Scheme of Study BS (IT) 2019-23
Scheme of Study BS (IT) 2019-23
Scheme of Study BS (IT) 2019-23
GC UNIVERSITY, FAISALABAD
Scheme of Study BS (IT) Session 2019-23
BS Information Technology
Semester 1
5. Islamic Studies
Semester 2
2. Communication Skills:
3. Discrete Structures:
Course Name: Discrete Structures
Credit Hours: 3
Prerequisites: None
Course Outline:
Mathematical reasoning: introduction to logic, propositional and predicate
calculus; negation disjunction and conjunction; implication and equivalence;
truth tables; predicates; quantifiers; natural deduction; rules of Inference;
methods of proofs; use in program proving; resolution principle; Set theory:
Paradoxes in set theory; inductive definition of sets and proof by induction;
Relations, representation of relations by graphs; properties of relations,
equivalence relations and partitions; Partial orderings; Linear and wellordered
sets; Functions: mappings, injection and surjection, composition of
functions; inverse functions; special functions; Peano postulates; Recursive
20
function theory; Elementary combinatorics; counting techniques; recurrence
relation; generating functions.
Graph Theory: elements of graph theory, Planar Graphs, Graph Colouring,
Euler graph, Hamiltonian path, trees and their applications.
Reference Materials:
1. Discrete Mathematical Structure with Application to Computer Science, J.
P. Temblay and B Manohar, McGraw-Hill, 2nd Edition.
2. Discrete Mathematics, 7th edition, Richard Johnson Baugh, 2008,
Prentice Hall Publishers.
3. Discrete Mathematics and Its Applications, 6th edition, Kenneth H. Rosen,
2006, McGraw-Hill Book Co.
4. Discrete Mathematical Structures, 4th edition, Kolman, Busby & Ross,
2000, Prentice-Hall Publishers.
5. Discrete and Combinatorial Mathematics: An Applied Introduction, Ralph
P. Grimaldi, Addison-Wesley Pub. Co., 1985.
6. Logic and Discrete Mathematics: A Computer Science Perspective by
Winifred Grassman, Jean-Paul Tremblay, Winifred Grassman, Prentice
Hall, 1995
4. Pakistan Study:
5. Basic Electronics:
Semester 3
3. Technical Writing:
4. Computer Networks
Course Name: Computer Networks
Credit Hours: 3
Prerequisites: None
Course Outline:
Data Communication concepts, Analogue and digital Transmission, Noise,
Media, Encoding, Asynchronous and Synchronous transmission. Network
system architectures (OSI, TCP/IP), Error Control, Flow Control, Data Link
Protocols, Bridging. Local Area Networks and MAC Layer protocols,
Multiplexing, Switched and IP Networks, Inter-networking, Routing. Transport
layer protocols TCP, UDP and SCTP. Application Layer Protocols. Wireless
LANs.
Lab exercises using tools such as Wireshark, OpNet, Packet tracer etc.
131
Reference Materials:
1. Data Communications and Networking, by Behrouz A. Forouzan,
McGraw-Hill Science; 5th edition (February 17, 2012). ISBN-10:
0073376221
2. Data and Computer Communications by William Stallings, Prentice Hall;
9th Edition (August 13, 2010). ISBN-10: 0131392050
3. Computer Networks by Andrew S. Tanenbaum and David J. Wetherall,
Prentice Hall; 5th Edition (October 7, 2010). ISBN-10: 0132126958
4. Computer Networks and Internets by Douglas E. Comer, Prentice Hall; 5th
Edition (April 28, 2008). ISBN-10: 0136066984
Visual Programming
Credit Hours: 3(3,0)
Course Outline:
Visual Programming Basics; Introduction to Events; Fundamentals of Event-driven
Programming, message handling, user interfaces, graphics device interface, painting and
drawing, windows management, input devices, resources, string and menu resource,
dialogs and windows controls, common controls, dynamic link libraries, threads and
synchronization, network programming, Building Class Libraries at the Command Line,
Class Libraries, Using References, Assemblies, Private Assembly Deployment, Shared
Assembly Deployment, Configuration Overview, Configuration Files, Programmatic
Access to Configuration, Using SDK Tools for Signing and Deployment, Metadata,
Reflection, Late Binding, Directories, Files, Serialization, Attributes, Memory
Management and Garbage Collection, Threading and Synchronization, Asynchronous
Delegates, Application Domains, Marshal by Value, Marshal by Reference,
Authentication and Authorization, Configuring Security, Code Access Security, Code
Groups, Evidence, Permissions, Role-Based Security, Principals and Identities, Using
Data Readers, Using Data Sets, Interacting with XML Data, Tracing Event Logs, Using
the Boolean Switch and Trace Switch Classes, Print Debugging Information with the
Debug Class, Instrumenting Release Builds with the Trace Class, Using Listeners, and
Implementing Custom Listeners.
Reference Materials:
1. Visual C#: How to Program, Deitel and Deitel, 6/e Edition, Prentice Hall / Pearson
Education, 2017.
2. Programming in C# .NET, J.C. Bradley, A.C. Millspaugh, McGraw-Hill, 2014
3. Microsoft Visual C# 2013 Step by Step (Step by Step Developer), Sharp, J., 1st Edition
(2013), Microsoft Press.
IT Elective-1 3(3-0)
Linear Algebra:
IT Elective-2 3
IT Elective-3 3
Reference Materials:
1. Computer Security: Art and Science, Matthew Bishop
2. Cryptography and Network Security by William Stalling 6th Edition, 2012
3. Principles of Information Security 3rd E by Michael E. Whitman and
Herbert J. Mattord
Semester 7
IT Elective-4 3(3-0)
IT Elective-5 3(3-0)
Reference Materials:
1. Modeling and Simulation, Bungartz, H.-J., Zimmer, S., Buchholz, M., Pflüger, D.,
Springer-Verlag, 2014.
2. Simulation Modeling Handbook, A Practical Approach, Christopher A. Chung,
CRC Press, 2004.
3. System design, modeling and simulation using Ptolemy II, Claudius Ptolemaeus, ,
Ver 2.0, Creative Commons Attribution-ShareAlike 3.0 Unported, 2014
4. Applied Simulation Modeling, Andrew F. Seila, Vlatko Ceric, Pandu Tadikamalla,
Thomson Learning Inc., 2003.
Cyber Security
Credit Hours: 3 (3,0)
Course Content:
Basic security concepts, Information security terminology, Malware classifications,
Types of malware. Server side web applications attacks. Cross-site scripting, SQL
Injection, Cross-site request forgery, Planning and policy, Network protocols and
service models. Transport layer security, Network layer security, Wireless security,
Cloud & IoT security.
Reference Materials:
Principle of Marketing: