It Ii 2011
It Ii 2011
RATIOALE
The objective of this course is to introduce the concept of PC hardware and its utilities. Students are able to
understand network concepts and networking administration in detailed. The ICT applications are very popular these days
specially is E-governance, computer based learning & EMIS.
COTETS
2. Utilities :
3. etworking Concepts:
3.1 Introduction
3.2 LAN,. WAN, MAN
3.3 Network Topologies
3.4 Transmission media & method of communication
3.5 Cabling : Straight through cross over
3.6 Study of components: switches, bridges, routers, WI FI routers etc.
3.7 Communication Protocol, TCP/IP
3.8 IP Addressing
3.9 MAC Address
3.10 Sub netting
4. etwork Administration:
PRACTICALS
1. Installation of Windows OS
2. Study of Window registry
3. Backup & Restore procedure of Windows.
4. Use of Compression Utilities.
5. Use of CD Writing Software.
6. To prepare straight & Cross over cable using standard color coding.
7. Install NIC, assigning of IP address to the system.
8. To Create simple LAN with two PC using single cross over cable to connect the workstation.
REFERECE BOOKS :
1. Upgrading & Repairing PC’s Scott & Muella, Techmedia, New Delhi
2. Computer Installation and Servicing D. Balasubramanian, TMH
3. Basic of Network NIIT, Prentice, Hall of India
4. Network Protocols & Slandered NIIT, Prentice, Hall of India
* * * * *
The aim of this course is to provide adequate knowledge about computer hardware. In this course student are taught
about evolution of the computer (how computer technology developed from the early days) CPU (Central processing unit)
architecture, Memory management, File organization, and other peripherals.
By acquiring adequate knowledge of this subject student may be able to understand the hardware functioning of the
computer and also get an overall idea of the computer system organization. After completing this course, the student will be
able to undertake maintenance and repair tasks of computer hardware at IC level.
COTETS
1. Overview of Computer Organization :
2.1 Register
2.2 Register transfer
2.3 Arithmetic micro operations
2.4 Logic micro operations
2.5 Shift micro operations
2.6 Control functions.
7. Memory Organization :
REFERECE BOOKS:
*****
4 Information Technology
This course is aimed at teaching the basic concepts of operating system principles, Memory management, job scheduling,
multiprogramming, concurrent device operations deadlocks, buffer management etc.
COTETS
1. Introduction :
4. Memory Management:
5. Virtual Memory:
6. File System:
7.1 Introduction
7.2 Hardware Concept: Multiprocessor and Multicomputer Systems
7.3 Software Concept: Network File System (NFS), Network Operating System (NOS) verses DOS
7.4 Design Issues: Transparency, Flexibility, Reliability, Performance, Scalability
REFERECE BOOKS :
* ****
'C' is system programming language and also structured programming language, In 'C' programming language we
consider various syntax used in programming. By having good knowledge of 'C', students can write modular application and
system programs. 'C' is mainly used in software developments, projects involving compiler design, operating system design,
system software etc. By acquiring a sound knowledge of 'C' students will be able to understand the concept of all the
application areas.
COTETS
1. Introduction :
2. Elements of ‘C’ :
3. Console Input-Output :
4. Control Flow :
6. Functions :
7. Pointers :
9. File Handling :
10.1 Array
10.2 Linked List
Information Technology 7
10.3 Stacks
10.4 Queues
10.5 Trees
10.6 Common Operation on Data Structures
PRACTICALS
REFERECE BOOKS :
1. Programming with 'C' Schaum's Series, TMH
2. 'C' Programming E. Balguru Swami, TMH
3. 'C' Programming Kernighan & Ritchie, TMH
4. Let us 'C' Yashwant Kanetkar, BPB
5. Data Structures & Algorithm R.S. Salaria, Khanna Pub.
*****
Basic digital electronics is the requirement of modern computer, microprocessor and digital communication systems.
On account of reliability and accuracy digital electronic systems are replacing conventional analog systems. A diploma pass
out having knowledge of digital system will be useful to the industries.
COTETS
1. Introduction :
2. umber System :
3.1 Introduction
3.2 Symbol and truth table of NOT, AND, OR, NAND, NOR, EX-
OR and EX-NOR gates
3.3 Universal gates
3.4 Positve, negative and tristate logic
8 Information Technology
4. Boolean Algebra :
4.1 Historical review - logical statements, logical constants and variables, truth table
4.2 Boolean operators
4.3 Postulates of Boolean algebra
4.4 Laws of Boolean algebra
4.5 Duality theorem
4.6 De' Morgan's theorem
4.7 Simplification of Boolean expressions
4.8 Verification of Boolean expressions using truth table
5.1 Representation of Boolean expression - min. and max. Term SOP, POS
5.2 Conversion of truth tables in POS and SOP form
5.3 Karnaugh map upto 4 variables - implication of logic function with and without don't care conditions
5.4 Realization of logic diagrams using NAND/NAND, NOR/NOR gate
6.6.1 4 to 1 multiplexer
6.6.2 16 to 1 multiplexer
6.7 Demultiplexer
6.7.1 1 to 4 Demultiplexer
6.7.2 1 to 16 Demultiplexer
6.8 Encoder
6.9 Decoder
7. Sequential Systems :
7.1 Introduction
7.2 Symbol, logic circuit, truth table of R-S, J-K, M/S J-K,D,T flip-flops
7.3 Edge and level triggering
7.4 Shift registers
7.4.1 Left, right and bi-direction
7.4.2 Series and parallel
7.4.3 Universal shift register
7.5 Asynchronous and synchronous counters - up, down and up-down
7.6 Mod counters - Mod 5, Mod 9, decade counter
7.7 Ring counters, Johnson counter
Information Technology 9
PRACTICALS
1. Verify the truth tables of NOT, AND, OR, NAND, NOR, EX-OR, EX-NOR gates
2. Design a NOT, AND, OR, EX-OR, EX-NOR gates using universal gates
3. Design a binary half and full adder
4. Design a binary half and full subtractor
5. Study of BCD to 7 segment decoder
6. Verify the truth table of RS, D, J-K, M/S J-K,D,T flip-flops.
7. Study of asynchronous binary ripple up, down and up-down and different mod counters
8. Study of synchronous counters
9. Study of decade counter
11. Study of programmable counter
12. Study of a shift register using flip flops
13. Study of ring counter using flip flops
REFERECE BOOKS :
*****
DATA COMMUICATIO
CODE IT 206 L T P
CS 206 2 2/2 --
RATIOALE
For the transmission and reception of signals in industry and domestic life the basic knowledge of communication
engineering is essential. The study of the subject provides the basic knowledge of various modulation, demodulation
technique which further provide the fundamentals to understands the operation of communication systems. Detailed
knowledge of radio receiver is also included in the syllabus.
COTETS
1. Introduction :
2.4 Digital Data Transmission : Parallel and Serial, Asynchronous and Synchronous
2.5 Modems
4.1 Introduction
4.2 Flow control & Error control
4.3 Types of errors : Single bit & burst errors
4.4 Error Detection & Correction
4.4.1 VRC, LRC, CRC
4.4.2 Checksum
4.4.3 Hamming Code
REFERECES BOOKS :
*****
RATIOALE
This course objective is to expose the students to the theoretical concepts of introduction to data base, physical and
logical data base, schema design, study of entity, rational diagram, different type of data base modules, also involves the
principle of designing relational data bases, normalisation process, storing and retrieval of data, securities, features of
locking.
An elementary introduction to the distributed data bases will be covered apart from this the students will be
completely exposed to the practical applications of dbase III, development of application software by getting exposures to the
commands, program development, After completion of the course the students will achieve full competence in the area of
application software development using data base.
Information Technology 11
COTETS
3.1 Introduction
3.2 Properties of Relational Tables
3.3 Differences between DBMS and RDBMS
3.4 Codd’s Rules of RDBMS
3.5 Integrity Constraints
3.5.1 Entity Integrity Constraints
3.5.2 Referential Integrity Constraints
3.6 Domain Integrity Constraits
3.7 Query Language
4. ormalization :
4.1 Normalization Concepts
4.2 Functional Dependencies
4.3 Lossless/Lossy Join Decomposition
4.4 Normal Forms
4.4.1 First Normal Form (1NF)
4.4.2 Second Normal Form (2NF)
4.4.3 Third Normal Form (3NF)
4.4.4 Boyce-Codd Normal Form (BCNF)
4.5 Multi-valued Dependency & Fourth normal Form
4.6 Join Dependency and Fifth Normal Form.
6. Deadlock Handling :
6.1 Introduction
6.2 Deadlock Detection
6.3 Recovery from Deadlock
REFERECES :
1. Database management System P.K. Yadav, S.K. Kataria & Sons, Delhi
2. An Introduction to Database System Bipin C. Desai, Galgotia Publications
3. Fundamentals of Database Systems R. Elmastri, S.B. Navathe, Pearson Education
4. An Introduction to Database management System (A-level) Satish jain, BPB Publication
5. Database Ssytems: Concepts, Design & Applications” S.K. Singh, Pearson Education
*****
Information Technology 13
E - COMMERCE
CODE IT 208 L T P
2 2/2 --
RATIOALE
Electronic commerce introduces both the theory & practices of doing business over the internet & word wide web.
The course looks briefly at the traditional practices of business & then gives an insight into the emerging technologies
leading to the concept of E-Commerce to improve standard business activities & product to operate in the global environment
of business.
Business & Security are two sides of the same coin in any business environment. Security threads to electronic
commerce is a ever growing problem. The course discusses many internal & external security threads to electronic
commerce. The role of copy right and intellectual property security and threats to them have also been included in this
course.
The course presents a comprehensive discussion of electronic payment system covering electronic cash, electronic
wallet technologies. Smart cards, and credit & charge cards.
COTETS
1. Fundamentals of E-Commerce :
1.1 Introduction
1.2 Objectives
1.3 Commerce – The Traditional way
2. Types of E-Commerce:
2.1 Introduction
2.2 Objectives
2.3 Types of Business Transactions
2.4 Business to Customer
2.5 Customer to Customer
2.6 Business to Business
3. Security of E-Commerce:
3.1 Introduction
3.2 Learning Objectives
3.3 Security Overview
3.4 Computer Security Classification
3.5 Copyrights and Intellectual Property
3.6 Electronic Commerce Threats
4.1 Introduction
4.2 Objectives
4.3 The Basics
4.4 Credit and Charge cards
4.5 Open and Closed Loop Systems
4.6 Secure Electronic Transaction (SET) Protocol
4.7 Dual Signature Scheme
4.8 Electronic Cheque Payment
4.9 Electronic Cash
4.10 Holding Electronic Cash
4.11 Advantages and Disadvantages of Electronic Cash
4.12 How Does Electronic Cash Work
4.13 Security for Electronic Cash
4.14 Electronic Wallets
4.15 Smart Cards
Reference Books :
1. http://www.ksouonline.org/download.htm
2. E-Commerce Business Brenda Kienew, PH
3. Instant- E-Commerce Kate J. Chase, BPB
4. E-Commerce : A Managers Guide KalaKota, PE
*****
Web programming will help you plan and develop well-designed web sites that combine effective navigation with
the balanced use of graphics, text, and color. You will learn how to create web sites that let users easily and quickly access
your information, regardless of browser type, connection speed, or computing platform.
COTETS
1. Internet Basics :
1.1. Concept
1.2. Establishing Connectivity on Internet
1.3. Email: POP, SMTP
1.4. www, File Transfer, Telnet
1.5. IP Address
1.6. Brief overview of TCP/IP
2. HTML :
2.1 File Creation, Web Server, Web Client
2.2 Introduction to HTML
2.2.1 HTML Tags
Information Technology 15
3. JavaScript :
4 DHTML :
6. Perl :
6.1 Basics of Perl
6.2 Strings, Scalar variables
6.3 Arrays, Hash Array
6.4 Arithmetic and Comparison Operators
6.5 Control Program Flow
6.6 Functions: String, Array, Mathematical and Time
6.7 File Handling
6.7.1 STDIN & STDOUT
6.7.2 Concept of Files and Directories
6.7.3 Open and Close Files
6.7.4 Reading and Writing Files
16 Information Technology
PRACTICALS
REFERECE BOOKS :
*****
COTETS
1. Ms-Office :
1.1 Introduction
1.2 Office Components and their uses
1.3 Use of Embedded Objects to share information between office components
1.4 Other features : Office Short cut bar, Schedule Task management
2. Advanced MS-Word :
3. Advanced MS-Excel :
4. MS-PowerPoint :
5. MS-Outlook Express :
5.1 Introduction
5.2 Menus of Outlook Express
5.3 Mail Inbox, Outbox
5.4 Message Rules
5.5 Internet Account : Mail, News, Directory service
5.6 Security Options
5.7 Managing address book
5.8 Managing various E-mail account : POP, HTTP, IMAP
5.9 Signature
6. MS - Access :
REFERECE BOOKS :
1. Office 97 Techmedia
2. Mastering MS-Office 2000 BPB, Publication
3. My First Course in MS-Office Sanjeev Saxsena, Vikas Pub.
*****