0% found this document useful (0 votes)
29 views2 pages

Computer Application in Financial Services

Uploaded by

Dharmik
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
29 views2 pages

Computer Application in Financial Services

Uploaded by

Dharmik
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 2

SEMESTER –VI

COMPUTER APPLICATIONS IN FINANCIAL SERVICES

 The topics of Unit I and Unit II are expected to provide an introduction.


They should be taught mostly at conceptual level
 Unit III is expected to be taught in the light if Information Technology
 Unit Iv is expected to be taught through mainly by demonstrations and
support of practical

UNIT –I
Introduction
The growth of Networking Technology : Modern Benefits of Networking, Data Sharing,
Resource Sharing. The development of computer networks. Life before Networking
Early connections, Modern Networking, TCP /IP model, OSI Model. Data
communications technology : Introduction to Analog and Digital Signals, Analog and
Digital technology.

Local Area Networks : Network Topologies, Point – to – Point Topology, Bus Topology,
Mesh Topology, Special Topology.

Components : Workstations, Network Interface Cards, Hubs, Peripherals, Different


types of Transmission Media in Networking : Twisted Pair Cabling. Coax al Cable,
Fiber Optic Cable, Wireless Media, Radio and Infrared

Connectivity : Repeaters, Bridges, Routers, Gateways.

Wide Area Networking : Switching Technology, mete Switching, Packet Switching,


Circuit Switching

UNIT –II
COMPUTER SECURITY
Introduction : Security, Attacks, Computer Criminals, Method of defense

Security in Networks ; Threats in networks, Networks, Network security control,


Firewalls Intrusion Detection systems, Secure e-mail, concepts of Encryption and
Decryption

Legal, Privacy and Ethical Issues in Computer Security : Protecting programs and data,
software failures, Computer crime, Privacy, Ethical issues in computer society.

Network Security ; Introduction and need for security, Authentication, Access Controls,
Server Logs, Virus Protection Firewalls, Intrusion Detection System and VPN.
Cyber Laws.

UNIT –III
DATA BASES
Introduction to Database Concepts : Database system vs files systems, view of data,
data models, data abstruction, data independence, three level architecture, database
design, database language – data definition language (DDL), data manipulation
language (DML)
E-R model : Basic concepts, Keys, E-R diagram, design of E-R diagram scheme
(simple example)
Introduction to Access Creating databases, tables (relations), rows (Tuples), domains,
attribute candidate keys primary key, queries, forms

UNIT –IV
VISUAL BASIC
Introduction to Visual Basic Programming.
What is Visual Basic ? Terminology, Creating and Application, Modular Environment,
Building an Application
Setting properties of Objects, Forms, Introduction to Controls, Object-based, Event
driven, Programming
Coding
Examining Code, Using the object Browser, Statements and Functions, Conditional
Statements in Visual Basic, Looping Statements, Overview of debugging
Forms
Using Forms Multiple Forms, Order of events, Startup and End of Applications
Variables
Data Types, Scope and Lifetime of variables, Constants, Arrays and User-Defined
Types Procedures
Introduction to Procedures, Arguments as Parameters, Named Arguments and Optional
/ Arguments
Controls
Using Controls, Standard Controls, Custom Controls
Menus
Creating and Documenting Naming Standards
Cumsoms Pop – Up Menus
Error Handling
An introduction to Error Handlers
Record Sets : Choosing ADO or DAO, Adding data, Editing data, Deleting data
Building Active X Controls : Creating and Active X control, Expositing properties,
Methods and Events, Testing a control, Creating property pages, Creating a data-bound
control source control, .net

You might also like