The document lists various microprojects assigned to students in the Department of Computer Technology, focusing on IoT-based systems and digital forensics. Each project includes specific tasks such as explaining the need for the system, hardware and software requirements, circuit design, and data management. Additionally, there are projects related to studying cases of fraud and forgery using digital forensics, as well as identifying vulnerabilities in credit card fraud and Trojan attacks.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
31 views2 pages
ETI Micro-Project Topics
The document lists various microprojects assigned to students in the Department of Computer Technology, focusing on IoT-based systems and digital forensics. Each project includes specific tasks such as explaining the need for the system, hardware and software requirements, circuit design, and data management. Additionally, there are projects related to studying cases of fraud and forgery using digital forensics, as well as identifying vulnerabilities in credit card fraud and Trojan attacks.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2
Department of Computer Technology
Class- TYCM Subject- ETI (22618)
ETI MTCRO-PROJECTS LIST Roll No Name of Student Name of Microproject
1 Ghorpade Rutuja pramod
2 Bendre Atharva Nandu 3 Shinde Tejas Jalindar Io'T Based Humidity and Temperature Monitoring 4 Mahanor Yash Babasaheb 1. Explain the need of Io'T Based Humidity and Temperature Monitoring. 5 Deshmukh Aditya Santosh 2. What will be the hardware requirements for designing this system? 6 Vidhate Mayur Pramod 3. What will be the software requirements 7 Harshad pankaj wakchaure 4. Explain how circuit can be designed for this system along with its working 8 Shivani Ashok gujar 5. Explain how to design an loT application and how to store and retrieve a data on it. 9 Bhambare pranjali pandurang 10 Markad Sakshi Gajanan 11 [email protected] 12 Garadhe Rutuja Balkrishna 13 Gadhave Siddharth Rajendra 14 Phopase Darshan Sunil 15 Kale Komal Santosh Io'T based Weather Monitoring System 16 Rode Amruta Santosh 17 Tajane Nikhil Vitthal 1. Explain the need of Io'T Based Weather Monitoring System. 18 Sadafule Deepak Sarjerao 2. What will be the hardware requirements for designing this system. 19 Murdare Shreya Sham 3. What will be the software requirements 20 Patel Mijba Shakir 4. Explain how circuit can be designed for this system along with its working 21 Pokale Manasvi Prakash 5. Explain how to design an Io'T application and how to store and retrieve a data on it 22 Kachole Pratik Ganesh 23 Vaishnavi Sharad Shirsath 24 Pawar Om Rajendra 25 Jagatp Nandini Balasaheb 26 Suyog Mangesh Sonar 27 Gite Vrushabh Sanjay 28 Nibe Shiveshwari Rajendra Study any case of fake profiling. Identify 29 Shirsath Ishwari Prashant 30 Kakade shruti ravindra 1. The way digital forensics was used in detecting the fraud. 31 Ranmale Madhura Devidas 2. Where was digital evidence located? 32 Tambe Gayatri Vishwanath 3. Effects. 33 Mandal Sujay Sukdev 34 Kadu Aditya Rajeev 35 Sayyad siddik firoj 36 Pranali Navnath Gatkal 37 Mutha Siddhi Nitin 38 Ghorpade Vrushali Balkrushna 39 Sumb Pooja Eknath 40 Ghodechor Saloni Kanifnath Study any case of forgery /falsification crime case solved using digital forensics: 41 More Gautami Kiran 1. Identify the model used for Digital Investigation. 42 Sanika Shivraj Wagh 2. Was investigation done ethically or unethically? 43 Sonawane Tejaswi Vijay 3. Where was digital evidence found for crime establishment? 44 Kathale Apurva Ganesh 4. State the punishment meted. 45 Hase Omkar Ravindra 46 Thanage Prasad Gitaram 47 Kale Gauri Sachin 48 Telore Samruddhi Vijay 49 Mapari Aditi Dinesh 50 Sarode Prathamesh Ganesh 51 Vikhe bhakti Parshuram Study Credit card fraud as an identity threat. Identify: 52 Akash Navnath mali 53 Pathare Vaibhav Machhindra 1. Use of digital media in carrying out fraud. 54 Mhaske Kalyani Santosh 2. Vulnerability Exploited. 55 Sadaphal Sai Ramdas 3. Effect of fraud. 56 Aditya Udaysinh nimbalkar 4. Protection/Precaution to be taken against such frauds. 57 Patil Harsh Dnyaneshwar 58 Chaudhari Neha Valmik 59 Kapse Vaibhav Sandip 60 Vivek Nanasaheb Mohite 61 Krushna Balasaheb Thombare 62 Landge swapnali subhash 63 Narote Onkar Abasaheb 64 Kekan Suseema Ravindra 65 Gite Anuja Motiram Study any Trojan attack. Identify the Trojan attack: 66 Jadhav Gayatri sandip 67 Sakshi Rajkumar Jadhavar 1. State the way Trojan got installed on particular Machine. 68 Nirmal Payal Subhash 2. State the effects of the Trojan. 69 Yuvraj Narendra More 70 3. Elaborate/Mention/State protection/Blocking mechanism for this specific Trojan, Aher ritesh ravindra 71 Ghadge Rutuja Mahesh example specification of any anti-threats platform which filters the Trojan 72 Patole rohan shashikant 73 Pandit Sahil Vijay 74 Kadri Shahid Arif 75 Salve Sapna Anil 76 Kakad Abhiraj Suresh 77 Mungase pranav popat 78 Ashish Laxman Talekar 79 Tambe Rushikesh Vishwanath Io'T Based Humidity and Temperature Monitoring 80 Chougule Abhishek Kishore 1. Explain the need of Io'T Based Humidity and Temperature Monitoring. 81 Siddharth Babasaheb Pawar 2. What will be the hardware requirements for designing this system? 82 Deore Akshara Gorakh 3. What will be the software requirements 83 Shivam Anil Anerao 4. Explain how circuit can be designed for this system along with its working 84 Bansode Riya Vilas 5. Explain how to design an loT application and how to store and retrieve a data on it. 85 Kanake Arati Devidas 86 Landge Ganesh Dattatray 87 Shasam Uday Vijay
Id Questio N A Graph Is A Set of - and Set of - A Vertices, Edges B Variables, Values C Vertices, Distances D Variable, Equation Answer A Marks 1 Unit 1