MCA Syllabus Sri Sri University
MCA Syllabus Sri Sri University
MCA Syllabus Sri Sri University
FACULTY OF SCIENCE
DOCS-Department of Computer Science
AEC- Ability Enhancement Compulsory, CC - Core Course, CCP -Core Course Practical, GE- Generic Elective,
GEP- Generic Elective Practical, SEC- Skill Enhancement Course, SECP- Skill Enhancement Course Practical,
1
Preamble
Education is the key to development of any society. Role of higher education is crucial for securing right kind of
employment and also to pursue further studies in best available world class institutes elsewhere within and
outside India. Quality education in general and higher education in particular deserves high priority to enable
the young and future generation of students to acquire skill, training and knowledge in order to enhance their
thinking, creativity, comprehension and application abilities and prepare them to compete, succeed and excel
globally. Sustained initiatives are required to reform the present higher education system for improving and
upgrading the academic resources and learning environments by raising the quality of teaching and standards of
achievements in learning outcomes in undergraduate program in professional streams of higher education like
computer science. One of the significant reforms in the postgraduate education is to introduce the Learning
Outcomes-based Curriculum Framework (LOCF) which makes it student- centric, interactive and outcome-
oriented with well-defined aims, objectives and goals to achieve. LOCF also aims at ensuring uniform
education standard and content delivery across the country which will help the students to ensure similar
quality of education irrespective of the institute and location. With initiatives of University Grants Commission
(UGC) for nation-wide adoption and implementation of the LOCF for PG programmes in colleges, universities
and HEIs in general.So Two Year MCA at Sri Sri University is designed as per LOCF & as per UGC
guidelines.
The main objective of Two Year MCA program at Sri Sri University is to prepare a comprehensive course
structure with detailed syllabus along with quality reading material in order to have a uniform standard of
education in undergraduate Computer Science programme among students. This document shall serve as a
model document across the higher education institutes (HEIs) in the country for teachers, students and academic
administrators. It is a student centric framework where they are expected to learn fundamentals of computer
science along with the latest trends and techniques like Artificial Intelligence, Internet of Things, Machine
Intelligence,Cloud Computing alongwith advanced skillsets that include Mobile Application Development,
Object Oriented Programming among many other courses. It will help the students to be equipped with
fundamental as well as advanced and latest technologies in computer science after completion of the programme
Introduction
MCA has been evolving as an important branch of science and engineering throughout the world in last couple
of decades and it has carved out a space for itself like any other disciplines of basic science and engineering.
Computer science is a discipline that spans theory and practice and it requires thinking both in abstract terms
and in concrete terms. Nowadays, practically everyone is a computer user, and many people are even computer
programmers. Computer Science can be seen on a higher level, as a science of problem solving and problem
2
solving requires precision, creativity, and careful reasoning. The ever-evolving discipline of computer science
also has strong connections to other disciplines. Many problems in science, engineering, health care, business,
and other areas can be solved effectively with computers, but finding a solution requires both computer science
expertise and knowledge of the particular application domain.
MCA has a wide range of specialties. These include Computer Architecture, Software Systems, Graphics,
Artificial Intelligence, Computational Science, and Software Engineering. Drawing from a common core of
computer science knowledge, each specialty area focuses on specific challenges. Computer Science is practised
by mathematicians, scientists and engineers. Mathematics, the origins of Computer Science, provides reason
and logic. Science provides the methodology for learning and refinement. Engineering provides the techniques
for building hardware and software.
MCA will commence at Sri Sri University in this year 2020, as this discipline evolved itself to a
multidisciplinary discipline. Information Technology is growing rapidly. Increasing applications of computers
in almost all areas of human endeavor has led to vibrant industries with concurrent rapid change in technology.
Unlike other basic disciplines, developing core competency in this discipline that can be reasonably stable
becomes a challenge.
Career Objective
Two Year MCA is aimed at postgraduate level training facilitating multiple career paths. Students so
graduated, can take up postgraduate programmes in CS leading to research as well as R&D, can be
employable at IT industries, or can pursue a teachers’ training programme such BEd in Computer Education,
or can adopt a business management career. . There are several employment opportunities and after
successful completion of an MCA. Graduating students can fetch employment directly in companies as Web
Developer, Software Engineer, Network Administrator, Data Scientist, or AI/ML personnel,system
administrator etc.
The Learning Outcome-based Curriculum Framework in MCA is aimed at allowing flexibility and innovation in
design and development of course content, in method of imparting training, in teaching learning process and in
assessment procedures of the learning outcomes. The emphasis in computer science courses, in outcome-based
curriculum framework, help students learn solving problems, accomplishing IT tasks, and expressing
creativity, both individually and collaboratively. The proposed framework will help Students learn
programming techniques and the syntax of one or more programming languages.
3
Many of the learning outcomes of MCA can be achieved only by programming a computer for several different
meaningful purposes. All students must, therefore, have access to a computer with a modern programming
language installed. The computer science framework does not prescribe a specific language. The teacher and
students will decide which modern programming languages students will learn. More importantly, students
will learn to adapt to changes in programming languages and learn new languages as they are developed.
The present Learning Outcome-based Curriculum Framework for MCA is intended to facilitate the students to
achieve the following.
1.To develop an understanding and knowledge of the basic theory of Computer Science and Information
Technology with good foundation on theory, systems and applications such as algorithms, data structures, data
handling, data communication and computation.
2.To develop the ability to use this knowledge to analyse new situations
3.To acquire necessary and state-of-the-art skills to take up industry challenges. The objectives and outcomes
are carefully designed to suit to the above-mentioned purpose.
4.The ability to synthesize the acquired knowledge, understanding and experience for a better and improved
comprehension of the real-life problems
5.To learn skills and tools like mathematics, statistics, physics and electronics to find the solution, interpret
the results and make predictions for the future developments.
4
Curriculum Planning- Learning Outcomes-based Approach for MCA
MCA in India is generally a two-year degree program which develops advanced
theoretical and research skills in subject . It is an appropriate course for students who
wish to pursue Mphil(CS) or Doctor of Philosophy (PhD) in CS and a research or
academic career. This program facilitates students who wish to pursue an independent
research project in an area of interest under the supervision of an academic.
MCA focus on the concepts and techniques used in the design and development of software
systems. Students in this program explore the conceptual underpinnings of Computer Science
-- its fundamental algorithms, programming languages, operating systems, and software
engineering techniques. In addition, students choose from a rich set of electives that includes
data science, computer graphics, artificial intelligence, database systems, computer architecture,
and computer networks, among other topics. A generous allotment of free electives allows
students to combine study in computer science with study in auxiliary fields to formulate a
program that combines experiences across disciplines.
Programme Learning Outcomes for MCA
The MCA program enables students to attain, by the time of completion :
PLO-E. Display ethical code of conduct in usage of Internet and Cyber systems.
PLO-F. Ability to pursue higher studies of specialization and to take up technical
employment.
PLO-G. Ability to formulate, to model, to design solutions, procedure and to use software
tools to solve real world problems and evaluate .
PLO-H. Ability to operate, manage, deploy, configure computer network, hardware,
software operation of an organization.
PLO-I.Ability to present result using different presentation tools.
PLO-J. Ability to appreciate emerging technologies and tools.
PLO-K. Apply standard Software Engineering practices and strategies in real-time
software project development
PLO-L. Design and develop computer programs/computer -based systems in the
areas related to algorithms, networking, web design, cloud computing, IoT and data
analytics.
PLO-N. The ability to apply the knowledge and understanding noted above to the
analysis of a given information handling problem.
PLO-O. The ability to work independently on a substantial software project and as
an effective team member.
Course Structure & Syllabus
MCA Semester-I
Subject Subjects Name Contact Credits Examination Scheme
Code Hours per
Week
L P L P Total Internal Theory Prac Total
Assessment
MCA101 Design Analysis and Algorithms 4 4 4 40 60 100
MCA102 Database Management System 4 4 4 40 60 100
(DBMS)
MCA103 Computer Networks 4 4 4 40 60 100
MCA104 Cloud Computing 4 4 4 40 60 100
MCA105 Optimization Techniques 4 4 4 40 60 100
MCA106 DAA - LAB 2X2=4 2 2 40 -- 60 100
MCA Semester-IV
Subject Subjects Name Contact Credits Examination Scheme
Code Hours
per Week
L P Total Evaluation Evaluation Prac Total
by the by the
Industry Institute
(Report &
Institute
Viva
MCA401 Industrial Training cum 30 10 40 500 500 1000
Project/ Entrepreneurship
Training cum Project
Total Contact Hours per Week=40 Total Credits=40 Total Marks = 1000
MCA FIRST SEMESTER
MCA 101 Design Analysis and Algorithms
Module 1 (10 Hours)
INTRODUCTION
Computing a Binomial Coefficient – Warshall’s and Floyd’s algorithm – Optimal Binary Search
Trees – Knapsack Problem and Memory functions. Greedy Technique– Prim’s algorithm-
Kruskal’s Algorithm- Dijkstra’s Algorithm-Huffman Trees.
ITERATIVE IMPROVEMENT
The Simplex Method-The Maximum-Flow Problem – Maximum Matching in Bipartite Graphs-
the Stable marriage Problem.
Module 5 (6 Hours)
Portion covered can be tested through Internal evaluation only not to be included in
University examination)
Text Books:
1. Thomas H.Cormen, Charles E.Leiserson, Ronald L. Rivest and Clifford Stein,
“Introduction to Algorithms”, Third Edition, PHI Learning Private Limited, 2012.
2. Anany Levitin, “Introduction to the Design and Analysis of Algorithms”, Third Edition,
Pearson Education, 2012.
REFERENCES:
1. Alfred V. Aho, John E. Hopcroft and Jeffrey D. Ullman, “Data Structures and
Algorithms”, Pearson Education, Reprint 2006.
2. Donald E. Knuth, “The Art of Computer Programming”, Volumes 1& 3 Pearson
Education, 2009. Steven S. Skiena, “The Algorithm Design Manual”, Second Edition,
Springer, 2008
3. http://nptel.ac.in/
MCA-102 Database Management System (DBMS)
Module1 :( 10Hours)
Introductory concepts of DBMS:
Introduction and applications of DBMS, Purpose of data base, Data, Independence,
Database System architecture- levels, Mappings, Database, users and DBA
Relational Model:
Structure of relational databases, Domains, Relations, Relational algebra – fundamental
operators and syntax, relational algebra queries, tuple relational calculus
Transaction Management:
Transaction concepts, properties of transactions, serializability of transactions, testing for
serializability, System recovery, Two- Phase Commit protocol, Recovery and Atomicity, Log-
based recovery, concurrent executions of transactions and related problems, Locking
mechanism, solution to concurrency related problems, deadlock, , two-phase locking
protocol, Isolation, Intent locking
Module 5 (6 Hours)
(As per choice of faculty)
(Portion covered can be tested through Internal evaluation only not to be included in
University examination)
Text Books:
1. Abraham Silberschatz, Henry F. Korth and S. Sudarshan, “Database Systems
Concepts”, McGraw-Hill Education , New Delhi
2. RamezElmasri and Shamkant B. Navathe, “Fundamentals of Database Systems”,
Pearson Education Inc., New Delhi. Reference Books:
1. Hector Garcia-Molina, Jeffret D. Ullman, JennifferWidom, “Database Systems: A
Complete Book”, Pearson Education Inc., New Delhi.
2. C. J. Date “An introduction to Database System”, Pearson Education Inc., New Delhi.
3. Bipin Desai, “An introduction to Database System”, Galgotia Publications.
4. Peter Rob & Carlos Coronel, “Database Systems: Design, Implementation, and
Management”, CENGAGE Learning India Pvt. Ltd., New Delhi.
5. Mark L. Gillenson, “Fundamentals of Database Management Systems”, Wiley India
Pvt. Ltd., New delhi.
6. Raghu Ramakrishnan, Johannes Gehrke, “Database Management Systems”, McGraw-
Hill Education (India), New Delhi.
Module 5 (6 Hours)
(as per choice of faculty)
Portion covered can be tested through Internal evaluation only not to be included in
University examination) Preferably use of NetSim, NS2
TEXT BOOK :
1. Larry L. Peterson, Bruce S. Davie, “Computer Networks: A Systems Approach”, Third
Edition,Morgan Kauffmann Publishers Inc., 2003.
REFERENCES:
1. JamesF.Kuross,KeithW.Ross,“Computer Networking,ATop
DownApproachFeaturingtheInternet”,Third Edition,Addison Wesley, 2004.
2. NaderF.Mir,“Computer andCommunicationNetworks”,PearsonEducation,2007
3. Comer, “ComputerNetworks andInternetswithInternetApplications”,Fourth Edition,
PearsonEducation,2003.
4. Andrew S.Tanenbaum,“Computer Networks”,FourthEdition,2003.
5. William Stallings, “Data and Computer Communication”, Sixth Edition, Pearson
Education,2000
TEXT BOOK :
1. Barrie Sosinsky, “Cloud Computing Bible”, Wiley-India, 2010
2. Rajkumar Buyya, James Broberg, Andrzej, M. Goscinski, “Cloud
3.Computing Principles & Paradigms”, Wiley-2011.
4.Cloud computing for dummies,wiley publication
UNIT-I
Basics of idea of optimization of a function: Extremizer of function of single variable, and several
variables, local minimizer and global minimizer of functions. Concept of critical points. feasible
regions, convex region. Constrained optimization, unconstrained optimization. Introduction to linear
programming problem(lpp). Formulation of lpp. Basic feasible solution of set of linear constraints.
Determination feasible solutions of lpp with two variables by graphical method, use of iso-profit line.
Different forms of lpp, standard form and canonical form.
UNIT-II
Solution of linear programming problem : Solution of lpp by simplex method, use of artificial
variable in solving lpp. Identifying initial basic feasible solution, solution of lpp by Big-M method, and
by two phase method. Duality in lpp , general rule for converting primal lpp to its dual. Dual simplex
method is solving special types of lpp. Duality theorems (discussions on statements only), duality
techniques in solving lpp.
UNIT-III
Special types of lpp : Introduction to transportation problem(TP) as an lpp. Solution of transportation
problem: searching initial basic feasible solution of transportation problem by Vogel’s method, test for
optimality in TP, improving feasible solution for optimality, optimal solution of TP by MODI method.
Degeneracy in TP. Introduction to assignment problem as special type of TP, solution of assignment
problem by Konig’s algorithm. Special type of assignment problem prohibited assignment and
traveling sales man problem.
UNIT-IV
Network Scheduling Problem: Introduction to network scheduling problem, Network and basic
components, rules of network construction. Network scheduling by Critical Path Method (CPM) and
Program Evaluation and Review method, distinction between CPM and PERT method.
UNIT-V
Non Linear Programming : One dimensional optimization, unimodal functions and its minimizer,
optimization of unimodular functions by function comparison methods-two point equal search method,
bisection method, golden section method; polynomial interpolation methods- quadratic interpretation,
cubic interpretation; iterative methods- Newton’s method, secant method. Unconstrained gradient
based optimizations; method of steepest descent method, conjugate gradient method, Newton type
method. Constrained optimization of non linear functions in function of several variables- Lagrange
multipliers method, optimization by using Khun-Tucker conditions.
Recommended Books:
1.Operations Research, K. Swarup, P. K. Gupta, M. Mohan, Sultan Chand & sons, New Delhi, 1990.
2. Optimization : Theory and Practice, M. C. Joshi, K. M. Moudgalya, Narosa Publishing House.
3.Optimization Techniques: An Introduction,L. R. Foulds,Springer-Verlag.
4. Optimization Techniques,Chander Mohan and Kusum Deep,New Age Science.
5. Operation Research : An Introduction, H. A Taha, Mc Millan Publishing Co, New York, 1986.
Module 5 (6 Hours)
(as per choice of faculty)
Portion covered can be tested through Internal evaluation only not to be included in
University examination)
Text Books:
1. Herbert Schildt, The Complete Reference Java 2, Fourth Edition, Tata McGraw
Hill-2001
2. Liang Y.Daniel, Introduction to Java Programming (7th Edition), 2009, Pearson
Education.
Reference Books:
1.Steven Holzner, Java 1.2, BPB-1998
2.E. Balaguruswami, Programming with Java - Second Edition, Tata McGraw
Hill1998.
3.Mughal K.A., Rasmussen R.W., A Programmer‟s Guide to Java Certification,
Addison-Wesley, 2000 `
Module 5 (6 Hours)
Portion covered can be tested through Internal evaluation only not to be included in
University examination)
Text Books:
1.Donald Hearn & M. Pauline Baker, “Computer Graphics with OpenGL”, Third Edition,
2004, Pearson Education, Inc. New Delhi.
2.Ze-NianLi and Mark S. Drew, “Fundamentals of Multimedia”, First Edition, 2004, PHI
Learning Pvt. Ltd., New Delhi.
Reference Books:
Responsibilities of a Software project manager, project planning, Metrics for project size
estimation, Project estimation techniques, Empirical estimation techniques, COCOMO
models, Scheduling, Organization &team structure, Staffing, Risk management, Software
configuration management.
Emerging Topics:
Module 5 (6 Hours)
Portion covered can be tested through Internal evaluation only not to be included in
University examination)
Text Books:
Reference Books:
Introduction
UNIT-II
Mobile Commerce
Introduction to Mobile Commerce, Mobile Computing Application, Wireless Application
Protocols, WAP Technology, Mobile Information Devices, Web Security
Introduction to Web security, Firewalls & Transaction Security, Client Server Network,
Emerging Client Server Security Threats, firewalls & Network Security.
UNIT-III
Encryption
World Wide Web & Security, Encryption, Transaction security, Secret Key Encryption,
Public
Key Encryption, Virtual Private Network (VPM), Implementation Management Issues.
UNIT – IV
Electronic Payments
UNIT-V
Net Commerce
Books:
Syntax directed translation: Study of syntax directed definitions & syntax directed
translation schemes, implementation of SDTS, intermediate notations: postfix, syntax tree,
TAC, translation of expression, controls structures, declarations, procedure calls, Array
reference.
Storage allocation & Error Handling: Run time storage administration, stack allocation,
symbol table management, Error detection and recovery: lexical, syntactic, semantic.
Code optimization: Important code optimization techniques, loop optimization, control flow
analysis, data flow analysis, Loop invariant computation, Induction variable removal,
Elimination of Common sub expression.
Module 4 (10 Hours)
Text Books:
Module 5 (6 Hours)
(Portion covered can be tested through Internal evaluation only not to be included in
University examination)
Text Books
Reference Books
1. Lex and Yacc by Johan R. levine, Tonny Mason, et. al. O” Reilly and Assosiates.
“Compilers Design in C” Allen I. Holub, PHI eastern economy edition 2003.
MCA 208 Group Discussion/Seminar
Tasks:
Reading of newspapers, writing of articles, how to prepare seminars and reports, technical
paper writing skills, GD on current topics, invited guest for spoken English, HR personnel
from IT industries.
Read voraciously
Make a habit of reading voraciously on every subject. This will keep you ready for any
topic for a discussion in GD Your knowledge is your most important weapon in a
discussion.
Most of us have a misconception that initiating the discussion would give you an
advantage over others. It does give you an advantage but only if you know the subject
well and have something relevant to start the discussion otherwise it is a disadvantage.
For e.g. when a group was given a subject “Is Capital punishment right?” some members
of the group heard the word punishment and jumped at starting the discussion without
understanding the meaning of Capital Punishment. The evaluators kept hearing for 2
minutes after which they intervened and asked the group if they knew the meaning of
Capital Punishment. Not to say, the members who initiated were quite looking at each
other‟s faces. That is when a quite member of the group got up and explained the
meaning of the topic. From this incidence, you can easily tell who must have succeeded in
the GD, the ones who initiated the discussion or the one who explained the topic and gave
it a right direction.
They say, “Speaking just for the sake of speaking is noise”. So, don‟t create noise in the
GD rather make some useful and resourceful contributions to get noticed in the
discussion.
Be précised
Abstain from using irrelevant information and data from your talks during a GD Speak
precisely so that others also get a chance to put across their point of view.
Stay attentive to the ideas put forward by other group members and keep writing the
important points discussed during the GD As you get a chance to speak, put forward your
views about the topic. You can also agree or disagree with other‟s ideas, based on your
knowledge about the subject.
Speak confidently
Maintain your confidence as you speak. Establish eye contact with other members of the
group and do not let your voice tremble.
Moderate
Try to moderate the discussion if any arguments arise. This is necessary to ensure that
the group doesn‟t wander from the goal of the GD
Your body language should not demonstrate dominance or low self-confidence. Show
your interest in the discussion through your gestures like bending forward a bit, nodding
your head.
Be a team player
Last but not the least; be a team player as this is a group activity. Be comfortable with the
group members and vice versa.
Sample GD topics
• Reservation system should be stopped
• Donald Trump‟s presidency – Impact on India bad or good
• Divorce and remarriage should be encouraged
• Reservation for women would help the society
• Hindi movies are harming our society
• Live-in relationships should be encouraged
• India should be reorganized into smaller states
• IT boom and the growing pressure
• Smaller businesses and start-ups have more scope
• Developing countries need trade, not aid China is a threat to Indian IT industry
• Should agricultural subsidies be stopped?
• Multinational corporations: Are they devils in disguise?
• Business and Ethics do not go together
• India - really the NexGen superpower
• Fate of Apple after Steve Jobs
• FDI in Retail - Will really affect the farmers of India?
• EU Zone Crisis - reason for rising value of dollar
• US Debt Crisis - really has an impact on world market
• Should central government provide West Bengal a moratorium on loan
repayments?
• Sanctions against Iran - right or wrong?
• FDI in Indian retail should be welcomed
• China market - a threat to Indian market
• Black money in tax heavens - declared national property Rising petrol prices -
Govt. can control? Government should give up the control on CBI US war
on Iraq-justified or not?
• Depreciation of Indian Rupee has only negative impact on the economy Nokia
and Microsoft are a planned alliance or desperate move? RBI cannot control
inflation with its temporary monetary policies
• Ditching the Kyoto Protocol - Is India's objection on EU justified?
THIRD SEMESTER
Books:
1. Stuart Russell and Peter Norvig, Artificial Intelligence: A Modern Approach, 2nd Edition,
Pearson Education.
2. Elaine Rich, Kevin Knight, Shivshankar B Nair, Artificial Intelligence, McGraw Hill, 3rd
Edition.
3. Nills J. Nilsson, “Artificial Intelligence: A New Synthesis”, 2nd Edition, 2000, Elsevier India
Publications, New Delhi.
4. Michael Negnevitsky, “Artificial Intelligence: A Guide to Intelligent Systems”, Second
Edition, 2005, Pearson Education, Inc. New Delhi.
5. Dan W. Patterson, “Introduction to Artificial Intelligence and Expert Systems”, 1st Edition,
1996, PHI Learning Pvt. Ltd., New Delhi.
6. Ben Coppin, “Artificial Intelligence Illuminated”, 2005, Narosa Publication, New Delhi.
ISBN: 978-81-7319-671-3
This course will give a high level understanding of what information is, what business is and how information is key to
successful execution of a business. It will help understanding the evolution of information system from a traditional way
of dealing with information to a level how information is a business enabler. It also covers the tools and techniques
deployed to expedite the information processing and controlled dissemination of information.
References
1. Management Information Systems by Kenneth C Laudon- Prentice Hall. 2.
Business Information Systems by Robert C Nickerson, Prentice Hall
MCA304 (Elective-II )
Elective-II (Choose any one)
1. MCA 304A: Cryptography and Cyber Law
2. MCA 304B: Information Security and Management
3. MCA 304C: Parallel Computing
4. MCA 304D: Business Analytics and Big Data
5. MCA 304E: Dot Net Programming
MCA305 (Elective-III)
Elective-III (Choose any one)
1. MCA 305A: Distributed System / Distributed Technology
2. MCA 305B Cloud Computing
3. MCA 305C: Microprocessor & Assembly Level Language Programming
4. MCA 305D: Foundations of Statistical Natural Processing (NLP)
5. MCA 305E: Soft Computing
MCA306 (Elective-IV)