Sem 6 Syllabus
Sem 6 Syllabus
University of Mumbai
(All the practical mentioned in the syllabi are compulsory as per the courses chosen)
Semester – 6
Course Code Course Type Course Title Credits
USIT601 Skill Enhancement Course Software Testing and Quality Assurance 2
USIT602 Skill Enhancement Course Information Security 2
USIT603 Skill Enhancement Course Business Intelligence and Data Analytics 2
USIT604 Discipline Specific Elective Fundamentals of GIS
2
USIT605 (Any One) Enterprise Network Design
USIT606 Discipline Specific Elective IT Infrastructure Management
2
USIT607 (Any One) IT Act and Cyber Laws
Skill Enhancement Course
USIT6P1 Project Implementation 2
Practical
Skill Enhancement Course
USIT6P2 Information Security Practical 2
Practical
Skill Enhancement Course
USIT6P3 Business Intelligence and Data Analytics Practical 2
Practical
USIT6P4 Discipline Specific Elective Fundamentals of GIS Practical
2
USIT6P5 Practical (Any One)* Enterprise Network Design Practical
Skill Enhancement Course
USIT6P6 Android Programming Practical 2
Practical
Total Credits 20
*The choice of Practical course is based on the theory Course. For Semester V, USIT504, USIT505, USIT506 and
USIT507, the practical courses are USIT5P4, USIT5P5 USIT5P6, USIT5P7. For Semester VI, USIT604, USIT605
the practical courses are USIT6P4, USIT6P5 respectively. Practical Course USIT6P6 is compulsory.
Semester –VI
Software Testing and Quality Assurance
Course Objective:
• To understand the effective testing techniques for ensuring high quality software.
• To become familiar with quality assurance metrics and comprehend test tool capabilities.
• To become proficient in test project planning, test case and data design, testing operations.
• To understand the challenges and solutions related to software test automation.
• To understand the taxonomy of testing tools.
Course Outcome:
After completing the course, the learner will be able to:
CO1: Learners understand various software testing methods.
CO2: Learners can identify defects and manage those defects for improvement in quality.
CO3: Learners analyze and comprehend the use of modern software testing tools and procedures
for their projects testing.
CO4: Understand and apply methods for verifying and validating software to ensure it meets
requirements and functions correctly.
CO5: Gain comprehensive knowledge of various testing levels and methodologies to ensure
thorough software quality assurance from requirements to system testing stages.
Information Security
B. Sc. (Information Technology) Semester – VI
Course Name: Information Security Course Code: USIT602
Periods per week (1 Period is 50 minutes) 5
Credits 2
Hour Marks
s
Evaluation System Theory Examination 2½ 75
Internal -- 25
Course Objective:
● To understand the importance of Information protection
● To learn current best practices in storage capacity
● To understand the fundamental security aspects of network devices and learn techniques
for hardening network devices against attacks.
● To familiarize Intrusion Detection and Prevention Systems, Voice over IP(VoIP) and PBX
security
● To understand the security considerations for virtual machines and security aspects of
cloud computing
Course Outcome:
After completing the course, the learner will be able to:
CO1: Understanding the importance of information protection.
CO2: Comprehending the evolution of information security.
CO3: Utilize established methodologies for implementing and managing security
CO4: Analysing Intrusion Detection and Prevention Systems, Voice over IP(VoIP) and PBX
security
CO5: Understanding the security considerations for virtual machines and security aspects of
cloud computing
Business Intelligence and Data Analytics
B. Sc. (Information Technology) Semester – VI
Course Name: Business Intelligence and Data Analytics Course Code: USIT603
Periods per week (1 Period is 50 minutes) 5
Credits 2
Hour Marks
s
Evaluation System Theory Examination 2½ 75
Internal -- 25
Course Objective:
● To understand the importance of business intelligence in facilitating effective and timely
decision-making processes within organizations.
● Explore different classes of mathematical models and their applications in various decision-
making scenarios.
● Understand the concept of classification problems and their applications in various
domains.
● Study relational marketing models and their application in building and maintaining
customer relationships.
● Study different types of organizational culture, including hierarchical, clan, adhocracy and
market cultures.
Course Objective:
● To understand the principles of Geographical Information System
● To learn Data Management and Processing Systems Hardware and Software Trends
● To understand Spatial Referencing and Positioning
● To understand the Classification of analytical GIS Capabilities
● To understand Data visualization and its strategies
Unit Details Lectures
A Gentle Introduction to GIS: The nature of GIS: Some fundamental
observations, Defining GIS, GISystems, GIScience and GIApplications,
Spatial data and Geoinformation.
The real world and representations of it: Models and modelling, Maps,
Databases, Spatial databases and spatial analysis Geographic Information
and Spatial Database Models and Representations of the real world
I Geographic Phenomena: Defining geographic phenomena, types of 12
geographic phenomena, Geographic fields, Geographic objects, Boundaries
Computer Representations of Geographic Information: Regular
tessellations, irregular tessellations, Vector representations, Topology and
Spatial relationships, Scale and Resolution, Representation of Geographic
fields, Representation of Geographic objects Organizing and Managing
Spatial Data The Temporal Dimension
Data Management and Processing Systems, Hardware and Software
Trends
Geographic Information Systems: GIS Software, GIS Architecture and
functionality, Spatial Data Infrastructure (SDI)
Stages of Spatial Data handling: Spatial data handling and preparation,
Spatial Data Storage and maintenance, Spatial Query and Analysis, Spatial
II 12
Data Presentation.
Database management Systems: Reasons for using a DBMS, Alternatives
for data management, The relational data model, Querying the relational
database.
GIS and Spatial Databases: Linking GIS and DBMS, Spatial database
functionality.
Spatial Referencing and Positioning
III Spatial Referencing: Reference surfaces for mapping, Coordinate 12
Systems, Map Projections, Coordinate Transformations
Satellite-based Positioning: Absolute positioning, Errors in absolute
positioning, Relative positioning, Network positioning, code versus phase
measurements, Positioning technology Data Entry and Preparation
Spatial Data Input: Direct spatial data capture, Indirect spatial data
capture, Obtaining spatial data elsewhere
Data Quality: Accuracy and Positioning, Positional accuracy, Attribute
accuracy, temporal accuracy, Lineage, Completeness, Logical consistency
Data Preparation: Data checks and repairs, Combining data from multiple
sources
Point Data Transformation: Interpolating discrete data, Interpolating
continuous data
Spatial Data Analysis: Classification of analytical GIS Capabilities
Retrieval, classification and measurement: Measurement, Spatial selection
queries, Classification
Overlay functions: Vector overlay operators, Raster overlay operators
Neighbourhood functions: Proximity computations, Computation of
IV 12
diffusion, Flow computation, Raster based surface analysis
Analysis: Network analysis, interpolation, terrain modeling GIS and
Application models: GPS, Open GIS Standards, GIS Applications and
Advances Error Propagation in spatial data processing: How Errors
propagate, Quantifying error propagation
Data Visualization: GIS and Maps, The Visualization Process
Visualization Strategies: Present or explore? The cartographic toolbox:
What kind of data do I have? How can I map my data? How to map? How
V 12
to map qualitative data, How to map quantitative data, How to map the
terrain elevation, How to map time series Map Cosmetics, Map
Dissemination
Course Objective:
• To understand and apply network design principles, including architectures, lifecycle, and high
availability protocols.
• To master enterprise LAN and data center design, focusing on Ethernet rules, storage, and data
center infrastructure.
• To explore wireless LAN technologies, including design considerations, security, and quality of
scalable networks.
• To develop an IPv4 addressing plan for a hierarchical network infrastructure
• To develop Internet Protocol design, security management, and integrating security mechanisms
into network infrastructure.
Course Outcome:
After completing the course, the learner will be able to:
CO1: understand the working of Network design models
CO2: describe Enterprise LAN Design, and data center design.
CO3: remember and describe various WAN technologies .
CO4: Successfully implement route summarization to optimize routing table size and efficiently
utilize IPv4 address space within the network.
C O 5: understand Internet Protocol and describe how to manage security.
IT Infrastructure Management
B. Sc (Information Technology) Semester – VI
Course Name: IT Infrastructure Management Course Code: USIT606
(Elective-II)
Periods per week (1 Period is 50 minutes) 5
Credits 2
Hours Marks
Evaluation System Theory Examination 2½ 75
Internal -- 25
Course Objectives:
Course Outcomes:
CO 1: Apply the principles and concepts of ITIL 4 to enhance IT service management practices.
CO 2: Demonstrate proficiency in implementing ITIL management practices.
CO 3: Successfully drive stakeholder value and engage in value co-creation.
CO 4: Develop the skills to create, deliver, and support services within the ITIL service value
system.
CO 5: Understand the principles and techniques of High-Velocity IT and foster a culture of
continual improvement.
IT act and Cyber Law
B. Sc. (Information Technology) Semester – VI
Course Name: IT act and Cyber Law Course Code: USIT607
(Elective-II)
Periods per week (1 Period is 50 minutes) 5
Credits 2
Hours Marks
Evaluation System Theory Examination 2½ 75
Internal -- 25
Course Objective:
• To understand the legal framework for arrests without warrant, penalties, adjudication,
and appeals in cybercrime cases under the IT Act, 2000.
• To explore the formation, validity, and jurisdictional issues of contracts in the digital and
cyber world.
• To examine legal strategies and protections against cyber-squatting and copyright
infringement in the digital realm.
• To analyze the challenges of e-commerce taxation and understand the role of digital
signatures, certifying authorities, and e-governance in the digital economy.
• To compare the Indian Evidence Act of 1872 with the IT Act of 2000 and explore
protections for cyber consumers in India.
Course Outcome:
After completing the course, the learner will be able to:
CO1: Gain a detailed understanding of the legal procedures and enforcement mechanisms for
cybercrimes, including arrest without warrant, penalties, adjudication, and appeals under the IT
Act, 2000.
CO2: understand the legal principles governing digital contracts and jurisdictional challenges
in the cyber world.
CO3: Equipped with knowledge of legal remedies and strategies to combat cyber squatting and
protect copyrights in the digital world.
CO4: Understand the complexities of e-commerce taxation and the significance of digital
signatures, certifying authorities, and e-governance in modern digital transactions.
CO5: Comprehend the interplay between the Indian Evidence Act of 1872 and the Information
Technology Act of 2000, and gain insights into the legal safeguards for cyber consumers in
India.
Information Security Practical
B. Sc. (Information Technology) Semester – VI
Course Name: Information Security Practical Course Code: USIT6P2
Periods per week (1 Period is 50 minutes) 3
Credits 2
Hour Marks
s
Evaluation System Practical Examination 2½ 50
Internal -- --
List of Practical
1. Configure Routers:
a. OSPF MD5 authentication.
b. NTP.
c. to log messages to the syslog server.
7. Layer 2 Security
a. Assign the Central switch as the root bridge.
b. Secure spanning-tree parameters to prevent STP manipulation attacks.
c. Enable port security to prevent CAM table overflow attacks.
List of Practical
1. Perform the analysis for the following:
a. Import the data warehouse data in Microsoft Excel and create the Pivot table and Pivot
Chart.
b. Import the cube in Microsoft Excel and create the Pivot table and Pivot Chart to perform data
analysis.
2. Apply the what – if Analysis for data visualization. Design and generate necessary reports
based on the data warehouse data. Use Excel.
5. Perform the Linear regression on the given data warehouse data using R/Python.
6. Perform the logistic regression on the given data warehouse data using R/Python.
7. Write a Python program to read data from a CSV file, perform simple data analysis, and
generate basic insights. (Use Pandas is a Python library).
9. Create the Data staging area for the selected database using SQL.
10. Create the cube with suitable dimension and fact tables based on ROLAP, MOLAP and
HOLAP model.
List of Practical
1. Familiarizing Quantum GIS: Installation of QGIS, datasets for both Vector
and Raster data, Maps.
2. Creating and Managing Vector Data: Adding vector layers, setting properties, formatting,
calculating line lengths and statistics
3. Exploring and Managing Raster data: Adding raster layers, raster styling and analysis, raster
mosaicking and clipping
4. Making a Map, Working with Attributes, Importing Spreadsheets or CSV files Using Plugins,
Searching and Downloading OpenStreetMap Data
8. Managing Data Tables and Saptial data Sets: Table joins, spatial joins, points in polygon
analysis, performing spatial queries
9. Advanced GIS Operations 1: Nearest Neighbor Analysis, Sampling Raster Data using Points
or Polygons, Interpolating Point Data
List of Practical
1. Configuring OSPF – I
a. Single-Area OSPF Link Costs and Interface Priorities
b. Multi-Area OSPF with Stub Areas and Authentication
2. Configuring OSPF – II
a. OSPF Virtual Links and Area Summarization
b. OSPF over Frame Relay
4. BGP
a. Configuring BGP with Default Routing
b. Using the AS_PATH Attribute
c. BGP Route Reflectors and Route Filters
5. IPv6
a. Configuring OSPF for IPv6
b. Configuring 6to4 Tunnels
Practical Details
No
0 Introduction to Android, Introduction to Android Studio IDE, Application Fundamentals:
Creating a Project, Android Components, Activities, Services, Content Providers, Broadcast
Receivers, Interface overview, Creating Android Virtual device, USB debugging mode, Android
Application Overview. Simple “Hello World” program.
1 Programming Resources
Android Resources: (Color, Theme, String, Drawable, Dimension, Image),
4 Programming UI elements
AppBar, Fragments, UI Components
1. Practical Question 1 20
2. Practical Question 2 20
3. Journal 5
4. Viva Voce 5
OR
1. Practical Question 40
2. Journal 5
3. Viva Voce 5
Project Dissertation Semester V and
Project Implementation Semester VI
Chapter 1 to 4 should be submitted in Semester V in spiral binding. These chapter have also to be included in
Semester VI report. Semester VI report has to be hard bound with golden embossing. Students will be evaluated
based on the dissertation in semester V and dissertation and viva voce in Semester VI.
I. OBJECTIVES
• Describe the Systems Development Life Cycle (SDLC).
• Evaluate systems requirements.
• Complete a problem definition.
• Evaluate a problem definition.
• Determine how to collect information to determine requirements.
• Perform and evaluate feasibility studies like cost-benefit analysis, technical feasibility, time feasibility
and Operational feasibility for the project.
• Work on data collection methods for fact finding.
• Construct and evaluate data flow diagrams.
• Construct and evaluate data dictionaries.
• Evaluate methods of process description to include structured English, decision tables and decision trees.
• Evaluate alternative tools for the analysis process.
• Create and evaluate such alternative graphical tools as systems flow charts and state transition diagrams.
• Decide the S/W requirement specifications and H/W requirement specifications.
• Plan the systems design phase of the SDLC.
• Distinguish between logical and physical design requirements.
• Design and evaluate system outputs.
• Design and evaluate systems inputs.
• Design and evaluate validity checks for input data.
• Design and evaluate user interfaces for input.
• Design and evaluate file structures to include the use of indexes.
• Estimate storage requirements.
• Explain the various file update processes based on the standard file organizations.
• Decide various data structures.
• Construct and evaluate entity-relationship (ER) diagrams for RDBMS related projects.
• Perform normalization for the unnormalized tables for RDBMS related projects
• Decide the various processing systems to include distributed, client/server, online and others.
• Perform project cost estimates using various techniques.
• Schedule projects using both GANTT and PERT charts.
• Perform coding for the project.
• Documentation requirements and prepare and evaluate systems documentation.
• Perform various systems testing techniques/strategies to include the phases of testing.
• Systems implementation and its key problems.
• Generate various reports.
• Be able to prepare and evaluate a final report.
• Brief the maintenance procedures and the role of configuration management in operations.
• To decide the future scope and further enhancement of the system.
• Plan for several appendices to be placed in support with the project report documentation.
• Decide the various processing systems to include distributed, client/server, online and others.
• Perform project cost estimates using various techniques.
• Schedule projects using both GANTT and PERT charts.
• Perform coding for the project.
• Documentation requirements and prepare and evaluate systems documentation.
• Perform various systems testing techniques/strategies to include the phases of testing.
• Systems implementation and its key problems.
• Generate various reports.
• Be able to prepare and evaluate a final report.
• Brief the maintenance procedures and the role of configuration management in operations.
• To decide the future scope and further enhancement of the system.
• Plan for several appendices to be placed in support with the project report documentation.
• Work effectively as an individual or as a team member to produce correct, efficient, well organized
and documented programs in a reasonable time.
• Recognize problems that are amenable to computer solutions, and knowledge of the tool necessary for
solving such problems.
• Develop of the ability to assess the implications of work performed.
• Get good exposure and command in one or more application areas and on the software
• Develop quality software using the software engineering principles
• Develop of the ability to communicate effectively.
IV. Introduction
The project report should be documented with scientific approach to the solution of the problem that the students
have sought to address. The project report should be prepared in order to solve the problem in a methodical and
professional manner, making due references to appropriate techniques, technologies and professional standards.
The student should start the documentation process from the first phase of software development so that one can
easily identify the issues to be focused upon in the ultimate project report. The student should also include the
details from the project diary, in which they will record the progress of their project throughout the course.
The project report should contain enough details to enable examiners to evaluate the work. The important points
should be highlighted in the body of the report, with details often referred to appendices.
1.1 PROJECT REPORT:
Title Page
Original Copy of the Approved Proforma of the Project Proposal
Certificate of Authenticated work
Role and Responsibility Form
Abstract
Acknowledgement
Table of Contents
Table of Figures
CHAPTER 1: INTRODUCTION
1.1 Background
1.2 Objectives
1.3 Purpose, Scope, and Applicability
1.3.1 Purpose
1.3.2 Scope
1.3.3 Applicability
1.4 Achievements
1.5 Organisation of Report
CHAPTER 7: CONCLUSIONS
7.1 Conclusion
7.1.1 Significance of the System
7.2 Limitations of the System
7.3 Future Scope of the Project
REFERENCES
GLOSSARY
APPENDIX A
APPENDIX B
V. EXPLANATION OF CONTENTS
Title Page
Sample format of Title page is given in Appendix 1 of this block. Students should follow the given format.
Abstract
This should be one/two short paragraphs (100-150 words total), summarising the project work. It is
important that this is not just a re-statement of the original project outline. A suggested flow is background,
project aims and main achievements. From the abstract, a reader should be able to ascertain if the project
is of interest to them and, it should present results of which they may wish to know more details.
Acknowledgements:
This should express student‟s gratitude to those who have helped in the preparation of project.
Table of Contents:
The table of contents gives the readers a view of the detailed structure of the
report. The students would need to provide section and subsection headings with associated pages. The
formatting details of these sections and subsections are given below. Table of Figures: List of all Figures,
Tables, Graphs, Charts etc. along with their page numbers in a table of figures.
Chapter 1: Introduction
The introduction has several parts as given below:
Background: A description of the background and context of the project and its relation to work already
done in the area. Summarise existing work in the area concerned with the project work.
Objectives: Concise statement of the aims and objectives of the project. Define exactly what is going to
be done in the project; the objectives should be about 30 /40 words.
Purpose, Scope and Applicability: The description of Purpose, Scope, and Applicability are given below:
• Purpose: Description of the topic of the project that answers questions on why this project is being done.
How the project could improve the system its significance and theoretical framework.
• Scope: A brief overview of the methodology, assumptions and limitations. The students should answer
the question: What are the main issues being covered in the project? What are the main functions of the
project?
• Applicability: The student should explain the direct and indirect applications of their work. Briefly
discuss how this project will serve the computer world and people.
• Achievements: Explain what knowledge the student achieved after the completion of the work. What
contributions has the project made to the chosen area? Goals achieved - describes the degree to which the
findings support the original objectives laid out by the project. The goals may be partially or fully
achieved, or exceeded.
• Organisation of Report: Summarizing the remaining chapters of the project report, in effect, giving the
reader an overview of what is to come in the project report.
Chapter 7: Conclusions
Conclusion: The conclusions can be summarised in a fairly short chapter (2 or 3 pages). This chapter
brings together many of the points that would have made in the other chapters. Limitations of the System:
Explain the limitations encountered during the testing of the project that the students were not able to
modify. List the criticisms accepted during the demonstrations of the project.
Future Scope of the Project describes two things: firstly, new areas of investigation prompted by
developments in this project, and secondly, parts of the current work that was not completed due to time
constraints and/or problems encountered.
REFERENCES
It is very important that the students acknowledge the work of others that they have used or adapted in
their own work, or that provides the essential background or context to the project.
The use of references is the standard way to do this. Please follow the given standard for the references
for books, journals, and online material. The citation is mandatory in both the reports.
E.g:
Linhares, A., & Brum, P. (2007). Understanding our understanding of strategic scenarios: What role do
chunks play? Cognitive Science, 31(6), 989-1007.
https://doi.org/doi:10.1080/03640210701703725
Lipson, Charles (2011). Cite right : A quick guide to citation styles; MLA, APA, Chicago, the sciences,
professions, and more (2nd ed.). Chicago [u.a.]: University of Chicago Press. p. 187.
ISBN 9780226484648.
Elaine Ritchie, J Knite. (2001). Artificial Intelligence, Chapter 2 ,p.p 23 - 44. Tata McGrawHill.
GLOSSARY
If you the students any acronyms, abbreviations, symbols, or uncommon terms in the project report then
their meaning should be explained where they first occur. If they go on to use any of them extensively
then it is helpful to list them in this section and define the meaning.
APPENDICES
These may be provided to include further details of results, mathematical derivations, certain
illustrative parts of the program code (e.g., class interfaces), user documentation etc.
In particular, if there are technical details of the work done that might be useful to others who wish to
build on this work, but that are not sufficiently important to the project as a whole to justify being
discussed in the main body of the project, then they should be included as appendices.
VI. SUMMARY
Project development usually involves an engineering approach to the design and development of a
software system that fulfils a practical need. Projects also often form an important focus for discussion at
interviews with future employers as they provide a detailed example of what the students are capable of
achieving. In this course the students can choose your project topic from the lists given in Unit 4:
Category-wise Problem Definition.
This is to certify that the project entitled, "Title of The Project ", is bonafied work of NAME OF
THE STUDENT bearing Seat.No: (NUMBER) submitted in partial fulfillment of the requirements
for the award of degree of BACHELOR OF SCIENCE in INFORMATION TECHNOLOGY from
University of Mumbai. (12, times new roman, justified)
External Examiner
ACKNOWLEDGEMENT
(20, BOLD, ALL CAPS, CENTERED)
The acknowledgement should be in times new roman, 12 font with 1.5 line spacing, justified.
Marks Distribution:
Semester V: 50 Marks
Documentation: 50 marks