B.SC Computer Science (CC&CS)
B.SC Computer Science (CC&CS)
Academic Council
held on 05.08.2022
APPENDIX – D
MADURAI KAMARAJ UNIVERSITY
(University with Potential for Excellence)
Accredited by NAAC with 'A++' Grade in the 4th Cycle
Syllabus for
B.Sc. Computer Science (Cloud Computing and Cyber Security)
CBCS- Semester Pattern
(for those who joined in the academic year 2022-23 and after)
Regulation, Scheme of Examination and Syllabus
1. Course Objectives:
To prepare the students to manage the software components in a computer
independently and to be a Programmer.
To motivate the students to take up higher studies in Computer Science and other
streams.
169
(Subject/Structure of Course Study)
Sem. Subjects Total Total
Hours Credits
170
II SEMESTER
Internal External Total
CODE Subject Hours Credits
Marks Marks Marks
T2 Tamil 6 3 25 75 100
E2 English 6 3 25 75 100
Total 30 22
III SEMESTER
Internal External Total
CODE Subject Hours Credits
Marks Marks Marks
T3 Tamil 6 3 25 75 100
E3 English 6 3 25 75 100
Data Structures and Computer
CS5 4 4 25 75 100
Algorithm
Lab 5: Data Structures And
CS6 4 3 40 60 100
Computer Algorithm
Data Communication and
CS7 4 4 25 75 100
Computer Networks
Resource Management
AS3 4 4 25 75 100
Techniques
SBS3 Lab 6: Python Programming 2 2 40 60 100
Total 30 23
171
I V SEMESTER
Internal External Total
CODE Subject Hours Credits
Marks Marks Marks
T4 Tamil 6 3 25 75 100
E4 English 6 3 25 75 100
CS8 Operating System 4 4 25 75 100
CS9 Cloud Computing 4 4 25 75 100
Lab 7: Advanced Java
CS10 4 3 40 60 100
Programming
AS4 Numerical Methods 4 4 25 75 100
SBS4 Lab 8: Cloud Computing 2 2 40 60 100
EA Extension Activities 1 100
Total 30 24
V SEMESTER
Internal External Total
CODE Subject Hours Credits
Marks Marks Marks
Relational Database
CS11 5 4 25 75 100
Management Systems
CS12 Network Security 5 4 25 75 100
CS13 Biometric Systems 5 4 25 75 100
Lab 9: Relational Database
CS14 6 4 40 60 100
Management Systems
1.Block Chain
2.System Administration and
ES1 5 4 25 75 100
Maintenance
3.Wireless Network
Introduction to Computers
NME1 2 2 25 75 100
and Office Automation
Lab 10: Cryptography and
SBS5 2 2 40 60 100
Network Security
Total 30 24
172
VI SEMESTER
Internal External Total
CODE Subject Hours Credits
Marks Marks Marks
CS15 Software Engineering 5 4 25 75 100
Total - 25 Marks
Part – A
Answer all the Questions (10*1=10)
Ten Questions, two questions from each Unit: Multiple Choice Questions
Part – B
Answer all the Questions (5*7=35)
Five Questions, one question set from each Unit: Either …Or…type
Part – C
Answer any three Questions(3*10=30)
Practical Subjects:
A candidate has to prepare Algorithm / Procedure for both the questions covering both
the parts. The following list of parameters is taken into account for the evaluation of practical
examination.
Total Marks: 100 (Internal: 40 marks, External: 60 Marks)
Parameters
174
For Project Work:
The combined project shall be undertaken by the students as a team of two. The project
should be done in the college lab. The Following list of parameters is taken into account for the
evaluation of Project work and Viva-voce.
Total Marks: 100 (Internal: 25 marks, External: 75 Marks)
Parameters:
Note: The External Examiner can fix other exercises also other than those found in the
list (Syllabus) in consultation with the Internal Examiner without violating the scope of
the prescribed syllabus
1. Which of the following service provider provides the least amount of built in security?
a) SaaS b) PaaS c) IaaS d) All of the mentioned above
175
4. Which of the following is application and infrastructure management software for
hybrid multi-clouds?
a) VMware Hyperic b) Webmetrics c) Univa UD d) Tapin systems
6. Which of the following services that need to be negotiated in Service Level Agreements?
a) You can use proxy and brokerage services to separate clients from direct access to shared
cloud storage
b) Any distributed application has a much greater attack surface than an application that is
closely held on a Local Area Network
9. Which of the following is used for Web performance management and load testing?
a) VMware Hyperic b) Webmetrics c) Univa UD d) Tapin systems
10.CLC Stands for_________________________
176
Answer any Five Questions (5X7=35)
11. a) What are some open challenges in cloud security at SaaS and IaaS?
OR
b) Define Distributed Systems. List and Explain the 3 major milestones of distributed
systems that led to the evolution of Cloud Computing.
177
(Detailed Syllabus)
CS1: Programming in C
(4 Hours - 4 Credits)
UNIT II : Managing I/O Operations: Reading and Writing a Character – Formatted Input,
Output – Decision Making & Branching: if statement - if else statement - nesting of if else
statements - else if ladder – switch statement – the ?: operator – goto statement – the while
statement – do statement – the for statement – jumps in loops.
Text Books:
1. Programming in ANSI C, E.Balagurusamy, 8th Edition, Tata McGraw Hill
Publishing Company, 2019.
Unit I : Chapters 2 (Except 2.3-2.7, 2.10-2.12), 3 (Except 3.9, 3.13), 4
(Except 4.13)
178
Unit II : Chapters 5 – 7
Unit III : Chapters 8, 9 (Except 9.5, 9.6, 9.7, 9.9, 9.10)
Unit IV : Chapters 10 (Except 10.20), 11
Unit V : Chapters 12 (Except 12.8, 12.10, 12.12, 12.14, 12.15, 12.17), 13
(Except 13.6)
Reference Books:
1. Programming with C, Schaum‟s Outline Series, Gottfried, Tata McGraw Hill, 2006.
2. C Programming Language by Brian W Kernighan, Dennis M Ritchie (Author),Pearson
Education Limited (Publisher), edition 2, 2017.
3. Stephen G. Kochan, Programming in C, 4th Ed., Pearson Education,2015.
4. Kalavathi.P, C – A Text for Beginners, Bonfring Publications, Tamil Nadu,2014.
5. Programming with ANSI and Turbo C , Ashok N.Kamthane , Pearson Education, 2006
6. H. Schildt, C: The Complete Reference, 4th Edition, TMH Edition, 2000.
Section B
1. Write a C Program to find the grade of a student using else if ladder
Write a C Program to implement the various string handling functions
Write a C Program to create an integer file and display the even numbers only
Write a C Program to calculate quadratic equation using switch-case
Write a C Program to implement the various string handling function
Write a C Program to generate student mark list using array of structures
Write a C Program to create and process the student mark list using file
Write a C Program to create and process pay bill using file
Write a C Program to create and process inventory control using file
Write a C Program to create and process electricity bill using file
179
AS1: MATHEMATICAL FOUNDATIONS - I
(4 Hours – 4 Credits)
UNIT III : Counting: The basic of counting - The pigeonhole principle–Permutation and
Combinations–Applications of recurrence relations – Solving recurrence relations – Divide and
Conquer algorithms and recurrence relations. (All theorems and Results statement only)
UNIT IV : Graphs: Graphs and Graphs models, (Excluding Biological networks;
Tournaments; all its related examples and problems) – Graph terminology and special types of
graphs – Representing graphs and Graph isomorphism – Connectivity (paths – connectedness
in undirected graphs – paths and isomorphism – counting paths between vertices ) – shortest
path problems.
UNIT V : Matrices: Introduction –operations–inverse–Rank of a matrix, solution of
simultaneous linear equations – Eigen values and Eigen Vectors.
Text Books:
1. Discrete Mathematics and its applications, Seventh Edition, Kenneth.H.Rosen,
McGraw Hill Publishing Company, 2012.
Discrete Mathematics, M. Venkataraman, N.Sridharan and N.Chandrasekaran, The National
Publishing Company, 2009.
Unit I: Textbook 1 Chapter 1: Sections: 1.1, 1.2, 1.3, 1.4, 1.6
Unit II: Textbook 1 Chapter 9: Sections: 9.1, 9.3, 9.4, 9.5, 9.6
Unit III: Textbook 1 Chapter 6: Sections: 6.1, 6.2, 6.3 Chapter 8: Sections: 8.1, 8.2, 8.3 (Pages:
-529 only) (Exclude algorithms and relations, on page 507 and its related problems)
Unit IV: Textbook 1 Chapter 10: Sections: 10.1, 10.2, 10.3, 10.4, 10.6)
Unit V: Textbook 2 Chapter 6: Sections: 6.1 to 6.5, and 6.7)
Reference Books:
1. Modern Algebra - S.Arumugam and A. Thangapandi Isaac, SciTech publications
2005.
Invitation to Graph Theory-S.Arumugam and S.Ramachandran, SciTech Publications, 2005,
Chennai.
Discrete Mathematical Structures with applications to Computer Science - Tremblay and
Manohar, McGraw Hill, 1997.
PC Assembling
1. Installing the motherboard.
Installing the CPU and heat sink.
Installing the RAM.
Installing the power supply.
Installing the hard disk and optical drive.
Connecting various cables (ATX power connector, cabinet cables for power, reset button, front
USB/audio panel cable).
BIOS settings – setting time, changing boot sequence, system password setting
Changing CMOS battery
Connecting extra cabinet fan
PC Troubleshooting
1. Booting with CD/DVD, pen drive, LAN & hard disk with different OS
Formatting hard drive.
Installing the OS and drivers.
Troubleshooting BSOD (blue screen of death)
Installation of service packs, applications such as MS Office, Anti-virus software.
Creating restore point and backup a drive.
Using hard disk tools (sfc, disk checker, defragmenter, data recovery).
Windows update, registry fix, msconfig, gpedit.
Using repair tools like ccleaner, system mechanic, malware bytes.
System Management
1. Familiarization with configuring and installing a LAN (Assign IP addresses)
Internet connection sharing over LAN
File transfer over LAN
Installing and using web browser and firewall
Using search engines like Google
CD/DVD burning – image burning – date/audio/video CD/DVD making with Nero
Playing audio and video with VLC media player – creating play list
Reference Books:
1. Mueller, Scott, “Upgrading & Repairing PCs”, 14th Edition, Que Publishing,
2003.
Moulton, Pete, “A+ Certification and PC repair Guide”, 2nd Edition, Prentice Hall PTR, 2002.
Loukides, Mike, Musumeci, G., “System Performance Tuning”, 2nd Edition, O‟Reilly, 2002.
Bigelow, Stephen, “Troubleshooting, Maintaining & Repairing PCs”, 5th Edition,
Osborne,2002.
UNIT II:
DECISION MAKING & BRANCHING: Introduction, Decision making with if
statement, Simple if statement, if. Else statement, Nesting of if. else statements, the else
if ladder, the switch statement, the conditional operator. DECISION MAKING
&LOOPING: Introduction, The While statement, the do-while statement, the for
statement, Jumps in loops.
CLASSES, OBJECTS & METHODS: Introduction, Defining a class, Adding
variables, Adding methods, Creating objects, Accessing class members, Constructors,
Method overloading, Static members, Nesting of methods;
UNIT III:
INHERITANCE: Extending a class, Overloading methods, Final variables and
methods, Final classes, Finalizer methods, Abstract methods and classes; ARRAYS,
STRINGS AND VECTORS: Arrays, One-dimensional arrays, Creating an array,
Two–dimensional arrays, Strings, Vectors, Wrapper classes
INTERFACES: MULTIPLE INHERITANCE: Introduction, Defining interfaces,
Extending interfaces, Implementing interfaces, Assessing interface variables;
UNIT IV:
MULTITHREADED PROGRAMMING: Introduction, Creating Threads, Extending
the Threads, Stopping and Blocking a Thread, Lifecycle of a Thread, Using Thread
Methods, Thread Exceptions, Thread Priority, Synchronization, Implementing the
„Runnable‟ Interface. MANAGING ERRORS AND EXCEPTIONS: Types of errors :
Compile-time errors, Runtime errors, Exceptions, Exception handling, Multiple Catch
Statements, Using finally statement.
UNIT V:
PACKAGES: Introduction, Java API Packages, Using System Packages, Naming
conventions, Creating Packages, Accessing a Package, using a Package.
182
MANAGING INPUT/OUTPUT FILES IN JAVA: Introduction, Concept of Streams,
Stream classes, Byte Stream Classes, Input Stream Classes, Output Stream Classes,
Character Stream classes: Reader stream classes, Writer Stream classes, Using Streams,
Reading and writing files.
Text Books:
1. Programming with JAVA, A Primer, E.Balagurusamy, 5th Edition, McGraw-Hill
Company, 2015.
Unit I :: Chapters 1 – 5
Unit II : Chapters 6 ,7 and 8.1-8.10
Unit III : Chapter 8.11-8.18, Chapters 9 and 10
Unit IV : Chapter 12 and 13
Unit V : Chapter 14,11.1-11.7 and 16
Reference Books:
UNIT I:
Introduction to statistics: primary and secondary data–classification, tabulation and
Diagrammatic Representation of statistical data – Bar-charts, Pie-diagrams‟ – Graphical
Representation of data – Histograms, Frequency polygon, Ogives.
UNIT II:
Measures of dispersion: characteristics–coefficient of dispersion - Coefficient of
variation–Moments – skewness and kurtosis – Pearson‟s coefficient of skewness -
Bowley‟s coefficient of Skewness – Coefficient of skewness based upon moments.
UNIT III:
Simple correlation: Karl Pearson‟s coefficient of correlation –correlation coefficient
for Abivariate frequency distribution – Rank correlation – Regression – lines of
regression – Properties of regression coefficient.
UNIT IV:
Events and sets: sample space–concept of probability–addition and multiplications
Theoremon probability – conditional probability and independence of evens – Baye‟s
Theorem – concept of random variable – Mathematical Expectation.
UNIT V:
Concept of sampling distributions: standard error–Tests of significance based on t,
Chi-square and F distributions with respect to mean, variance.
184
Text Books:
1. Statistical Methods, S.P.Gupta, Sultan chand and sons, 2004.
Unit I : Chapters 1, 2.2, 2.2.1, 2.2.2, 2.2.3 – 2.2.5
Unit II : Chapters 7 and 8
Unit III : Chapters 9, 9.1, 9.2, 9.3, 10, 10.1, 10.2, 10.2.1, 10.2.2, 10.2.3, 10.3
Unit IV: Chapter 16
Unit V : Chapters 18.3, 18.4, 18.7.1, 18.7.2, 19
Reference Books:
1. Statistics, Dr. S.Arumugam and A.Thangapandi Issac, New Gamma Publication
house, 2002.
KishorS. Trivedi - Probability and statistics with reliability queuing and Computer Science
Applications - Prentice Hall of India (P) Ltd., New Delhi - 1997.
Discrete Mathematics - Seymour Lipschutz, Marc Lars Lipson Schaum‟s Outlines- by, 3rd
Edition., Tata McGraw Hill, Education Pvt. Ltd., New Delhi. 5th Reprint 2012.
Section A
1. Write a Linux script to find the number of users who have logged in.
Write a Linux script to see the current date, user name and current directory.
Write a Linux script to print the numbers 5,4,3,2,1 using Whileloop.
Write a Linux script to set the attributes of a file.
Write a Linux script to convert lowercase to uppercase using trutility.
Write a Linux script to copy and rename a file.
Write a Linux script to add 5 numbers and find the average.
Write a Linux script to convert a decimal number to hexadecimal conversion.
Write a Linux script to find the factorial of a number.
Write a Linux script to check for palindrome.
Section B
1. Write a Linux script to display Hello World in Bold, Blink effect and in different
colors like red, green etc.
Write a Linux script to display a multiplication table.
Write a Linux script to perform arithmetic operations using case.
Write a Linux script to add two real numbers.
Write a Linux script to display the following pattern:
1
22
333
4444
185
55555
Write a Linux script to find the sum of digits and reversing of a given number.
Write a Linux script to display the student mark details.
Write a Linux script to prepare electricity bill.
Write a Linux script to sort the numbers in ascending order.
Write a Linux script
(i) To create and append a file
(ii) To compare two files.
UNIT I:
Introduction and Overview –Introduction–Basic Terminology; Elementary Data
Organization – Data Structure Operations – Complexity of Algorithms – Other
Asymptotic Notations for Complexity of Algorithms.
Arrays –Introduction–Linear Arrays–Representation–on Linear Arrays inMemory –
Traversing Linear Arrays – Inserting and Deleting – Sorting: Bubble Sort – Searching;
Linear Search – Binary Search – Multidimensional Arrays. Linked List – Introduction –
Linked Lists – Representation of Linked Lists in Memory – Traversing a Linked List –
Memory Allocation; Garbage Collection – Insertion into a Linked List – Deletion from
a Linked list.
UNIT II:
Stack: Introduction–Stacks–Array Representation of Stacks–Linked Representation of
Stacks – Recursion - Tower of Hanoi - Implementation of Recursive Procedures by
Stacks - Queue –Linked Representation of Queues – D – Queue
UNIT III:
Trees –Introduction–Binary Trees–Representing Binary Trees in memory–Traversal
Binary Tree – Traversal algorithms using Stacks – Header Nodes; Threads – Binary
Search Trees – Searching and Inserting in Binary Search Trees– Deleting in a Binary
Search Trees.
Graphs –Introduction–Graph Theory - Terminology–Sequential Representations of
Graph– Adjacency Matrix; Path Matrix – Warshall‟s Algorithm; Shortest Paths.
UNIT IV:
Algorithms: Introduction: What is an Algorithm?–Algorithm Specification–
Performance Analysis – Divide and Conquer: General method – Binary Search –
Finding the maximum and minimum – Merge Sort – Quick Sort – Selection – Strassen‟s
Matrix Multiplication.
186
UNIT V:
The Greedy Method: General Method–Knapsack problem–Job Sequencingwith
deadlines – Minimum cost spanning trees: Prim‟s Algorithm – Kruskal Algorithm –
Optimal Storage on tapes – Optimal merge patterns – single source shortest path.
Text Books:
1. Seymour Lipschutz, Data Structures, Revised First Edition, Schaum‟ s Outlines,
McGraw Hill Education, 2017.
2. Fundamentals of Computer Algorithms, Ellis Horowitz, SartajSahni, Galgotia
Publications Pvt. Ltd, New Delhi, Second Edition, 2008.
Chapter 1 (1.1 to 1.4) , Chapter 2 (2.5 , 2.6), Chapter
Unit I : Textbook 1 (4.1 to
4.9), Chapter 5 (5.1 to 5.8)
Chapter
Unit II : Textbook 1 6 (6.1 to 6.4, 6.7 to 6.12)
Chapter
Unit III : Textbook 1 7 (7.1 to 7.9)
Chapter
Unit IV : Textbook 2 1 (Except 1.4), Chapter 3 (Except 3.2, 3.9)
Chapter
Unit V : Textbook 2 4 (Except 4.2, 4.6.3)
Reference Books:
1. C and C++ Programming Concepts and Data Structures -.S.Subramanyam - BS
Publications, 2013.
2. Algorithm and Data Structures, M.M.Raghuwanshi, Narosha Publishing House,
2016.
3. Data Structures and Algorithms- Alfred V.Aho, John E.Hopcraft and Jeffrey
D.Ullman - Pearson Education - Fourteenth Impression - 2013.
4. Data Structure and Algorithm Analysis in C – Mark Allen Weiss – Second
Edition, Addison Wesley publishing company, 1997.
187
Section A
(Programs from Data Structures Using C)
1. Write a program in ‟C‟ to implement Stack as an array.
Write a program in ‟C‟ to implement Stack as a linked list.
Write a program in ‟C‟ to convert the Infix expression to Postfix expression using stack.
Write a program in ‟C‟ to convert Infix expression to Prefix expression using Stack.
Write a program in ‟C‟ to implement Queue as an Array.
Write a program in ‟C‟ to implement Queue as a linked list.
Write a program in ‟C‟ to implement Binary tree traversals.
Write a program in ‟C‟ to implement Binary Search Tree.
Section B
Write a program in ‟C++‟ to perform Bubble Sort
Write a program in ‟C++‟ to perform Insertion Sort
Write a program in ‟C++‟ to perform Merge Sort
Write a program in ‟C++‟ to perform Quick Sort
Write a program in ‟C++‟ to perform Selection Sort
Write a program in ‟C++‟ to perform Linear Search
Write a program in ‟C++‟ to perform Binary Search
Write a menu driven program in ‟C++‟ to insert data in circular queue and display the queue
Write a program in ‟C++‟ to insert data in a binary search tree and display as in order, preorder
and post order
Reference Book:
1. C and C++ Programming concepts and Data Structures, P.S.Subramanyam, BS
Publications, 2013.
Note: The above are sample problems; Instructor can add more exercises based on their
requirements and the current technology.
188
Data Link Control and Protocol Concepts: Flow Control–Error Control–
Asynchronous Protocols – Synchronous Protocols – High-Level Data Link Control
(HDLC).
UNIT II:
Local Area Networks: Types of Networks and Topology–LAN Transmission
Equipment – LAN Installation and Performance.
Ethernet: IEEE Standard 802.3 Token Bus: IEEE Standard 802.4 Token Ring: IEEE
Standard 802.5 – Fiber Distributed Data Interface (FDDI) – Distributed Queue Dual
Bus (DQDB): IEEE Standard 802.6–LAN Operating Systems and Protocols – Ethernet
Technologies.
Wide Area Networks: WAN Transmission Methods–WAN Carrier Types–WAN
Transmission Equipments – WAN Design and Multicast Considerations – WAN
Protocols.
UNIT III:
Integrated Services and Routing Protocols: Integrating Services–ISDN Services –
ISDN Topology – ISDN Protocols – Broadband ISDN – Asynchronous Transfer Mode
(ATM) – Principal Characteristics of ATM – Frame Relay – Comparison of ISDN,
ATM and Frame Relay.
Wireless LANS: WLAN Applications–Wireless LAN Requirements–Planning for
Wireless LANs – Wireless LAN Architecture – IEEE 802.11 Protocol Layer – IEEE
802.11 Physical Layer – Designing the Wireless LAN Layout – WAP Services.
UNIT IV:
Internet Working: Principles of Internet Working–Routing Principles–Internetwork
Protocols (IP) – Shortcomings of IPv4 – IP Next Generation.
TCP Reliable Transport Service: Transport Protocols–The Service TCP Provides to
Applications – End –to-End Service and Datagrams – Transmission Control Protocol –
User Datagram Protocol.
UNIT V:
Network Applications: Client-Server Model–Domain Name System (DNS)–Telnet –
File Transfer and Remote File access – Electronic Mail – World Wide Web (WWW)
Network Management: Goal of Network Management–Network Management
Standards – Network Management Model – Infrastructure for Network Management –
Simple Network Management Protocol (SNMP).
Text Book:
1. Data Communications and Computer Networks, Brijendra Singh,Third Edition, PHI,
189
2011.
Unit I : Chapters 1,2,3,5
Unit II : Chapters 6, 7
Unit III : Chapters 8, 9
Unit IV : Chapters 10,11
Unit V : Chapter 12
Reference Books:
1. Larry L. Peterson, Bruce S. Davie, “Computer Networks: A Systems Approach”,
Fifth Edition, Morgan Kaufmann Publishers, 2011.
2. Nader. F. Mir, “Computer and Communication Networks”, Pearson Prentice Hall
Publishers, 2010.
3. Computer Networks, Andrew S Tanenbaum, 4th Ed, Prentice Hall of India, 2006.
Data Communications and Computer Networks ,Prakash C. Gupta, Prentice Hall of India,
2005.
Data and Computer Communications, William Stallings, PHI, 2007.
UNIT I:
Development of OR: Definition of OR–Modeling - Characteristics and Phases - Tools,
Techniques & Methods - scope of OR.
UNIT II:
Linear Programming Problem: Formulation - Slack & surplus variables - Graphical
solution of LPP.
UNIT III:
Simplex Method: Computational Procedure - Big-M method - Concept of duality in
LPP -Definition of primal dual problems - General rules for converting any primal into
its dual.
UNIT IV:
Duality Theorems: (without proof) Primal dual correspondence - Duality and Simplex
method - Mathematical formulation of assignment problem - Method for solving
assignment problem.
UNIT V:
Mathematical formulation of Transportation Problem: Methods for finding IBFS for the
Transportation Problems.
Text Books:
190
1. Operations Research, S.D.Sharma, Publisher KedarNath, Ram Nath& Co.
Unit I: Chapter-1(1.1, 1.2, 1.4, 1.5, 1.8, 1.9, 1.10, 1.11)
Unit II: Chapter-3 (3.1, 3.2, 3.3, 3.3.1, 3.3.2, 3.3.3, 3.3.4, 3.4, 3.5)
Unit III: Chapter-5 (5.1, 5.2, 5.2.1, 5.3, 5.4, 5.5.4) Chapter- 7 (7.1, 7.2, 7.3, 7.4)
Unit IV: Chapter-7 (7.5) (Statements only); 7.6, 7.7 Chapter 11(11.2, 11.3, 11.4)
Unit V: Chapter-12 (12.2 to 12.8)
Reference Books:
1. Operation Research, Nita H.Shah, Ravi M.Gor and Hardiksoni, Prentice Hall of
India Pvt. Ltd., New Delhi 2008.
2. Operation Research, R.Sivarethinamohan, Tata McGraw Hill, 2005.
3. Operations Research – An Introduction by Hamdy A.Taha. Ninth Edition, Dorling
Kindersley Pvt. Ltd., Noida, India, 2012.
LIST OF EXERCISES:
1. Program to convert the given temperature from Fahrenheit to Celsius and vice
versa depending upon user‟s choice.
Program to calculate total marks, percentage and grade of a student. Marks obtained in each of
the five subjects are to be input by user. Assign grades according to the following criteria:
Grade A: Percentage >=80Grade B: Percentage >=70 and <80Grade C: Percentage >=60 and
<70 Grade D: Percentage >=40 and <60Grade E: Percentage <40
Program, to find the area of rectangle, square, circle and triangle by accepting suitable input
parameters from user
Program to display the first n terms of Fibonacci series.
Program to find factorial of the given number using recursive function.
Write a Python program to count the number of even and odd numbers from array of N
numbers.
Python function that accepts a string and calculate the number of upper case letters and lower
case letters
Python program to reverse a given string and check whether the give string is palindrome or
not.
Write a program to find sum of all items in a dictionary.
Write a Python program to construct the following pattern, using a nested loop
1
22
333
191
4444
55555
666666
7777777
88888888
999999999
Read a file content and copy only the contents at odd lines into a new file.
Create a Turtle graphics window with specific size.
Write a Python program for Towers of Hanoi using recursion
Create a menu driven Python program with a dictionary for words and their meanings.
Devise a Python program to implement the Hangman Game.
A website requires the users to input username and password to register. Write a program to
check the validity of password input by users.
Following are the criteria for checking the password:
a. At least 1 letter between [a-z]
b. At least 1 number between [0-9]
c. At least 1 letter between [A-Z]
d. At least 1 character from [$#@]
e. Minimum length of transaction password: 6
f. Maximum length of transaction password: 12
Your program should accept a sequence of comma separated passwords and will
check them according to the above criteria. Passwords that match the criteria are to
be printed, each separated by a comma.
Reference Books:
1. Python Programming a Modular Approach with Graphics, Database, Mobile, and
Web Applications – Sheetal Taneja, Naveen Kumar – Pearson Publication, 2018.
2. Problem solving and Python Programming – S.A.Kulkarni, Yesdee Publisher,
2017.
3. Charles Dierbach, “Introduction to Computer Science using Python - A
computational Problem solving Focus”, Wiley India Edition, 2015.
Note: The above are sample problems; Instructor can add more exercises based on their
requirements and the current technology.
192
CS8: Operating System
(4 Hours- 4 Credits)
UNIT I:
Introduction to Operating Systems: Introduction, What is an Operating systems,
Operating system components and goals, Operating systems architecture. Process
Concepts: Introduction, Process States, Process Management, Interrupts, Inter process
Communication.
UNIT II:
Asynchronous Concurrent Execution: Introduction, Mutual Exclusion, Implementing
Mutual Exclusion Primitives, Software solutions to the Mutual Exclusion Problem,
Hardware solution to the Mutual Exclusion Problem, Semaphores. Concurrent
Programming: Introduction, Monitors.
UNIT III:
Deadlock and Indefinite Postponement: Introduction, Examples of Deadlock, Related
Problem Indefinite Postponement, Resource concepts, Four Necessary conditions for
Deadlock, Deadlock solution, Deadlock Prevention, Deadlock Avoidance with
Dijkstra‟s Banker‟s algorithm, Deadlock Detection, Deadlock Recovery.
Processor Scheduling: Introduction, Scheduling levels, Preemptive Vs. Non-
Preemptive Scheduling Priorities, Scheduling objective, Scheduling criteria,
Scheduling algorithms.
UNIT IV:
Real Memory Organization and Management: Introduction, Memory organization,
Memory Management, Memory Hierarchy, Memory Management Strategies,
Contiguous vs. Non-Contiguous Memory allocation, Fixed Partition Multi
programming, Variable Partition multiprogramming.
Virtual Memory Management: Introduction, Page Replacement, Page Replacement
Strategies, Page Fault Frequency (PFF) Page replacement, Page Release, Page Size.
UNIT V:
Disk Performance Optimization: Introduction, Why Disk Scheduling isnecessary,
Disk Scheduling strategies, Rotational optimization.
File and Database Systems: Introduction, Data Hierarchy, Files, File Systems, File
Organization, File Allocation, Free Space Management, File Access control.
193
Text Books:
1. Operating Systems, Deitel & Deitel Choffnes, Pearson education, Third edition,
2008.
Unit I: Chapter 1: 1.1, 1.2, 1.12, 1.13 & Chapter 3: 3.1, 3.2, 3.3, 3.4, 3.5
Unit II : Chapter 5: 5.1, 5.2, 5.3, 5.4(up to 5.4.2), 5.5, 5.6 &
Chapter 6: 6.1, 6.2
Unit III : Chapter 7: 7.1, 7.2, 7.3, 7.4, 7.5, 7.6, 7.7, 7.8, 7.9, 7.10
Chapter 8: 8.1, 8.2, 8 3, 8.4, 8.5, 8.6, 8.7
Unit IV : Chapter 9: 9.1, 9 2, 9.3, 9 4, 9.5, 9.6, 9.8, 9.9
Chapter 11: 11.1, 11.5, 11.6, 11.8, 11.9, 11.10
Unit V : Chapter 12: 12.1, 12.4, 12.5, 12.6
Chapter 13: 13.1, 13 2, 13.3, 13.4, 13.5, 13.6, 13.7, 13.8
Reference Books:
1. An introduction to Operating systems concepts and Practice, Pramod Chandra
P. Bhatt, PHI, Second Edition, 2008.
2. Operating System Concepts, Abraham Silberschatz Peter Galvin Greg Gagne, 6th
edition Windows XP Update, Wiley India edition, 2007.
3. Operating Systems Principles and Design, Pal Choudhury, PHI Learning, 2011.
4. Operating Systems, A Concept Based Approach Dhananjay M.Dhamdhere Tata
McGraw- Hill.
UNIT I:
Cloud Computing Foundation: Introduction to Cloud Computing–Move to Cloud
Computing–Types of Cloud –Working of Cloud Computing
UNIT II:
Cloud Computing Architecture: Cloud Computing Technology–Cloud Architecture–
Cloud Modeling and Design -Virtualization: Foundation –Grid, Cloud and
Virtualization – Virtualization and Cloud Computing
UNIT III:
Data Storage and Cloud Computing: Data Storage–Cloud Storage–Cloud Storage
from LANs to WANs –Cloud Computing Services: Cloud Services –Cloud Computing
at Work
194
UNIT IV:
Cloud Computing and Security: Risks in Cloud Computing–Data Security in Cloud–
Cloud Security Services –Cloud Computing Tools: Tools and Technologies for Cloud –
Cloud Mashaps–Apache Hadoop –Cloud Tools
UNIT V:
Cloud Applications: Moving Applications to the Cloud –Microsoft Cloud Services –
Google Cloud Applications –Amazon Cloud Services –Cloud Applications
Text Books:
A.Srinivasan and J.Suresh, “Cloud Computing –A Practical Approach for Learning and
Implementation”, Pearson India Publications2014.
Reference Books:
1. RajkumarBuyya, James Broberg, Andrzej, “Cloud Computing: Principles and
Paradigms”,Wiley India Publications2011.
2. ArshdeepBahga and Vijay Madisetti, “Cloud Computing –A Hands on Approach”,
Universities Press (India) Pvt Ltd. 2014.
Reference Books:
1. Java The Complete Reference - Herbert Schildt, McGraw Hill Education, 10th Edition,
New York, 2017
3. Note: The above are sample problems; Instructor can add more exercises based on their
requirements and the current technology.
UNIT I:
Algebraic and Transcendental Equations: Errors in numerical computation-Iteration
method-Bisection method-Regula-Falsi method-Newton-Raphson method-Horner‟s
method.
UNIT II:
Simultaneous Equations: Introduction-Simultaneous equations-Back substitution-
Gauss Elimination method-Gauss –Jordan Elimination method-Calculation of Inverse of
a matrix-Crout‟s method-Iterative methods-Gauss-Jacobi Iteration method-Gauss seidal
Iteration method-Newton Raphson‟s method for simultaneous equations.
UNIT III:
Interpolation & Introduction: Newton‟s interpolation Formulae-Central difference
Interpolation formulae-Gauss forward, Gauss backward, Lagrange‟s interpolation
formulae-Divided differences-Newton‟s divided difference formula-Inverse
Interpolation.
UNIT IV:
Numerical Differentiation and Integration: Introduction-Derivates using Newton‟s
forward difference formula-Derivates using Newton‟s backward difference formula-
Numerical Integration-Newton-cotes quadrature formula-Trapezoidal Rule-Simpson‟s
one third rule-Simpson‟s 3/8 th rule.
196
UNIT V:
Numerical Solution of Ordinary Differential Equations: Introduction-Taylor series
method-Picard‟s method-Euler‟s method-Runge-kutta method of second, third, fouth
order- Predictor & corrector methods-Mile‟s method.
Text Books:
1. Numerical Methods, Second Edition, S.Arumugam, A.ThangapandiIssac,
A.Somasundaram, SCITECH publications, 2009.
Unit I : Chapter-3
Unit II: Chapter-4 (excluding Relation method and its related problems)
Unit III: Chapter-7 (Sections: 7.0, 7.1, 7.2((i), (ii) and related problems);
7.3, 7.4, 7.5,7.6
Unit IV : Chapter-8 (Sections: 8.0,8.1,8.2 related problems, 8.5 (excluding
Weddles rule, Booles rule, Romberg‟s method and related problems))
Unit V : Chapter-10 (Sections : 10.0,10.1,10.2,10.3(excluding modified Euler‟s
method & its related problems) 10.4,10.5,10.6 )
Reference Books:
1. Mathews J.H. Numerical Method for Maths, Science and Engineering; PHI, New Delhi,
2001.
2. Iqbal H. Khan & Q. Hassan Numerical Methods for Engineers and Scientist - Galgotia
Publications (P) Ltd., New Delhi - 1997.
3. M.K. Jain, S.R.K. Iyengar&R.K.Jain - Numerical Methods for Scientific and
Engineering Computation - New Age International(P) Ltd., New Delhi - 1996
Section A
1. Write a C program that contains a string (char pointer) with a value \Hello World‟.
The program should XOR each character in this string with 0 and displays the
result.
Write a C program that contains a string (char pointer) with a value \Hello World‟. The
program should AND or and XOR each character in this string with 127 and display the result
Write a Java program to perform encryption and decryption using the following algorithms: a)
Ceaser Cipher b) Substitution Cipher c) Hill Cipher
197
Write a Java program to implement the DES algorithm logic
Write a C/JAVA program to implement the BlowFish algorithm logic
Write a C/JAVA program to implement the Rijndael algorithm logic.
Using Java Cryptography, encrypt the text “Hello world” using BlowFish. Create your own key
using Java keytool.
Write a Java program to implement RSA Algoithm
Implement the Diffie-Hellman Key Exchange mechanism using HTML and JavaScript.
Consider the end user as one of the parties (Alice) and the JavaScript application as other party
(bob).
Calculate the message digest of a text using the SHA-1 algorithm in JAVA.
Calculate the message digest of a text using the SHA-1 algorithm in JAVA.
Section B
1. Install Virtual box/VMware Workstation with different flavours of linux or
windows OS on top of windows7 or 8.
Install a C compiler in the virtual machine created using virtual box and execute Simple
Programs
Install Google App Engine. Create hello world app and other simple web applications using
python/java.
Use GAE launcher to launch the web applications.
Simulate a cloud scenario using CloudSim and run a scheduling algorithm that is not present in
Cloud Sim.
Find a procedure to transfer the files from one virtual machine to another virtual machine.
Find a procedure to launch virtual machine using try stack (Online Open stack Demo Version)
Install Ha doop single node cluster and run simple applications like word count.
Reference Books:
1. A.Srinivasan and J.Suresh, “Cloud Computing –A Practical Approach for
Learning and Implementation”, Pearson India Publications2014.
UNIT I:
OVERVIEW OF DATABASE SYSTEMS: Managing Data – A Historical Perspective
– File Systems Versus a DBMS – Advantages of a DBMS – Describing and Storing
Data in a DBMS – Queries in a DBMS – Transaction Management – Structure of a
DBMS – People Who Work with Databases. INTRODUCTION TO DATABASE
DESIGN: Database Design and ER Diagrams – Entities, Attributes, and Entity Sets –
Relationships and Relationship Sets – Additional Features of ER Model – Conceptual
Design With the ER Model.
198
UNIT II:
THE RELATIONAL MODEL: Introduction to the Relational Model – Integrity
Constraints over Relations – Enforcing Integrity Constraints – Querying Relational Data
– Logical Database Design: ER to Relational – Introduction to Views – Destroying /
Altering 2484 Tables and Views. RELATIONAL ALGEBRA AND CALCULUS:
Preliminaries – Relational Algebra: Selection and Projection – Set Operations –
Renaming – Joins - Division Relational Calculus: Tuple Relational Calculus – Domain
Relational Calculus
UNIT III:
SQL: QUERIES, CONSTRAINTS, TRIGGERS: The Form of a Basic SQL Query -
UNION, INTERSECT, and EXCEPT – Nested Queries – Aggregate Operators – Null
Values – Complex Integrity Constraints in SQL – Triggers and Active Databases –
Designing Active Databases
UNIT IV:
SCHEMA REFINEMENT AND NORMAL FORMS: Introduction to Schema
Refinement – Functional Dependencies – Reasoning about FD's – Normal Forms –
Properties of Decompositions – Normalization – Schema Refinement in Database
Design – Other Kinds of Dependencies
UNIT V:
OVERVIEW OF TRANSACTION MANAGEMENT: The ACID Properties –
Transactions and Schedules – Concurrent Execution of transactions – Lock Based
Concurrency Control – Performance of Locking – Transaction Support in SQL –
Introduction to Crash Recovery. SECURITY AND AUTHORIZATION: Intoduction to
Database Security - Access Control – Discretionary Access Control – Mandatory
Access Control – Security for Internet Applications – Additional Issues Related to
Security.
Text Books:
1. Database Management Systems – Raghu Ramakrishnan& Johannes Gehrke,
McGraw Hill International Edition – Third Edition – 2003.
UNIT I : 1.1 – 1.9 , 2.1 – 2.5
UNIT II : 3.1 – 3.7, 4.1 – 4.3
UNIT III : 5.2 – 5.9
UNIT IV : 19.1 – 19.8
UNIT V : 16.1 – 16.7, 21.1 – 21.6
Reference Books:
1. Database Management Systems - Alexis leon&mathews Leon, “Leon Vikas
Publishing, Chennai, 2002.
199
2. Modern Database Management - Frad R. McFadden, Jeffrey A.Hoffer& Mary. B.
Prescott, 5th Edition, Pearson Education Asia, 2001.
3. Database System Concepts – Abraham Silberschatz, Henry F.Korth,S.Sudarshan,
McGraw Hill, 2006.
UNIT I:
Introduction: Security Goals – Attacks – Services and Mechanism – 642 Techniques.
Mathematics of Cryptography: Integer Arithmetic – Modular Arithmetic – Matrices –
Linear Congruence - Traditional Symmetric Key Ciphers: Instruction – Substitution
Ciphers – Transposition Ciphers – Stream and Block Ciphers. Introduction to Modern
Symmetric Key Ciphers: Modern Block Ciphers – Modern Stream Ciphers.
UNIT II:
Data Encryption Standard (DES): Introduction – DES Structure – DES Analysis –
Multiple DES – Security of DES. Advanced Encryption Standard (AES): Introduction –
Transformations – Key Expansion – Ciphers – Examples – Analysis of AES.
UNIT III :
Asymmetric Key Cryptography: Introduction – RSA Crypto System. Message Integrity
and Message Authentication: Message Integrity – Random Oracle Model – Message
Authentication.
UNIT IV:
Cryptographic Hash Functions: Introduction – SHA – 512 – WHIRLPOOL. Digital
Signature: Comparison – Process – Services – Attacks on Digital Signature – Digital
Signature Schemes. Unit V: Entity Authentication: Introduction – Passwords –
Challenge Response – Zero Knowledge – Bio Metrics. Key Management: Symmetric
Key Distribution – Kerberos – Symmetric Key Agreement – Public Key Distribution.
Text Books:
1. Cryptography and Network Security – Behrouz A. Forouzan, TheMcGraw Hill,
2011.
Unit I : Chapters 1,2,3 and 5
Unit II : Chapters 6 and 7
Unit III : Chapters10 and 11
Unit IV : Chapters 12 and 13
Unit V : Chapters 14 and 15
200
Reference Books:
1. Cryptography and Network Security – William Stallings, PHI, 2008.
2. Cryptography and Network Security – Atul Kahate, McGraw Hill Education, 2013.
3. Network Security The Complete Reference – Roberta Bragg, Mark Rhodes Ousley and
Strassberg – McGraw Hill Education, 2003.
UNIT I:
Introduction: Benefits of biometric versus traditional techniques – Key biometric terms
and processes – Verification and identification – Enrollment and template creation
UNIT II:
Biometric matching. Accuracy in biometric systems: False match rate – False non-
match rate – Failure-to-enroll rate – Derived metrics – Equal error rate – Ability-to-
verify rate
UNIT III:
Physiological biometrics: Finger scan – Facial scan – Iris scan – Components –
Working principles – Competing technologies – Strengths and weaknesses – Automated
fingerprint Identification systems.
UNIT IV:
Behavioural biometrics signature scan – Keystroke scan – Components – Working
principles – Strengths and weaknesses. Biometric applications: Categorizing biometric
applications – Criminal identification – Citizen identification – Surveillance .
UNIT V:
PC/network access – Physical access/time and attendance – Customer facing
applications – E-commerce/telephony – Retail/ ATM/point of sale applications.
Biometric markets: Law enforcement – government sector – Financial sector –
Healthcare – travel and immigration – Biometric standards.
Text Books:
1. Samir Nanavati, Michael Thieme, Raj Nanavati, “Biometrics – Identity Verification
in a Networked World”, Wiley-dreamtech India Pvt Ltd, New Delhi, 2003.
Reference Books:
1. James Wayman, Anil Jain, David Maltoni, Dario Maio (Eds), “Biometric Systems”,
Springer International Edition, 2004.
201
2. Anil K Jain, Patrick Flynn, Arun A Ross, “Handbook of Biometrics”, Springer,
2008.
3. John R Vacca, “Biometric Technologies and Verification Systems”, Elsevier Inc,
2007.
4. Ruud M. Bolle, Sharath Pankanti, Nalini K. Ratha, Andrew W.Senior, Jonathan H.
Connell, “Guide to Biometrics”, Springer, 2009.
DDL Commands
Create table, alter table, drop table
DML Commands
1. Select, update, delete and insert statements
2. Condition specification using Boolean, Arithmetic operators and comparison
operators (and, or, not,=,<>,>,<,>=,<=)
3. Aggregate functions (Count, Sum, Avg, Min, Max)
4. Multiple table queries (join on different and same tables)
5. Nested select statements
6. Set manipulation using (any, in, contains, all, not in, not contains, exists, not
exists, union, intersect, minus, etc.)
7. Categorization using group by……..having
8. Arranging using order by
1. Create a table Student-master with the following fields client_no,name, address,
city, state, pincode, remarks, bal_due with suitable data types.
(i) Create another table supplier_table from client_master. Select all the fields and
rename client_no with supplier_no and name with supplier_name.
(ii) Insert data into client_master
(iii)Insert data into supplier_master from client_master.
(iv) Delete the selected row in the client_master.
2. Create a table sales_order with s_order_no and product_no as primary key. Set other
fields to store client number, delivery address, delivery date,order status.
(i) Add a new column for storing salesman number using ALTER Command.
(ii) Set the s_order_no as foregin key as column constraints.
202
(iii)Set the s_order_no as foreign key as table constraints.
(iv) Enforce the integrity rules using CHECK.
3. Create a table student_master with the following fields name, regno, dept and year
with suitable data types. Use Select command to do the following.
(i) Select the student‟s name column.
(ii) Eliminate the duplicate entry in table.
(iii)Sort the table in alphabetical order.
(iv) Select all the Students of a particular department.
4. Create a table sales_order_details with the s_order_no as primary key and with the
following fields: product_no, description, qty_ordered, qty_disp, product_rate,
profit_percent, sell_price, supplier_name.
(i) Select each row and compute sell_price*.50 and sell_price*1.50 for each row
selected.
(ii) Select product_no, profit_percent, Sell_price where profit_per is not between 10
and 20 both inclusive.
(iii) Select product_no, description, profit_percent, sell_price where profit_percent
is not between 20 and 30.
(iv) Select the supplier name and product_no where supplier name has„r‟ or „h‟as
second character.
5 Create and use the following database schema to answer the given queries
EMPLOYEE
DEFAULT
Field Type Null Key
Eno Char(3) No Primary
Ename Varchar(50) No
Job_type Varchar(50) No
Manager Char(3) Yes Foreign
Hiredate Date No
Dno Integer Yes Foreign
Commission Decimal(10,2) Yes
Salary Decimal(7,2) No
DEPARTMENT
DEFAULT
Field Type Null Key
203
Dno Integer No Primary
Dname Varchar(50) Yes
204
q. Query to display Name and calculate the number of months between today and
the date each employee was hired.
r. Query to display Name with the 1st letter capitalized and all other letter lower
case and length of their name of all the employees whose name starts with ‗J„,
„A„ and ‗M„.
s. Query to display Name, Department Name and Department No for all the
employees.
t. Query to display Unique Listing of all Jobs that are in Department # 30.
u. Query to display Name, Job, Department No. And Department Name for all the
employees working at the Mumbai location.
v. Query to display Name, Dept No. And Salary of any employee whose
department No. and salary matches both the department no. and the salary of
any employee who earns a commission.
w. Query to display the Highest, Lowest, Sum and Average Salaries of all the
employees
x. Query to display the Employee No. And Name for all employees who earn more
than the average salary.
y. Query to display Employee Number and Name for all employees who work in a
department with any employee whose name contains a ‗T„.
5. Create a table master, book to contain the information of magazine code, magazine
name and publisher. Weekly/biweekly/monthly, price. Write PL/SQL block to
perform insert, update and delete operations on the above table.
6. Create a table to contain phone number, user name, address of the phone user. Write
a function to search for a address using phone numbers.
7. Create a table stock to contain the item-code, item-name, current stock, date of last
purchase. Write a stored procedure to seek for an item using item-code and delete it,
if the date of last purchase is before 1 year from the current date. If not, update the
current stock.
8. Create a table to store the salary details of the employees in a company. Declare the
Cursor to contain employee number, employee name and net salary. Use Cursor to
update the employee salaries.
9. Create a table to contain the information about the voters in a particular
constituency.
Write a proper trigger to update or delete a row in the table.
ES1 : 1.BLOCKCHAIN
(5 Hours-4 Credits)
205
UNIT I:
Introduction To Blockchain -History of Blockchain – Types of Blockchain – Consensus
– Decentralization using Blockchain – Blockchain and Full Ecosystem Decentralization
– Platforms for Decentralization.
UNIT II:
Design Primitives of Blockchain:-Protocols -Security -Consensus -Permissions -
Privacy-Cryptographic Primitive:-Hash –Signature -Hashchain to Blockchain -Basic
consensus –mechanisms. Bitcoin mechanics:-Bitcoin Nuts and Bolts -Wallets:
managing and protecting crypto assets
UNIT III:
Ethereum -The Ethereum Network – Components of Ethereum Ecosystem – Ethereum
Programming Languages: Runtime Byte Code, Blocks and Blockchain, Fee Schedule –
Supporting Protocols – Solidity Language.
UNIT IV:
Privacy on a Public Block chain -Privacy on a public block chain- De-anonymizing the
block chain and mixing -zk-SNARKs description and how it is used.Scalability in
Block chain-Scalability in Block chain -Payment channels and state channels. -
Optimistic Rollup, ZK-Rollup, and Validium -Recursive SNARKs. –Block chain and its
Future-Block chain interoperability, miner extractable value (MEV), and governance-
The future of block chains
UNIT V:
Alternative Blockchains and Next Emerging Trends-Kadena – Ripple – Rootstock –
Quorum – Tendermint – Scalability – Privacy – Other Challenges – Blockchain
Research – Notable Projects – Miscellaneous Tools.
Text Books:
1. Imran Bashir, “Mastering Blockchain: Distributed Ledger Technology,
Decentralization and Smart Contracts Explained”, Second Edition, Packt
Publishing, 2018.
Reference Books:
1. Arshdeep Bahga, Vijay Madisetti, “Blockchain Applications: A Hands On
Approach”, VPT, 2017.
Andreas Antonopoulos, Satoshi Nakamoto, “Mastering Bitcoin”, O”Reilly, 2014.
Roger Wattenhofer, “The Science of the Blockchain” CreateSpace Independent
Publishing, 2016.
206
Narayanan, J. Bonneau, E. Felten, A. Miller, S. Goldfeder, “Bitcoin and
Cryptocurrency Technologies: A Comprehensive Introduction”, Princeton University
Press, 2016.
Alex Leverington, “Ethereum Programming” Packt Publishing, 2017.
UNIT I:
System Start up and Operation Disk Partitioning - File system Installation - File system
– Device 8 Manipulation Process
UNIT II:
User/Group Security and Permissions Log Analysis - Start-up Scripts - Configuration
Files Print- 8 Spooling File Formats
UNIT III:
Firewalls 8 Security - Privacy - Backup - Scheduling Maintenance Functions
UNIT IV:
Media Access DNS Service: Concepts - DNS Service: Configuration.
UNIT V:
DNS 8 Service: Client Resolver - File Service.
Text Book:
1. Jan Bergstra and Mark Burgess, Handbook of Network and System
Administration, 2008
Reference Book:
2. Eleen Frisch, Essential System Administration, 3rd Edition, O'Reilly Media, Inc.,
2002.
207
ES1 : 3.Wireless Networks
(5 Hours - 4 Credits)
UNIT I:
Basics of Wireless Networks-Wire1ess Network Architecture, Classifications,
Switching Technology, Communication Problems, Reference Models, Networking
Issues, Networking Standards -Wireless Body Area Networks: Properties, Network
Architecture, Network Components, Applications.
UNIT II:
Mobile Network Layer:-Introduction – Mobile IP: IP packet delivery, Agent discovery,
tunneling and encapsulation, IPV6-Network layer in the internet- Mobile IP session
initiation protocol – mobile ad-hoc network: Routing: Destination Sequence distance
vector, IoT: CoAP
UNIT III:
3G Overview-Overview of UTMS Terrestrial Radio access network-UMTS Core
network Architecture: 3GPP Architecture, User equipment,-CDMA2000 overview-
Radio and Network components, Network structure, Radio Network, TD-CDMA, TD –
SCDMA.
UNIT IV:
Wireless propagation mechanism, free space propagation model, ground reflection
model, knife edge diffraction model, path loss prediction in hilly terrain,
introduction to fading and diversity techniques,
UNIT V:
4G and Beyond Introduction – 4G vision – 4G features and challenges – Applications
of 4G – 4G Technologies: Multicarrier Modulation, Smart antenna techniques, IMS
Architecture, LTE, Advanced Broadband Wireless Access and Services, MVNO.
Text Books:
1. Jochen Schiller, Mobile Communications, Second Edition, Pearson Education
2012.(Unit I, II, III)
2. Vijay Garg, Wireless Communications and networking, First Edition, Elsevier 2007.
(Unit IV, V)
Reference Books:
1. Erik Dahlman, Stefan Parkvall, Johan Skold and Per Beming, “3G Evolution HSPA and
LTE for Mobile Broadband, Second Edition, Academic Press, 2008.
2. Anurag Kumar, D.Manjunath, Joy kuri, Wireless Networking, First Edition, Elsevier
2011.
3. Simon Haykin , Michael Moher, David Koilpillai, Modern Wireless Communications,
First Edition, Pearson Education 2013
208
NME1:Introduction to Computers and Office Automation
(2 Hours – 2 Credits)
UNIT I:
Introduction to Computer and Information Technology: History, Computer system
concepts-Computer system characteristics- Capabilities and limitations-Types of
computers- Generations. Computer organization and working: Introduction-The Control
Unit ALU- Memory-Read only memory (ROM).
UNIT II:
Input Devices: Introduction- Keyboards-Mouse-Joysticks-Optical Recognition input-
Scanners-Bar coders-Digital camera-MICR-Card reader-Web Cameras-Light pens-
Trackball- Touch screens-Touch pad-Digitizer-Voice input-Voice recognizers. Output
Devices: Introduction-Monitors and Displays- Multimedia Projector-Printers-Graphics
Output Devices-Plotters-Flatbed Plotters-Drum Plotters. Storage Devices: Introduction-
Hard Disk Drives –CD-ROMs and DVDs – Magnetic tape –Erasable disks.
UNIT III:
Microsoft Office 2007 and Word Processing: Introduction to Microsoft Office2007 -
Microsoft Word Screen. Microsoft Word: Working with Document in Word 2007 –
Introduction – saving the file – Formatting, Alignment of text, Applying fonts-Spell
checking- Borders and shading – Closing of the file, Editing document, Autocorrect-
Auto format-Find and Replace, Page numbering, header and footer- Footnotes and
endnotes- splitting panes-Tiling of the documents-using mail merge in Word 2007.
UNIT IV:
Microsoft Office Excel 2007: Understanding Spreadsheets-Creating a Worksheet in
Microsoft Excel 2007- Copying formula – Styles –functions in Excel – Using Auto
calculate–References –Sum, Average functions.
UNIT V:
Creating Charts in Excel 2007-Auditing a workbook – Comments Inserting –Function
wizard-Goal seeking- Typing with Auto fill- Formatting numbers and Labels –
changing the size of Rows and columns- Add or Remove a sheet –Protect a worksheet-
Applying themes.
Text Books:
1. Learning computer fundamentals, MS Office and Internet & Web
2. Technology, Dinesh Maidasani, Firewall Media, Third Edition, 2014.
Unit I : Section A-1, 2
Unit II : Section A- 3, 4, 5
Unit III : Section B- 2, 3
209
Unit IV : Section B- 4 (up to Functions in Excel)
Unit V - : Section B- 4(From Creating Charts in Excel)
Reference Books:
1. A Beginners Guide to Computers – Alexis Leon & Mathews Leon-Vikas
Publishing House Pvt. Ltd., 2001.
2. Fundamentals of Computers, P. Mohan, Himalaya Publishing House, Revised
Edition, 2010.
3. Fundamentals of Computers, V. Rajaraman, PHI Publication, Fifth Edition,
2010.
2. Write a C program that contains a string (char pointer) with a value \Hello World‟. The
program should AND or and XOR each character in this string with 127 and display the
result.
3. Write a Java program to perform encryption and decryption using Ceaser Cipher
algorithms.
4. Write a Java program to perform encryption and decryption using Substitution Cipher
algorithms.
5. Write a Java program to perform encryption and decryption using Hill Cipher
algorithms
6. Write a Java program to implement the DES algorithm logic.
9. Using Java Cryptography, encrypt the text “Hello world” using BlowFish. Create your
ownkey using Java key tool.
11. Calculate the message digest of a text using the SHA-1 algorithm in JAVA.
12. Calculate the message digest of a text using the MD5 algorithm in JAVA.
210
CS15: Software Engineering
(5 Hours - 4 Credits)
UNIT I:
Introduction to Software Engineering: Some Definitions–Some Size factors–Quality
and Productivity Factors – Managerial Issues. Planning a Software Project: Defining
the Problem–Developing a Solution Strategy–Planning the Development Process –
Planning an Organizational Structure – Other Planning Activities.
UNIT II:
Software Cost Estimation: Software Cost Factors–Software Cost Estimation
Techniques – Staffing-Level Estimation – Estimating Software Maintenance Costs.
UNIT III:
Requirements Definitions: The Software Requirements Specification–Formal
Specification Techniques – Languages and Processors for Requirements Specification.
UNIT IV:
Software Design: Fundamental Design Concepts–Modules and Modularization Criteria
– Design Notations – Design Techniques – Detailed Design Considerations – Real-
Time and Distributed System Design – Test Plans – Milestones, Walkthroughs, and
Inspections - Design Guidelines.
UNIT V:
Verification and Validation Techniques: Quality Assurance–Static Analysis–
Symbolic Execution – Unit Testing and Debugging – System Testing – Formal
Verification. Software Maintenance: Enhancing Maintainability During
Development–Managerial Aspects of Software Maintenance – Configuration
Management – Source-Code Metrics – Other Maintenance Tools and Techniques.
Text Books:
1. Software Engineering Concepts, Richard Fairley, Tata McGraw Hill Publishing
Company Limited, New Delhi, 2017.
Unit I : Chapters: 1.1 – 1.4, 2.1-2.5
211
Reference Books:
1. R.S. Pressman, “Software Engineering – A practitioners approach”, Eighth Edition,
McGraw Hill International editions, 2014.
2. Ian Somerville, “Software Engineering”, Tenth Edition, Pearson Education, 2015.
3. Managing and leading software projects , Richard E.(Dick) Fairley, IEEE Computer
Society, John Wiley & Sons Publications, 2009.
4. Hans van Vliet, “Software Engineering: Principles and Practice”, Third Edition, John
Wiley & Sons, 2008.
5. Rajib Mall, “Fundamentals of Software Engineering”, Fourth Edition, Prentice-Hall of
India Pvt. Ltd., 2014.
UNIT I:
Introducing PHP – Basic development Concepts – Creating first PHP Scripts – Using
Variable and Operators – Storing Data in variable – Understanding Data types – Setting
and Checking variables Data types – Using Constants – Manipulating Variables with
Operators.
UNIT II:
Controlling Program Flow: Writing Simple Conditional Statements - Writing More
Complex Conditional Statements – Repeating Action with Loops – Working with String
and Numeric Functions.
UNIT III:
Working with Arrays: Storing Data in Arrays – Processing Arrays with Loops and
Iterations – Using Arrays with Forms - Working with Array Functions – Working with
Dates and Times.
UNIT IV:
Using Functions and Classes: Creating User-Defined Functions - Creating Classes –
Using Advanced OOP Concepts. Working with Files and Directories: Reading Files-
Writing Files-Processing Directories.
UNIT V:
Working with Database and SQL : Introducing Database and SQL- Using My SQL-
Adding and modifying Data- Handling Errors – Using SQLite Extension and PDO
Extension. Introduction XML - Simple XML and DOM Extension.
212
Text Book: Vikram Vaswani, “PHP A Beginner's Guide”, Tata McGraw Hill 2008.
Reference Books:
1. Steven Holzner, “The PHP Complete Reference”, Tata McGraw Hill, 2007.
2. Steven Holzer, “Spring into PHP”, Tata McGraw Hill 2011, 5thEdition.
Web References:
https://www.w3schools.com/php/
https://www.phptpoint.com/php-tutorial-pdf/
http://www.xmlsoftware.com/
Note: The above are sample problems; Instructor can add more exercises based on their
requirements and the current technology.
213
ES2 : 1. INTERNET OF THINGS
(5 Hours - 4 Credits)
UNIT I:
Fundamentals OF Iot -Evolution of Internet of Things -Enabling Technologies–IoT
Architectures: oneM2M, IoT World Forum (IoTWF) and Alternative IoT models –
Simplified IoT Architecture and Core IoT Functional Stack -–Fog, Edge and Cloud in
IoT –Functional blocks of an IoT ecosystem – Sensors, Actuators, Smart Objects and
Connecting Smart Objects
UNIT II:
IoT Protocols - IoT Access Technologies: Physical and MAC layers, topology and
Security of IEEE 802.15.4, 802.15.4g, 802.15.4e, 1901.2a, 802.11ah and LoRaWAN –
Network Layer: IP versions, Constrained Nodes and Constrained Networks –
Optimizing IP for IoT: From 6LoWPAN to 6Lo, Routing over Low Power and Lossy
Networks –Application Transport Methods: Supervisory Control and Data Acquisition
–Application Layer Protocols: CoAP and MQTT
UNIT III:
Design And Development -Design Methodology -Embedded computing logic -Micro
controller, System on Chips -IoT system building blocks -Arduino -Board details, IDE
programming - Raspberry Pi -Interfaces and Raspberry Pi with Python Programming.
UNIT IV:
Data Analytics And Supporting Services-Structured Vs Unstructured Data and Data
in Motion Vs Data in Rest –Role of Machine Learning –No SQL Databases –Hadoop
Ecosystem –Apache Kafka, Apache Spark –Edge Streaming Analytics and Network
Analytics –Xively Cloud for IoT, Python Web Application Framework –Django –AWS
for IoT –System Management with NETCONF-YANG106
UNIT V:
Case Studies/Industrial Applications- Cisco IoT system -IBM Watson IoT platform–
Manufacturing -Converged Plant wide Ethernet Model (CPwE) –Power Utility Industry
–Grid Blocks Reference Model -Smart and Connected Cities: Layered architecture,
Smart Lighting, Smart Parking Architecture and Smart Traffic Control
Text Books:
1. IoT Fundamentals: Networking Technologies, Protocols and Use Cases for
Internet of Things, David Hanes, Gonzalo Salgueiro, Patrick Grossetete, Rob
Barton and Jerome Henry, Cisco Press, 2017
214
Reference Books:
1. ArshdeepB ahga, Vijay Madisetti, ―Internet of Things –A hands-on
approach‖ , Universities Press, 2015
2. Olivier Hersent, David Boswarthick, Omar Elloumi , ―The Internet of Things –
Key applications and Protocols‖ , Wiley, 2012 (for Unit 2).
3. Jan Holler, VlasiosTsiatsis, Catherine Mulligan, Stamatis, Karnouskos, Stefan
Avesand. David Boyle, "From Machine-to-Machine to the Internet of Things -
Introduction to a New Age of Intelligence", Elsevier, 2014.
4. Dieter Uckelmann, Mark Harrison, Michahelles, Florian (Eds), ―Architecting
the Internet of Things, Springer, 2011.
UNIT I:
Introduction To Hacking : Introduction to Hacking – Important Terminologies –
Penetration Test – Vulnerability Assessments versus Penetration Test – Pre-
Engagement – Rules of Engagement -Penetration Testing Methodologies – OSSTMM –
NIST – OWASP – Categories of Penetration Test – Types of Penetration Tests –
Vulnerability Assessment Summary -Reports.
UNIT II:
Network Attacks: Vulnerability Data Resources – Exploit Databases – Network
Sniffing – Types of Sniffing -Promiscuous versus Nonpromiscuous Mode – MITM
Attacks – ARP Attacks – Denial of Service Attacks -Hijacking Session with MITM
Attack .
UNIT III:
SSL Strip: Stripping HTTPS Traffic -DNS Spoofing – ARP Spoofing Attack
Manipulating the DNS Records – DHCP Spoofing -Remote Exploitation – Attacking
Network Remote Services – Overview of Brute Force Attacks – Traditional Brute Force
– Attacking SMTP – Attacking SQL Servers – Testing for Weak Authentication.
UNIT IV:
Wireless and Web Hacking-Wireless Hacking – Introducing Aircrack- Cracking the
WEP – Cracking a WPA/WPA2 Wireless Network Using Aircrack-ng – Evil Twin
Attack – Causing Denial of Service on the Original AP – Web Hacking .
215
UNIT V:
Attacking the Authentication – Brute Force and Dictionary Attacks – Types of
Authentication – Log-In Protection Mechanisms – Captcha Validation Flaw – Captcha
RESET Flaw – Manipulating User-Agents to Bypass Captcha and Other Protection –
Authentication Bypass Attacks – Testing for the Vulnerability – Automating It with
Burp Suite – Session Attacks – SQL Injection Attacks – XSS (Cross-Site Scripting) -
Types of Cross-Site Scripting – Cross-Site Request Forgery (CSRF) – SSRF Attacks.
Text Books:
1. Rafay Baloch, “Ethical Hacking and Penetration Testing Guide”, CRC Press, 2014.
Reference Books:
1. Kevin Beaver, “Ethical Hacking for Dummies”, Sixth Edition, Wiley, 2018.
2. Jon Erickson , “Hacking: The Art of Exploitation”, Second Edition, Rogunix,
2007.
UNIT I:
Introduction: Data mining application–data mining techniques–data mining case studies
the future of data mining – data mining software. Association rules mining:
Introduction -Basics-task and a Naive algorithm- Apriori algorithm – improve the
efficiency of the Apriori algorithm – mining frequent pattern without candidate
generation (FP-growth) – performance evaluation of algorithms.
UNIT II:
Data warehousing: Introduction – Operational data sources- data warehousing – Data
Warehousing design – Guidelines for data warehousing implementation - Data
warehousing - Metadata. Online analytical processing (OLAP): Introduction – OLAP
characteristics of OLAP system – Multidimensional view and data cube - Data cube
implementation – Data Cube operations OLAP implementation guidelines.
UNIT III:
Classification: Introduction–decision tree–over fitting and pruning - DT rules–Naïve
Bayesmethod- estimation predictive accuracy of classification methods - other
evaluation criteria for classification method – classification software.
216
UNIT IV:
Cluster analysis: cluster analysis – types of data – computing distances-types of cluster
analysis methods - partitioned methods – hierarchical methods – density based methods
– Dealing with large databases – quality and validity ofcluster analysis methods–cluster
analysis software.
UNIT V:
Web data mining: Introduction- web terminology and characteristics- locality and
hierarchy in the web- web content mining-web usage mining- web structure mining –
web mining software. Search engines: Search engines functionality- search engines
architecture–Ranking of web pages.
Text Books:
1. Introduction to Data mining with case studies, G.K. Gupta, PHI Private limited,
New Delhi, 2014.
Unit I : Chapters 1 & 2
Unit II : Chapters 7 & 8
Unit III : Chapter 3
Unit IV : Chapter 4
Unit V : Chapters 5 & 6
Reference Books:
1. Data Warehousing, Data Mining & OLAP, Alex Berson and Stephen J. Smith,
Tata McGraw Hill Edition, Tenth Reprint 2007
2. Data Mining Concepts and Techniques, Jiawei Han and MichelineKamber,
Second Edition, Elsevier, 2007
3. Insights into Data Mining K.P. Soman, ShyamDiwakar, V. Ajay, Theory and
Practice, PHI Publications Eastern Economy Edition 6th Printing, 2012
UNIT I:
Introduction to internet: Internet- Growth of Internet and ARPA Net–Owners of the
Internet -Anatomy of Internet – History of WWW - Basic Internet Terminologies – Net
etiquette - Internet Applications - Commerce on the Internet– Governance on the
Internet - Impact of Internet on Society.TCP/IP Internet Technology and Protocols:
Packet Switching Technology - Internet Protocols -TCP/IP – Router - Internet
Addressing Scheme- Machine Addressing - E-mail Addresses – Resource Addresses.
217
UNIT II:
Interconnectivity: Connectivity types - Setting up a connection – Hardware
requirements- Selection of a modem - Software requirements – Internet accounts by
ISP-ISDN-Protocol options-Service options. Internet Network: Network Definition-
Common terminologies – Node - Host- Workstation –Network Administrator - Network
security - Network Components – Servers-client Server-Communication Media - Types
of Networks - Addressing in Internet – DNS -Network topologies – Ethernet – FDDI -
ATM.
UNIT III:
Browsers and Search engines: Browsers - What is a browser? – Parts of a browser
Window-Running a browser - working with a Browser. Search engines: What is search
engine? - Types of search engines - Search and meta search engines.
UNIT IV:
E-mail: E-mail - E-mail Networks and Servers - E-mail Protocols - Structure of E-mail -
Attachments – E-mail Clients - E-mail Clients - web based E-mail-Address book –
Signature File.
UNIT V:
HTML Programming Basics: Introduction to HTML – HTML browsers -Different
versions of HTML-HTML tags - Document overview – Header elements - Section
headings - Block headings - Lists-Inline elements – Images -working with Tables,
Forms, Frames.
Text Books:
1. Internet Technology and Web design, Ramesh Bangia, Firewall Media, (Animprint of
Lakshmi Publications Pvt. Ltd.), Third Edition, 2011.
Unit I : Chapters 1 and 2
Unit II : Chapters 3 and 4
Unit III : Chapter 5(5.6), Chapter 8(8.11 &8.13)
Unit IV : Chapter 5 (5.1) & Chapter 6
Unit V : Chapter 9
Reference Books:
1. The Internet Book, Douglas E. Comer, Fourth Edition, PHI Learning Pvt. Ltd. , New
Delhi, 2009.
2. Using the Internet the Easy Way, Young Kai Seng, Minerva Publications, First Edition,
2000.
3. Fundamentals of Information Technology By Alexis Leon and Mathews Leon, Vikas
Publishing House Pvt. Ltd., Revised Edition.
218
SBS 6: Quantitative Aptitude
(2 Hours - 2 Credits)
UNIT II: Square roots and Cube roots- Average – Problems on ages.
Note: Example problems –Minimum 70% & Exercise problems – Maximum 30% to be set in
question paper
Text Books:
1. Quantitative Aptitude, R.S. Aggarwal, S. Chand & Company Ltd, New Delhi,
Reprint 2021.
Unit I : Page nos. 3-29, 30-45, 46-66
Unit II : Page nos. 117-138, 139-160, 182-194
Unit III : Page nos. 208-250, 251-293, 294-310
Unit IV : Page nos. 341-370, 384-404
Unit V : Page nos. 445-465, 466-486
Reference Books:
1. Quantitative Aptitude and reasoning, R.V. Praveen, PHI Learning, 2nd Edition 2013.
2. Magical book on Quicker Maths, M.Tyra, BSC Publishing Co. Pvt. Ltd, Delhi.
Reprint, 2011.
3. Quantitative Aptitude for Competitive Exams, Abhijit Guha, 4th Edition, Tata McGraw
Hill Company, New Delhi.
* * *
219