Recommended risk control practices.
UNIT-III
Planning for Security: Security policy, Standards and practices, Security blue print, Security
education, Continuity strategies. Security Technology Firewalls and VPNs: Physical design,
Firewalls, Protecting remote connections
UNIT-IV
Security Technology: Intrusion detection, access control and other security tolls: Intrusion detection
and prevention systems, Scanning and analysis tools, Access control devices.
Cryptography: Foundations of cryptology, Cipher methods, Cryptographic Algorithms,
Cryptographic tools, Protocols for secure communications, Attacks on cryptosystems.
UNIT- V
Implementing Information Security: Information security project management, Technical topics of
implementation, Non technical aspects of implementation, Security certification and accreditation.
Security and Personnel: Positioning and staffing security function, Employment policies and
practices, Internal control strategies. Information security maintenance : Security management
models, The maintenance model, Digital forensics
Suggested Reading:
1. Michel E With man and Herbert J Mattord, Principles and Practices of
Information Security, Cengage Learning, 2009.
2. Thomas R Peltier, Justin Peltier, John Blackley, Information Security
Fundamentals, Auerbach Publications, 2010.
3. Detmar W Straub, Seymour Goodman, Richard L Baskerville, Information Security, Policy,
Processes and Practices, PHI , 2008.
BCA 602 ADVANCED JAVA PROGRAMMING
Credits: 4
Unit-1
Introducing JDBC: Describing Components of JDBC , Features of JDBC , JDBC Architecture:
Types of Divers, Advantages and disadvantages of Drivers ,Use of Drivers , JDBC Statement and
Methods: Statement ,Prepared Statement ,Callable Statement ,Working with Result set interface ,
Working with Result set with metadata
Unit-2
Introducing CGI , Introducing Servlet , Advantages of Servlet over CGI , Features of Servlet ,
Introducing Servlet API :Javax.servlet package , Javax.servlet.http package ,Servlet life
,Working with GenericServlet and Http Servlet , Request Dispatcher interface ,Use of Request
Dispatcher , Session in Servlet: Introducing session , Session tracking mechanism ,Cookies :
Advantages & disadvantages ,use of cookies , Hidden form filed ,URL rewritten , Http Session.
Unit-3
Introduction to JSP :Advantages of JSP over Servlet , JSP architecture , JSP life cycle , Implicit
objects in JSP,JSP tag elements‐ Declarative, Declaration, scriplet, expression, action. Java
Bean‐ Advantages & Disadvantages, useBean tag‐ setProperty and getProperty , Bean In Jsp
Unit-4
JSTL core tag: General purpose tag, conditional tag, networking tag ,JSTL SQL tags , JSTL
formatting tags , JSTL xml tags ,Custom tag: empty tag, body content tag, iteration tag, simple tag ,
Introducing internationalization & Java: local class, Recourse Bundle class, web application
Unit – V
Working with JSF, Java Server Faces, Web Design Patterns, Security in web Application,
Introduction to Frameworks in java: struts, springs, hibernate.
Suggested Reading:
1. JDBC, Servlets and JSP Black Book, Dreamtech Publication, Santhosh Kumar.k
BCA 603 BIG DATA ANALYTICS
Credits: 4
Unit- I
Introduction: What Is Big Data and Why Is It Important? A Flood of Mythic “Start-Up” Proportions,
Big Data Is More Than Merely Big Why Now? A Convergence of Key Trends , Relatively Speaking
, A Wider Variety of Data, The Expanding Universe of Unstructured Data.
Unit-II
Big Data Technology: The Elephant in the Room: Hadoop’s Parallel World. Old vs. New
Approaches, Data Discovery: Work the Way People’s Minds Work, Open-Source Technology for
Big Data Analytics, The Cloud and Big Data, Predictive Analytics Moves into the Limelight.
Unit-III
A Brief History of Hadoop, Apache Hadoop and the Hadoop Ecosystem. MapReduce: Analyzing
the Data with Hadoop, Map and Reduce, Java MapReduce, Scaling Out, Data Flow, Combiner
Functions, Running a Distributed Map Reduce Job, Hadoop Streaming, The Hadoop Distributed File
system ,The Design of HDFS, HDFS Concepts, Blocks, Name nodes and Data nodes
Unit-IV
HDFS Federation, HDFS High-Availability, The Command-Line Interface, Basic File system
Operations, Hadoop Files stems. Information Management: The Big Data Foundation, Big Data
Computing Platforms, Big Data Computation, More on Big Data Storage, Big Data Computational
Limitations
Unit-V
Big Data Emerging Technologies, Business Analytics : The Last Mile in Data Analysis, Geospatial
Intelligence Will Make Your Life Better, Consumption of Analytics, From Creation to Consumption,
Data Privacy and Ethics : The Privacy Landscape, The Great Data Grab Isn’t New, Preferences,
Personalization, and Relationships, Rights and Responsibility
Suggested Readings:
1. Michael Minelli, Michele Chambers, Big Data, Big Analytics, Wiley Publications, 2013
2. Tom White, Hadoop: The Definitive Guide, 3/e, O'Reilly Publications. (MODULE –III)
3. Bill Franks, Taming The Big Data Tidal Wave, 1/e, Wiley, 2012. 2. Frank J. Ohlhorst, Big
Data Analytics, 1/e, Wiley, 2012
BCA 604 ARTIFICIAL INTELLIGENCE
Credits: 4
UNIT I
Introduction & Problem Solving: AI problems, AI Technique, Defining problem as a State Space
Search, Production Systems, Problem Characteristics, Production System Characteristics. Heuristic
Search Techniques: Generate – and – test, Hill Climbing, Best – First Search, Problem Reduction,
Constraint Satisfaction, Means-ends Analysis.
UNIT II
Game Playing: Overview, Min-Max search Procedure, Adding Alpha-beta Cutoffs, Additional
Refinements, Iterative Deepening. Knowledge Representation Issues: Approaches, Issues, Frame
Problem, Using Predicate Logic: Representing simple facts in logic, Representing Instance and ISA
Relationships, Computable Functions and predicates, Resolution, Natural Deduction.
UNIT III
Uncertainty and Reasoning Techniques Non monotonic reasoning, Logics for Non monotonic
reasoning, Implementation issues, Augmenting a problem solver, implementation of Depth First
Search and Breadth first search. Statistical reasoning Probability and Bayes theorem, Certainty
factors and Rule-based systems, Bayesian Networks, Dumpster-Shafer Theory.
UNIT IV
Learning: What is Learning, Rote learning, Learning by taking advice, Learning in problem solving,
learning from examples: Induction, Learning by Decision trees. Expert System: Representing and
Using Domain Knowledge, Expert systems shells, Explanation, Knowledge Acquisition.
UNIT V
Perception and Action: Real Time Search, Vision, Speech Recognition, ACTION: Navigation,
Manipulation, Robot architectures. Natural Language Processing: Introduction, Syntactic Processing,
Semantic Analysis, Statistical NLP, Spell Checking.
Suggested Readings:
UNIT I
Introduction to Cloud Computing: Cloud Computing in a Nutshell, System Models for Distributed
and Cloud Computing, Roots of Cloud Computing, Grid and Cloud, Layers and Types of Clouds,
Desired Features of a Cloud, Basic Principles of Cloud Computing, Challenges and Risks, Service
Models.
UNIT II
Virtual Machines and Virtualization of Clusters and Data Centers: Levels of Virtualization,
Virtualization Structures Tools and Mechanisms, Virtualization of CPU, Memory and I/O Devices,
Virtual Clusters and Resource Management, Virtualization Data-Center Automation. Case studies:
Xen Virtual machine monitors- Xen API. VMware - VMware products-Vmware Features.
UNIT III
Cloud computing architectures over Virtualized Data Centers: Data-Center design and
Interconnection networks, Architectural Design of Compute and Storage Clouds, Public Cloud
Platforms, GAE, AWS, Azure, Inter-cloud Resource Management.
UNIT IV
Cloud Security and Trust Management, Data Security in the Cloud : An Introduction to the Idea of
Data Security, The Current State of Data Security in the Cloud, CryptDb: Onion Encryption layers-
DET,RND,OPE,JOIN,SEARCH, HOM, and Homomorphism Encryption, FPE. Trust, Reputation
and Security Management.
UNIT V
Cloud Programming and Software Environments: Features of Cloud and Grid Platforms, parallel
and distributed Programming Paradigms, Programming Support of Google App Engine,
Programming on Amazon AWS and Microsoft Azure, Emerging Cloud Software Environments.
Common Standards in Cloud Computing: The Open Cloud Consortium, the Distributed Management
Task Force, Standards for Application Developers, Standards for Messaging.
Suggested Readings:
1. John W. Rittinghouse, "Cloud Computing: Implementation, Management, and Security ". James
F. Ransome, CRC Press 2009.
2. Kai Hwang. Geoffrey C.Fox, Jack J. Dongarra, “Distributed and Cloud Computing From Parallel
Processing to the Internet of Things”, Elsevier, 2012.
3. Rajkumar Buyya, James Broberg and Andrzej M. Goscinski,” Cloud Computing: Principles and
Paradigms (Wiley Series on Parallel and Distributed Computing), Wiley Publishing ©2011
BCA 651 ADVANCE JAVA PROGRAMMING LAB
Credits: 2
Sixth Semester of the MCA course is exclusively meant for project work. Project has to be carried
out by each student individually in a period of 15 weeks of duration. Students should submit a
synopsis at the end of 2nd week in consultation with the Project Guide. The synopsis should consist
of definition of the problem, scope of the problem and plan of action. After completion of eight
weeks students are required to present a Project Seminar on the topic covering the aspects of
analysis, design and implementation of the project work.
At the end of the semester the students are required to present themselves for a University Vive-voce
examination.
A committee consisting of two faculty members of the respective college along with a guide will
evaluate the project and award CIE marks.
1. Submit one page of synopsis on the project work for display on notice board.
2. Give a 20 minutes presentation followed by 10 minutes discussion.
3. Submit a technical write-up on the project.
At least two teachers will be associated with the Project Seminar to evaluate students for the award
of CIE marks which will be on the basis of performance in all the 3 items stated above.
The project seminar presentation should include the following components of the project: