MCA Syllabus Compressed
MCA Syllabus Compressed
I to IV Semesters
Revised w.e.f.
MCA PROGRAMME
JNANABHARATHI CAMPUS
BANGALORE UNIVESITY, BANGALORE
BANGALORE UNIVERSITY
Regulations of Master of Computer applications (MCA) Course
1 TITLE OF THE COURSE: The course shall be called MCA – Master of Computer
Applications.
5 SCHEME OF EXAMINATION:
A. The Internal Assessment marks should be decided for each of the theory subjects by
conducting 2 tests, each of 60 minutes duration, spread over the span of a Semester. A seminar
should also be given by the student in the second year and the same to be assessed and
evaluated for internal assessment along with two tests.
B. The Internal Assessment marks in Practical course is based on the performance in the
Laboratory. The Internal Assessment marks for Project work of a candidate is based on the
dissertation and seminar.
COURSE OBJECTIVE:
Understand data, Complexity, and order notation and their operations.
Demonstrate the key concepts introduced in C programming by writing and executing the programs.
Implement the single/multi-dimensional array for the given problem.
Demonstrate the application of searching and sorting in solving some societal/industrial problems.
Text Books:
1. R.G.Dromey, “How to Solve it by Computer”, Pearson Education India, 2008.
2. Thomas H. Cormen, Charles E. Leiserson, Ronald L. Rivest, Clifford Stein, “Introduction to
Algorithms”, 3rd Edition, The MIT Press Cambridge, Massachusetts London, England, 2009.
3. Brain M. Kernighan, and Dennis M. Ritchie, “The C Programming Language”, 2nd edition,
Princeton Hall Software Series, 2012.
Reference Books:
1. Steven S. Skiena, “The Algorithm Design Module”, 2nd Edition, Springer-Verlag London
Page 8 of 46
Limited, 2008.
2. Donald E. Knuth, The Art of Computer Programming”, Volume 1: Fundamental Algorithms, 3rd
Edition, Addison Wesley Longman, 1997.
3. Donald E. Knuth, The Art of Computer Programming”, Volume 2: Seminumerical Algorithms,
3rd Edition, Addison Wesley Longman, 1998.
4. Greg Perry and Dean Miller, “C programming Absolute Beginner’s Guide”, 3rd edition,
Pearson Education, Inc, 2014.
Web Resources:
1. http://algorithmsforinterviews.com “Algorithms for Interviews”
Page 9 of 46
COURSE OBJECTIVE:
To Acquaint with advanced knowledge of formal computation and its relationship to languages.
To understand fundamentals of logic (the laws of logic, rules of inferences, quantifiers, proofs of theorems),
Fundamental
To solve principles of counting (permutations, combinations), set theory, relations and functions, graphs, trees
Develop the mathematical concepts and technique which should serve as a preparation for more advanced
quantitative courses.
To analyze and express computer science problems as mathematical statements and formulate proofs.
Text Books:
1. Ralph P. Grimaldi: Discrete and Combinatorial Mathematics, 5thEdition, Pearson Education,
2004.
2. C. L. Liu: Elements of Discrete Mathematics, Tata McGraw-Hill, 2000.
3. Sheldon M Ross: Introduction to Probability Models, 12th edition, Academic Press, 2019.
4. F. Harary: Graph Theory, Addition Wesley, 1969.
Reference Books:
1. Kenneth H Rosen: “Discrete Mathematics and its Applications”, McGraw Hill publications,
7th edition, 2007.
2. J. P. Tremblay and R.P. Manohar: Discrete Mathematical Structures with applications to
Computer Science, Mc Graw Hill Ed. Inc. 1975.
3. Sheldon M Ross: Introduction to Probability and Statistics for Engineers and Scientists, 6th
edition, Academic Press, 2020.
4. Michael Baron: Probability and Statistics for Computer Scientists, 3rd Edition, CRC, 2019
Web Resources:
1. https://www.my-mooc.com/en/categorie/mathematics
2. http://www.nptelvideos.in/2012/11/discrete-mathematical-structures.html
3. https://ocw.mit.edu/courses/mathematics/
Page 11 of 46
COURSE OBJECTIVE:
To Learn the concept of data representation and digital logic circuits used in the computer system.
To understand architecture of processing, memory and input output organization in a computer system.
To Identify, understand and apply different number systems and codes.
Interpret concepts of register transfer logic and arithmetic operations.
UNIT - I [13Hours]
Number Systems: Binary, Octal, Hexa decimal numbers, base conversion, addition, subtraction
of binary numbers, one's and two's complements, positive and negative numbers, character codes
ASCII, EBCDIC etc. Computer Arithmetic: Addition and Subtraction, Multiplication and
Division algorithms, Floating-point Arithmetic Operations, Decimal arithmetic operations.
Structure of Computers: Computer types, Functional units, Basic operational concepts, Von-
Neumann Architecture, Bus Structures, Software, Performance, Multiprocessors and
Multicomputer, Digital Logic Circuits: Logic gates, Boolean algebra, Map Simplification.
Combinational Circuits: Half Adder, Full Adder, flip flops.
Sequentialcircuits: Shiftregisters,Counters,IntegratedCircuits,Mux,Demux,Encoder,Decoder.
Data representation: Fixed and Floating point, Error detection and correction codes.
UNIT - II [13Hours]
Basic Computer Organization and Design: Instruction codes, Computer Registers,
Computer Instructions and Instruction cycle. Timing and Control, Memory-Reference
Instructions, Input-Output and interrupt. Central processing unit: Stack organization,
Instruction Formats, Addressing Modes, Data Transfer and Manipulation, Complex
Instruction Set Computer (CISC) Reduced Instruction Set Computer (RISC), CISC vs RISC.
UNIT - III
[13Hours]Transfer and Micro-operations: Register Transfer Language, Register Transfer,
Register
Bus and Memory Transfers, Arithmetic Micro-Operations, Logic Micro-Operations, Shift
Micro-Operations, Arithmetic logic shift unit. Micro-programmed Control: Control
Memory, Address Sequencing, Micro-Program example, Design of Control Unit. Input
Output: I/O interface, Programmed IO, Memory Mapped IO, Interrupt Driven IO, DMA.
Instruction level parallelism: Instruction level parallelism (ILP)-over coming data hazards,
limitations of ILP.
UNIT - IV
Memory System: Memory Hierarchy, Semiconductor Memories, RAM(Random Access
Memory), Read Only Memory (ROM), Types of ROM, Cache Memory, Performance
considerations, Virtual memory, Paging, Secondary Storage, RAID. Multiprocessors And
Thread level Parallelism: Characteristics of multiprocessors, Multi-Threaded
Architecture,Distributed Memory MIMD Architectures, Architecture of MultiThreaded
Processor, principle of MultiThreading, Interconnection structures, Inter Processor
Arbitration, Inter processor Communication and Synchronization, Cache Coherence.
Page 12 of 46
TEXT BOOKS:
1. Mano M Morris, ”Computer System Architecture”, 3rd edition Pearson India(2019).
2. William Stallings, “Computer Organization and Architecture designing for
performance”, 10th edition, Pearson(2016)
REFERENCE BOOKS:
1. Subrata Ghoshal, “Computer Architecture And Organization”, Pearson India(2011).
2. Andrew S. Tanenbaum “ Structured Computer Organization”, 5th edition,
Pearson Education Inc(2006).
3. Carl Hamacher, Zvonks Vranesic,SafeaZaky, “Computer Architecture And Organization”,
5th edition McGraw Hill New Delhi,India(2002).
4. Kai Hwang, “Advanced Computer Architecture - Parallelism, Scalability,
Programmability”, Tata Mcgraw-Hill (2008).
Page 13 of 46
COURSE OBJECTIVE:
To acquaint with advanced knowledge of formal computation and its relationship to languages.
To understand the theoretical computer science areas of formal languages and automata.
Interpret the mathematical foundations of computation including automata theory; the theory of formal
languages and grammars; the notions of algorithm, decidability, complexity, and computability.
The students will be able to analyze and express computer science problem as mathematical statements and
formulate proofs.
Text Books:
1. John E. Hopcroft, Rajeev Motwani, Jeffrey D. Ullman (2007), Introduction to Automata
Theory, Languages and Computation, 3rd Edition, Pearson Education, India.
2. K. L. P Mishra, N. Chandrashekaran (2003), Theory of Computer Science-Automata
Languages and Computation, 2nd Edition, Prentice Hall of India, India.
Reference Books:
1. Harry. R. Lewis and C. H. Papadimitriou - Elements of the Theory of Computation, Second
Edition, PHI, 2003.
2. John C. Martin - Introduction to Languages and the Theory of Computation, Fourth Edition,
TMH, 2011.
3. Micheal Sipser - Introduction of the Theory and Computation, Thomson Brokecole, Second
Edition, 1997.
4. C. K. Nagpal - Formal Languages and Automata Theory, Oxford Higher Education, April
2011.
Web Resources:
1. Youtube Channel: nptelhrd, Playlist name: Theory of automata, formal languages and
computation.
Page 15 of 46
COURSE OBJECTIVE:
To Understand the basic concepts and techniques which form the object -oriented programming paradigm
Fundamental features of an object-oriented language like Java: object classes and interfaces, exceptions and
libraries of object collections
To model of object-oriented programming: abstract data types, encapsulation, inheritance and polymorphism
To take the statement of a business problem and from this determine suitable logic for solving the problem; then
be able to proceed to code that logic as a program written in Java.
To design and develop document and prepare a professional looking package for each business project using
Javadoc.
Textbooks:
1. E. Balagurusamy, Programming with JAVA, McGraw Hill, New Delhi, 2007
Reference Books:
1. Raj Kumar Buyya, Object Oriented Programming with JAVA, McGraw Hill, 2009
2. Herbert Schildt, Java A Beginner’s Guide – Create, Compile, and Run Java Programs Today,
Sixth Edition, Oracle Press, 2014
3. Ken Arnold, James Gosling, “The Java Programming Language, Fourth Edition, Addison
Wisely, 2005
4. Herbert Schildt, ‘The Complete Reference Java, 7th Edition, McGraw Hill, 2007
Web Resources
1. https://docs.oracle.com/javase/tutorial/
2. https://javabeginnerstutorial.com/core-java-tutorial/
Page 17 of 46
COURSE OBJECTIVE:
Understand data, data structures, Complexity order notation, and various complexity measures.
Identify relevant data structures to develop solutions for a problem.
Analyzes the performance of Trees, Hashing, and searching techniques.
Analyze and evaluate the algorithms based on the data structures used, order of notation, and performance
metrics
UNIT-I [13Hours]
Introduction and Overview: Definition, Elementary data organization, Data Structures, data
Structures operations, Abstract data types, algorithms complexity, time-space trade off.
Preliminaries: Mathematical notations and functions, Algorithmic notations, control structures,
Complexity of algorithms, asymptotic notations for complexity of algorithms. String Processing:
Definition, Storing Strings, String as ADT, String operations, word/text processing, Pattern
Matching algorithms.
UNIT-II [13Hours]
Arrays: Definition, Linear arrays, arrays as ADT, Representation of Linear Arrays in Memory,
Traversing Linear arrays, Inserting and deleting, Multi-dimensional arrays, Matrices and
Sparse matrices. Linked list: Definition, Representation of Singly Linked List in memory,
Traversing a Singly linked list, Searching in a Singly linked list, Memory allocation, Garbage
collection, Insertion into a singly linked list, Deletion from a singly linked list; Doubly linked list,
Header linked list, Circular linked list. Stacks: Definition, Array representation of stacks, Linked
representation of stacks, Stack as ADT, Arithmetic Expressions: Polish Notation, Conversion of
infix expression to postfix expression, Evaluation of Post fix expression, Application of Stacks,
Recursion, Towers of Hanoi, Implementation of recursive procedures by stack. Queues:
Definition, Array representation of queue, Linked list representation of queues. Types of queue:
Simple queue, Circular queue, Double-ended queue, Priority queue, Operations on Queues,
Applications of queues.
UNIT-III [13Hours]
Binary Trees: Definitions, Tree Search, Traversal of Binary Tree, Tree Sort, Building a Binary
Search Tree, Height Balance: AVL Trees, Contiguous Representation of Binary Trees: Heaps,
Lexicographic Search Trees: Tries, External Searching: B-Trees, Applications of Trees.
Graphs: Mathematical Back ground, Computer Representation, Graph Traversal, Topological
Sorting, Greedy Algorithm, Graphs as Data Structure.
UNIT-IV [13Hours]
Searching: Introduction and Notation, Sequential Search, Binary Search, Comparison of
Methods. Sorting: Introduction and Notation, Insertion Sort, Selection Sort, Shell Sort, Divide
And Conquer, Merge sort for Linked List, Quick sort for Contiguous List. Hashing: Sparse
Tables, Choosing a Hash function, Collision Resolution with Open Addressing, Collision
Resolution by Chaining.
Text Books:
1. Seymour Lipschutz, “Data Structures with C”, Schaum’s outLines, Tata Mc Graw Hill,
2011.
2. Robert Kruse, C.L.Tondo, Bruce Leung,Shashi Mogalla,“Data Structures and
Program Design using C”, Pearson Education, 2009.
Page 18 of 46
ReferenceBooks:
1. Mark Allen Weiss,“ Data Structures and Algorithm Analysis in C”, Second Edition,
Pearson Education,2013.
2. Forouzan,“A Structured Programming Approach using C”,2nd Edition, Cengage
LearningIndia,2008.
Page 19 of 46
COURSE OBJECTIVE:
The course is designed to develop skills to design and analyze linear and nonlinear data structures.
To strengthen the ability to identify and apply the suitable data structure for the given real-world problem.
To design and analyze the time and space efficiency of the data structure.
To identity the appropriate data structure for given problem.
* For all the programs write the output, flowchart and number of basic operations performed.
1. Given {4,7,3,2,1,7,9,0, find the location of 7 using Binary search and also display its first
occurrence .
1. Given {5,3,1,6,0,2,4} order the numbers in ascending order using Quick Sort.
2. Perform the Merge sort on the input {75,8,1,16,48,3,7,0} and display the output in
descending order.
3. Write a program to insert the elements 61,16,8,27 into singly linked list and delete 8,61,27
from the list. Display your list after each insertion and deletion.
4. Write a program to add 6x3+10x2+0x+5 and 4x2+2x+1 using linked list.
5. Write a program to push 5,9,34,17,32 into stack and pop 3 times from the stack, also display
the popped numbers.
6. Write a recursive program to find GCD of 4,6,8.
7. Write a program to inert the elements {5,7,0,6,3,9} into circular queue and delete 6,9&5
from it(using linked list implementation).
8. Given S1={“Flowers”} ; S2={“are beautiful”} ,
a) Find the length of S1.
b) Concatenate S1 and S2.
c) Extract the substring “low” from S1.
d) Find “are” in S2 and replace it with “is”.
9. Write a program to convert an infix expression x^y/(5*z)+2 to its postfix expression.
10. Write a program to evaluate a postfix expression 5 3+8 2 - *.
11. Write a program to create a binary tree with the elements 18,15,40,50,30,17,41 after creation
insert 45 and 19 into tree and delete 15,17 and 41 from tree. Display the tree on each
insertion and deletion operation.
12. Write a program to create binary search tree with the elements {2,5,1,3,9,0,6} and perform
inorder, preorder and post order traversal.
13. Write a program to Sort the following elements using heap sort {9.16,32,8,4,1,5,8,0}.
Page 20 of 46
COURSE OBJECTIVE:
To understand object-oriented way of solving problems.
To use basic, I/O to communicate with the user to populate variables and control program flow.
To apply arithmetic, logical, relational, and string manipulation expressions to process data.
Conceptualize, Analyze and write programs to solve more complicated problems using the concepts of Object
Oriented and java technology.
Apply all the programming concepts as and when required in the future application development.
PART-A
1. Develop a JAVA program to demonstrate the precedence and associativity among arithmetic
operators. The program should also demonstrate how the default precedence can be overridden.
2. Write a JAVA program to validate a date. The program should accept day, month and year and
it should report whether they form a valid date or not.
3. Write a JAVA program to display the following pattern.
1
22
333
4444
55555
4. Write a JAVA program to print the first n members of Fibonacci series.
5. Write a program to generate the multiplication tables of a range of numbers between m and n
inclusive and m < n.
6. Write a JAVA program to define a class, define instance methods for setting and retrieving
values of instance variables and instantiate its object.
7. Write a JAVA program to demonstrate static member data and static member methods
8. Write a JAVA Program to demonstrate nested classes
9. Write a JAVA program to demonstrate dynamic method dispatch.
10. Write a JAVA program to implement inheritance and demonstrate use of method overriding.
PART-B
11. Write a JAVA program to implement the concept of importing classes from user defined
package and creating packages.
12. Write a program to demonstrate abstract class and abstract methods
13. Write a JAVA Program to implement an array of objects of a class.
14. Write a JAVA program to demonstrate String class and its methods.
15. Write a JAVA program to implement the concept of exception handling by creating user
defined exceptions.
16. Write a JAVA program using synchronized threads, which demonstrates producer consumer
concept.
17. Write a JAVA program that creates three threads. First thread displays “Good Morning” every
one second, second thread displays “Hello” every two seconds and the third thread displays
“Welcome” every three seconds.
18. Write a JAVA program which uses FileInputStream / FileOutPutStream Classes.
19. Write a JAVA program to list all the files in a directory including the files present in all its
subdirectories.
20. Write a JAVA program to demonstrate the life cycle of applet.
Page 21 of 46
COURSE OBJECTIVE:
Understand and Demonstrate Operating System concepts in general.
To acquire through understanding of process synchronization and Deadlock prevention, avoidance and recovery.
Analyze Memory management strategies and implement file/disk management concept.
Analyze operating system protection and implement virtual machines.
Text Books:
1. Abraham Silberschatz, Peter Baer Galvin, Greg Gagne: Operating Systems Concepts, 9th
Edition, 2016 India, Wiley.
Reference Books:
1. William Stallings, “Operating Systems-Internals and Design Principles”, Pearson, 9th
Edition, 2018
2. D M Dhamdhere: Operating Systems – A Concept Based Approach, 3rd Edition, Tata
McGraw – Hill, 2015.
3. .Harvey M Deitel, Paul J Deitel, Dr Choffnes,“Operating Systems”, Pearson Education Limited
(Publisher), 3rd Edition, 2013.
4. J. Archer Harris, John Cordani, “ Operating Systems”, Schaum's Outline, Indian Edition, Mc
Page 22 of 46
COURSE OBJECTIVE:
High-level understanding of major DBMS components and their function.
To model an application’s data requirements using conceptual modeling tools like ER diagrams and design
database schemas based on the conceptual model.
To program a data-intensive application using DBMS APIs.
To identify and analyze user needs and take them into account in the selection, creation, evaluation and
administration of computer- based systems.
Text Books:
1. Elmasri and Navathe: Fundamentals of Database Systems, 7th Edition, Addison -Wesley,
2016.
2. Silberschatz, Korth and Sudharshan Data base System Concepts, 7th Edition, Tata McGraw
Hill, 2019.
References:
1. C.J. Date, A. Kannan, S. Swamynatham: An Introduction to Database Systems, 8th Edition,
Pearson education, 2009
2. Database Management Systems :Raghu Ramakrishnan and Johannes Gehrke: , 3rd Edition,
McGraw-Hill, 2003
Page 25 of 46
COURSE OBJECTIVE:
Understand the advanced networking concepts
Apply various networking classifications in day-to-day computing
Analyze the importance of routing and congestion control principles
Access the different routing protocol methods in the networking support layers
Text Books:
1. Behrouz A. Forouzan, “Data Communications and Networking”, 5th Edition, McGraw Hill
Education, 2013.
Reference Books:
1. Andrew S. Tanenbaum, David J. Wetherall, “Computer Networks”, 5th Edition, Prentice Hall,
2011.
2. Larry L. Peterson and Bruce S. Davie, “Computer Networks A System Approach”, 5th Edition,
MKP, 2012.
3. James F. Kurose , Keith W. Ross, “ Computer Networking, A Top-Down Approach”, 5th
Edition, Pearson, 2012.
Web Resources:
1. https://www.geeksforgeeks.org/computer-network-tutorials/
2. https://codescracker.com/networking/
3. https://youtube.com/playlist?list=PLxCzCOWd7aiGFBD2-2joCpWOLUrDLvVV_
Page 26 of 46
COURSE OBJECTIVE:
To understand principles of Agile software development and evolution.
To design, formulate, and solve complex engineering problems by applying principles of SE.
To Learn Time measurement,Time management and Quality assurance techniques.
To analyse communication and planning in Distributed Agile Projects.
Proficiently apply standards, CASE tools and techniques for engineering software projects
Planning:
The Stand-Up Meeting, Design and Refactoring, Abstraction in Learning Environments, Teaching
and Learning Principles. Trust: Overview, Objectives, Software Intangibility and Process
Transparency, Game Theory Perspective in Software Development, Ethics in Agile Teams,
Diversity, Trust in Learning Environments, Teaching and Learning Principle. Globalization:
Overview, Objectives, Study Questions, The Agile Approach in Global Software Development,
Communication in Distributed Agile Teams, Planning in Distributed Agile Projects, Case Study,
Tracking Agile Distributed Projects, Reflective Processes in Agile Distributed Teams,
Text Books:
1. Orit Hazzan and Yael Dubinsky, Agile Software Engineering, Springer, 2009
2. Bernd Bruegge, Alan H Dutoit, Object-Oriented Software Engineering, Pearson Education,
3rd edition, 2014.
3. David C. Kung, “Object oriented software engineering”, Tata McGraw Hill,2015
Reference books:
1. Cockburn, Agile Software Development, Pearson Education India
2. Mike Cohn, Agile Estimating and Planning, Pearson Education, 2005
3. Michele Sliger, Stacia Broderick, The Software Project Manager's Bridge to Agility, Addison-
Wesley Professional, 2008
Web Resources:
1. www.allaboutagile.com/what-is-agile-10-key-principles/
2. https://www.versionone.com/agile
3. https://www.youtube.com/watch?v=MTEl3LEI4EQ
4. https://azure.microsoft.com/en-in/cloud-adoption-framework/
Page 28 of 46
COURSE OBJECTIVE:
To understand and develop efficient algorithms for simple computational tasks.
To apply knowledge of computing and mathematics to algorithm design.
To design and implement algorithms for moderately difficult computational problems, using various algorithm
design techniques.
To analyze range of behaviors of algorithms and the notion of tractable and intractable.
Text Books:
1. Anany Levitin, “Introduction to the Design and Analysis of Algorithms”, 3rd Edition, Pearson,
2012.
2. Horowitz, Sahni, Rajasekaran, “Fundamentals of Computer Algorithms”, 2/e, Universities
Press, 2007.
Reference Books:
1. Thomas H. Cormen, Charles E. Leiserson, Ronald L. Rivest, Clifford Stein, “Introduction to
Algorithms”, 3rd Edition, The MIT Press, 2009.
2. A.V. Aho, J.E. Hopcroft, J.D. Ullmann, “The design and analysis of Computer Algorithms”,
Addison Wesley Boston, 1983.
3. Jon Kleinberg, Eva Tardos, “Algorithm Design”, Pearson Education, 2006.
Web Resources:
1. https://onlinecourses.nptel.ac.in/noc20_cs27/preview
2. https://web.stanford.edu/class/archive/cs/cs161/cs161.1138/
Page 29 of 46
COURSE OBJECTIVE:
To understand the main concepts, models, technologies, and services of AI, the reasons for the use of AI, and its
advantages and disadvantages.
Design user interfaces to improve human–AI interaction and real- time decision-making.
Develop systems that process unstructured, uncurated data automatically using artificial intelligence (AI)
frameworks and platforms.
Evaluate and Analyze datasets with the following unsupervised learning methods:for dimensionality reduction;
for grouping, k-means clustering and hierarchical clustering.
Text Books:
1. Stuart Russel, Peter Norvig, “Artificial Intelligence A Modern Approach”, 4th Edition,
Pearson Education, 2020.
2. Ela Kumar, “Artificial Intelligence”, I.K.International Publishing House Pvt.Ltd, 2008.
Reference Books:
1. Elaine Rich, Kevin Knight, “Artificial Intelligence”, 3rd Edition, Tata McGraw Hill, 2009.
2. Nils J. Nilsson,” Principles of Artificial Intelligence”, Elsevier, 1980.
Page 30 of 46
3. Dan W. Patterson, “Introduction to AI and ES”, Pearson Education, 2007. (Unit- 3).
4. Andries P. Engelbrecht, "Computational Intelligence: An Introduction", John Wiley & Sons,
2nd edition, 2007.
5. John J. Craig, “Introduction to Robotics”, Addison Wesley publication.
Web Resources:
1. https://www.journals.elsevier.com/artificial-intelligence
2. https://nptel.ac.in/courses/106/105/106105078/
3. http://neuralnetworksanddeeplearning.com/
4. https://nptel.ac.in/courses/106/106/106106226/
5. https://ocw.mit.edu/courses/electrical-engineering-and-computer-science/6-034-artificial-
intelligence-fall-2010/lecture-videos/
Page 31 of 46
COURSE OBJECTIVE:
To practice the designing, developing and querying a database.
To use MySQL/Oracle database to implement the following Case Studies:
1. Company database
2. Library Database
3. Student Management systems
To Analyze the problem carefully and Identify the entities, attributes and primary keys for all the entities.
Apply cardinalities for each relationship, DDL and DML commands.
Using SQL Special operators,Aggregate functions, SQL Joins.
PART – A
1. Draw E-R diagram and convert entities and relationships to relation table for a given scenario.
a. Two assignments shall be carried out i.e. consider two different scenarios (eg. bank, college)
8. For each department that has more than five employees, retrieve the department number and
number of employees who are making salary more than 40000.
9. For each project on which more than two employees work, retrieve the project number, project name
and the number of employees who work on that project.
10. For a given set of relation tables perform the following
a. Creating Views (with and without check option), Dropping views, Selecting from a
view
PART B
Create the following tables with properly specifying Primary keys, Foreign keys and solve the
following queries.
2. a. List the details of Students who are all studying in 2nd sem MCA.
b. List the students who are not borrowed any books.
4. a. Display the student details who borrowed more than two books.
b.Display the student details who borrowed books of more than one Author.
9. a. Find the students whose name starts with the alphabet “S”.
b. Update the column total by adding the columns mark1, mark2, mark3.
COURSE OBJECTIVE:
Demonstrate the working of basic commands of Unix environment including file processing.
Apply Regular expression to perform pattern matching using utilities like grep, sed and awk.
Implement unix commands/ system calls to demonstrate process management Demonstrate the usage of
different shell commands, variable and AWK filtering to the given problem.
Develop shell scripts for developing the simple applications to the given problem
PART-A
2. Write a shell script that displays list of all the files in the current directory to which
the user has read, write and execute permissions.
3. Write a shell script that accepts a list of file names as its arguments, count and reports
the occurrence of each word that is present in the first argument file on other argument
files.
4. Write a shell script that accepts one or more file name as arguments and converts
all of them to uppercase, provided they exist in the current directory.
6. Write a shell script which accepts two file names as arguments. Compare the contents.
If they are same, then delete the second file.
10. Write a shell script to read three text files in the current directory and merge them
into a single file and returns a file descriptor for the new file.
Page 35 of 46
PART-B
1. Write a program to copy a file into another using system calls.
2. Write a program using system call: create, open, write, close, stat, fstat, lseek.
3. Write a program to create a child process and allow the parent to display “parent” and
the child to display “child” on the screen.
4. Write a program to create a Zombie process.
9. Write a program that illustrates inter process communication using shared memory
system calls.
Reference Books:
COURSE OBJECTIVE:
To Understand the basics of mathematics in quantitative aptitude.
Apply the Quantitative aptitude problem-solving skills in solving a real-world problem and enrich their
knowledge and develop their logical reasoning thinking ability.
To demonstrate teaching and research aptitude skills for their lifelong learning.
To Analyze holistically the higher education system and Develop skills to meet the competitive
examinations for a better job opportunity.
UNIT – I [8 Hours]
Numbers Property – Simplification – Divisibility – HCF and LCM – Decimal Fractions –Square
roots and Cube Roots – Logarithms – Antilogarithms - Surds and indices - Permutation and
Combination – Probability – Odd man out series - Number series - letter series – codes –
Relationships – classification.
UNIT – II [7 Hours]
Time and work – Problems on Ages – Calendar – Clock – Pipes and Cistern – Time and Distance –
Problems of Train – Boats and Streams. Area – Volume and surface Areas – Heights and Distances
– Data Interpretation: Tabulation – Bar Graphs – Pie Charts – Line Graphs. Data Interpretation -
Sources, acquisition and interpretation of data; Quantitative and qualitative data; Graphical
representation and mapping of data.
UNIT – IV [7 Hours]
Teaching: Nature, objectives, characteristics and basic requirements; Learner's characteristics;
Factors affecting teaching; Methods of teaching; Teaching aids; Evaluation systems. Research
Aptitude: Meaning, characteristics and types; Steps of research; Methods of research; Research
Ethics; Paper, article, workshop, seminar, conference and symposium; Thesis writing: its
characteristics and format. Reading Comprehension: A passage to be set with questions to be
answered. Communication: Nature, characteristics, types, barriers and effective classroom
communication.
UNIT – V [7 Hours]
Higher Education System: Governance, Polity and Administration; Structure of the institutions for
higher learning and research in India; formal and distance education; professional/technical and
general education; value education: governance, polity and administration; concept, institutions
Page 37 of 46
Reference
1. R.S. Aggarwal, Quantitative Aptitude, S. Chand & Company, New Delhi, 2012
2. Govind Prasad Singh and Rakesh Kumar, Text Book of Quickest Mathematics (for all
Competitive Examinations),
3. Kiran Prakashan, 2012.R.S. Aggarwal, Objective Arithmetic, S. Chand & Company, New
Delhi, 2005.
4. Dr. Lal,Jain,Dr. K. C. Vashistha, “U.G.C.- NET/JRF/SET Teaching & Research Aptitude”,
Upkar Prakashan, 2010.
5. “UGC NET/SLET: Teaching & Research Aptitude”, Bright Publications, 2010.
Page 38 of 46
COURSE OBJECTIVE:
Identify the research area and articulate the research steps in a proper sequence for the given problem.
Carry out a literature survey, define the problem statement and suggest a suitable solution for the given
problem, and present it in the research paper format (IEEE).
Analyze the problem and conduct experimental design with the samplings
Perform tabulation and graphical representation of collected data and obtain statistical inference.
To evaluate the research outcome through a research report.
UNIT – I
Introduction: Definition and objectives of Research – Types of research, Various Steps in Research
process, Mathematical tools for analysis, Developing a research questionChoice of a problem
Literature review, Surveying, synthesizing, critical analysis, reading materials, reviewing,
rethinking, critical evaluation, interpretation, Research Purposes, Ethics in research – APA Ethics
code.
Reference
1. C.R. Kothari, Research Methodology Methods and Techniques, 2/e, Vishwa Prakashan, 2006.
2. Donald H.McBurney, Research Methods, 5th Edition, Thomson Learning, ISBN:81-315-0047-
0,2006.
3. Donald R. Cooper, Pamela S. Schindler, Business Research Methods, 8/e, Tata McGraw-Hill Co.
Ltd., 2006.
4. Fuzzy Logic with Engg Applications, Timothy J.Ross, Wiley Publications, 2nd Edition, 2004.
5. Simulated Annealing: Theory and Applications (Mathematics and Its Applications, by P.J. van
Laarhoven & E.H. Aarts[e], 19.
6. Genetic Algorithms in Search, Optimization, and Machine Learning by David E. publisher
Page 39 of 46
COURSE OBJECTIVE:
Understand the need for data and pre-processing, machine learning techniques for various applications.
Identify and apply the appropriate techniques to process the data and solve the applications using machine
learning techniques
Implement machine learning techniques for real life problem.
Evaluate the different data processing and machine learning techniques for various application
Module 2: Supervised Learning with KNN, ANN, SVM [10 Hours] Instance-
based learning: k-nearest neighbour learning, Artificial Neural networks: Introduction, Perceptrons,
Multi-layer networks and back-propagation, Activation Units, Support Vector Machines – margin
and maximization, SVM - The primal problem, the Lagrangian dual, SVM – Solution to the Lagrangian
dual.
Reference Books:
1. Ethem Alpaydin,"Introduction to Machine Learning”, MIT Press, Prentice Hall of India, Third
Page 40 of 46
Edition 2014
2. Jiawei Han and Micheline Kambers and Jian Pei, “Data Mining –Concepts and Techniques”, 3rd
edition, Morgan Kaufman Pub
3. Charu C. Aggarwal, “Data Classification Algorithms and Applications”, CRC Press, 2014.
4. Charu C. Aggarwal, “DATA CLUSTERING Algorithms and Applications”, CRC Press, 2014.
COURSE OBJECTIVE:
Understand the fundamentals of big data analytics frameworks.
Apply big data analytics frameworks and visualization techniques to solve problems.
Analyze the use of HDFS ecosystem, HDFS architecture, Yarn, Pig, Hive QL.
Asses the solutions of big data analytics ecosystems.
Case Study: Implement your leanings to find sectors in which different companies ought to inves
Page 42 of 46
Reference
1. Seema Acharya, Subhasini Chellappan, "Big Data Analytics" Wiley 2015.
2. Tom White “ Hadoop: The Definitive Guide” Third Edit on, O’reily Media, 2012.
3. Big Data Analytics: From Strategic Planning to Enterprise Integration with Tools, Techniques,
NoSQL, and Graph. By David Loshin, Elsevier, August 23, 2013.
4. White, T. (2012). Hadoop: The definitive guide. " O'Reilly Media, Inc."Smolan, R. (2013). The
human face of big data.
5. Tom Plunkett, Mark Hornick, “Using R to Unlock the Value of Big Data: Big Data Analytics
with Oracle R Enterprise and Oracle R Connector for Hadoop”, McGraw-Hill/Osborne Media
(2013), Oracle press.
6. Mayer-Schönberger, V., & Cukier, K. (2013). Big data: A revolution that will transform how we
live, work, and think. Houghton Mifflin Harcourt. Holmes, A. (2012). Hadoop in practice.
Manning Publications Co..
7. Simon, P. (2013). Too big to ignore: the business case for big data (Vol. 72). John Wiley & Sons.
8. Robert D. Schneider , Hadoop for Dummies, Wiley India.
Page 43 of 46
COURSE OBJECTIVE:
To understand basics of cryptography and network security by symmetric encryption techniques for given
applications
To apply block, stream ciphers to secure messages over insecure channels
To analyze methods for message authentication and access control
To evaluate how to encrypt application layer data to identify users and protect information
To examine various protocols for intrusion detection and prevention against network threats
References
1. William Stallings, Cryptography and Network Security: Principles and Practice, 7th Edition,
Pearson
Page 44 of 46
COURSE OBJECTIVE:
This course provides knowledge and skills on recent technologies in cloud computing.
It is designed to meet the current business needs in the market. It provides a platform for the students to create
innovative and robust applications on cloud platform.
It provides in depth knowledge of Cloud domain and cover the topics of cloud infrastructures, virtualization,
software defined networks and storage, cloud storage, and programming models.
It will develop the skills needed to become a practitioner or carry out research projects in cloud domain.
References:
1. George Reese, “Cloud Application Architectures: Building Applications and Infrastructure in
the Cloud” O'Reilly Gautam Shroff, Enterprise Cloud Computing, Cambridge University
Press,2011
2. Judith Hurwitz, R Bloor, M.Kanfman, F.Halper “Cloud Computing for Dummies”, Wiley
India Edition, First Edition
3. Rajkumar Buyya, James Broberg, Andrzej M. Goscinski, “Cloud Computing : Principles and
Paradigms”, Wiley Publication,2011
4. Kai Hwang, Geoffrey C Fox, Jack G Dongarra, “Distributed and Cloud Computing, From
ParallelProcessing to the Internet of Things”, Morgan Kaufmann Publishers, 2012
5. RajkumarBuyya, Christian Vecchiola, S.ThamaraiSelvi, ‘Mastering Cloud Computing”,
TMGH,2013
Page 46 of 46
COURSE OBJECTIVE:
Understand the basic constructs of the web concepts
Apply the concepts to design and implement the web solutions for the given solutions.
To evaluate server-side web application development framework
To illustrate responsive web pages using ajax and rails
Analyze the web components in buildings and application