BCA Syllabus 2021.pdf - PDF - Compressed
BCA Syllabus 2021.pdf - PDF - Compressed
LEARNING OBJECTIVES:
In this course, the learners will be able to develop expertise related to the following: -
1. To study different types of media, multiplexing, switched networks, the Internet, TCP/IP suite, fiber-
optic communications and the state-of-art networking applications.
2. To develop an understanding of different components of computer networks, various protocols, modern
technologies and their applications.
3. Identify and discuss the underlying concepts of IPv4 & IPv6 protocols, along with their characteristics
and functionality.
4. Details of IP operations in the Internet and associated routing principles
5. Analyzing various layering protocols in computer networks.
PRE-REQUISITES:
1. Fundamentals of Computers and IT
CO2 Understand and describe the layered protocol model (OSI and TCP/IP BTL2 PO1, PO2,
model) PO3, PO7
CO3 Analyze the elements and protocols for peer – peer and communication BTL3 PO1, PO2,
between layers. BTL4 PO3, PO4,
PO6, PO7
CO4 Evaluate and implement routing algorithms and BTL3 PO1, PO2,
Router basic configuration. BTL5 PO3, PO4,
PO7, PO8
CO5 Evaluate the protocols and Principles in computer networking BTL5 PO1, PO2,
BTL6 PO3, PO4,
PO5, PO6,
PO7
UNIT – I
No. of Hours: 10 Chapter/Book Reference: TB1[Chapter-1], TB2[Chapter-1, 2]
Basic Concepts: Components of data communication, distributed processing, Line configuration, topology,
transmission mode, and categories of networks. OSI and TCP/IP Models: Layers and their functions,
comparison of models. Transmission Media: Guided and unguided, Attenuation, distortion, noise, throughput,
propagation speed and time, wavelength, Shannon Capacity.
UNIT – II
No. of Hours: 12 Chapter/Book Reference: TB1[Chapter-2, 3], TB2[Chapter-3, 9]
Telephony: Multiplexing, WDM, TDM, FDM, circuit switching, packet switching and message switching.
Data Link Layer: Types of errors, Framing (character and bit stuffing), error detection & correction methods;
Flow control; Protocols: Stop & wait ARQ, Go-Back- NARQ, Selective repeat ARQ.
UNIT – III
No. of Hours: 12 Chapter/Book Reference: TB1[Chapter-5], TB2[Chapter-18, 19, 20, 22]
Network Layer: Internetworking & Devices: Repeaters, Hubs, Bridges, Switches, Router, Gateway, Modems;
Addressing: IPv4 and IPv6 addressing, IPv4 subnetting; Routing: Unicast Routing Protocols: RIP, OSPF, BGP;
Routing: Routing Methods- Static and Dynamic Routing, Routing basic commands, Distance vector protocol,
Link state protocol
UNIT – IV
No. of Hours: 10 Chapter/Book Reference: TB1[Chapter-6,7], TB2[Chapter-23, 24,25]
Transport and upper layers in OSI Model: Transport layer functions and Protocols, connection management,
functions of session layers, Presentation layer, and Application layer.
TEXT BOOKS:
TB1. A. S. Tenanbaum, “Computer Networks”; Pearson Education Asia, 4th Ed., 2003.
TB2. Behrouz A. Forouzan, “Data Communication and Networking”, 2nd edition, Tata Mc Graw Hill.
REFERENCES:
RB1. D. E. Comer, “Internetworking with TCP/IP”, Pearson Education Asia, 2001.
RB2. William Stallings, “Data and computer communications”, Pearson education Asia, 7th Ed., 2002.
RB3. Leinwand, A., Pinsky, B. (2001). Cisco router configuration. United Kingdom: Cisco Press.
LEARNING OBJECTIVES:
In this course, the learners will be able to develop expertise related to the following:
1. To study the various logic gates and design principles of different digital electronic circuits
2. To design different combinational and sequential circuits.
3. Identify the functional units of the processor and the factors affecting the performance of a computer
4. To learn about the Input –Output organization of a typical computer
PRE-REQUISITES:
Fundamentals of Computer
CO3 Able to trace the execution sequence of an instruction through the BTL1 PO1, PO7,
processor BTL2 PO11
CO4 Demonstrate computer architecture concepts related to design of BTL2 PO1, PO4,
modern processors, memories and I/Os. BTL4 PO7, PO11
CO5 Demonstrate the ability to classify the addressing modes, instructions BTL2 PO1, PO4,
set BTL5 PO7, PO11
UNIT – I
No. of Hours: 11 Chapter/Book Reference: TB2[Chapter-2, 4], RB1 [Chapter-5, 6]
Boolean Algebra and Logic: Basics Laws of Boolean Algebra, Logic Gates, Simplifications of Boolean
equations using K-maps SOP and POS, Don’t Care condition.
Data Transfer Operations: Register Transfer, Bus and Memory Transfer, Registers and micro-operations.
Basic Computer Organizations and Design: Instruction Codes, Computer Registers, Instruction Cycle,
General Register Organization, Stack Organization, Instruction Formats, Addressing Modes,
UNIT – IV
No. of Hours: 11 Chapter/Book Reference: TB1[Chapter-12, 13], RB3[Chapter-7]
Input-Output Organization: Peripheral Devices, Input-Output Interfaces, Asynchronous Data Transfer, Modes
of Transfer, Priority Interrupt, Direct Memory Access (DMA)
Memory Organization: Main Memory, Auxiliary Memory, Associative Memory, Cache Memory, Virtual
Memory.
TEXT BOOKS:
TB1. Morris Mano, Computer System Architecture, 3rd Edition, Prentice-Hall of India Private Limited,
1999.
TB2. Moris Mano, “Digital Logic and Computer Design”, PHI Publications, 2002
REFERENCES:
RB1. R. P. Jain, “Modern Digital Electronics”, TMH, 3rd Edition, 2003.
RB2. WIliam Stallings, Computer Organization and Architecture, 4th Edition, Prentice Hall
of India Private Limited, 2001
RB3. Subrata Ghosal,” Computer Architecture and Organization”, Pearson 2011
RB4. Malvino, “Digital Computer Electronics: An Introduction to Microcomputers”, McGraw Hill
LEARNING OBJECTIVES:
In this course, the learners will be able to develop expertise related to the following:
1. Gain knowledge and develop a broad understanding of bottom up approach
2. Construct object oriented solutions for real world scenarios
PRE-REQUISITES:
1. Knowledge of C programming
2. Basic Programming Skills
CO3 Develop expertise inclassification hierarchies and polymorphism using C++ BTL3 PO3,
PO4
CO4 Comprehend the working of files and generic programming BTL5 PO3,
PO4
UNIT – I
No. of Hours: 10 Chapter/Book Reference: TB1 [Chapters 1, 2], TB2 [Chapters 1, 2, 3]
Object Oriented Paradigm: Procedural vs. object-oriented development, basic concepts of object-oriented
programming, applications and benefits of OOP, comparison between C and C++.
Beginning with C++: Stream based I/O, literals- constant qualifiers, operators in C++, reference variable,
functions, default arguments, parameter passing by value, reference and pointer, inline functions, type
conversion, basic C++ programs, new, delete operators- basic use and dynamic memory allocation for arrays.
UNIT – II
No. of Hours: 11 Chapter/Book Reference: TB1 [Chapters 10, 11], TB2 [Chapters 5, 6]
Classes and Objects: C++ class declaration, access specifiers, member functions, arrays within a class, array of
objects, memory allocation of objects, passing objects as arguments, returning objects from functions, function
overloading, static data and member functions, friend function and friend class, this pointer
UNIT – III
No. of Hours: 12 Chapter/Book Reference: TB1 [Chapters 13, 14, 15], TB2 [Chapters 7, 8, 9]
Inheritance: Types of inheritance, derivation – public, private & protected, ambiguity resolution (function
overriding), aggregation, composition v/s classification, virtual base class, constructor and destructor in derived
classes.
Polymorphism: Types of polymorphism, early v/s late binding, Virtual Functions: Need for virtual functions,
pointer to derived class objects, pure virtual functions, abstract classes.
Operator Overloading: Overloading unary operators, nameless objects, overloading binary operators,
overloading with friend functions, conversion between basic types and user-defined types.
UNIT – IV
No. of Hours: 11 Chapter/Book Reference: TB1 [Chapters 16, 17, 18, 19],TB2 [Chapters 11, 12,
13]
TEXT BOOKS:
TB1. K.R. Venugopal, Rajkumar, T. Ravishanker, “Mastering C++”, TMH
TB2. E. Balagurusamy, “Object Oriented Programming with C++”, McGraw-Hill Education
REFERENCE BOOKS:
RB1. Ashok N. Kamthane, “Object-Oriented Programming with ANSI And Turbo C++”, Pearson Education.
RB2. Schildt Herbert, “C++: The Complete Reference”, Tata McGraw Hill.
RB3. R. Lafore, “Object Oriented Programming using C++”, Galgotia Publications.
INSTRUCTIONSTOPAPERSETTERS:
1. Question No. 1 should be compulsory and cover the entire syllabus. There should be10 questions of
short answer type of 2.5 marks each, having at least 2 questions fromeachunit.
2. Apart from Question No. 1, rest of the paper shall consist of four units as per thesyllabus. Every
unitshould have two questions to evaluate analytical/technical skillsof candidate. However, student
may be asked to attempt only 1 question from eachunit.Eachquestion should be of12.5 marks,
includingitssubparts,ifany.
3. ExaminersarerequestedtogothroughtheCourseOutcomes(CO)ofthiscourseandpreparethequestionpaper
accordingly,usingBloom’sTaxonomy(BT),insuchawaythat every question be mapped to some or
other CO and all the questions, puttogether,mustbe ableto achievethe mappingto alltheCO(s), in
balanced way.
LEARNING OBJECTIVES:
In this course, the learners will be able to develop expertise related to the following:
1. To distinguish between values and skills, and understand the significance of values in personal and
professional life
2. To understand harmony at all the levels of human living, and live accordingly.
3. To understand the role of a human being in ensuring harmony in society and nature.
4. To apply the understanding of harmony in existence in their profession and lead an ethical life
PRE-REQUISITES:
None
CO2 Recognize the multiple ethical interests at stake in a real-world situation BTL2 PO10
CO3 Demonstrate knowledge of ethical values in non-classroom activities, such as service BTL3 PO10
learning, internships, and field work integrate, synthesize, and apply knowledge of
ethical dilemmas and resolutions in academic settings, including focused and
interdisciplinary research
CO4 Instill Moral and Social Values and Loyalty and appreciate the rights of others BTL4 PO10
CO5 Comprehend the concept of harmony at all the levels of society and readiness to BTL5 PO10
contribute towards harmony at all levels.
UNIT – I
No. of Hours: 10 Chapter/Book Reference: TB1 [Chapters-1, 2], TB2 [Chapters-1]
Introduction to human values:
Understanding the need, basic guidelines, process of value education
Understanding the thought provoking issues- continuous happiness and prosperity
Right understanding- relationship and physical facilities, choice making- choosing, cherishing and
Acting
Understanding values- Personal Values, Social values, Moral values and spiritual values, Self-
Exploration and Awareness leading to Self-Satisfaction; Tools for Self-Exploration.
UNIT-II
No. of Hours: 10 Chapter/Book Reference: TB2 [Chapters 5-10]
UNIT-III
UNIT-IV
No. of Hours: 11 Chapter/Book Reference: TB1 [Chapters-4, 5], TB2 [Chapters-12, 13]
Professional ethics
Understanding about Professional Integrity, respect and equality, Privacy, Building Trusting
relationships, Co-operation, respecting the competence of other profession.
Understanding about taking initiative, promoting the culture of openness, depicting loyalty towards
goals and objectives.
Ethics at the workplace: - cybercrime, plagiarism, sexual misconduct, fraudulent use of institutional
resources, etc.;
Ability to utilize the professional competence for augmenting universal human order.
TEXT BOOKS:
TB1. A Textbook on Professional Ethics and Human Values by R S Naagarazan.
TB2. A Foundation Course in Human Values and Professional Ethics by R.R. Gaur, R. Sangal, G.P. Bagaria.
TB3. Indian Ethos and Modern Management by B L Bajpai New Royal Book Co., Lucknow., 2004,
Reprinted 2008.
REFERENCE BOOKS:
RB1. A N Tripathy, 2003, Human Values, New Age International Publishers
RB2. Human Values and Professional Ethics by Vaishali R Khosla, Kavita Bhagat
RB3. I.C. Sharma. Ethical Philosophy of India Nagin & co Julundhar
PRE-REQUISITES:
1. Computer Fundamentals
COURSE OUTCOMES(COs):
After completion of this course, the learners will be able to: -
CO2 Illustrates string handling methods and user-defined functions BTL3 PO1, PO2, PO3,PO7,
in python PO10
CO3 Applying data structures primitives like List, Dictionary and BTL2 PO1, PO2, PO3,PO4
tuples.
CO4 Identify the commonly used operations involved in file BTL3 PO1, PO2, PO3, PO4,
handling PO7
CO5 To understand how python can be used for application BTL2 PO1, PO2, PO3, PO4,
development PO11
UNIT–I
No. of Hours: 11 Chapter/Book Reference: TB1[Chapters 1, 2], TB2[Chapters 1, 3, 6]
Basic Introduction: Origin, Need of Python Programming, Features, program structure, identifiers, reserved
words, escape sequences, IDLE-Python Interpreter
Python Programming Introduction: Variables and assignment statements, data types, Operators: Assignment,
Unary, Binary, Arithmetic, Relational, Logical, Bitwise Operator and membership operator
Control Structures: if-conditional statements, if –else condition, if-elif-else condition, nested if-elif-else
condition, Iteration (for Loop and while loop), Nested Loops, break and continue statement.
Strings: Slicing, Membership, Built in functions (count, find, capitalize, title, lower, upper and swap case,
replace, join, isspace (), isdigit(), split(), startswith(), endswith()).
UNIT–II
No. of Hours: 11 Chapter/Book Reference: TB1[Chapter 3], TB2[Chapters 7, 12]
Mutable and Immutable objects: List: creating, initializing, accessing, slicing, and traversing List. List
operations: length, concatenation, repetition, in, not in, max, min, sum, all, any. List methods: append, extend,
count, remove, index, pop, insert, sort, reverse.
Tuples: creating tuples, Tuple operations: length, concatenation, repetition, membership, maximum, minimum,
tuple methods: count, index.
Dictionary: creating, accessing values, adding, modifying and deleting items in dictionary, Dictionary methods:
len, str, clear, copy, get, update, copy. Difference between list and dictionary
UNIT–III
No. of Hours: 11 Chapter/Book Reference: TB1 [Chapters 5], TB2[Chapters 2, 8]
Concept of Functions: Functions: Defining, Calling and Types of Functions, Arguments and Return Values,
Formal vs. Actual Arguments, Scope and Lifetime, Keyword Arguments, Default Arguments, Recursion.
Modules: importing Modules, Math and Random Module, creating your own modules, and concept of Packages
UNIT–IV
No. of Hours: 11 Chapter/Book Reference: TB2[Chapter 9], TB1[ Chapters 5, 7]
TEXTBOOKS:
TB1. Programming in Python 3: A Complete Introduction to the Python Language (2nd Edition), Mark
Summerfield.
TB2. Python Programming: A Modular Approach by TanejaSheetal, Kumar Naveen, Eleventh Impression,
Pearson India Education Services Pvt. Ltd.
TB3. Agile tools for real world data: Python for Data Analysis by Wes McKinney, O’Reilly
REFERENCE BOOKS:
RB1. Let Us Python 2Nd Ed: Python Is Future, Embrace It Fast (Second Edition): YashvantKanetkar.
RB2. Programming Python, 4th Edition by Mark Lutz Released December 2010 Publisher(s): O'Reilly
Media, Inc.
RB3. Python: The Complete Reference by Martin Brown.
This is the associated practical paper. The learning outcomes are same as the corresponding theory paper.
List of Practicals
5 Write a menu driven program to accept two strings from the user and perform the various CO1,
functions using user defined functions. CO2
6 Write a program to find smallest and largest number in a list CO2,
CO3
7 Create a dictionary whose keys are month names and whose values are the number of days CO2,
in the corresponding months. CO3
Ask the user to enter a month name and use the dictionary to tell them how many
days are in the month.
Print out all keys in the alphabetically order
PRE-REQUISITES:
1. Fundamentals of Information Technology
CO2 Describe briefly types of criminal attack and classification of BTL2 PO1,PO3, PO7
Cybercrimes. Describe Steganography.
CO3 Identify and apply the Cybercrime Tools and Methods. BTL1, PO1,PO3,PO6, PO8
Identify and apply the underlying concepts of Symmetric-key BTL2,
and Asymmetric-key Cryptography along with Digital BTL3
Signature.
CO4 Implement security for HTTP applications, Emails. Apply BTL4 PO1,PO3,PO5, PO7
Firewall in your system.
CO5 Implement, evaluate Keyloggers. Implement and evaluate BTL3, PO1, PO4, PO6,
different cyber security algorithms with the help of program. BTL5 PO7, PO8
CO6 Design and create security mechanisms to protect computer BTL6 PO1, PO4, PO6, PO7,
systems. PO8
UNIT – I
No. of Hours: 12 Chapter/Book Reference: TB1 [Chapters – 1, 2], TB2[Chapters - 1, 2]
Introduction to Cyber Security: Basic Cyber Security Concepts, Layers of Cyber Security, Cybercrimes,
Cybercriminals, Cyberspace, Cyber threats, Cyberwarfare, Classification of Cybercrimes, Categories of Cyber
Crime, Types of criminal attack, cyberstalking, botnet, cybercrime and cloud computing.
UNIT – II
No. of Hours: 10 Chapter/Book Reference: TB1 [Chapters – 2, 3], TB2 [Chapter - 3, 4, 11]
Cybercrime attacks on Mobile/Cell Phones, Introduction to Cybercrime Tools and Methods: phishing and its
working, password cracking and its types, Keyloggers and its types, viruses, Trojan horse and backdoor,
steganography, DoS & DDoS attack,
UNIT – III
No. of Hours: 10 Chapter/Book Reference: TB1 [Chapter – 4], TB3 [Chapter - 2, 21]
Introduction to Cyber Forensics: Need of Cyber Forensics, Digital Evidence and its rules, RFC2822, Life cycle
of Digital Forensics, process of Digital Forensics, Phases of Computer Forensics/Digital Forensics, Computer
Forensics Investigation, Computer Forensics and Steganography, OSI 7-layer model to Computer Forensics.
TEXT BOOKS:
TB1. Supriya Madan and Rajan Gupta, “Security in Cyber Space and its Legal Perspective”, 1 st Edition,
AGPH Books.
TB2. Nina Godbole and Sunit Belpure, Cyber Security Understanding Cyber Crimes, Computer Forensics
and Legal Perspectives, Wiley.
TB3. Kevin Beaver, Hacking for Dummies Wiley Publishing, Inc.
TB4. Stallings and Brown, Computer Security: Principles and Practice, Fourth Edition, Publisher: Pearson,
2018.
REFERENCE BOOKS:
RB1. Cyber Security Essentials, James Graham, Richard Howar and Ryan Otson, CRC Press.
RB2. Introduction to Cyber Security: Jeetendra Pande.
RB3. Certified Ethical Hacker STUDY GUIDE Kimberly Graves Sybex.
This is the associated practical paper. The learning outcomes are same as the corresponding theory paper.
List of Practicals
LEARNING OBJECTIVES:
In this course, the learners will be able to develop expertise related to the following:
1. To get the knowledge about the important management concepts and their applications.
2. To help the students to develop cognizance of the importance of management principles.
3. To have an insight of various functional departments in an organization.
4. To help the organization in understanding Organizational culture.
PRE-REQUISITES:
None
CO2 To give knowledge about planning and decision making process. To describe BTL2,4 PO2,
about staffing and directing. PO1
CO3 To learn about the motivation theories and Leadership styles. To discuss about BTL4,6 PO3
the Organizational behaviour and its application.
CO4 To give basic knowledge people management, their personality and perception. BTL5,2 PO3
To describe about the Organisational culture and its effects.
UNIT – I
No. of Hours: 12 Chapter/Book Reference: TB1 [Chapters – 1, 2, 4]
Management: Meaning & concept, Management principles (Fayol & Taylor), Management process (in brief),
Managerial levels, Skills, Roles and Functions of a manager, Management Theories (Classical, Neo classical,
Behavioral, Systems & Contingency).
UNIT – II
No. of Hours: 10 Chapter/Book Reference: TB1 [Chapters – 7, 8, 10, 16, 17, 27, 28]
Planning: Meaning, Purpose & process, Decision making: Concept & process, Organizing: Process,
Departmentation, Authority & Responsibility relationships, Decentralization.
Staffing: Concept, nature & importance of staffing and Directing.
UNIT – III
No. of Hours: 12 Chapter/Book Reference: TB1 [Chapters – 13, 18, 32, 33]
Motivation: concept & theories (Maslow’s, Herzberg Two factor, McGregor’s theory X & Y),Leadership:
Concepts & styles. Controlling: Nature, Importance, significance & Process of control.
Organizational Behavior: concept and Nature of Organisational Behaviour, Importance, Challenges and
Opportunities.Organizational culture: Meaning, importance and characteristics of organization culture.
UNIT – IV
No. of Hours: 10 Chapter/Book Reference: TB1 [Chapters –34, 35, 36, 40, 41]
Managing People - Meaning, Need of understanding human behavior in organization, Models of OB, Major
concepts in OB (elementary) - Personality, Learning, concept of perception & perception theories, Attitude
Building and Leadership.
TEXT BOOKS:
TB1. Dr. C.B Gupta “Management concepts & practices” S.Chand & Sons, 2009.
REFERENCES BOOKS:
RB. Stoner, Freeman & Gilbert, “Management” 6th Edition, Pearson International.
RB2. Ankur Chhabra, “Organisational Behaviour”, Sun India Publications, 2009
RB3. Robbins, Stephen P, “Organisational Behaviour”. PHI, 2010
PRE-REQUISITES:
None
COURSE OUTCOMES (COs):
After completion of this course, the learners will be able to: -
CO2 Identify how security issues in cyberspace raise ethical BTL3 PO10
concerns. BTL5
CO3 Recognize various types of cybercrime and its impact BTL3 PO10
BTL5
CO4 Discuss ethical issues associated with the use of social BTL3 PO10
networks and social media BTL5
UNIT – I
UNIT – III
No. of Hours: 05 Chapter/Book Reference: TB1 [Chapters – 4,5,6]
Discussion on articles, companies, or legal cases that deal with an ethical issue. Students are required to analyze
and present at least one multinational company and investigate its ethical policies and practices. These polices
can normally be found using any search engine.
TEXT BOOKS:
TB1. Cyber Ethics 4.0 Serving Humanity with Values Editors Christoph Stückelberger / Pavan Duggal e-
book by Globalethics.net available for download from
https://repository.globethics.net/handle/20.500.12424/169317
REFERENCE BOOKS:
The students may refer free e-books or online latest articles, news and legal cases dealing cyber ethical issues
for understanding the importance of cyber ethics.
LEARNING OBJECTIVES:
In this course, the learners will be able to:
1. Develop concepts related to Object Oriented Programming
2. Construct object oriented solutions in real world scenarios
PRE-REQUISITES:
1. Knowledge of C programming
2. Basics of Programming
List of Practicals
S. Detailed Statement Mapping
No. to CO #
Core Practicals (Implement minimum 8 out of 10 practicals)
1 WAP to implement ‘Inline function’ CO1
2 WAP to implement call by reference and return by reference using class. [Hint. CO1
Assume necessary functions]
3 WAP to implement friend function by taking some real life example CO2
18 Implement the following hierarchy considering appropriate data members and member CO3
functions (use Virtual functions).
19 WAP to convert meter to centimeter and vice versa, using data conversions and operator CO3
overloading
20 WAP to count digits, alphabets and spaces, stored in a text file, using streams CO4
Note:
1. In total 15 practical to be implemented. 2 additional practical may be given by the course instructor.
2. This is a suggestive list of programs. However, the instructor may add programs as per the
requirement of the course.