MCASyll09 PDF
MCASyll09 PDF
DISTANCE EDUCATION
ANNA UNIVERSITY CHENNAI : : CHENNAI 600 025
REGULATIONS - 2009
CURRICULUM AND SYLLABI FOR I SEMESTER
SEMESTER I
PRACTICAL
DMC1916 Programming and Data Structure Lab 100
DMC1917 Database Management System Lab 100
TOTAL 700
SEMESTER II
SEMESTER III
SEMESTER V
SEMESTER VI
IV Semester M C A – Elective II
V Semester M C A – Elective IV
V Semester M C A – Elective V
SEMESTER – I
TEXTBOOK
REFERNCES
1. John .p.Hayes,”Computer Architecture and Organization”, Tata McGraw Hill,
1996.
2. V.C.Hamatcher,et al “Computer Organization”, Tata Mcgraw Hill,1996
Page 5 of 47
DMC1912 PROBLEM SOLVING AND PROGRAMMING
TEXTBOOKS
REFERNCES
UNIT I INTRODUCTION
Database Systems vs. File Systems-View of Data- Data Models-Database Languages-
Transaction Management-Database Systems Structure-History of Database Systems-
Database Systems Applications-Entity Relationship Model
REFERENCES
UNIT II TREES
Binary Trees – Operations on binary trees - Binary Tree Representations – node
representation, internal and external nodes, implicit array representation – Binary tree
Traversals - Huffman Algorithm – Representing Lists as Binary Trees
TEXTBOOK
REFERNCES
1. Robert Kruse & Clovis L. Tondo “ Data Structures and Program Design in
C”,Prentice Hall , 2nd edition.,1991.
2. Weiss “Data Structures and Algorithm Analysis in C ” ,Addison Wesley , Second
Edition, 1997.
Page 8 of 47
DMC1915 ACCOUNTING AND FINANCIAL MANAGEMENT
UNIT II ACCOUNTING
Meaning-Objectives-Elements of Cost-Cost Sheet-Marginal Costing and Cost Volume
Profit Analysis-Break Even Analysis-Applications-Limitations-Standard Costing and
Variance Analysis-Material-Labor-Overhead-Sales-Profit Variances
TEXTBOOK
REFERENCES
• Simple C programs
• Files and Structures
• Array Implementation
• Dynamic Memory allocation
• Implementation of Stacks
• Linked List Implementation
• Queue Implementation
• Implementation of Binary Search Tree and Linear Search
• Sorting Algorithm, Simple sorting and Queue Sorting
SEMESTER – II
Basic Definitions - Venn Diagrams and set operations - Laws of set theory -
Principle of inclusion and exclusion - partitions- Permutation and Combination -
Relations- Properties of relations - Matrices of relations - Closure operations on
relations - Functions - injective, surjective and bijective functions.
REFERENCES
UNIT I FUNDAMENTALS
Aggregate Type struct – Structure Pointer Operators – Unions – Bit Fields – Data
Handling and Member Functions – Classes – Constructors and Destructors –
Static Member – this Pointer – reference semantics – implementation of simple
ADTs.
UNIT IV TEMPLATES
UNIT V INHERITANCE
REFERENCES:
UNIT I INTRODUCTION
Need for SCM – Version Control – SCM process – Software Configuration Items
– Taxonomy – Case Repository – Features.
REFERENCES:
UNIT I INTRODUCTION
UNIT II ASSEMBLERS
TEXT BOOKS:
REFERENCES:
UNIT I INTRODUCTION
Case study – Design and implementation of the UNIX OS, Process model and
structure – Memory management – File system – UNIX I/O management and
device drivers – Windows – System components – Process Management –
Memory management – File Systems – Networking
REFERENCES:
1. COMMUNICATION IN BUSINESS
2. COMMUNICATION PROCESS
3. BUSINESS CORRESPONDENCE
Business letter. Memos, minutes, agendas, enquiries, orders, sales letters, notice,
tenders, letters of application, letter of complaints.
4. TECHNICAL REPORTS
5. PROJECT REPORTS
TEXT BOOKS:
REFERENCES:
1. McGraith – Basic Managerial Skills for all Prentice Hall of India – 6th Edition
2002.
2. Halliday, M.A.Ky R.Hasan, Cohesion in English, Longman, London 1976.
Page 16 of 47
1. Assemblers.
2. Linkers.
3. Loaders.
4. Features of text editors.
5. Basic UNIX commands.
6. Shell Programming.
7. Grep, sed, awk.
8. File system related system calls.
9. Process management – Fork, Exec.
10. Message queues.
11. Pipe, FIFO’s.
12. Signals.
13. Shared memory.
Page 17 of 47
SEMESTER – III
DMC 1931 COMPUTER NETWORKS
1. INTRODUCTION
2. NETWORK FUNDAMENTALS
3. NETWORK LAYER
4. TRANSPORT LAYER
TEXT BOOK
REFERENCES
REFERENCES:
UNIT I INTRODUCTION
Fundamentals of algorithmic problem solving – Important problem types –
Fundamentals of the analysis of algorithm efficiency – analysis frame work –
Asymptotic notations – Mathematical analysis for recursive and non-recursive
algorithms.
Divide and conquer methodology – Merge sort – Quick sort – Binary search –
Binary tree traversal – Multiplication of large integers – Strassen’s matrix
multiplication – Greedy method – Prim’s algorithm – Kruskal’s algorithm –
Dijkstra’s algorithm.
REFERENCES:
1. INTRODUCTION
2. 2D TRANSFORMATIONS
3. 3D TRANSFORMATIONS
4. OVERVIEW OF MULTIMEDIA
TEXT BOOKS
1. Hearn D and Baker M.P, “Computer graphics – C Version”, 2nd Edition, Pearson
Education, 2004 (unit 1, 2 &3).
2. Ralf Steinmetz, Klara steinmetz, “Multimedia Computing, Communications and
Applications”, Pearson education, 2004 (unit 4 & 5).
REFERENCES
Overview – Web Security, Privacy, and site-blocking – Audio and Video on the
web – Creating and Maintaining the Web – Web site creation concepts – Web
Page Editors – Optimizing Web Graphics – Web Audio Files – Forms,
Interactivity, and Database-Driven Web sites – File Transfer and downloading –
FTP – Peer to Peer – Downloading and Installing software.
UNIT IV PACKAGES
TEXT BOOK
1. Margaret Levine Young, “Internet and WWW”, 2nd Edition, Tata McGraw Hill,
2002. (Unit 1 & 2)
2. Herbert Schildt, The Complete Reference – Java 2 , 4th Edition, Tata McGraw
Hill, 2001. (Unit 3, 4 & 5)
REFERENCES
2. Write a C program for Line drawing using Bresenham, DDA Line Drawing
Algorithms.
8. Develop a presentation for a product using techniques like Guide Layer, masking
and onion Skin using authoring tools.
10. Demonstrate Rasterization and filtering of layers and give blending effects for a
logo
Page 24 of 47
SEMESTER IV
DMC1941 UNIX AND NETWORK PROGRAMMING
Overview of UNIX OS - File I/O – File Descriptors – File sharing - Files and
directories – File types - File access permissions – File systems – Symbolic links -
Standard I/O library – Streams and file objects – Buffering - System data files and
information - Password file – Group file – Login accounting – system identification.
2. PROCESSES
3. INTERPROCESS COMMUNICATION
4. SOCKETS
5. APPLICATIONS
Debugging techniques - TCP echo client server - UDP echo client server - Ping -
Trace route - Client server applications like file transfer and chat.
TEXT BOOKS
REFERENCE BOOKS
1. Meeta Gandhi,Tilak Shetty and Rajiv Shah “The ‘C’ Odyssey Unix –The open
Boundless C”, 1st Edition ,BPB Publications1992.
Page 25 of 47
DMC 1942 RESOURCE MANAGEMENT TECHNIQUES
TEXT BOOKS
REFERENCES
UNIT I INTRODUCTION
TEXT BOOKS
REFERENCES
1. Craig Larman, Applying UML and Patterns, 2nd Edition, Pearson, 2002.
2. Grady Booch, James Rumbaugh, Ivar Jacobson, “The Unified Modeling
Language
User Guide”, Addison Wesley Long man, 1999.
3. Bernd Bruegge, Allen H. Dutoit, Object Oriented Software Engineering using
UML,
Patterns and Java, Pearson 2004
Page 27 of 47
UNIT IV CONTROLS
Dialog Based Applications, controls – Animate control, image list, CRect tracker
– Tree control – CtabControl – Dynamic controls – slider control – progress
control – Inheriting CTreeView – CRicheditView – Modal Dialog, – Modeless
Dialog – CColorDialog – CfileDialog.
TEXT BOOKS:
1. Charles Petzold, “Windows Programming”, Microsoft press, 1996.
2. J. David Kruglirski, “Programming Microsoft Visual C++”, Fifth Edition, Microsoft
press, 1998.
3. Marion Cottingham “Visual Basic”, Peachpit Press, 1999.
REFERENCES:
1. Steve Holzner, “Visual C++ 6 programming”, Wiley Dreamtech India Private Ltd.,
2003.
2. Kate Gregory “Using Visual C++”, Prentice Hall of India Pvt., Ltd., 1999.
3. Herbert Sheildt, “MFC from the Ground Up”.
4. Deitel , “ Visual Basic 6.0 How To Program”, Pearson Education, 1999.
Page 28 of 47
DMC 1945 MIDDLEWARE TECHNOLOGIES
Client – Server – File Server, Database server, Group server, Object server, Web
server .Middleware – General middleware – Service specific middleware. Client /
Server Building blocks – RPC – Messaging – Peer – to- Peer.
2. EJB ARCHITECTURE
3. EJB APPLICATIONS
EJB Session Beans – EJB entity beans – EJB clients – EJB Deployment – Building
an application with EJB.
4. CORBA
5. COM
TEXT BOOKS
1. Robert Orfali, Dan Harkey and Jeri Edwards, “The Essential Client/Server
Survival Guide”, Galgotia Publications Pvt. Ltd., 2002. (Unit 1)
2. Tom Valesky, “Enterprise Java Beans”,Pearson Education, 2002.(Unit 2 & 3)
3. Jason Pritchard, “COM and CORBA side by side”, Addison Wesley,2000
(Unit 4 & 5)
4. Jesse Liberty, “Programming C#”, 2nd Edition, O’Reilly Press, 2002. (Unit 5)
REFERNCES
1. Socket Programming
a. TCP Sockets
b. UDP Sockets
c. Applications using Sockets
2. Simulation of Sliding Window Protocol
3. Simulation of Routing Protocols
4. RPC
5. Development of applications such as DNS/ HTTP/ E – mail/ Multi - user Chat
VB
1. Form Design – Keyboard & Mouse events
2. Programs on usage of data types - variant, Control arrays
3. Simple applications using file system controls
4. Database applications using data control.
VC++
SDK type programs for creating simple windows with different window styles
SDK type programs code for keyboard and mouse events, GDI objects.
Simple Dialog Based application – eg. Calculator, interest computation, money
conversions, etc.
Creating SDI & MDI applications, Modal and Modeless dialog.
Programming for reading and writing into documents.
Coding Dynamic controls – slider control, progress control, inheriting CtreeView
and CricheditView.
Creating static and dynamic splitter windows
Creating DLLs and using them.
Winsock and WinInet & Internet Explorer common controls.
Data access through ODBC – Cdatabase, Crecordset.
Creating ActiveX control and using it.
Page 30 of 47
SEMESTER V
DMC 1951 XML AND WEB SERVICES
1. INTRODUCTION
Role Of XML – XML and The Web – XML Language Basics – SOAP – Web
Services – Revolutions Of XML – Service Oriented Architecture (SOA).
2. XML TECHNOLOGY
3. SOAP
4. WEB SERVICES
5. XML SECURITY
TEXT BOOKS
1. Frank. P. Coyle, “XML, Web Services And The Data Revolution”, Pearson
Education, 2002.
REFERENCES
REFERENCES:
1. Create an XML file for any domain with multiple sublevel complexity.
( Example: Students data, Employee information, Product details etc..)
1. Project Planning
2. Software Requirement Analysis
3. Software Estimation
4. Software Design
5. Data Modelling & Implementation
6. Software Testing
7. Software Debugging
a. Library System
b. Student Marks Analyzing System
c. Text Editor.
d. Create a dictionary.
e. Telephone dictionary.
f. Simulator Software for Parallel Processing Operation.
g. Inventory System.
Page 33 of 47
LIST OF ELECTIVES
M.C.A (MASTER OF COMPUTER APPLICATIONS)
1. RELATIONAL DATABASES
3. EMERGING SYSTEMS
Enhanced Data Models - Client/Server Model - Data Warehousing and Data Mining
- Web Databases – Mobile Databases.
4. CURRENT ISSUES
TEXT BOOK
REFERENCES
1. INTRODUCTION
Standards – Internet – History- OSI model – Protocol suite – Addressing –
Transmission media – Local Area and Wide Area Networks – Switching –
Connecting devices – IP addressing
2. INTERNET PROTOCOL
Subnetting – Supernetting – IP packets – Delivery – Routing – Routing model –
Routing table – Datagram – Fragmentation – Checksum – IP Design – ARP –
RARP – Internet control message protocol – Internet group management protocol
5. APPLICATION PROTOCOLS
File Transfer Protocol – Connections – Communication – Simple Mail Transfer
Protocol – Simple Network Management Protocol – Hyper Text Transfer Protocol –
Transaction – Request and Response messages
TEXT BOOK
1. Behrouz A. Forouzan, “TCP/IP Protocol Suite”, Tata McGraw Hill Edition 2000.
REFERENCE
1. Douglas E. Comer, David L. Stevens, “Internetworking with TCP/IP – Volume I,
II and III”, Prentice-Hall of India Pvt. Ltd., 2nd Edition 1994
Page 35 of 47
UNIT I INTRODUCTION:
TEXT BOOK:
REFERENCES:
1. INTRODUCTION
2. WIRELESS NETWORKS
Traditional TCP- Indirect TCP- Snooping TCP- Mobile TCP- Fast retransmit/ Fast
Recovery- Transmission/ Timeout Freezing – Selective Retransmission-
Transaction Oriented TCP
5. WAP
TEXT BOOK
REFERENCE BOOKS
Agents for Information Sharing and Coordination - Agents that Reduce Work
Information Overhead - Agents without Programming Language - Life like
Computer character - S/W Agents for cooperative Learning - Architecture of
Intelligent Agents
4. AGENT ARCHITECTURE
5. MOBILE AGENTS
TEXT BOOKS
1. Jeffrey M.Bradshaw," Software Agents ", MIT Press, 2000. (Unit 1,2,3 & 4)
2. William R. Cockayne, Michael Zyda, “Mobile Agents", Prentice Hall, 1998
(5th Unit)
REFERENCES
1. Russel & Norvig, " Artificial Intelligence: A Modern Approach ", Prentice
Hall, 2nd Edition, 2002
2. Joseph P.Bigus & Jennifer Bigus, “Constructing Intelligent agents with
Java: A Programmer's Guide to Smarter Applications ", Wiley, 1997.
Page 38 of 47
TEXT BOOKS:
1. Decenzo and Robbins, Human Resource Management, Wilsey, 6th edition, 2001.
2. Biswajeet Pattanayak, Human Resource Management, Prentice Hall of India,
2001.
REFERENCES:
1. INTRODUCTION
2. SECURITY ANALYSIS
Risk Management : Identifying and Assessing Risk, Assessing and Controlling Risk.
3. LOGICAL DESIGN
Blueprint for Security, Information Security Poicy, Standards and Practices, ISO
17799/BS 7799, NIST Models, VISA International Security Model, Design of Security
Architecture, Planning for Continuity
4. PHYSICAL DESIGN
TEXT BOOKS
REFERENCES
1. INTRODUCTION
3. DELIVERY
5. LEARNING METHODOLOGY
TEXT BOOKS
REFERENCE
1. INTRODUCTION
Introduction to health care information – Health care data quality – Health care
information regulations, laws and standards.
History and evolution of health care information systems – Current and emerging use
of clinical information systems – system acquisition – System implementation and
support.
3. INFORMATION TECHNOLOGY
4. MANAGEMENT OF IT CHALLENGES
5. IT INITIATIVES
TEXT BOOK
REFERENCE
1. INTRODUCTION
2. SECURITY TECHNOLOGIES
TEXT BOOK
REFERENCES
1.INTRODUCTION
2. PRINCIPLES OF E-LEARNING
5. TECHNIQUES
TEXT BOOKS
REFERENCE
UNIT I - INTRODUCTION
REFERENCES
1. INTRODUCTION
HTML coding - Basic web graphics - Web page design and site building - Image
maps - Adding multimedia to the web.
Introduction - Image Basics - File Formats - GIF - JPEG - Color Palette - Layers -
Creating new Images - Brushes - Grids - Scaling Images - Moving and Merging
Layers - Tool Palette - Screen capturing - Grey styling - Using style Palette -
Animation.
3. IMAGE HANDLING
4. MULTIMEDIA
5. APPLICATIONS
Creating web site with a particular theme using all the utilities - Graphics -
Animations and Interaction.
TEXT BOOKS
REFERENCES
1. Deitel, “Internet and World Wide Web How to program”, Prentice Hall 2003.
2. Robert Reinhardt, Jon Warren Lentz , “Flash 5 Bible”, Hungry Minds Inc, 2001.
Page 46 of 47
DMC1984 E-LEARNING TECHNOLOGY
1. INTRODUCTION
2. ADVANCED INTERACTION
4. LEARNING SITE
Learning site for tracking – Learning site database – Tracking and scoring issues
– Setting up data tracking – Enhancements – Communicating with learning
management system.
TEXT BOOKS
REFERENCE
1. INTRODUCTION
3. PREDICTIVE MODELING
4. DATA WAREHOUSING
5. APPLICATIONS
TEXT BOOK
REFERENCES