0% found this document useful (0 votes)
71 views15 pages

Computer Science Major - 0001

Uploaded by

Meena Chouhan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
71 views15 pages

Computer Science Major - 0001

Uploaded by

Meena Chouhan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 15
Session: 2022-23 Program: Diploma Subject: Computer Science 1. | Course Code ‘S2-COSCIT 2._| Course Title Computer Networks & Information Security 3._| Course Type (Core Course? | CoreCourse -(Major — 1) Elective/ Generic Elective! ‘Vocational 4, | Pre-Requisite Gf any) NIL 5. | Course Learning Outcomes After completing this:coursé i stilent al ‘be able (CLO) to: 1. Define and dasibe Communications §5 OSI Model, na format. 2. Identify and’ reed Raong the network devices and deve, 3a Le and deser rious error detection and eS ore xis, Define the various terminologies u 2 in and Application layers. ¢ various network technologies and can suitable technology installation as per Srequifement and environment at any work place. . Describe the various protocols and can identify the application areas of each protocol. Know the fundamentals of network and information security issues, laws, and various security technologies which can be applied on work place. Theory—4 Credits Practical — 2 Credits Max. Marks: 30+70 | Min. Passing Marks: 33 ‘Course’ No. of Lectures (in hours per week): 2 Hrs. per week Total No. of Lectures (in hours):60 Hrs. Module. Topics No. of Lectures T _ | Introduction to Computer Network: 8 Use of computer network: Access to information, person to person ‘communication, electronic commerce, internet of things; Types of computer network: Broadband access network, Mobile and wireless network, content delivery network, transit network, Enterprise network. Network Technology: Personal _Area Network, Local Area Network, y Abhilasha Kumar Chairman, Central Board of Studies, Computer Science ‘Metropolitan Area Network, Wide Area Network, intemetworks, example of network (Internet, Mobile network, wireless network-Wi-Fi); Reference Model: OSI, TCP/IP, Critique of the OSI and TCP/IP reference models; Policy, Legal & Social Issues: Online speech, net neutrality, security & privacy, disinformation. Keywords: IoT, Broadband, LAN, MAN, WAN, OSL, TCP/IP. 1 Physical Layer: Guided Transmission Media: Twisted pairs, coaxial cable, Fiber Optics; Wireless ‘Transmission: The electromagnetic spectrum, frequency hopping spread spectrum, direct sequence, spread . spectrum, ultra-debng communication; 5 Cellular Network: Common concepts ~ cells, handoff, Bagin; Oe, "AG 4G & 5G technology. ~~" oP 1G. 3G, mL Data Link Layer: = Service Provided to Network Layer: Data LinkéGontrgl: Framing, Flow and Error Control; Error detecting codes, Error cor : Data Link Protocols: Basic transmission an protocol, Full duplex, Sliding windoty,protgcol, Point-to-Point Protocol. th, “a, Switching Techniques: Ratket Switchiig, “Circuit Switching, Datagram Networks, Virtual-Circuit Nétyor Strubture of a Switch. Network Devices & Drivers: Réjiter, Modim, Repeater, Hub, Switch, Bridge and Gateways (fundamental concepts), Keywords: error cgirectii codes, error detecting codes, SONET, ADSL, point -to;point profocgl*Roliter, Modem, Repeater, Hub, Switch, Bridge, Gateways". a, “UE a jimplex link layer ver SONET, ADSL, 12 Ne at | Adc ‘Network Layer: “%, or suedRouting Algorithm: Optimality, principle of shortest fe ding, Distance Vector Routing, Broadcast Routing; gestion “tir 4c, traffic management approaches; IP Addresses, IPv4 SEP TG Adiresses, ikCireuit'Nétworks: Frame Relay and ATM, *gnsport Layer:Process-Process Delivery: UDP, TCP. Appligation layers: DNS, SMTP, POP, ftp, http and https. Basics of Wi-Fi (Fundamental concepts only). Streaming audio and vidéo: digital audio and video, streaming stored media, real-time streaming. Keywords: routing algorithm, IPv4, IPvé, ATM, SMTP, POP, ftp, http, https, WiFi, video streaming. 12 Network Security and Information Security: Fundamentals of network and information security: principles of security and attack. Security Goals (Confidentiality, Integrity, and Availability), Not udiation. ] Overview of Security Threats and Vulneral Types of attacks on 10 ye Abhilasha Kumar Chairman, Central Board of Studies, Computer Science Confidentiality, Integrity and Availability. Vulnerability and Threats: Phishing Attacks, E-mail threats, Web-threats, Intruders and Hackers, Insider threats, SQL injection Attacks, Ransomware. Malware: Worms, Virus, Spams, Adware, Spyware, Trojans. Security Technology: Firewalls, Intrusion detection and prevention systems, Scanning and Analysis Tools: Biometric access controls, Cipher methods, Cryptographic algorithms, Cryptographie tools, Protocols for secure communication. Keywords: phishing, SQL injection, Worms, Computer virus, Spyware, Trojans, Firewall, Cipher, Cryptography ae ‘Vi__| Computer and Cyber-crimes: Cyber-crimes and related concepts, distinction | 10 between cyber-crimes and conventional crimes, Cyber, criminglssandstheir objectives. Kinds of eyber-crimes, cyber stalking, forgéty and frau related to IPRs, cyber terrorism, Ransom ware attacks, compiiter Vand Cyber Laws- Introduction to IT laws & Cyber Crimes _ , Cracking, Viruses, Virus Attacks, Software Piracy Intl sctual:, property, Legal System of Information Technology, Social ial HO ‘Mail Bombs, Bug Exploits. Scope of cyber laws: e-comniite, oflinescontacts IPRs (copyright, trademarks and software patenting), oe ee "governance and cyber-crimes, Cyber law in India vith ae hg to Information Technology Act, 2000 and Recent amendment » Keywords: cyber-crime, gir st st sefraud, IPR, IT laws, e- commerce, e-taxation, e-govemance, ae jources: TexibookS, Referetices Books, Other Resources Suggested Readings Textbooks: © Andrew S. Tanéhibs yctaeam rer; David J. Wetherall, Computer Networks, 6th Edition, (2021), Pearson. —) * Michael ie a Mattord, Principles of Information Security, Fourth Edition, CENGAC 6tliiindian Reprint. ° Mg at Ge formation Security Principles and Practices, 2™ Edition, 2014, . oN letwork Security, Cengage Learning. Praveen ‘Kumar ‘Shukla, Surya Prakash Tripathi, Ritendra Goel “Introduction to Information Security and’Cyber Laws”, 2014, Dreamtech Press. © Faiyaz Ahamad, KLSI “Cyber Law and Information Security”, 2013, Dreamtech Press. © Books published by M.P. Hindi Granth Academy, Bhopal Reference books: ‘© Kurose James F., Ross Keith W., Computer Networking, A Top-Down Approach, Sixth Edition, 2017, Pearon © Micki Krause, Harold F. Tipton, Handbook of Information Security Management, Vol. 1-3, CRC Press LLC. B.A. Forouzan: Data Communications and Networking, Fourth edition, TMH Publishing ye Abhilasha Kumar Chairman, Central Board of Studies, Computer Science ‘Company Ltd. © Basta, W.Halton, Computer Security: Concepts, Issues and Implementation, Cengage Learning India, Suggestive digital platform web links + https'//www. youtube. com/watch?v=qiORSrTSshw_ 2 Free CONA | Network Fundamentals - Day 1 (https://www.youtube.com/watch?v=n2D10- aM-2s) Free CONA | Network Deviceshttps://www.voutube.com/watch?v=H8W90MNSuwo Free CCNA | OSI Model & TCP/IP Suite (hitps://Awww. youtube.com/watch?v=t-ai8JzhHuY) Free CCNA | Interfaces and Cables | Day3 (attps://www.youtube.com/watch?v=ieTHSIVhNaY) Free CCNA | Intro to the CLI Day 4 (https://www. youtube.com/watch?v=1Ybtai7Nu2: Free CCNA | Ethernet LAN Switching (Part 1) | Day 5 - — Ghttps://www-youtube.com/watch?v=u2n762WGOVo) 8. eCCNA | Analyzing Ethemet Switching | Day 6 Lab (https://www youtube.com/watch?v=l0dSa0QDI8) 9. Free CCNA | IPv4 Addressing (Part 1) | Day7 (https://wwwyoutube.com/watch?v=3ROdsfEUuhs) 10. Free CCNA | IPv6 Part 1 | Day 31 (https://www. youtube,com/watch?v=ZNuXyOXae5U) 11, Free CCNA | IPv6 Part 3 | Day 33 (https://www.youtube.com/watch?v=rwkHfsWQwy8 12. btpl/www.mphindigranthacademy.org/ i, yay no Suggested equivalent online courses 2° NPTEL: 1. Demystifying Networking (04 week) i z Cyber Security (15 Weeks), 5. https/www.edx.ore/learn/cbinputer-nel Workin: 2 = is. Pant D2Assessmeitand Evaluation’ Suggested guciny i Methods: 55 Maximum, Continuous ae] luation (CCE) : 30 marks University Exam (UE) : 70marks onset) Class Test Total 30 Assignment/Presentation Evaluation (CCE): External Asséigment + Section(A) : Objective Questions | Total 70 ‘University Exam Section: 70 | Section (B): Short Questions Time : 03.00 Hours Section (C) : Long Questions y* Abhilasha Kumar Chairman, Central Board of Studies, Computer Science Program: Diploma Session: 2022-23 Subject: Computer Science 1. | Course Code $2-COSCIP 2._| Course Title Computer Networks Lab 3. | Course Type (Core Course/ Core Course - (Major —1) Elective/ Generic Elective/ Vocational 4_| Pre-Requisite GFany) Open for all y 5. | Course Learning Outcomes After completing ths lab Sotnge!Sfudents will be (CLO) able to: ‘3, 1. Leam and identify’ networking. % 2. Leam, identifyvarigus Conneciors used to connect different cables. Use the, zis tobls.9F preparing the connectors for cb, fe lage various local area networks aes place. 6._| Credit Value Prigtici 2 GFedits 7._| Total Marks “Min. Passing Marks: 33, No. of Lab. Practicals (in hours per week): 1Hr. Elen weale Be, “Total No. of Labs: 30 Hrs. ©" SuBgestive List of Practicals ‘No. of Labs. TL. Stag Se cable 30 ‘Slor code of UTP cable tics of UTP n/w cable P es: lding of n/w cable ~ ‘Teétricity interference with n/w cable %q, ‘Magimum length for which data cable can be used rimping of RJ45 connector and Punching of data n/w. cable ‘©. Penta scanning of cabling work ©. Rules of UTP laying 2. Knowledge of Structured Cabling and its components Information outlet with box o Network Rack (4U, 6U, 9U, 12U, 24U, 32U, 42U) o Patch Panel © Rack Management = 3._Study of Optical Fiber cable we Abhilasha Kumar Chairman, Central Board of Studies, Computer Science & 4, Use of tools 5. Configuration/ Manageme Pettit Rn Nevork & ky coaitye ‘Dynamic routing using packet tracer & Ned ‘tracer S Different cores of OFC 6 core, 12, 24 core) Multimode & Single mode OFC cable Shielding of OFC Splicing/Termination of OFC OTDR Testing LIU fixing LIU management (pigtail/fiber patchoord) Media Convertor SFP module ©” Rules of OFC laying 000000000 © Crimping Tool Punching Tool ‘Nose plier Wire Stripping and Cable Cutter Multimeter RU45 RIL RY12 Cat5 Cat6 Network C: + In-Line Coupler (RI45 F/F) Shee RJ45 NETWORK, SETTER Ros Way. 0000000 ° Implementatigt of fil Installation 61 van ent. Connect the tiie Beal Area Network. Configuring Class, IPsddress on LAN Connection in ComputéiLAB and then use following tools: pingsipe getmac, hostname, nslookup, tracert, ping, systeminfo. tatic routing using packet tracer software oo° Configure VLAN using Managed switch Device / Packet plementation of Subnetting in Class A, B and C 6 Sa 2 systems using IPv6 © Configuration of NAT for incoming packet request © Configuration of Software / Hardware firewall to block outgoing requests to facebook.com we Abhilasha Kumar Chairman, Central Board of Studies, Computer Science. PART. C: Learning Resources,” Textbooks, Reference Books, Other Resources Suggested Readings © Andrew S. Tanenbaum Nick Feamster, David J. Wetherall, Computer Networks, 6th Edition, (2021), Pearson. © Michael E Whitman and Herbert J Mattord, Principles of Information Security, Fourth Edition, CENGAGE Leaning, 6th Indian Reprint. © Books published by M.P. Hindi Granth Academy, Bhopal Reference books: ‘* Hacking Exposed, Stuart McClure, Joel Scrambray, George Kurtz, TMH. «Computer Security Art and Science, Matt Bishop, Pearson/PHI..._ ‘Suggestive digital platform web links hitps://www.edx.org/learn/computer-networking http/www.mphindigranthaeademy.org/ ‘Suggested equivalent online courses hittps://nptel.ac.in/courses/106/105/1061050817 Internal Assessment External Assessment Marks Class Interaction /Quiz Viva Voce on Practical Attendance Practical Record File Assignmesig a si Table work / Experiments Seminar / Rutal Technology Dissemin: Report. ae sion, Lab Visits! Survey India visi) TOTAL 30 70 y* Abhilasha Kumar Chairman, Central Board of Studies, Computer Science Program: Diploma Session: 2022-23 Subject: Computer Science T. | Course Code 'S2-COSC2T 2. | Course Title Object Oriented Programming with Java 3. | Course Type (Core Course/Blective/Generic Blective/ Vocational Core Course— (Major —I) / Minor / Elective Dee 4, [Pre-Req ite (if any) To study this course, a stude completed the course on’ Certificate Level. 3. | Course Leaming Outeomes(CLO) After the completion: of isco, a successful student will be able to a followin: 1 Inlet Secorenied programming concept using ini ‘ea 1 Structures, strings and function foe veloping skills of logic building activity 2. Tak uset objects, members ofa class and the desing ‘among them needed for a finding the solution “e a specific problem. 3. Dénjonstrates how to achieve reusability using inheritance, interfaces and packages and describes faster application development can be achieved. . Demonstrate understanding and use of different exception handling mechanisms and concepts of multi-threading for robust faster and efficient application development. . Identify and describe common abstract user interface components to design GUI in Java using Applet & AWT. along with response to events. >. Identify, Design & Develop complex Graphical user interfaces using principal Java Swing classes based on MVC architecture. 6. | Credit Value Theory -4 Credits Practical —2 Credits 7. | Total Marks ‘Max. Marks : 30+70 Min, Passing Marks: 33 wpe Abhilasha Kumar Chairman, Central Board of Studies, Computer Science 'No. of Leotures (in hours per week): 2 His. per week Total No. of Lectures: 60 Hrs. Topies ‘No. of Lectures OOPS - Object Oriented Paradigm, Benefits of OOP, Applications of OOP. Java - History, Java Features, How Java Differs from C and C+, Java and internet, Java and World Wide Web, Web Browsers, Hardware and Software Requirements, Java Supports Systems, Java Environment. Java Program Structure - Java Tokens, Java Statements, Implemy Java Program, Java Virtual Machine, Command Line ‘Arguments, Programming Style. Keywords: OOPS, JVC, WWW, Java Environment 12 I Ke ‘ava Basies -Constants, Variables, Data Types, Deplaratigi Of Variables, Giving Values to Variables, Scope of Variable, Symbolic Constants, Type Casting, Getting Values of Variablessigiandgrd Defi tYlues. Operators - Arithmetic Operator, Relatighal 6 rat 3, Logical Operators, Assignment Operators, Incremefit and ‘pecreinent 0} srators, Conditional Operators, Bitwise Operators, Special, Operator Arithmetic Expressions - Evaluation of Expressions, Precedence of Arithmetic Operators, Type Conversioigin Expressions, Operator Precedence and AssogjativityMathematical Functions. Decision Making with if Statement, SimpleifStatement, if.......Else Statement, Nesting of if ..clse Stater hse Ladder, 7 The Switch Statement, The ? Operator. -meiit,,Do Statement, For Statement, Jump in Loops, 1 aU 2p ving Cree Arithmetic Expressions, Decision Making, Loops 12 fi Class - fsa a'Class, Adding Variables, Adding Methods, Creating Obits Actessing Class Members, Constructors — definition and types, Methods Overloading, Static Members, Nesting of Methods. Inheritance - Extending a Class, Overloading Methods, Final Variables and Methods, Final Classes, Finalize Methods, Abstract Methods and Classes, Visibility Control Arrays, One Dimensional Array, Strings, Vectors, Wrapper Classes. Defining Interfaces, Extending Interfaces, Implementing Interfaces, Accessing Interface Variables. Keywords: Class, Constructors, Inheritance, Final, Abstract Methods, 12 yp Abhilasha Kumar Chairman, Central Board of Studies, Computer Science 10 Overloading Java API Packages - Using System Packages, Naming Conventions, Creating Packages, Accessing a Package, Using a Package, Adding a Class toa Package, and Hiding Classes. Creating Threads, Extending the Thread Class, Stopping and Blocking a Threads, Life Cycle of a Thread, Using Threads Methods, Threads Exceptions, Threads Priority, Synchronization, Implementing the ‘Runnable’ interface. a ‘Types of Errors - Exceptions, Syntax of Exception Handling Code, Multiple Catch Statements, Using Finally Statements, Throwing Qur Exceptions, Using Exceptions for Debugging. Preparing to Write Applets - Building Applet Code, Applet Lite Gyci Creating an Executable Applet, Designing a Web Pages! fag, Adding Applet to HTML File, Running the Applet. Keywords: API, threads, synchronization, eros, Applets, debugeing Se 12 More About the Applet fag - Passing Baraiglerstg, Applets, Aliguing the Display, More About HTML Tags, Disp ‘ing Values, Getting Input from the user. £ e ‘The Graphics Class - Lines Ares, Drawing Polygons, Li Drawing Bar Charts. Mech ies and Ellipses, Drawing Graplis, Using Control Loops in Applets, BP Concept of Stream Str Stream Clasies, Using S Other Usefi 70.Caikes = ising the File Class, Input / Output Exceptions, Credtion off Fils, Reading / Writing Characters, Reading / Writing Bytes, ia sinBPrintve Daa ‘Types, Concatenating and Buffering Files, Random Kes S Ti Geaciye Input and Output, other Stream Classes. Sywvor les, Graphics class, buffering, HTML tags Classes, Byte Stream Classes, Character S, — 12 \p” Abhilasha Kumar Chairman, Central Board of Studies, Computer Science 1 “Textbooks, Reference Books, Other Resources Suggested Readings Textbooks - © E Balguruswami, Programming with Java, Tata McGraw-Hill Publication. Reference Books - © Bruce Eckel, Thinking in Java. Herbert Schildt, Java: The Complete Reference . Y. Daniel Liang, Introduction to Java Programming . Paul Deitel, Harvey Deitel, Java: How To Program . Cay S. Horsttnann, Core Java Volume I Fundamentals . Java Projects, BPB Publication. Dr. $.S, Kandare, Programming in Java, $ Chand Publication, Books published by M.P. Hindi Granth Academy, Bhopal Suggestive digital platform web Tinks https:/www.youtube.com/watch?v=7s3: httoe//uwu.mphindlgranthacademy.ors/ ‘Suggested equivalent online courses Se ‘itps/nptel.ac.in/eourses/ 1067105110 POS1OR/ \ssessment and Evaluation. Suggested ContinuousiEvaluation Method: Maximum Marks'%100 Continuous Comprehensive Evaluation (CCE) : 30marks University Exam (UE) 70marks Internal Assessment : Class Test Continuous Comprehensive | Assignment/Presentation Evaluation (CCE):30 External Assessment Section(A) : Objective Questions | Total 70 University Exam Section: 70. | Seetion (B) : Short Questions Time : 03.00 Hours Section (C) : Long Questions yp Abhilasha Kumar Chairman, Central Board of Studies, Computer Science 13 Program: Diploma ‘Session: 2022-23 Subject: Computer Science T. | Course Code 'S2-COSC2P. 2. | Course Title ‘Java Programming Lab 3. | Course Type (Core Course/Elective/Generic Blective/ Vocational Core Course - (Major- II) /Minor / Elective 4. | Pro-Requisite GF any) Tmushhave guocessfully To study this course, a stud completed the course on gait ing’Methodology at Certificate Level. 5. | Course Leaming Outcomes(CLO) After the completion of {his course, a successful student willbe able tad aéithe following: - plein 1 Baie ectt@fiented programming concept using ” ie ytaxes ‘GEcontrol Structures, strings and function fou developitifiskills of logic building activity. 2. Identify classes, objects, members of a class and the lationiips among them needed for a finding the solution na.sbécific problem. 3. Demonstrates how to achieve reusability using inheritance, interfaces and packages and describes faster application development can be achieved. . Demonstrate understanding and use of different exception handling mechanisms and concepts of multi-threading for robust faster and efficient application development. . Identify and describe common abstract user interface components to design GUI in Java using Applet & AWT along with response to events. . Identify, Design & Develop complex Graphical user interfaces using principal Java Swing classes based on MVC architecture. 6. | Credit Value Practical - 2 Credits 7. | Total Marks Max. Marks : 100 Min. Passing Marks: 33 wy" Abhilasha Kumar Chairman, Central Board of Studies, Computer Science 14 ‘No. of Lab, Practicals (in hours per week): I Hr. per week Total No. of Lab.: 30 Hrs. Suggestive List of Practicals No. of Labs. (Using any Text editor: Notepad/Eclipse/Netbeans/Sublime ete.) 1. Find greater number between two numbers -using conditional, operator. oe 2. Find the factorial of number if number is given by user using &_ ‘command line argument. , 7 3. Write a program to check if'a number is prime or not. 4. Write a program to display tables from 2 to 10. 5. Write a program to print Fibonacci series. 6 7. 8. 9 10. be employee if salary is Of service is greater than or " nea ye called “Arithmetic” that contains methods to deal all ions. Also write a program to use the package, SG Bie program to demonstrate use of constructor and destructor, Define an exception called “Marks out of Bound” exception that is thrown if the entered marks are greater than 100. 17, Write a program using application of single inheritance. Find the area of rectangle & volume of cube, 18. Develop a simple real life application to illustrate the use of multithreading. 19. Write a program using multiple inheritance to calculate area and perimeter of a circle using interface. 20. Write an applet program to draw a Rectangle (color = orange) and a 30 \p* Abhilasha Kumar Chairman, Central Board of Studies, Computer Science 15 Tight aligned oval. 21. Develop an applet that receives 3 numeric values as inputs from the user and then displays the largest no, on the screen. 22 Write a Java Program to read data from the inputted text file name, and print its content on the console, 23. Write a Java Program to merge two files into third file 24. Write a Java program to delete duplicate lines in text file 25, Write a Java Program to implement FileInputStream class to read binary data from any image file, PART C: Learning Resources Textbooks, Reference Books, Other Resources Suggested Readings Textbooks - ¢ EBalguruswami, Programming with Java, Tata McGraw-Hill Publica © Books published by M.P. Hindi Granth Academy, Bhopiil |, 2nd Edition Reference Books - © Bruce Eckel, Thinking in Java (4e) Herbert Schildt, Java: The Complete Refergivet s Y. Daniel Liang, Introduction to Java Programming (108) Paul Deitel, Harvey Deitel, Java: He TopPrébeam|(T0e) Cay S. Horsttnann, Core Java Volume® ete funda (10e) Java Projects, BPB Publicatior #_Dr.$.S. Kandare, Programmingsin Java, evcee Gland Publication Suggestive digital Platform web likes hitps/nnw.cs.cmu.edulat/eioan ‘du/user/echen/www/download/java/LearnJava. pdf https://www.tutorialspoint com/jaa/javi tutorial. pdf httpsil/www. youtube. céntiwath2v=783xDfdafDw http://www.mphindigranithacademyiore/ ' Suggested, equivalent online, tyes https/ Ulapte.seaiVeotes/T0G7 1571061051917 S we Abhilasha Kumar Chairman, Central Board of Studies, Computer Science 16 F ae SURE eas D-Assessin ent and fuation: Suggested Continuous Evaluation Methods: Internal Assessment Marks External Assessment Marks Class Interaction /Quiz ‘Viva Voce on Practical Attendance Practical Record File Assignments (Charts/ Model Seminar / Rural Service/ Technology Dissemination/ Report of Excursion/ Lab Visits/ Survey / Industrial visit) TOTAL 70 y* Abhilasha Kumar Chairman, Central Board of Studies, Computer Science

You might also like