0% found this document useful (0 votes)
18 views9 pages

Dav Cis R20 DS

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views9 pages

Dav Cis R20 DS

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 9

NARASARAOPETA ENGINEERING COLLEGE

(Autonomous)
Yallmanda(Post), Narasaraopet- 522601
Department of Computer Science and Engineering (AIML, CS, DS)
COURSE INFORMATION SHEET

PROGRAMME: B.Tech. CSE (Data Science)


COURSE: DATA ANALYTICS Semester : II CREDITS: 3
AND VISUALISATION

COURSE CODE: R20DS3201 COURSE TYPE (CORE /ELECTIVE / BREADTH/ S&H): CORE
REGULATION: R20
COURSE AREA/DOMAIN: CSE PERIODS: 5 Per Week.

COURSE OUTCOMES:
C321.1 Interpreting the Importance of Data and its importance [K2] Understanding – [K2]

C321.2 Illustrating various ANOVA methods and Regression methods Understanding – [K2]
[K2]
C321.3 Analyze various data types and visualization types to extract Analyzing – [K4]
meaningful insights. [K4]
Apply visualization techniques to address specific problems using
C321.4 datasets and derive valuable insights, especially for large datasets. Applying – [K3]
[K3]
C321.5 Make use of power bi tool for applying various functions. [K3] Applying – [K3]

SYLLABUS:
UNIT DETAILS

Data and its importance, data analytic and its types, importance of data analytics, Python
I Fundamentals: Python Language Basics, Jupiter Notebook, Introduction to pandas, Data
Structures, Essential Functionality, Visual Representation of the Data, Measures of Central
Tendency, Dispersion

Introduction to ANOVA, one way ANOVA, two way ANOVA, Post-Hoc test, Simple Linear
II Regression, Multiple Linear Regression, Maximum Likelihood Estimation (MLE), Logistic
Regression, step-wise methods and algorithms.

Overview of data visualization, Data Abstraction Task Abstraction, Dimensions and Measures,
Analysis: Four Levels for Validation, Statistical charts (Bar Chart - stacked bar chart - Line Chart
III - Histogram - Pie chart - Frequency Polygon - Box plot - Scatter plot - Regression curves.)

Introduction to various data visualization tools, Scalar and point techniques, vector
IV visualization techniques, multidimensional techniques, visualizing cluster analysis K-means and
Hierarchical Cluster techniques.
Power BI, DAX Logical Functions, Date and Time Functions, Time Intelligence Functions,
V Information Functions, Logical Functions, Mathematical and Trigonometric Functions, Statistical
Functions, Text Functions, Parent-Child functions
TEXT BOOKS
T BOOK TITLE/AUTHORS/PUBLISHER
McKinney, W. (2012). Python for data analysis: Data wrangling with Pandas, NumPy, and IPython.
T1 "O'Reilly Media, Inc.".

David W. Hosmer, Stanley Lemeshow (2000). Applied logistic regression (Wiley Series in probability
T2 and statistics). "Wiley-Interscience Publication".

T3 Tamara Munzer, Visualization Analysis and Design, 1st edition, CRC Press, United States, 2015.”,

Michael Fry, Jeffrey Ohlmann, Jeffrey Camm, James Cochran, Data Visualization: Exploring and
T4 Explaining with Data, South-Western College Publishing, 2021

REFERENCE BOOKS
R BOOK TITLE/AUTHORS/PUBLISHER
Dr. Chun-hauh Chen, W. K. Hardle, A. Unwin, Handbook of Data Visualization, 1st edition, Springer
R1 publication, Germany, 2008

Ben Fry, Visualizing Data, 1st edition, O'Reilly Media, United States, 2008
R2 Avril Coghlan, A little book of R for multivariate analysis, 1st edition, Welcome Trust Sanger Institute,
United Kingdom, 2013

DELIVERY/INSTRUCTIONAL METHODOLOGIES:
☑Chalk & Talk ☑ PPT ☑Active Learning
☑Web Resources ☑ Students Seminars ☐Case Study
☐ Blended Learning ☐ Quiz ☐Tutorials
☐Project based learning ☐NPTEL/MOOCS ☐ Simulation
☑Flipped Learning ☐Industrial Visit ☑Collaborative Learning
☐Brain storming ☐Role Play ☑Virtual Labs

MAPPING OF CO-PO AND CO-PSO:

CO-PO Mapping CO-PSO


POs PSO
COs
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 01 02 03
C321.1 3 3 2 2 1 2 3 2 1
C321.2 2 3 2 3 2 1 2 3 2
C321.3 3 3 2 3 3 - 3 3 2
C321.4 2 3 3 3 3 2 3 2 3
C321.5 1 2 1 2 3 - 2 3 3
C322

COURSE OUTCOME RUBRIC (ASSESMENT PER STUDENT):


ASSESMENT ATTAINMENT ATTAINMENT ATTAINMENT ATTAINMENT
TOOL WITH METHOD LEVEL 3 LEVEL 2 LEVEL 1 LEVEL 0
WEIGHTAGE (EXCELLENT) (GOOD) (AVERAGE) (POOR)
Student secured Student secured
Student secured Student secured
< 60% and < 50% and
Internal tests ≥ 60% marks of < 40% marks of
Direct ≥50% marks of ≥40% marks of
(40%) allocated marks allocated marks
allocated marks allocated marks
for that CO for that CO
for that CO for that CO
Student secured Student secured
Student secured Student secured
≥ 70% and ≥ 60% and
Assignments ≥ 80% marks < 60% of marks
Direct <80% marks <70% marks
(20%) allocated for that allocated for that
allocated for that allocated for that
CO CO
CO CO
Student secured Student secured Student secured
End Semester Student secured
grades O*&E* grades A*& B* grades C*& P*
Examination Direct grades F* in
in External in External in External
(30%) External Exam
Exam Exam Exam
Course end Student selected Student selected Student selected Student selected
Indirect
Survey (10%) option option option option
* Grade Definition: O : 91-100; E : 81-90; A : 71-80; B : 61-70; C : 51-60; P: 41-50; F: < 40

Course Coordinator Module Coordinator Head of the Department


ANNEXURE I:

(A) PROGRAM OUTCOMES (POs) Engineering Graduates will be able to:

P01: Engineering Knowledge: Apply the knowledge of mathematics, science, engineering fundamentals, and
an engineering specialization to the solution of complex engineering problems.
P02: Problem Analysis: Identify, formulate, review research literature and analyse complex engineering
problems reaching substantiated conclusions using first principles of mathematics, natural sciences and
engineering sciences.
P03: Design/development of solutions: Design solutions for complex engineering problems and design system
components or processes that meet the specified needs with appropriate consideration for the public
health and safety and the cultural, societal and environmental considerations.
P04: Conduct investigations of complex problems: Use research based knowledge and research methods
including design of experiments, analysis and interpretation of data and synthesis of the information to
provide valid conclusions.
P05: Model tool usage: Create, select and apply appropriate techniques, resources and modern engineering
and IT tools including prediction and modelling to complex engineering activities with an understanding
of the limitations.
P06: The engineer and society: Apply reasoning informed by the contextual knowledge to assess societal,
health, safety, legal and cultural issues and the consequent responsibilities relevant to the professional
engineering practice.
P07: Environment and sustainability: Understand the impact of the professional engineering solutions in
societal and environmental contexts, and demonstrate the knowledge of, and need for sustainable
development.
PO8: Ethics: Apply ethical principles and commit to professional ethics and responsibilities and norms of the
engineering practice.
PO9: Individual and team work: Function effectively as an individual and as a member or leader in diverse
teams, and in multidisciplinary settings.
PO10: Communication: Communicate effectively on complex engineering activities with the engineering
community and with society at large, such as, being able to comprehend and write effective reports and
design documentation, make effective presentations and give and receive clear instructions.
PO11: Project management and finance: Demonstrate knowledge and understanding of the engineering and
management principles and apply these to one’s own work, as a member and leader in a team, to manage
projects and in multidisciplinary environments.
PO12: Life-long learning: Recognize the need for and have the preparation and ability to engage in independent
and life-long learning in the broad test context of technological change.
(B) PROGRAM SPECIFIC OUTCOMES (PSOs) :

PSO1: Apply a range of Cyber Security techniques and measures to protect digital systems effectively and
mitigate security risks.
PSO2: Demonstrate to conduct research in the field of Cyber Security, contributing to the development of
new knowledge, algorithms, and approaches for enhanced security.
PSO3: Analyze and develop proficiency in the areas of network security, cyberlaws and ethics.

COURSE OUTCOMES: Students are able to


After completion of this course, the students would be able to:
CO1: Interpreting the Importance of Data and its importance [K2]
CO2: Illustrating various ANOVA methods and Regression methods [K2]
CO3: Analyze various data types and visualization types to extract meaningful insights. [K4]
CO4: Apply visualization techniques to address specific problems using datasets and derive valuable
insights, especially for large datasets. [K3]
CO5: Make use of power bi tool for applying various functions. [K3]

Cognitive levels as per Revised Blooms Taxonomy:

Cognitive
LEVEL Key words
Domain
Defines, describes, identifies, knows, labels, lists, matches, names,
Remembering K1
outlines, recalls, recognizes, reproduces, selects, states.
Comprehends, converts, defends, distinguishes, estimates, explains,
Understanding K2 extends, generalizes, gives an example, infers, interprets, paraphrases,
predicts, rewrites, summarizes, translates.
Applies, changes, computes, constructs, demonstrates, discovers,
Applying K3 manipulates, modifies, operates, predicts, prepares, produces, relates,
shows, solves, uses.
Analyzes, breaks down, compares, contrasts, diagrams, deconstructs,
Analysing K4 differentiates, discriminates, distinguishes, identifies, illustrates, infers,
outlines, relates, selects, separates.
Appraises, compares, concludes, contrasts, criticizes, critiques,
Evaluating K5 defends, describes, discriminates, evaluates, explains, interprets,
justifies, relates, summarizes, supports
Categorizes, combines, compiles, composes, creates, devises, designs,
explains, generates, modifies, organizes, plans, rearranges,
Creating K6
reconstructs, relates, reorganizes, revises, rewrites, summarizes, tells,
write
UNIT WISE SAMPLE ASSESSMENT QUESTIONS

KNOWLED
S NO QUESTION GE CO
LEVEL

UNIT 1

1 K2 CO1

2 K1 CO1

3 K1 CO1

4 K4 CO1

5 K1 CO1

6 K1 CO1

UNIT 2

1 K1 CO2

2 K2 CO2

3 K1 CO2

4 K3 CO2

5 K2 CO2

6 K1 CO2

UNIT 3

1 K2 CO3

2 K1 CO3

3 K3 CO3

4 K1 CO3

5 K3 CO3

6 K2 CO3

7 K2 CO3

UNIT 4

1 K1 CO4

2 K1 CO4

3 K2 CO4

4 K1 CO4
5 K2 CO4

6 K3 CO4

7 K2 CO4

UNIT 5

1 K1 CO5

2 K2 CO5

3 K5 CO5

4 K2 CO5

5 K3 CO5

Model Mid Question Paper – 1


NARASARAOPETA ENGINEERING COLLEGE
(Autonomous)
Department of Computer Science and Engineering (CS)
III B. TECH II-SEMESTER I-MID EXAMINATIONS
Sub: MALWARE ANALYSIS AND REVERSE ENGINEERING

Duration: 90 min. Max. Marks: 25

Sno Question Co Cognitive Level Marks

Define malware analysis and explain its


1.a importance in cybersecurity
CO1 K2 5

Differentiate between Behavioral Analysis and


1.b
Code Analysis with examples CO1 K4 5

How is The Sleuth Kit (TSK) used for network


2.a and host discoveries? K1
C02 5

Explain the methods to bypass Conficker's file


2.b
system ACL restrictions. CO2 K2 5

Explain the process of opening and attaching to


3. processes for debugging.
C03 K2 5
Model Mid Question Paper – 2
NARASARAOPETA ENGINEERING COLLEGE
(Autonomous)
Department of Computer Science and Engineering (CS)
III B. TECH II-SEMESTER II-MID EXAMINATIONS
Sub: MALWARE ANALYSIS AND REVERSE ENGINEERING

Duration: 90 min. Max. Marks: 25


Sno Question Co Cognitive Level Marks

Describe the use of Python scripts and K3


1
Py commands in debugging malware. C03 5

What methods are used to investigate K1


2
processes in memory dumps? C04 10

Discuss the tools and techniques for K2


3 creating static and interactive maps for
domain/IP research. C05 10
MODEL QUESTION PAPER
Narasaraopeta Engineering College
(Autonomous)
Yallmanda(Post), Narasaraopet- 522601
III B.Tech II Semester Regular Examinations
MALWARE ANALYSIS AND REVERSE ENGINEERING
COMPUTER SCIENCE & ENGINEERING –(CS)
[OUTCOME BASED EDUCATION PATTERN]

Time: 3 hours Max. Marks: 70


Sub Code: R20CY3202

Note: Answer All FIVE Questions.


All Questions Carry Equal Marks (5X14=70M)

Q.No. Question Marks


UNIT-I

1 a) Define malware analysis and explain its importance in cybersecurity [14]


OR
b) Describe the process of creating custom Clam AV databases.
[14]
UNIT-II
a) Explain how the Microsoft Offline API is utilized for registry discoveries.
2 [14]
OR
b) How can rogue PKI certificates be detected and analyzed?
[14]
UNIT-III

3 a) Explain the process of opening and attaching to processes for debugging [14]

OR
b) Explain DLL export enumeration, execution, and debugging.
[14]

UNIT-IV
a) Explain the overview and key features of the Volatility framework [14]

4
OR
b) Explain the techniques to detect and capture suspicious loaded DLLs in memory

[14]
UNIT-V

5 a) Explain the process of DNS hostname resolution and passive DNS querying [14]
OR
b) Discuss the tools and techniques for creating static and interactive maps for domain/IP
research

You might also like