BSC - CS With DA - 2020-2021-07.03.2023
BSC - CS With DA - 2020-2021-07.03.2023
ComputerSciencewithDataA
nalytics
Syllabus
AFFILIATEDCOLLEGES
ProgramCode:***
2020–2021onwards
BHARATHIARUNIVERSITY
A State University, Accredited with “A” Grade by NAAC,Ranked13thamongIndianUniversitiesby MHRD-NIRF
WorldRanking:Times-801-1000,Shanghai-901-1000,URAP-982)
Coimbatore-641046,TamilNadu, India
B. Sc. Computer Science with Data Analytics2020-21 onwards - Affiliated Colleges - Annexure No.27A10
SCAA DATED: 23.09.2020
ProgrammeEducationalObjectives(PEOs)
The B.Sc. Computer Science with Data Analytics program describe accomplishments
thatgraduates are expectedto attainwithin fiveto sevenyears after graduation.
Page 1 of 89
B. Sc. Computer Science with Data Analytics2020-21 onwards - Affiliated Colleges - Annexure No.27A10
SCAA DATED: 23.09.2020
ProgrammeSpecificOutcomes(PSOs)
Afterthesuccessfulcompletion
ofB.Sc.ComputerSciencewithDataAnalyticsprogramthestudents areexpectedto
PSO1 Imparteducationwithdomainknowledgeeffectivelyandefficientlyinparwith
theexpectedqualitystandardsfor Dataanalyst professional.
PSO2 Abilitytoapplythemathematical,technicalandcriticalthinkingskillsinthedisciplineof
Data analyticsto findsolutions forcomplexproblems.
PSO3 Abilitytoengageinlife-longlearningandadoptfastchangingtechnologyto
prepareforprofessional development.
PSO4 Expose the students tokey technologies in data science and businessanalytics:data
mining, machine learning, visualization techniques, predictive modeling,
andstatistics.
PSO5 Inculcateeffectivecommunicationskillscombinedwithprofessionalðical
attitude.
Page 2 of 89
B. Sc. Computer Science with Data Analytics2020-21 onwards - Affiliated Colleges - Annexure No.27A10
SCAA DATED: 23.09.2020
ProgrammeOutcomes(POs)
PO10 Demonstrateknowledgeandunderstandingofmanagementprinciplesandapply
thesetoone ownwork tomanageprojectsand inmultidisciplinaryenvironment.
Page 3 of 89
B. Sc. Computer Science with Data Analytics2020-21 onwards - Affiliated Colleges - Annexure No.27A10
SCAA DATED: 23.09.2020
Course
TitleoftheCourse Credits Hours Maximummarks
Code
Theory Practical CIA ESE Total
FIRSTSEMESTER
Language–I 4 6 25 75 100
English–I 4 6 25 75 100
Core1:ProgramminginC 4 4 25 75 100
CoreLab1:ProgrammingLab–C
4 3 40 60 100
Core2:Datastructures 4 4 25 75 100
Allied1:IntroductiontoLinear
4 5 25 75 100
algebra
EnvironmentalStudies# 2 2 50 50
Total 26 27 3 165 485 650
SECONDSEMESTER
Language–II 4 6 25 75 100
English– II 4 6 25 75 100
Core3:Programmingin C++ 4 5 25 75 100
CoreLab2:ProgrammingLab–
C++ 4 4 40 60 100
CoreLab3:InternetBasics Lab 2 2 20 30 50
Allied2:DiscreteMathematics 4 5 25 75 100
ValueEducation –HumanRights
# 2 2 50 50
Total 24 24 6 160 440 600
THIRDSEMESTER
Core4:JAVAProgramming 4 6 25 75 100
CoreLab4: JAVAProgramming
Lab 4 5 40 60 100
Core5:DatabaseManagement
Systems 4 6 25 75 100
Allied 3: Data
4 6 25 75 100
CommunicationandNetworks
SkillbasedSubject1 :Data
3 5 20 55 75
Visualization
Tamil @/ Advanced
Tamil(OR)Non-majorelective-
2 2 50 50
1(Yoga
for Human
Excellence)#
/Women‟sRights#
Total 21 25 5 135 390 525
FOURTHSEMESTER
Page 4 of 89
B. Sc. Computer Science with Data Analytics2020-21 onwards - Affiliated Colleges - Annexure No.27A10
SCAA DATED: 23.09.2020
Core6:PythonProgramming 4 6 25 75 100
Core7:DataWarehousingand
DataMining 4 6 25 75 100
CoreLab5:Python
ProgrammingLab 4 6 40 60 100
Allied4:DeepLearning 4 6 25 75 100
SkillBasedSubject2:Capstone
ProjectWorkPhase I 3 4 30 45 75
Tamil @/ Advanced
Tamil(OR)Non- 2 2 50 50
majorelective–II
(GeneralAwareness)#
Total 21 20 10 145 380 525
FIFTHSEMESTER
Core8:RProgramming 4 6 25 75 100
CoreLab6:RProgrammingLab 4 6 40 60 100
Core9:BigDataAnalytics 4 6 25 75 100
Elective- I
BusinessDataAnalytics/
SocialNetwork 4 6 25 75 100
Analysis/t/ArtificialNeuralNet
workandFuzzySystems
SkillBasedSubject3:Capstone
ProjectWorkPhase II 3 6 30 45 75
Total 19 18 12 145 330 475
SIXTHSEMESTER
Core10 :LinuxandShell
Programming 4 6 25 75 100
CoreLab7:LinuxandShell
ProgrammingLab 4 5 40 60 100
Core11:ProjectWorkLab 6 3 60 90 150
Elective- II
WebApplicationSecurity/
4 5 25 75 100
Software
Agents/Embeddedsystems
Elective- III
Client Server
4 5 25 75 100
Computing/Opensource
Software/Principles
ofSecureCoding
SkillbasedSubject4:Machine
Learning 3 4 30 45 75
ExtensionActivities 2 50 - 50
Naan Muthalvan – Skill Course
Cyber Security
http://kb.naanmudhalvan.in/images/ 2 2 - 25 25 50**
7/71/Cybe
rsecurity.pdf
Total 29 22 8 280 445 725
Page 5 of 89
B. Sc. Computer Science with Data Analytics2020-21 onwards - Affiliated Colleges - Annexure No.27A10
SCAA DATED: 23.09.2020
GrandTotal 140 136 44 1030 2470 3500
ONLINE COURSES
**NaanMudhalvan – Skill courses- external 25 marks will be assessed by Industry and internal will be offered by
respective course teacher.
Page 6 of 89
B. Sc. Computer Science with Data Analytics2020-21 onwards - Affiliated Colleges - Annexure No.27A10
SCAA DATED: 23.09.2020
First Semester
Page 7 of 89
B. Sc. Computer Science with Data Analytics2020-21 onwards - Affiliated Colleges - Annexure No.27A10
SCAA DATED: 23.09.2020
CourseCode ProgramminginC L T P C
Core/elective/Supportive Core:1 4 0 0 4
Pre- requisite Basicknowledgeincomputers Syllabus I
version
CourseObjectives
TointroducetheconceptsofProcedure OrientedProgrammingandthe variousprogramming
constructsofCprogramming
ExpectedCourseOutcomes
1 Describeabouttheaboutthefundamentalsofcomputers,historyandvarioustypesof K1
softwareandhardwaredevices.
2 InterprettheconceptsofVariables,Constant,Operatorsandvarioustypesof K2
expressions
3 ApplytheconceptofDecisionmakingstatementsandloopingconstructsforsolving K3
basicprograms
4 Usetheconcepts offilesandpointers insideaCprogram K3
5 DevelopprogramsincorporatingalltheClanguageconstructs K4
6 Testthecorrectnessoftheprogramsandidentifylogicalandsyntax errors K5
K1–Remember K2 –Understand K3–applyK4-AnalyzeK5–evaluateK6-Create
UNITI FundamentalsofComputers 12
FundamentalsofComputers:Introduction–HistoryofComputers-GenerationsofComputers-
Classification of Computers-Basic Anatomy of a Computer System-Input Devices-Processor-
OutputDevices-MemoryManagement–TypesofSoftware-OverviewofOperatingSystem-Programming
Languages-TranslatorPrograms-ProblemSolvingTechniques-OverviewofC.
UNITII Overview of C 11
Overview of C - Introduction - Character set - C tokens - keyword & Identifiers - Constants -
Variables - Data types - Declaration of variables - Assigning values to variables - Defining
SymbolicConstants- Arithmetic,Relational,Logical,Assignment, Conditional, Bitwise,
Special,IncrementandDecrementoperators-ArithmeticExpressions-Evaluationofexpression-
precedenceof
arithmeticoperators-Typeconversioninexpression–operatorprecedence&associativity-
Mathematicalfunctions-Reading&Writing acharacter-Formatted inputand output.
UNITIII DecisionMakingandBranching 12
Decision Making and Branching: Introduction – if, if….else, nesting of if …else statements- else
ifladder – The switch statement, The?: Operator – The goto Statement. Decision Making and
Looping:Introduction-Thewhilestatement-thedostatement–theforstatement-jumpsinloops.Arrays–
CharacterArraysandStrings
UNITIV Functions 12
User-DefinedFunctions:Introduction– Needand Elements of User-Defined Functions- Definition-
ReturnValuesandtheirtypes-FunctionCalls–Declarations–CategoryofFunctions-Nestingof
Functions-Recursion–Passing ArraysandStringstoFunctions-
TheScope,VisibilityandLifetimeofVariables-Multi filePrograms-Structures andUnions.
UNITV Pointers 13
Page 8 of 89
B. Sc. Computer Science with Data Analytics2020-21 onwards - Affiliated Colleges - Annexure No.27A10
SCAA DATED: 23.09.2020
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 L L L L L L L L L L
CO2 M L L L L L L L L L
CO3 S M L L L L L L L L
CO4 S M L L L L L L L L
CO5 S M M L L L L L L L
CO6 S S S L L L L L L L
*S-Strong;M-Medium;L-Low
Page 9 of 89
B. Sc. Computer Science with Data Analytics2020-21 onwards - Affiliated Colleges - Annexure No.27A10
SCAA DATED: 23.09.2020
CourseCode ProgrammingLab -C L T P C
Core/elective/Supportive CoreLab :1 0 0 3 4
Pre- requisite Basicknowledgeincomputers Syllabus I
version
CourseObjectives
TointroducetheconceptsofProcedureOrientedProgrammingand thevariousprogramming
constructsofCprogramming.
ExpectedCourseOutcomes
1 Applythevariousbasicprogrammingconstructslikedecisionmakingstatements. K3
Loopingstatements,functions,structures,pointersandfiles
2 Designprograms usingtheconcept offilesin C and beable tosimulate operations K4
3 Determinetheefficienttechniquesinprogrammingtosolvevariousscientific K5
problems
K1–Remember K2 –Understand K3–applyK4-AnalyzeK5–evaluateK6-Create
EXERCISE1 ImplementationofControlstructures 6
DevelopvariousC ProgramsusingControlStructures
DevelopvariousC programs usingSwitchcase.
EXERCISE2 ImplementationofLoopings 6
Developvarious C program forthe implementationof looping
DevelopvariousC programfortheimplementationoflooping&Conrtol Structures
EXERCISE3 ImplementationofFunctions 9
DevelopaCprogramtoillustraterecursivefunction.
DevelopaCprogramtofind thepalindromeina given sentence
Developa Cprogram to manipulatestrings usingstringfunctions.
DevelopaCProgramusingFunctions
EXERCISE4 ImplementationofPointers 6
DevelopaCprogramto swaptwointegersusingpointers.
Developa C programusingArrayof Pointers.
EXERCISE5 ImplementationofStructures 6
DevelopaCprogramusingthestructures.
DevelopaC programusingArrayof Structures.
EXERCISE6 ImplementationofFiles 6
DevelopaCprogramto calculate electricitybillusingfiles
EXERCISE7 ImplementationofSecurity 6
DevelopaCprogramtoencryptanddecryptastring
DevelopaGprogramto encryptanddecryptFiles
TotalLectureHours 45
Hours
Page 10 of
89
B. Sc. Computer Science with Data Analytics2020-21 onwards - Affiliated Colleges - Annexure No.27A10
SCAA DATED: 23.09.2020
TextBook(S)
1 EBalagurusamy:ComputingFundamentals&CProgramming –TataMcGraw-Hill,Second
Reprint2008.
ReferenceBook(s)
1 AshokNKamthane: Programmingwith ANSIand TurboC, Pearson, 2002. 2.Henry
Mullish&HubertL.Cooper: TheSprit of C,Jaico, 1996.
CourseDesignedby :
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 S M L L L L L L L L
CO2 S M M L L L L L L L
CO3 S S S L L L L L L L
*S-Strong;M-Medium;L-Low
Page 11 of
89
B. Sc. Computer Science with Data Analytics2020-21 onwards - Affiliated Colleges - Annexure No.27A10
SCAA DATED: 23.09.2020
CourseCode DataStructures L T P C
Core/elective/Supportive Core:2 4 0 0 4
Pre- requisite Basic knowledge of Syllabus I
ProgrammingConstructs version
CourseObjectives
Tointroducetheconceptofdatastructuresandthetypesofdatastructures
Todemonstratehowvariousdata structurescanbeimplemented andusedinvariousapplications
ExpectedCourseOutcomes
1 DefinetheconceptofDatastructureandlistthevariousclassificationsofdata K1
structures.
2 Demonstratehowarrays, stacks,queues,linkedlists,trees,heaps, K2
GraphsandHashTablesarerepresentedinthemainmemoryandvariousoperationsareperfor
med on thosedata structures.
3 Illustratethe various file organizations like Sequential, Random and Linked K2
organizations.
4 Discovertherealtimeapplicationsofthe variousdatastructures K3
5 Designalgorithmsforvarioussortingandsearchingtechniques K4
K1–Remember K2 –Understand K3–applyK4-AnalyzeK5–evaluateK6-Create
UNITI INTRODUCTION 12
Hours
Introduction:IntroductionofAlgorithms,AnalyzingAlgorithms.Arrays:SparseMatrices-
RepresentationofArrays.StacksandQueues.Fundamentals-EvaluationofExpressionInfixto
Postfix Conversion-MultipleStacksandQueues
UNITII LINKEDLIST 12
Linked List: Singly Linked List - Linked Stacks and Queues - Polynomial Addition - More on
LinkedLists-SparseMatrices-DoublyLinkedListandDynamic -StorageManagement-Garbage
CollectionandCompaction.
UNITIII NONLINEARDATA STRUCTURES 12
Hours
Trees: Basic Terminology - Binary Trees - Binary Tree Representations - Binary Trees -Traversal -
More on Binary Trees - Threaded Binary Trees - Binary Tree Representation of Trees -
CountingBinaryTrees.Graphs:TerminologyandRepresentations-Traversals,ConnectedComponentsand
SpanningTrees,ShortestPathsandTransitiveClosure
UNITIV EXTERNAL-SORTING 12
Hours
External Sorting: Storage Devices -Sorting with Disks: K-Way Merging - Sorting with Tapes
SymbolTables:StaticTreeTables -DynamicTreeTables-Hash Tables:HashingFunctions-Overflow
Handling.
UNITV INTERNAL -SORTING 12
Hours
InternalSorting:InsertionSort-QuickSort-2WayMergeSort-HeapSort-ShellSort-Sortingon
Page 12 of
89
B. Sc. Computer Science with Data Analytics2020-21 onwards - Affiliated Colleges - Annexure No.27A10
SCAA DATED: 23.09.2020
SeveralKeys.Files:Files,QueriesandSequentialorganizations-IndexTechniques-File
Organizations.
TotalHours 60
Hours
TextBook(s)
1 EllisHorowitz,SartajShani,DataStructures,GalgotiaPublication.
ReferenceBook(s)
1 EllisHorowitz,SartajShani,SanguthevarRajasekaran,ComputerAlgorithms,Galgotia
Publication.
RelatedOnlineContents(MOOC,SWAYAM,NPTEL,Websitesetc)
1 https://onlinecourses.swayam2.ac.in/aic20_sp06/preview
2 https://onlinecourses.swayam2.ac.in/arp19_ap79/preview
CourseDesignedby :
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 L L L L L L L L L L
CO2 M L L L L L L L L L
CO3 S M L L L L L L L L
CO4 S M L L L L L L L L
CO5 S M M L L L L L L L
*S-Strong;M-Medium;L-Low
Page 13 of
89
B. Sc. Computer Science with Data Analytics2020-21 onwards - Affiliated Colleges - Annexure No.27A10
SCAA DATED: 23.09.2020
CourseCode IntroductiontoLinearAlgebra L T P C
Core/elective/Supportive Allied:1 5 0 0 4
ExpectedCourseOutcomes
1 Explaintheconcept/theoryinlinearalgebra,todevelopdynamicandgraphicalviews K2
totherelatedissuesofthechosentopicsasoutlinedin“coursecontent,”andtoformallyproveth
eorems
2 Recognizethebasicapplicationsofthechosentopicsandtheirimportanceinthe K3
modernscience
3 Developsimplemathematicalmodels,andapplybasiclinearalgebratechniques K3
learned fromthechosentopicstosolvesimpleproblems
4 Reportandcommunicateeffectivelywithothersandpresentmathematicalresultsina K4
logical andcoherentfashion
5 Appraisethepowerandbeautyofmathematics,andsolveproblemsindependentlyand K5
collaborativelyas part ofateam
K1–Remember K2 –Understand K3–applyK4-AnalyzeK5–evaluateK6-Create
UNITI 15
Introduction–VectorsandMatrices–LengthandDotProducts–SolvingLinearEquations–
LinearEquations–TheIdeaofElimination–EliminationUsingMatrices–RulesforMatrixOperations–
InverseMatrices–Elimination=Factorization:A=LU –TransposesandPermutations
UNITII 15
Vector Spaces and Subspaces – Spaces of Vectors – The Null space of A: Solving Ax = 0– TheRank
and the Row Reduced Form – The complete solution to Ax=b – Independence, Basis,
andDimensions–DimensionsofthefourSubspaces–Orthogonality–OrthogonalityoftheFour
Subspaces–Projections– LeastSquaresApproximations –Orthogonal BasesandGram–Schmidt.
UNITIII 15
Determinants – The Properties of Determinants – Permutations and Cofactors – Cramer‟s
Rule,Inverse,andVolumes–EigenvaluesandEigenvectors–IntroductiontoEigenvalues–
DiagonalizingaMatrix–ApplicationstoDifferentialEquations–SymmetricMatrices–Positive
DefiniteMatrices–SimilarMatrices–TheSingularValueDecomposition
UNITIV 15
SingularvalueDecomposition–LinearTransformations–TheIdeaofaLinearTransformation–
TheMatrixofaLinearTransformation–Change ofBasis–DiagonalizationandthePseudoinverse.
UNITV 15
ComplexVectorsandComplexMatrices–ComplexNumbers–HermitianandUnitaryMatrices–
Page 14 of
89
B. Sc. Computer Science with Data Analytics2020-21 onwards - Affiliated Colleges - Annexure No.27A10
SCAA DATED: 23.09.2020
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 L L L L L L L L L L
CO2 M L L L L L L L L L
CO3 S M L L L L L L L L
CO4 S M L L L L L L L L
CO5 S M M L L L L L L L
*S-Strong;M-Medium;L-Low
Page 15 of
89
B. Sc. Computer Science with Data Analytics2020-21 onwards - Affiliated Colleges - Annexure No.27A10
SCAA DATED: 23.09.2020
SecondSemester
Page 16 of
89
B. Sc. Computer Science with Data Analytics2020-21 onwards - Affiliated Colleges - Annexure No.27A10
SCAA DATED: 23.09.2020
CourseCode ProgramminginC++ L T P C
Core/elective/Supportive Core:3 5 0 0 4
BasicknowledgeofProcedureOrientedPr
ogrammingconcepts Syllabus
Pre- requisite BasicknowledgeinCProgramming I
version
CourseObjectives
TointroduceheconceptsofObjectOrientedProgrammingParadigmandtheprogrammingconstructs
ofC++
ExpectedCourseOutcomes
1 Describetheproceduralandobjectorientedparadigmwithconceptsofstreams, K1
classes,functions,data andobjects
2 Demonstratethe various basic programming constructs like decision making K2
statements. Loopingstatementsandfunctions
3 Explainthe objectorientedconceptslikeoverloading,inheritance,polymorphism, K3
virtualfunctions,constructorsanddestructors
4 Explainthevariousfilestreamclasses;filetypes,usageoftemplatesandexception K3
handlingmechanisms.
5 Comparetheprosandconsofprocedureorientedlanguagewiththeconceptsofobject K5
orientedlanguage
6 Developprogramsincorporatingtheprogrammingconstructsofobjectoriented K5
programmingconcepts
K1–Remember K2 –Understand K3–applyK4-AnalyzeK5–evaluateK6-Create
UNITI IntroductiontoC++ 12
Introduction to C++ - key concepts of Object-Oriented Programming –Advantages – Object
OrientedLanguages – I/O in C++ - C++ Declarations. Control Structures : - Decision Making and
Statements :If..else,jump,goto,break,continue,Switchcasestatements-LoopsinC++:for,while,do-
functionsinC++-inline functions–FunctionOverloading.
UNITII ClassesandObjects 14
ClassesandObjects:DeclaringObjects–DefiningMemberFunctions–StaticMembervariablesandfunctions–
arrayofobjects–friendfunctions–Overloadingmemberfunctions–Bitfieldsandclasses
–Constructoranddestructorwithstaticmembers.
UNITIII OperatorOverloading andInheritance 16
OperatorOverloading:Overloadingunary,binaryoperators–OverloadingFriendfunctions–type
conversion–Inheritance:TypesofInheritance–
Single,Multilevel,Multiple,Hierarchal,Hybrid,Multipathinheritance–Virtual baseClasses– Abstract
Classes.
UNITIV PointersandPolymorphism 18
Pointers–Declaration–PointertoClass,Object–thispointer–PointerstoderivedclassesandBase
classes–Arrays–Characteristics–arrayofclasses–Memorymodels–newanddeleteoperators–
Page 17 of
89
B. Sc. Computer Science with Data Analytics2020-21 onwards - Affiliated Colleges - Annexure No.27A10
SCAA DATED: 23.09.2020
dynamicobject –Binding,PolymorphismandVirtualFunctions.
UNITV FileandExceptionHandling 15
Files–Filestreamclasses–file modes–SequentialRead/Writeoperations–BinaryandASCIIFiles
–RandomAccessOperation–Templates–ExceptionHandling-String–
DeclaringandInitializingstringobjects – StringAttributes– Miscellaneousfunctions .
TotalLectureHours 75
Hours
TextBook(s)
1 AshokNKamthane,Object-OrientedProgrammingwithAnsiAndTurboC++,Pearson
Education,2003.
ReferenceBooks
1 E.Balagurusamy,Object-OrientedProgrammingwithC++,TMH,1998.
2 MariaLitvin&GrayLitvin,C++foryou,Vikaspublication,2002.
3 JohnR Hubbard,Programmingwith C,2nd Edition, TMHpublication, 2002
RelatedOnlineContents(MOOC,SWAYAM,NPTEL,Websitesetc)
1 https://onlinecourses.swayam2.ac.in/aic20_sp06/preview
2 https://onlinecourses.swayam2.ac.in/arp19_ap79/preview
CourseDesignedby :
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 M M L L L L L L L L
CO2 M M M L L L L L L L
CO3 S M M L L L L L L L
CO4 S S M L L L L L L L
CO5 S S M L L L L L L L
CO6 S S S L L L L L L L
*S-Strong;M-Medium;L-Low
Page 18 of
89
B. Sc. Computer Science with Data Analytics2020-21 onwards - Affiliated Colleges - Annexure No.27A10
SCAA DATED: 23.09.2020
CourseCode ProgrammingLab–C++ L T P C
Core/elective/Supportive CoreLab :2 0 0 4 4
CourseObjectives
Tointroducehe conceptsofObjectOrientedProgrammingParadigmandtheprogrammingconstructs
ofC++
ExpectedCourseOutcomes
1 Applythevariousbasicprogrammingconstructslikedecisionmakingstatements.Loopingst K3
atements,functions,conceptslikeoverloading,inheritance,polymorphism,
virtualfunctions,constructorsanddestructors
2 IllustratetheconceptofVirtualClasses,inlinefunctionsandfriendfunctions K4
3 Comparethevariousfilestreamclasses;filetypes,usageoftemplatesandexception K5
handlingmechanisms.
4 Comparetheprosandconsofprocedureorientedlanguagewiththeconceptsofobject K5
orientedlanguage
K1–Remember K2 –Understand K3 –applyK4-AnalyzeK5–evaluateK6-Create
PROGRAM- 5
1
WriteaC+
+ProgramtocreateaclasstoimplementthedatastructureSTACK.WriteaconstructortoinitializetheTOPofthe
STACK.WriteamemberfunctionPUSH()toinsertanelementandmember
functionPOP()todelete an elementcheck foroverflowand underflowconditions.
PROGRAM- 5
2
WriteaC++ProgramtocreateaclassARITHMETICwhichconsistsofaFLOATandanINTEGER
variable.WritememberfunctionsADD(),SUB(),MUL(),DIV()toperformaddition,subtraction,multiplicatio
n,division respectively.Write amemberfunction togetand displayvalues.
PROGRAM- 5
3
WriteaC++Programtoreadanintegernumberandfindthesumofallthedigitsuntilitreducestoa
singledigitusingconstructors,destructorsandinlinememberfunctions.
PROGRAM- 5
4
WriteaC++ProgramtocreateaclassFLOAT thatcontains onefloatdatamember.Overload allthe
fourArithmeticoperatorssothat theyoperate ontheobjectFLOAT.
PROGRAM- 5
5
WriteaC++ProgramtocreateaclassSTRING.WriteaMemberFunctiontoinitialize,getand
Page 19 of
89
B. Sc. Computer Science with Data Analytics2020-21 onwards - Affiliated Colleges - Annexure No.27A10
SCAA DATED: 23.09.2020
displaystings.Overloadtheoperators++and==toconcatenatetwoStringsandtocomparetwo
stringsrespectively.
PROGRAM-6 5
WriteaC+
+Programtocreateclass,whichconsistsofEMPLOYEEDetaillikeE_Number,E_Name,Department,Basic,S
alary,Grade.Writeamemberfunctiontogetanddisplaythem.Deriveaclass
PAYfromtheaboveclassandwriteamemberfunctiontocalculateDA,HRAandPFdependingonthegrade.
PROGRAM - 5
7
WriteaC+
+ProgramtocreateaclassSHAPEwhichconsistsoftwoVIRTUALFUNCTIONSCalculate_Area()andCalcul
ate_Perimeter()tocalculateareaandperimeterofvariousfigures.Derive
threeclassesSQUARE,RECTANGLE,TRIANGEfromclassShapeandCalculateAreaandPerimeterofeachc
lass separatelyand displaytheresult.
PROGRAM - 5
8
Write a C++ Program to create two classes each class consists of two private variables, a integer and
afloat variable. Write member functions to get and display them. Write a FRIEND Function common
tobothclasses,whichtakestheobjectofabovetwoclassesasargumentsandtheintegerandfloatvalues
ofboth objects separatelyand displaytheresult.
PROGRAM - 5
9
WriteaC++ProgramusingFunctionOverloadingtoreadtwoMatricesofdifferentDataTypessuch
asintegersandfloatingpointnumbers.Findoutthesumoftheabovetwomatricesseparatelyanddisplaythe sum
of thesearrays individually.
PROGRAM- 5
10
WriteaC++Program tocheck whetherthe givenstringis apalindromeornotusingPointers.
PROGRAM- 5
11
WriteaC++Programtocreatea Fileand todisplaythecontentsof that filewith line numbers.
PROGRAM - 5
12
WriteaC++Programtomergetwofilesintoasingle file.
TotalLectureHours 60
Hours
TextBook(s)
1 AshokNKamthane, Object-OrientedProgrammingwithAnsiAndTurbo C++,Pearson
Education,2003.
ReferenceBooks
1 E.Balagurusamy,Object-OrientedProgrammingwithC++,TMH,1998.
2 Maria Litvin&GrayLitvin,C++foryou,Vikaspublication, 2002.
3 JohnRHubbard, ProgrammingwithC, 2ndEdition,TMH publication,2002
CourseDesignedby :
Page 20 of
89
B. Sc. Computer Science with Data Analytics2020-21 onwards - Affiliated Colleges - Annexure No.27A10
SCAA DATED: 23.09.2020
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 S S M L L L L L L L
CO2 S S M L L L L L L L
CO3 S S M L L L L L L L
CO4 S S S L L L L L L L
*S-Strong;M-Medium;L-Low
Page 21 of
89
B. Sc. Computer Science with Data Analytics2020-21 onwards - Affiliated Colleges - Annexure No.27A10
SCAA DATED: 23.09.2020
Core/elective/Supportive CoreLab :3 0 0 2 2
ExpectedCourseOutcomes
1 ApplythepredefinedprocedurestocreateGmailaccount,checkandreceivemessages K3
2 Applythe predefinedprocedures toperform variousbasic operationson internet K3
3 Utilizevariousgoogleapplicationslikedocs,googleclassroom,googledrive,google K3
forms,googlemeetandslides
K1–Remember K2 –Understand K3–applyK4-AnalyzeK5–evaluateK6-Create
PROGRAM-1 2
CreateanemailaccountinGmail.Usingtheaccountcreatedcomposeamailtoinviteothercollege
studentsforyourcollegefest,enclosetheinvitationasattachmentandsendthemailtoatleast50recipients.Use
CC andBCC options accordingly
PROGRAM-2 2
OpenyourinboxintheGmailaccountcreated,checkthemailreceivedfromyourpeerfromothercollegeinviting
youforhiscollegefest,anddownloadtheinvitation.Replytothemailwithathank
younote fortheinviteandforwardthemailto otherfriends
PROGRAM-3 2
Assumethatyouarestudyinginfinalyearofyourgraduationandareeagerlylookingforajob.Visit
anyjobportalanduploadyour resume.
PROGRAM-4 2
CreateameetingusingGoogle calendarand sharemeetingid totheattendees. Transfertheownership
totheManageroncethe meetingidisgenerated.
PROGRAM-5 2
Createalabel anduploadbulk contactsusingimportoptionin GoogleContacts
PROGRAM-6 4
CreateyourownGoogleclassroomandinviteallyourfriendsthroughemailid.Poststudymaterialin
GoogleclassroomusingGoogledrive.CreateaseparatefolderforeverysubjectanduploadallunitwiseE-
Content Materials.
PROGRAM-7
CreateandshareafolderinGoogleDriveusing„sharealink‟optionandsetthepermissiontoaccess
thatfolderbyyourfriends only.
PROGRAM-8
Createone-pagestoryinyourmother tonguebyusingvoicerecognition facilityof Google Docs
Page 22 of
89
B. Sc. Computer Science with Data Analytics2020-21 onwards - Affiliated Colleges - Annexure No.27A10
SCAA DATED: 23.09.2020
PROGRAM-9 2
CreatearegistrationformforyourDepartmentSeminarorConferenceusingGoogleForms.
PROGRAM-10 2
Createaquestionpaperwithmultiplechoicetypesofquestionsforasubjectofyourchoice,using
GoogleForms.
PROGRAM-11 4
CreateameetusingGoogleCalendar andrecordthemeetusingGoogleMeet.
CreateaGoogleslidesfor atopicandsharethesamewithyour friends.
PROGRAM-12 4
Createtemplate foraseminarcertificate usingGoogleSlides.
PROGRAM-13
CreateasheettoillustratesimplemathematicalcalculationsusingGoogle Sheets. 4
Createstudent‟sinternalmarkstatementandsharetheGooglesheetsvialink.
TotalLectureHours 30
Hours
TextBook(s)
1 IanLamont,Google Drive&Docsin30 Minutes,2ndEdition.
ReferenceBook(s)
1 SherryKinkoph Gunter,MyGoogleApps, 2014.
CourseDesignedby :
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 M M L L L L L L L L
CO2 S M L L L L L L L L
CO3 S S S L L L L L L L
*S-Strong;M-Medium;L-Low
Page 23 of
89
B. Sc. Computer Science with Data Analytics2020-21 onwards - Affiliated Colleges - Annexure No.27A10
SCAA DATED: 23.09.2020
CourseCode DiscreteMathematics L T P C
Core/elective/Supportive Allied:2 5 0 0 4
ExpectedCourseOutcomes
1 Understanddiscretemathematicalpreliminariesand applydiscretemathematicsin K2
formalrepresentationof variouscomputingconstructs
2 Demonstrateanunderstandingofrelations,functions,Combinatoricsandlattices K2
3 Applythetechniquesofdiscretestructuresandlogicalreasoningtosolveavarietyof K3
problemsandwriteanargumentusinglogicalnotation
4 Analyzeandconstructmathematicalargumentsthatrelatetothestudyofdiscrete K4
structures
5 Developand model problems with the concepts and techniques of discrete K4
mathematics.
K1–Remember K2 –Understand K3–applyK4-AnalyzeK5–evaluateK6-Create
UNITI MATHEMATICALLOGIC 15
Proposition –LogicalOperators–TruthTables–Laws ofLogic–Equivalances–Rules ofinterface–
validityArguments–ConsistencyofSpecifications–PropositonalCalculus–Quantifiersanduniverseof
discourse.
UNITII PROOFTECHNIQUES &RELATIONSANDFUNCTIONS 15
PROOF TECHNIQUES: Introduction – Methods of proving theorems – Direct Proofs, Proof
byContraposition,Vacuousandtrivialproofs,Proofsbycontradiction–MistakesinProofs–Mathematical
induction – Strong Mathematical induction – Strong mathematical induction and wellordering–
Program Correctness.
UNITIII COMBINATORICS 15
Basics of Counting – The Pigeonhole principle – Permutations and Combinations with and
withoutrepetition,Permutationswithindistinguishableelements–distributionsofobjects–
Generatingpermutationsand combinations in lexicographic order.
Page 24 of
89
B. Sc. Computer Science with Data Analytics2020-21 onwards - Affiliated Colleges - Annexure No.27A10
SCAA DATED: 23.09.2020
UNITIV RECURRENCERELATIONS 15
SomeRecurrenceRelationModels–
Solutionoflinearhomogeneousrecurrencerelationswithconstantcoefficients–solutionoflinearnon-
homogeneousrecurrencerelationsbythemethodof
characteristicroots –Divideandconquerrecurrencerelations.
UNITV LATTICES 15
Latticesaspartiallyorderedset–PropertiesofLattices–Latticesas algebraicsystem–Sublattices –
DirectProductand Homomorphism–Somespeciallattices.
TotalLectureHours 75
Hours
TextBook(s)
1 KennethH.Rosen,“DiscreteMathematicsanditsapplications”,McGrawHill,2011.
2 JudithL.Gersting,“MathematicalStructures forComputerScience”,W.H>Freemanand
Company,2014
3 TremblayJ.P.andManoharR.,“DiscreteandCombinatorialMathamatics–AnIntroduction”,
AddisonWesley,2009.
ReferenceBooks
1 DoerrAlanandLevasseurK.,“AppliedDiscreteStructuresforComputerScience”,Galgotia
Publications,2002
2 BenardKolman,Robert C.BusbyandSharanRoss,“DiscreteMathematicalStructures”,
PearsonEducation,2014
RelatedOnlineContents(MOOC,SWAYAM,NPTEL,Websitesetc)
1 https://onlinecourses.swayam2.ac.in/aic20_sp06/preview
2 https://onlinecourses.swayam2.ac.in/arp19_ap79/preview
CourseDesignedby :
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 M L L L L L L L L L
CO2 M L L L L L L L L L
CO3 S M L L L L L L L L
CO4 S M M L L L L L L L
CO5 S S S L L L L L L L
*S-Strong;M-Medium;L-Low
Page 25 of
89
B. Sc. Computer Science with Data Analytics2020-21 onwards - Affiliated Colleges - Annexure No.27A10
SCAA DATED: 23.09.2020
ThirdSemester
Page 26 of
89
B. Sc. Computer Science with Data Analytics2020-21 onwards - Affiliated Colleges - Annexure No.27A10
SCAA DATED: 23.09.2020
CourseCode JavaProgramming L T P C
Core/elective/Supportive Core:4 6 0 0 4
UNITI 18
Fundamentals of Object-Oriented Programming: Object-Oriented Paradigm – Basic Concepts
ofObject-Oriented Programming – Benefits of Object-Oriented Programming – Application of Object-
Oriented Programming. Java Evolution: History – Features – How Java differs from C and C++ –
JavaandInternet –Javaandwww –WebBrowsers.OverviewofJava:simpleJavaprogram–Structure –
JavaTokens – Statements – JavaVirtual Machine.
UNITII 18
Constants, Variables, Data Types - Operators and Expressions – Decision Making and Branching:
if,if...else,nestedif,switch?:Operator-Decision MakingandLooping: while,do,for– JumpsinLoops
-Labeled Loops–Classes,ObjectsandMethods.
UNITIII 18
Arrays,StringsandVectors–Interfaces:MultipleInheritance–Packages:PuttingClassestogether–
MultithreadedProgramming.
UNITIV 18
ManagingErrorsandExceptions–AppletProgramming–GraphicsProgramming.
UNITV 18
ManagingInput/OutputFilesinJava:ConceptsofStreams-StreamClasses–ByteStreamclasses–
Characterstreamclasses–Usingstreams–I/OClasses–FileClass–I/Oexceptions–Creationoffiles–
Reading/Writing characters,Byte-HandlingPrimitiveDataTypes–RandomAccessFiles.
Page 27 of
89
B. Sc. Computer Science with Data Analytics2020-21 onwards - Affiliated Colleges - Annexure No.27A10
SCAA DATED: 23.09.2020
TotalLectureHours 90
TextBook(s)
1 ProgrammingwithJava–APrimer-E. Balagurusamy,3rd Edition,TMH.
ReferenceBook(s)
1 TheComplete ReferenceJava2-PatrickNaughton &Hebert Schildt, 3rdEdition,TMH
2 Programmingwith Java– JohnR. Hubbard, 2ndEdition, TMH.
RelatedOnlineContents(MOOC,SWAYAM,NPTEL,Websitesetc)
1 https://onlinecourses.swayam2.ac.in/aic20_sp06/preview
2 https://onlinecourses.swayam2.ac.in/arp19_ap79/preview
CourseDesignedby :
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 M L - - - - - - - -
CO2 M L - - - - - - - -
CO3 S M L - - - - - - -
CO4 S M M - - - - - - -
CO5 S S S - - - - - - -
*S-Strong;M-Medium;L-Low
Page 28 of
89
B. Sc. Computer Science with Data Analytics2020-21 onwards - Affiliated Colleges - Annexure No.27A10
SCAA DATED: 23.09.2020
CourseCode JAVAProgrammingLab L T P C
Core/elective/Supportive CoreLab:4 0 0 5 4
Pre- requisite Basic knowledge of Syllabus I
ProgrammingConstructs version
Knowledge on Object
OrientedProgrammingConcepts
CourseObjectives
To introduce the concepts of Object Oriented Programming Paradigm and the
programmingconstructsof JAVA
ExpectedCourseOutcomes
1 ApplythevariousbasicprogrammingconstructsofJAVAlikedecisionmakingstatements.Lo K3
opingstatements,overloading,inheritance,polymorphism,constructors
anddestructors
2 Illustratetheconceptsofthreadingandmulti-threading K4
3 Designprogramsusingvariousfilestreamclasses;filetypes,andframes K4
K1–Remember K2 –Understand K3–applyK4-AnalyzeK5–evaluateK6-Create
PROGRAM1 3
WriteaJavaApplicationsto extractaportion ofacharacterstringandprinttheextractedstring.
PROGRAM2 3
WriteaJavaProgramto implementtheconceptof multipleinheritanceusingInterfaces.
PROGRAM3 3
WriteaJavaProgramtocreateanExceptioncalledpayout-of-bounds andthrowtheexception
PROGRAM4 3
Write a Java Program to implement the concept of multithreading with the use of any
threemultiplicationtables andassign threedifferentpriorities to them.
PROGRAM5 6
WriteaJavaProgramtodrawseveralshapesinthecreatedwindows
PROGRAM6 6
WriteaJavaProgramtocreateaframewithfourtextfieldsname,street,cityandpincodewithsuitabletables.Als
oaddabuttoncalledmydetails.Whenthebuttonisclickeditscorresponding
valuesareto beappearedin thetext fields.
PROGRAM7 6
WriteaJavaProgramtodemonstratetheMultipleSelectionList-box.
PROGRAM8 6
WriteaJavaProgram tocreateaframe withthree textfields forname,age and qualificationandatext
fieldformultiplelinefor address
PROGRAM9 6
WriteaJavaProgramtocreateMenuBars andpulldownmenus.
PROGRAM10 6
Write a JavaProgramtocreate frameswhichrespondtothe mouseclicks.Foreacheventswithmouse
Page 29 of
89
B. Sc. Computer Science with Data Analytics2020-21 onwards - Affiliated Colleges - Annexure No.27A10
SCAA DATED: 23.09.2020
TotalLectureHours 60
Hours
TextBook(s)
1 ProgrammingwithJava–APrimer-E. Balagurusamy,3rd Edition,TMH.
ReferenceBook(s)
1 TheComplete Reference Java2-PatrickNaughton &Hebert Schildt, 3rd Edition, TMH
CourseDesignedby :
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 S S S - - - - - - -
CO2 S S S - - - - - - -
CO3 S S S - - - - - - -
*S-Strong;M-Medium;L-Low
Page 30 of
89
B. Sc. Computer Science with Data Analytics2020-21 onwards - Affiliated Colleges - Annexure No.27A10
SCAA DATED: 23.09.2020
CourseCode DatabaseManagementSystems L T P C
Core/elective/Supportive Core:5 6 0 0 4
Pre- requisite None Syllabus I
version
CourseObjectives
The objective of the course is to present an introduction to database management systems,
withan emphasis on how to organize, maintain and retrieve - efficiently, and effectively -
information froma DBMS.
ExpectedCourseOutcomes
1 Describethefundamentalelementsof relationaldatabasemanagementsystems K2
2 Explainthebasicconceptsofrelationaldatamodel,entity-relationshipmodel, K2
relationaldatabasedesign,relationalalgebraand SQL.
3 Explaintheconceptsoftransactionprocessing,basicdatabasestoragestructuresand K2
accesstechniques
3 ConstructER-modelstorepresentsimpledatabaseapplicationscenarios K3
4 Applythe normalizationtechniques toimprovise the databasedesign K3
5 DevelopDDLandDMLcommandstoperform basicoperationson adatabase K3
UNITI INTRODUCTIONTODBMS 18
File Systems Organization – Sequential, Pointer, Indexed, Direct – Purpose of Database System-
Database System Terminologies-Database characteristics- Data models – Types of data models –
ComponentsofDBMS-RelationalAlgebra.LOGICALDATABASEDESIGN:RelationalDBMS–
Codd‟s Rule – Entity- Relationship model – Extended ER Normalization – Functional
Dependencies,Anomaly- 1NFto 5NF-Domain KeyNormal Form–Denormalization
UNITII SQL&QUERYOPTIMIZATION 18
I SQL Standards – Data types – Database Objects- DDL-DML-DCL-TCL-Embedded SQL-Static
VsDynamicSQL–QUERYOPTIMIZATION:QueryProcessingandOptimization–Heuristicsand
CostEstimates in QueryOptimization.
UNITIII TRANSACTIONPROCESSINGANDCONCURRENCYCONTROL 18
Introduction-PropertiesofTransaction-Serializability-ConcurrencyControl–LockingMechanisms-
TwoPhaseCommitProtocol-Deadlock.
UNITIV TRENDSINDATABASETECHNOLOGY 18
OverviewofPhysicalStorageMedia–MagneticDisks–RAID–Tertiarystorage–FileOrganization
– Organization of Records in Files – Indexing and Hashing –Ordered Indices – B+ tree Index Files –
Btree Index Files – Static Hashing – Dynamic Hashing – Introduction to Distributed Databases-
Clientservertechnology-MultidimensionalandParalleldatabases-Spatialandmultimediadatabases-
Mobileand web databases-Data Warehouse-Mining-Data marts.
UNITV ADVANCEDTOPICS 18
DATABASESECURITY:Data Classification-Threatsandrisks–DatabaseaccessControl–Typesof
Privileges–Cryptography-StatisticalDatabases.-DistributedDatabases-Architecture-Transaction
Page 31 of
89
B. Sc. Computer Science with Data Analytics2020-21 onwards - Affiliated Colleges - Annexure No.27A10
SCAA DATED: 23.09.2020
Processing-DataWarehousingandMining-Classification-Associationrules-Clustering-Information
Retrieval-Relevanceranking-CrawlingandIndexingtheWeb-ObjectOrientedDatabases-XMLDatabases.
TotalLectureHours 90
TextBook(s)
1 RamezElmasriandShamkantB.Navathe,“FundamentalsofDatabaseSystems”,FifthEdition,Pearso
nEducation, 2008.
ReferenceBook(s)
1 AbrahamSilberschatz,HenryF.KorthandS.Sudharshan,“DatabaseSystemConcepts”,Sixth
Edition,TataMcGrawHill,2011.
2 C.J.Date,A.KannanandS.Swamynathan,“AnIntroductiontoDatabaseSystems”,Eighth
Edition,Pearson Education,2006.
3 AtulKahate,“IntroductiontoDatabaseManagementSystems”,PearsonEducation,NewDelhi,
2006.
4 AlexisLeonandMathewsLeon,“DatabaseManagementSystems”,VikasPublishingHouse
PrivateLimited,NewDelhi,2003.
5 RaghuRamakrishnan,“DatabaseManagementSystems”, Fourth Edition,TataMcGrawHill,
2010.
6 G.K.Gupta,“DatabaseManagementSystems”,TataMcGrawHill,2011.
7 RobCornell,“DatabaseSystemsDesignandImplementation”,CengageLearning,2011.
RelatedOnlineContents(MOOC,SWAYAM,NPTEL,Websitesetc)
1 https://onlinecourses.swayam2.ac.in/aic20_sp06/preview
2 https://onlinecourses.swayam2.ac.in/arp19_ap79/preview
CourseDesignedby:
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 M L L L L L L L L L
CO2 M L L L L L L L L L
CO3 S M L L L L L L L L
CO4 S M M L L L L L L L
CO5 S S S L L L L L L L
*S-Strong;M-Medium;L-Low
Page 32 of
89
B. Sc. Computer Science with Data Analytics2020-21 onwards - Affiliated Colleges - Annexure No.27A10
SCAA DATED: 23.09.2020
CourseCode DataCommunicationandNetworks L T P C
Core/elective/Supportive Allied:3 6 0 0 4
Pre- requisite None Syllabus I
version
CourseObjectives
Tointroducetheconceptsofdatacommunicationnetworks
Toexplainthevarioustypestopologies andtransmissionmedia
ExpectedCourseOutcomes
1 Describethebasisand structureofcomputernetworks K2
2 Understandtheconcept ofanalog/digitalsignals andtransmissions K2
3 Describethelayers of the OSImodel K2
4 Explaintheconceptof ISDNarchitectureandinterfaces K2
5 Identifythedifferenttypesof networktopologies andprotocols. K3
K1–Remember K2 –Understand K3–applyK4-AnalyzeK5–evaluateK6-Create
UNITI IntroductiontocommunicationsandNetworking 16
IntroductiontocommunicationsandNetworking:Introduction–Fundamentalconcepts-
Datacommunications – Protocols- standards - Standards organizations - Signal propagations- Analog
andDigitalsignals-Bandwidthofasignalandamedium-
Fourieranalysisandtheconceptofbandwidthofasignal-
Thedatatransmissionrateandthebandwidth.Informationencoding:Introduction–
Representingdifferentsymbols-Minimizingerrors-Multimedia–Multimedia andData compression
UNITII Analoganddigitaltransmissionmethods 17
Analoganddigitaltransmissionmethods:Introduction-Analogsignal,Analogtransmission-Digital
signal,Digitaltransmission-Digitalsignal,Analogtransmission-Baudrateandbitspersecond-Analogsignal,
Digital (Storageand) transmission-Nyquist Theorem.
UNITIII ModesofdatatransmissionandMultiplexing 20
Modes of data transmission and Multiplexing: Introduction – Parallel and Serial communication -
Asynchronous, Synchronous and Isochronous communication - Simplex, Half-duplex and Full-
duplexcommunication–Multiplexing-TypesofMultiplexing-FDMversusTDM.TransmissionErrors:
Detectionand correction: Introduction –Errorclassification–TypesofErrors –Errordetection.
UNITIV Transmissionmedia 18
Transmission media: Introduction - Guided media - Un Guided media - Shannon capacity.
Networktopologies, switching and routing algorithms: Introduction - Mesh topology - Star topology -
Treetopology - Ring topology - Bus topology - Hybrid topology - Switching basics- Circuit switching
–Packetswitching-Messageswitching-RouterandRouting–Factorsaffectingroutingalgorithms-
Routingalgorithm -Approachestorouting.
UNITV NetworkingprotocolsandOSImodel 19
Networking protocols and OSI model: Introduction – Protocols in computer communications -
TheOSI model - OSI layer functions.Integrated services digital networking (ISDN):Introduction–
BackgroundofISDN-ISDNarchitecture–ISDNinterfaces-Functionalgrouping–Reference
points - ISDN protocol architecture - Broadband ISDN (B-ISDN). of ATM – Packet size –
Virtualcircuitsin ATM – ATM cells– Switching–ATMlayers – Miscellaneous Topics.
TotalLectureHours 90
Page 33 of
89
B. Sc. Computer Science with Data Analytics2020-21 onwards - Affiliated Colleges - Annexure No.27A10
SCAA DATED: 23.09.2020
Hours
TextBook(s)
1 DataCommunicationsandNetworks,Achyut.S.Godbole,TataMcGraw-HillPublishing
Company,2007.
ReferenceBook(s)
1 B.A. Forouzan –“Data CommunicationsandNetworking(3rdEd.) “ –TMH
2 A.S.Tanenbaum–“ComputerNetworks(4thEd.)”– PearsonEducation/PHI
3 W.Stallings –“Dataand ComputerCommunications(5thEd.)”–PHI/PearsonEducation
CourseDesignedby :
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 M L L L L L L L L L
CO2 M L L L L L L L L L
CO3 S M L L L L L L L L
CO4 S M M L L L L L L L
CO5 S S S L L L L L L L
*S-Strong;M-Medium;L-Low
Page 34 of
89
B. Sc. Computer Science with Data Analytics2020-21 onwards - Affiliated Colleges - Annexure No.27A10
SCAA DATED: 23.09.2020
CourseCode DataVisualization L T P C
Core/elective/Supportive SkillBasedSubject:1 5 0 0 3
Pre- requisite None Syllabus I
version
CourseObjectives
TointroducetheconceptofDataVisualization
Toexplainthe varioustechniquesin DataVisualization
ExpectedCourseOutcomes
1 Understandthebasics of datavisualization K2
2 Understandtheimportanceofdatavisualization andthe designanduseof manyvisual K2
components
3 Explaintheprocess ofdatavisualization K2
4 Explainthebasics ofinteractivedatavisualizationtechniquesvisualization-based K2
issues.
5 Understandthe conceptofvarious typesofvisulaization K2
K1–Remember K2 –Understand K3–applyK4-AnalyzeK5–evaluateK6-Create
UNITI Introduction 15
Introduction-contextofdatavisualization-definitionmethodology,visualizationdesignobjectives.Key
factors-purpose, visualization function and tone, visualization design options- data
representation,datapresenation,sevenstagesof datavisualization,widgets,datavisualizationtools.
UNITII visualizingdatamethods 15
visualizingdatamethods-mapping,timeseries-connectionsandcorrelations-scatterplotmaps-trees,
hierachiesandrecursion-networksnaadgraphs,infographics
UNITIII Visualizingdataprocess 15
Visualizing data process- acquiring data, where to find data, tools of acquiring data from the
internet,locating file for use with processing, loading text data, dealing withfiles and folders,lisiting
files in afolder, asynchronous image downloads, advanced web techniques, using a database, dealing
with largenumberoffiles,parsingdata,levelofeffort,toolsforgatheringclues,textisbest,textmarkup
languages, regular expressions(regexps),grammars and BNF notation, compressed data vectors
andgeometry,binarydata formats, advances detect work
UNITIV Interactivedatavisualization 15
Interactive data visualization-drawing with data,scales-axes-updates,transaction and mode-
interactivity-layouts-geomapping-exportingframework-T3lstabio
UNITV Securitydatavisualization 15
Securitydatavisualization-portscanvisualization-vulnerabilityassessmentandexploitation-firewall
logvisualization-instructiondetectionlogvisualization-attackinganddefendingvisualizationsystems-
creatingsecurityvisualization system
TotalLectureHours 75
Hours
TextBook(s)
1 ScottMurray,”interactivedatavisualizationfortheweb“,O”Reillymedia,inc,2013.
Page 35 of
89
B. Sc. Computer Science with Data Analytics2020-21 onwards - Affiliated Colleges - Annexure No.27A10
SCAA DATED: 23.09.2020
ReferenceBook(s)
1 Benfry,”visualizingdata”,O”Reillymedia,inc,2007
2 Greg conti,”security data visualization:”,”graphical techniques for network
analysis”,Nostarchpress inc,2007
CourseDesignedby :
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 M L L L L L L L L L
CO2 M L L L L L L L L L
CO3 S M L L L L L L L L
CO4 S M M L L L L L L L
CO5 S S S L L L L L L L
*S-Strong;M-Medium;L-Low
Page 36 of
89
B. Sc. Computer Science with Data Analytics2020-21 onwards - Affiliated Colleges - Annexure No.27A10
SCAA DATED: 23.09.2020
FourthSemester
Page 37 of
89
B. Sc. Computer Science with Data Analytics2020-21 onwards - Affiliated Colleges - Annexure No.27A10
SCAA DATED: 23.09.2020
CourseCode PythonProgramming L T P C
Core/elective/Supportive Core:6 6 0 0 4
Pre- requisite KnowledgeinBasicsofObjectOrientedPro Syllabus I
gramming version
CourseObjectives
Tointroducethe conceptsof thevarious programmingconstructsof Pythonprogramming
ExpectedCourseOutcomes
1 Applythevariousbasicprogrammingconstructslikeoperators,expressions,decision K2
makingstatementsandLoopingstatements
2 Summarizetheconcept oflists, tuples, functionsand errorhandling K2
3 ApplytheconceptofDecisionmakingstatements,loopingconstructs,functionsfor K3
solvingbasicprograms
4 Analyzethe conceptsofLists,tuplesanderrorhandlingmechanisms K4
5 Evaluateaprogramincorporatingallthepythonlanguage constructs K5
K1–Remember K2 –Understand K3–applyK4-AnalyzeK5–evaluateK6-Create
UNITI BASICS 16
Python-Variables-ExecutingPythonfromtheCommandLine-EditingPythonFiles-PythonReservedWords-
BasicSyntax-Comments-StandardDataTypes–RelationalOperators-Logical
Operators -BitWiseOperators -Simple Inputand Output.
UNITII CONTROLSTATEMENTS,LISTS,TUPLES 17
CONTROLSTATEMENTS:ControlFlowandSyntax-Indenting-ifStatement-
statementsandexpressions-stringoperations-BooleanExpressions -whileLoop-breakandcontinue -for
Loop.
LISTS: List-list slices - list methods - list loop–mutability–aliasing - cloning lists - list
parameters.TUPLES:Tupleassignment, tupleasreturn value-Sets–Dictionaries.
UNITIII FUNCTIONS: 20
Definition-PassingparameterstoaFunction-Built-infunctions-VariableNumberofArguments-Scope–
Typeconversion-Typecoercion-PassingFunctionstoaFunction–MappingFunctionsina
Dictionary–Lambda -Modules-StandardModules –sys –math –time-dir–help Function.
UNITIV ERRORHANDLING: 18
RunTimeErrors-ExceptionModel-ExceptionHierarchy-HandlingMultipleExceptions-DataStreams-
AccessModesWriting-DatatoaFileReading-DataFromaFile-AdditionalFile
Methods-UsingPipesasDataStreams- HandlingIOExceptions -WorkingwithDirectories.
UNITV OBJECTORIENTEDFEATURES: 19
Classes Principles of Object Orientation - Creating Classes -Instance Methods - File Organization -
Special Methods - Class Variables – Inheritance – Polymorphism - Type Identification -
SimpleCharacter Matches - Special Characters – Character Classes – Quantifiers - Dot Character -
GreedyMatches–Grouping-MatchingatBeginningorEnd-MatchObjects–Substituting-Splittinga
String-CompilingRegular Expressions.
TotalLectureHours 90
Hours
TextBook(s)
1 MarkSummerfield.―ProgramminginPython3:ACompleteintroductiontothePython
Page 38 of
89
B. Sc. Computer Science with Data Analytics2020-21 onwards - Affiliated Colleges - Annexure No.27A10
SCAA DATED: 23.09.2020
Language,Addison-WesleyProfessional,2009.
2 MartinC.Brown,―PYTHON:TheCompleteReference‖,McGraw-Hill,2001
ReferenceBook(s)
1 AllenB.Downey,``ThinkPython:HowtoThinkLikeaComputerScientist„„,2ndedition,
UpdatedforPython3,Shroff/O„ReillyPublishers,2016
2 GuidovanRossumandFredL.DrakeJr,―AnIntroductiontoPython–Revisedandupdated
forPython 3.2,NetworkTheoryLtd., 2011.
CourseDesignedby :
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 L L L L L L L L L L
CO2 M L L L L L L L L L
CO3 S M L L L L L L L L
CO4 S S M L L L L L L L
CO5 S S S L L L L L L L
*S-Strong;M-Medium;L-Low
Page 39 of
89
B. Sc. Computer Science with Data Analytics2020-21 onwards - Affiliated Colleges - Annexure No.27A10
SCAA DATED: 23.09.2020
CourseCode DataWarehousingandDataMining L T P C
Core/elective/Supportive Core:7 6 0 0 4
Pre- requisite None Syllabus I
version
CourseObjectives
Introduce the concepts of data ware house and data mining and explain the
methodologiesusedforanalysis of data
ExpectedCourseOutcomes
1 Understandthefunctionalityofthevariousdatamininganddatawarehousing K2
component
2 Describedifferent methodologiesused indataminingand datawarehousing. K2
3 ExplaintheanalyzingtechniquesandOnlineAnalyticalProcessing K2
4 Explainabouttheassociation ruleminingandclassification K2
5 Comparedifferentapproachesofdatawarehousinganddataminingwithvarious K4
technologies
K1–Remember K2 –Understand K3–applyK4-AnalyzeK5–evaluateK6-Create
UNITI DataWarehousing 18
DatawarehousingComponents–BuildingaDatawarehouse–-
MappingtheDataWarehousetoaMultiprocessorArchitecture–DBMSSchemasforDecisionSupport–
DataExtraction,Cleanup,and
TransformationTools–Metadata.
UNITII BusinessAnalysis 18
Reporting and Query tools and Applications – Tool Categories – The Need for Applications –
CognosImpromptu – Online Analytical Processing (OLAP) – Need – Multidimensional Data Model –
OLAPGuidelines – Multidimensional versus Multirelational OLAP – Categories of Tools – OLAP
Tools andthe Internet.
UNITIII DataMining 17
Introduction–Data–TypesofData–DataMiningFunctionalities–InterestingnessofPatterns–
ClassificationofDataMiningSystems–DataMiningTaskPrimitives–IntegrationofaDataMiningSystemwith
aData Warehouse–Issues–DataPreprocessing
UNITIV AssociationRuleMiningandClassification 19
MiningFrequentPatterns,AssociationsandCorrelations–MiningMethods–MiningvariousKindsof
Association Rules – Correlation Analysis – Constraint Based Association Mining – Classificationand
Prediction – Basic Concepts – Decision Tree Induction – Bayesian Classification – Rule
BasedClassification–ClassificationbyBackpropagation–SupportVectorMachines–
AssociativeClassification–LazyLearners –Other Classification Methods–Prediction.
UNITV ClusteringAnd TrendsIn DataMining 18
ClusterAnalysis–TypesofData–CategorizationofMajorClusteringMethods–K-means–Partitioning
Methods – Hierarchical Methods – Density-Based Methods –Grid Based Methods –Model-
BasedClusteringMethods–ClusteringHighDimensionalData–Constraint–BasedCluster
Analysis –Outlier Analysis –Data MiningApplications.
Page 40 of
89
B. Sc. Computer Science with Data Analytics2020-21 onwards - Affiliated Colleges - Annexure No.27A10
SCAA DATED: 23.09.2020
TotalLectureHours 90
Hours
TextBook(s)
AlexBersonandStephen J.Smith,“DataWarehousing,DataMiningand OLAP”,
1 TataMcGraw–HillEdition,ThirteenthReprint2008.
JiaweiHanandMichelineKamber,“DataMiningConceptsandTechniques”,ThirdEdition,
2
Elsevier,2012.
ReferenceBook(s)
Pang-NingTan,MichaelSteinbachandVipinKumar,“IntroductiontoDataMining”,Person
1
Education,2007.
K.P.Soman,ShyamDiwakarand V.Aja,“InsightintoDataMiningTheoryandPractice”,
2 EasternEconomyEdition,PrenticeHallof India,2006.
G.K.Gupta,“IntroductiontoDataMiningwithCaseStudies”,EasternEconomyEdition,
3 PrenticeHallofIndia,2006.
4 DanielT.Larose,“DataMiningMethodsandModels”,Wiley-Interscience,2006.
RelatedOnlineContents(MOOC,SWAYAM,NPTEL,Websitesetc)
1 https://onlinecourses.swayam2.ac.in/aic20_sp06/preview
2 https://onlinecourses.swayam2.ac.in/arp19_ap79/preview
CourseDesignedby :
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 L L L L L L L L L L
CO2 M L L L L L L L L L
CO3 S M L L L L L L L L
CO4 S M M L L L L L L L
CO5 S S M L L L L L L L
*S-Strong;M-Medium;L-Low
Page 41 of
89
B. Sc. Computer Science with Data Analytics2020-21 onwards - Affiliated Colleges - Annexure No.27A10
SCAA DATED: 23.09.2020
CourseCode PythonProgramming-Lab L T P C
Core/elective/Supportive CoreLab :5 0 0 6 4
Pre- requisite KnowledgeinbasicProgramming Syllabus I
version
CourseObjectives
Tointroducetheconceptsofpythonprogrammingconstructsof C++
ExpectedCourseOutcomes
1 ApplytheconceptofDecisionmakingstatements,loopingconstructs,functionsfor K3
solvingbasic programs
2 Analyzethe conceptsofLists,tuplesanderrorhandlingmechanisms K4
3 Evaluateaprogramincorporatingallthepythonlanguage constructs K5
K1–Remember K2 –Understand K3–applyK4-AnalyzeK5–evaluateK6-Create
PROGRAM - 5
1
Writeapythonprogramthat displaysthefollowinginformation:Yourname,FulladdressMobile
number,Collegename, Coursesubjects.
PROGRAM-2 5
Writeapython programto findthelargestthreeintegersusingif-else and conditionaloperator.
PROGRAM - 5
3
Write a python program that asks the user to enter a series of positive numbers (The user should
enteranegativenumberto signalthe endoftheseries)and theprogram shoulddisplaythenumbers inorder
andtheirsum.
PROGRAM-4 5
Writeapython programto findtheproductoftwomatrices[A]mxp and[B]pxr
PROGRAM-5 5
Writerecursivefunctions forGCD oftwo integers.
PROGRAM- 10
6
Writerecursivefunctionsforthefactorialofpositiveinteger.
PROGRAM - 10
7
WriterecursivefunctionsforFibonacciSequence uptogivennumber n.
PROGRAM- 10
8
Writerecursive functionsto displayprimenumber from 2to n.
PROGRAM - 10
9
Writeapython programthat writesaseries ofrandom numberstoafilefrom1 ton anddisplay.
PROGRAM - 10
10
Page 42 of
89
B. Sc. Computer Science with Data Analytics2020-21 onwards - Affiliated Colleges - Annexure No.27A10
SCAA DATED: 23.09.2020
Writeapythonprogramfor LinearSearchandBinarySearch.
TotalLectureHours 90
Hours
TextBook(s)
1 MarkSummerfield.―ProgramminginPython3:ACompleteintroductiontothePython
Language,Addison-WesleyProfessional,2009.
2 MartinC.Brown,―PYTHON:TheCompleteReference‖,McGraw-Hill,2001
ReferenceBook(s)
1 AllenB.Downey,``ThinkPython:HowtoThinkLikeaComputerScientist„„,2ndedition,
UpdatedforPython3,Shroff/O„ReillyPublishers,2016
2 GuidovanRossumandFredL.DrakeJr,―AnIntroductiontoPython–Revisedandupdated
forPython 3.2,NetworkTheoryLtd., 2011.
CourseDesignedby :
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 S M M L L L L L L L
CO2 S S M L L L L L L L
CO3 S S S L L L L L L L
*S-Strong;M-Medium;L-Low
Page 43 of
89
B. Sc. Computer Science with Data Analytics2020-21 onwards - Affiliated Colleges - Annexure No.27A10
SCAA DATED: 23.09.2020
CourseCode DeepLearning L T P C
Core/elective/Supportive Allied:4 6 0 0 4
Pre- requisite None Syllabus I
version
CourseObjectives
Tointroducestudents tothebasic conceptsandtechniques ofdeepLearning.
ExpectedCourseOutcomes
1 Understandthebasicconceptsandtechniquesof Deep Learning. K2
2 TounderstandandapplytheMachinelearningprinciples K2
3 Tostudythe deeplearningarchitectures K2
4 Exploreandcreatedeeplearningapplicationswith tensorflow K3
K1–Remember K2 –Understand K3 –applyK4-AnalyzeK5–evaluateK6-Create
Page 44 of
89
B. Sc. Computer Science with Data Analytics2020-21 onwards - Affiliated Colleges - Annexure No.27A10
SCAA DATED: 23.09.2020
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 M L - - - - - - - -
CO2 M L - - - - - - - -
CO3 S M M - - - - - - -
CO4 S S S - - - - - - -
*S-Strong;M-Medium;L-Low
Page 45 of
89
B. Sc. Computer Science with Data Analytics2020-21 onwards - Affiliated Colleges - Annexure No.27A10
SCAA DATED: 23.09.2020
CourseCode CapstoneProjectWorkPhaseI L T P C
Core/elective/Supportiv SkillBasedSubject2 0 0 4 3
e
Pre- requisite Students should have a Syllabus I
goodunderstandingofsoftwareengineeri version
ng
Studentshouldpossessstronganalyticalsk
ills
CourseObjectives
Themain objectives ofthis courseareto:
Tounderstandand selectthetask basedontheircoreskills.
Togettheknowledge aboutanalyticalskillforsolvingtheselected task.
Togetconfidencefor implementingthetaskandsolvingthe realtimeproblems.
ExpectedCourseOutcomes
Onthesuccessful completionofthecourse,student willbe ableto:
1 Illustrate arealworld problemand identifythelistofprojectrequirements K3
2 Compareexistingsystemwiththeproposedsystemandextracttheinnovative ideas K4
3 Judgethefeaturesoftheprojectincludingforms, databasesandreports K5
K1–Remember K2 –Understand K3 –applyK4-AnalyzeK5–evaluateK6-Create
Aimoftheproject work
ProjectWork Format
PROJECTWORK
TITLEOFTHEDISSERTATION
Page 46 of
89
B. Sc. Computer Science with Data Analytics2020-21 onwards - Affiliated Colleges - Annexure No.27A10
SCAA DATED: 23.09.2020
REG.NO.
46.College Logo
InternalExaminer External
ExaminerMonth– Year
CONTENTS
Acknowledgement
Contents
Synopsis
1. Introduction
1.1 OrganizationProfile
1.2 SystemSpecification
1.2.1 HardwareConfiguration
1.2.2 SoftwareSpecification
2. SystemStudy
2.1 ExistingSystem
2.1.1 Drawbacks
2.2 ProposedSystem
2.2.1 Features
3. SystemDesign
3.1 FormDesign
3.2 InputDesign
3.3 OutputDesign
3.4 DatabaseDesign
ConclusionB
ibliographyA
ppendices
A. DataFlow Diagram
B. TableStructure
Page 47 of
89
B. Sc. Computer Science with Data Analytics2020-21 onwards - Affiliated Colleges - Annexure No.27A10
SCAA DATED: 23.09.2020
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 S S S M L L L L L L
CO2 S S S M L L L L L L
CO3 S S S M M L L L L L
*S-Strong;M-Medium;L-Low
Page 48 of
89
B. Sc. Computer Science with Data Analytics2020-21 onwards - Affiliated Colleges - Annexure No.27A10
SCAA DATED: 23.09.2020
Fifth Semester
Page 49 of
89
B. Sc. Computer Science with Data Analytics2020-21 onwards - Affiliated Colleges - Annexure No.27A10
SCAA DATED: 23.09.2020
CourseCode RProgramming L T P C
Core/elective/Supportive Core:8 6 0 0 4
Pre- requisite None Syllabus I
version
CourseObjectives
Toexposethestudent sotthefundamentalconcepts ofRProgramming
ExpectedCourseOutcomes
1 UnderstandthebasicsinRprogrammingintermsofconstructs,controlstatements, K2
stringfunctions
2 UnderstandtheuseofRforBigDataanalytics K2
3 ApplyR programmingfor Text processing K3
4 Appreciateandapplythe Rprogrammingfromastatistical perspective K3
K1–Remember K2 –Understand K3 –applyK4-AnalyzeK5–evaluateK6-Create
UNITI IntroductiontoR 18
Introducing to R – R Data Structures – Help Functions in R – Vectors – Scalars – Declarations –
Recycling–CommonVector Operations–Using allandany–Vectorizedoperations – NAand
NULLvalues–Filtering–Victoriesedif-thenelse– VectorElementnames.
UNITII Matricesandoperations 18
Creating matrices – Matrix Operations – Applying Functions to Matrix Rows and Columns –
Addinganddeletingrowsandcolumns-Vector/MatrixDistinction – AvoidingDimensionReduction –
Higher
Dimensional arrays – lists – Creating lists – General list operations – Accessing list components
andvalues– applyingfunctions to lists– recursive lists.
UNITIII DataFrames 18
Creating Data Frames – Matrix-like operations in frames – merging Data frames – Applying
functionsto Data Frames – Factors and Tables – Factors and levels – Common Functions used with
factors –Working with tables – Other factors and table related functions – Control statements –
Arithmetic andBoolean operators and values – Default Values for arguments – Returning Boolean
Values – Functionsareobjects–Environment andscopeissues – WritingUpstairs–Recursion–
Replacement functions–
ToolsforComposingfunction code– Math and Simulation inR.
UNITIV ClassesandObjects 18
S3 Classes – S4 Classes – Managing your objects – Input/output – accessing keyboard and monitor –
readingandwritingfiles–accessingtheinternet–StringManipulation –Graphics –CreatingGraphs
–CustomizingGraphs –SavingGraphstofiles –CreatingThree-Dimensionalplots.
UNITV ModellinginR 18
InterfacingRtootherlanguages –ParallelR– BasicStatistics–LinearModel–Generalized Linear
models–Non-linearModels –TimeSeriesandAuto-Correlation–Clustering.
TotalLectureHours 90
Hours
Page 50 of
89
B. Sc. Computer Science with Data Analytics2020-21 onwards - Affiliated Colleges - Annexure No.27A10
SCAA DATED: 23.09.2020
TextBook(s)
1 NormanMatloff, “TheArtofRProgramming:ATourofStatisticalSoftwareDesign”,No
StarchPress,2011.
2 JaredP. Lander,“RforEveryone:AdvancedAnalyticsand Graphics”,Addison-WesleyData
&AnalyticsSeries,2013.
ReferenceBook(s)
1 MarkGardner,“BeginningR –TheStatisticalProgrammingLanguage”, Wiley,2013.
2 RobertKnell,“IntroductoryR:ABeginner‟sGuidetoDataVisualisation,StatisticalAnalysisandprog
ramminginR”,AmazonDigitalSouthAsiaServicesInc,2013.Richard
Cotton(2013).LearningR,O‟ReillyMedia.
3 GarretGrolemund(2014).Hands-onProgrammingwithR.O‟ReillyMedia,Inc.
4 RogerD.Peng(2018).R ProgrammingforDataScience. LeanPublishing.
RelatedOnlineContents(MOOC,SWAYAM,NPTEL,Websitesetc)
1 https://onlinecourses.swayam2.ac.in/aic20_sp06/preview
2 https://onlinecourses.swayam2.ac.in/arp19_ap79/preview
CourseDesignedby :
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 M L L L L L L L L L
CO2 M L L L L L L L L L
CO3 S M L L L L L L L L
CO4 S S M L L L L L L L
*S-Strong;M-Medium;L-Low
Page 51 of
89
B. Sc. Computer Science with Data Analytics2020-21 onwards - Affiliated Colleges - Annexure No.27A10
SCAA DATED: 23.09.2020
CourseCode RProgrammingLab L T P C
Core/elective/Supportive CoreLab:6 0 0 6 4
Pre- requisite None Syllabus I
version
CourseObjectives
Toexposethestudent sotthefundamentalconcepts ofRProgramming
ExpectedCourseOutcomes
1 Understandthebasicsin Rprogrammingin termsofconstructs, controlstatements, K2
stringfunctions
2 UnderstandtheuseofRforBigDataanalytics K2
3 ApplyR programmingfor Text processing K3
4 Appreciateandapplythe Rprogrammingfromastatistical perspective K3
K1–RememberK2 –Understand K3–applyK4-AnalyzeK5–evaluateK6-Create
ListofPrograms
1. RExpressionsandDataStructures
2. Manipulationofvectorsandmatrix
3. OperatorsonFactorsinR
4. DataFramesinR
5. ListsandOperators
6. Workingwith loopingstatements.
7. GraphsinR
8. 3D plotsin R
TotalLectureHours 90
Hours
TextBook(s)
1 NormanMatloff,“TheArtofRProgramming:A TourofStatisticalSoftwareDesign”,No
StarchPress,2011.
2 JaredP. Lander,“RforEveryone:AdvancedAnalyticsand Graphics”,Addison-WesleyData
&AnalyticsSeries,2013.
ReferenceBook(s)
1 MarkGardner,“BeginningR –TheStatisticalProgrammingLanguage”, Wiley,2013.
2 RobertKnell,“IntroductoryR:ABeginner‟sGuidetoDataVisualisation,StatisticalAnalysisandprog
ramminginR”,Amazon DigitalSouth AsiaServicesInc,2013. Richard
Cotton(2013).LearningR,O‟ReillyMedia.
3 GarretGrolemund(2014).Hands-onProgrammingwithR.O‟ReillyMedia,Inc.
4 RogerD.Peng(2018).R ProgrammingforDataScience. LeanPublishing.
RelatedOnlineContents(MOOC,SWAYAM,NPTEL,Websitesetc)
1 https://onlinecourses.swayam2.ac.in/aic20_sp06/preview
2 https://onlinecourses.swayam2.ac.in/arp19_ap79/preview
CourseDesignedby :
Page 52 of
89
B. Sc. Computer Science with Data Analytics2020-21 onwards - Affiliated Colleges - Annexure No.27A10
SCAA DATED: 23.09.2020
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 M L L L L L L L L L
CO2 M L L L L L L L L L
CO3 S M L L L L L L L L
CO4 S S M L L L L L L L
*S-Strong;M-Medium;L-Low
Page 53 of
89
B. Sc. Computer Science with Data Analytics2020-21 onwards - Affiliated Colleges - Annexure No.27A10
SCAA DATED: 23.09.2020
CourseCode BigDataAnalytics L T P C
Core/elective/Supportive Core:9 6 0 0 4
Pre- requisite None Syllabus I
version
CourseObjectives
TointroducetheconceptofBigdata analytics
ExpectedCourseOutcomes
1 Understandthekeyissuesinbigdatamanagementanditsassociatedapplicationsin K2
intelligentbusinessandscientificcomputing.
2 UnderstandtheconceptsofHadoopDistributedfilesystemandhadoopfilesystem K2
interfaces.
3 Illustratetheconceptsof PIG andHIVE K2
4 Identifythecharacteristicsofdatasetsandcomparethetrivialdataandbigdatafor K3
variousapplications.
K1–Remember K2 –Understand K3–applyK4-AnalyzeK5–evaluateK6-Create
UNITI IntroductiontoData 17
Types of Digital Data, Introduction to Big Data, Big Data Analytics, History of Hadoop,
ApacheHadoop,AnalysingDatawithUnix tools,AnalysingDatawithHadoop,HadoopStreaming,
HadoopEchoSystem,IBMBigDataStrategy,Introductionto InfosphereBigInsightsandBigSheets.
UNITII IntroductiontoHDFS 19
HDFS(Hadoop Distributed File System) The Design of HDFS, HDFS Concepts, Command
LineInterface,Hadoopfilesysteminterfaces,Dataflow,DataIngestwithFlumeandScoopandHadooparc
hives,HadoopI/O:Compression, Serialization,AvroandFile-BasedDatastructures.
UNITIV HadoopEcoSystemPig 18
Hadoop Eco System Pig : Introduction to PIG, Execution Modes of Pig, Comparison of Pig
withDatabases, Grunt, Pig Latin, User Defined Functions, Data Processing operators. Hive : Hive
Shell,Hive Services, Hive Metastore, Comparison with Traditional Databases, HiveQL, Tables,
QueryingData and User Defined Functions. Hbase :HBasics, Concepts, Clients, Example, Hbase
VersusRDBMS.BigSQL:Introduction
Page 54 of
89
B. Sc. Computer Science with Data Analytics2020-21 onwards - Affiliated Colleges - Annexure No.27A10
SCAA DATED: 23.09.2020
Hours
TextBook(s)
1 TomWhite“Hadoop:TheDefinitiveGuide”ThirdEditon,O‟reilyMedia,2012.
2 SeemaAcharya,SubhasiniChellappan,"BigData Analytics"Wiley2015.References.
3 MichaelBerthold,DavidJ.Hand,"IntelligentDataAnalysis”,Springer,2007.
4 JayLiebowitz,“BigData andBusinessAnalytics”AuerbachPublications,CRCpress(2013)
5 TomPlunkett,MarkHornick,“UsingRtoUnlocktheValueofBigData:BigDataAnalytics
with Oracle R Enterprise and Oracle R Connector for Hadoop”, McGraw-Hill/Osborne
Media(2013),Oracle press.
6 AnandRajaramanandJefreyDavidUlman, “MiningofMassiveDatasets”,Cambridge
UniversityPress, 2012.
ReferenceBook(s)
1 BillFranks,“TamingtheBigDataTidalWave:FindingOpportunitiesinHugeDataStreams
withAdvancedAnalytics”,JohnWiley&sons,2012.
2 GlenJ.Myat, “MakingSense ofData”, JohnWiley& Sons,2007
3 PeteWarden,“BigDataGlossary”,O‟Reily,2011.
4 MichaelMineli,MicheleChambers,AmbigaDhiraj,"BigData,BigAnalytics:Emerging
Business IntelligenceandAnalyticTrendsforToday's Businesses",WileyPublications,2013.
5 ArvindSathi,“BigDataAnalytics:DisruptiveTechnologiesforChangingtheGame”,MC
Press,2012
6 PaulZikopoulos,DirkDeRoos,KrishnanParasuraman,ThomasDeutsch,JamesGiles,DavidCoriga
n,"HarnessthePowerofBigDataTheIBMBigDataPlatform",TataMcGraw
Hill Publications,2012
RelatedOnlineContents(MOOC,SWAYAM,NPTEL,Websitesetc)
1 https://onlinecourses.swayam2.ac.in/aic20_sp06/preview
2 https://onlinecourses.swayam2.ac.in/arp19_ap79/preview
CourseDesignedby :
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 L L L L L L L L L L
CO2 M L L L L L L L L L
CO3 S M L L L L L L L L
CO4 S M L L L L L L L L
CO5 S M L L L L L L L L
*S-Strong;M-Medium;L-Low
Page 55 of
89
B. Sc. Computer Science with Data Analytics2020-21 onwards - Affiliated Colleges - Annexure No.27A10
SCAA DATED: 23.09.2020
CourseCode CapstoneProjectWorkPhaseII L T P C
Core/elective/Supportive SkillBasedSubject3 0 0 6 3
Aimoftheprojectwork
1. Theaimof theprojectworkis toacquirepracticalknowledgeonthe
implementationoftheprogrammingconcepts studied.
2. Each student should carry out individually one project work and it may be a work using
thesoftware packages that they have learned or the implementation of concepts from the papers
studiedorimplementation of anyinnovative ideafocusing on application oriented concepts.
3. Theprojectwork should be compulsorilydonein thecollegeonlyunderthe supervision of
thedepartmentstaff concerned.
VivaVoce
1. Viva-Voce will be conducted at the end of the year by both Internal (Respective Guides)
andExternalExaminers,afterdulyverifyingtheAnnexureReport availableinthe College,foratotal of75
marks at the lastdayof thepractical session.
2. Outof75marks, 45 marksforproject reportand 30 MarksforVivaVoce.
Page 56 of
89
B. Sc. Computer Science with Data Analytics2020-21 onwards - Affiliated Colleges - Annexure No.27A10
SCAA DATED: 23.09.2020
ProjectWork Format
PROJECTWORK
TITLEOFTHEDISSERTATION
Bonafide Work Done
bySTUDENT
NAMEREG.NO.
Dissertationsubmitted inpartialfulfillment oftherequirementsfor theaward of
<NameoftheDegree>
ofBharathiar University,Coimbatore-46.
CollegeLogo
CONTENTS
Acknowledgement
Contents
Synopsis
1. Introduction
1.1 OrganizationProfile
1.2 SystemSpecification
1.2.1 HardwareConfiguration
1.2.2 SoftwareSpecification
2. SystemStudy
2.1 ExistingSystem
2.1.1 Drawbacks
2.2 ProposedSystem
2.2.1 Features
3. SystemDesign andDevelopment
3.1 FileDesign
3.2 InputDesign
3.3 OutputDesign
3.4 DatabaseDesign
3.5 SystemDevelopment
3.5.1 DescriptionofModules(Detailedexplanation abouttheprojectwork)
4SoftwareTestingandImplementationC
onclusion
Bibliography
Appendices
A. DataFlow Diagram
B. TableStructure
Page 57 of
89
B. Sc. Computer Science with Data Analytics2020-21 onwards - Affiliated Colleges - Annexure No.27A10
SCAA DATED: 23.09.2020
C. SampleCoding
D. Sample Input
E. SampleOutput
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 S S S S S L L L L L
CO2 S S S S S M M L L L
CO3 S S S S S M M L L L
*S-Strong;M-Medium;L-Low
Page 58 of
89
B. Sc. Computer Science with Data Analytics2020-21 onwards - Affiliated Colleges - Annexure No.27A10
SCAA DATED: 23.09.2020
CourseCode BusinessDataAnalytics L T P C
Core/elective/Supportive Elective:I 6 0 0 4
Pre- requisite None Syllabus I
version
CourseObjectives
Tointroducethefundamentalconcepts ofBusinessdataanalytics and associatedmethodologies
ExpectedCourseOutcomes
1 Understandandcriticallyapplytheconceptsand methods ofbusiness analytics K2
2 Demonstrationthevariousmethodologiesofdescriptivestatistics K2
3 Understandingof modelinguncertaintyand statisticalinference K2
4 Understandingofanalyticalframeworks K2
K1–Remember K2 –Understand K3–applyK4-AnalyzeK5–evaluateK6-Create
Page 59 of
89
B. Sc. Computer Science with Data Analytics2020-21 onwards - Affiliated Colleges - Annexure No.27A10
SCAA DATED: 23.09.2020
2 UmeshRHodeghatta,UmeshaNayak,“BusinessAnalyticsUsingR–APracticalApproach”,
Apress,2017.
ReferenceBook(s)
1 AnandRajaraman,JeffreyDavidUllman,“MiningofMassiveDatasets”, Cambridge
UniversityPress, 2012.
2 JeffreyD. Camm,James J.Cochran, MichaelJ. Fry,JeffreyW.Ohlmann, DavidR. Anderson,
“EssentialsofBusiness Analytics”,CengageLearning,secondEdition,2016
3 U.DineshKumar, “BusinessAnalytics:TheScienceofData-DrivenDecisionMaking”,
Wiley,2017.
4 A.Ohri,“RforBusiness Analytics”,Springer,20127.RuiMiguelForte,“Mastering
PredictiveAnalyticswithR”,PacktPublication,2015.
RelatedOnlineContents(MOOC,SWAYAM,NPTEL,Websitesetc)
1 https://onlinecourses.swayam2.ac.in/aic20_sp06/preview
2 https://onlinecourses.swayam2.ac.in/arp19_ap79/preview
CourseDesigned by :
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 L L L L L L L L L L
CO2 M M L L L L L L L L
CO3 S M M L L L L L L L
CO4 S S S L L L L L L L
*S-Strong;M-Medium;L-Low
Page 60 of
89
B. Sc. Computer Science with Data Analytics2020-21 onwards - Affiliated Colleges - Annexure No.27A10
SCAA DATED: 23.09.2020
CourseCode SocialNetworkAnalysis L T P C
Core/elective/Supportive Elective:I 6 0 0 4
Pre- requisite None Syllabus I
version
CourseObjectives
Toexplainthemethodologiesusedinsocialnetworkanalysis
ExpectedCourseOutcomes
1 Understandabroad rangeof network conceptsand theories. K2
2 Appreciatehow network analysiscan contribute toincreasingknowledgeaboutdiverse K2
aspectsofsociety.
3 Usearelationalapproachtoanswerquestionsofinteresttothem(i.e.beabletoapply K3
'networkthinking').
4 Analysesocial network datausingvarious softwarepackages. K3
5 Presentresultsfromsocialnetworkanalysis,bothorallyandinwriting. K5
K1–Remember K2 –Understand K3–applyK4-AnalyzeK5–evaluateK6-Create
UNITI CLUSTERINGANDCLASSIFICATION 17
Supervised Learning–Decisiontree- Naïve BayesianTextClassification-SupportVectorMachines
- Ensemble of Classifiers – Unsupervised Learning – K-means Clustering – Hierarchical Clustering –
PartiallySupervisedLearning–Markov Models –Probability-BasedClustering–VectorSpaceModel
UNITII SOCIALMEDIAMINING 17
Data Mining Essentials –Data Mining Algorithms - Web Content Mining –Latent semantic Indexing –
AutomaticTopicExtraction–OpinionMiningandSentimentAnalysis–DocumentSentimentClassification
Page 61 of
89
B. Sc. Computer Science with Data Analytics2020-21 onwards - Affiliated Colleges - Annexure No.27A10
SCAA DATED: 23.09.2020
UNITV VISUALIZATIONANDAPPLICATIONSOFSOCIALNETWORKS 19
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 L L L L L L L L L L
CO2 M L L L L L L L L L
CO3 S M L L L L L L L L
CO4 S M M L L L L L L L
CO5 S S S L L L L L L L
*S-Strong;M-Medium;L-Low
Page 62 of
89
B. Sc. Computer Science with Data Analytics2020-21 onwards - Affiliated Colleges - Annexure No.27A10
SCAA DATED: 23.09.2020
CourseCode ArtificialNeuralNetworkandFuzzyS L T P C
ystems
Core/elective/Supportive Elective:I 6 0 0 4
Pre- requisite None Syllabus I
version
CourseObjectives
Tointroducetheconcepts ofartificial neuralnetworks andfuzzysystems
To explain thebasic mathematical elements ofthetheoryof fuzzysets.
ExpectedCourseOutcomes
1 Explaintheconceptsof neuralnetworksand ,fuzzylogic K2
2 Understandingof the basic mathematicalelements ofthe theoryoffuzzysets. K2
3 Understandingthe differencesandsimilaritiesbetween fuzzysetsand classicalsets K2
theories
4 Solveproblems that areappropriatelysolved byneural networksand fuzzylogic K3
K1–Remember K2 –Understand K3–applyK4-AnalyzeK5–evaluateK6-Create
UNITI BasicConcepts 17
Basicconcepts-singlelayerperceptron-Multilayerperceptron-Adaline-Madaline-Learningrules-
Supervisedlearning-Backpropagationnetworks-Trainingalgorithm,Advancedalgorithms-
Adaptivenetwork-Radial basis network modular network-Applications
UNITII UnsupervisedLearning 19
Introduction-unsupervisedlearning–Competitivelearningnetworks-Kohonenselfuantizatinetworks-
Learning vectoruantization – Hebbian learning – Hopfield network-Content
addressablenature,BinaryHopfieldnetwork,ContinuousHopfieldnetworkTravellingSalespersonproblem
–
Adaptiveresonancetheory–BidirectionalAssociativeMemory-PrinciplecomponentAnalysis
UNITIII FuzzyLogic 18
Introduction–crispsetsanoverview–thenotionoffuzzysets–Basicconceptsoffuzzysets–
classicallogicanoverview–Fuzzylogic.Operationsonfuzzysets-fuzzycomplement–fuzzyunion
–fuzzyintersection –combinationsofoperations–generalaggregationoperations
UNITIV FuzzyLogicContd.. 17
Crispandfuzzyrelations –binaryrelations–binaryrelationsonasingleset–
equivalenceandsimilarityrelations–Compatibilityortolerancerelations–orderings–Membershipfunctions–
methodsofgeneration–defuzzificationmethods
UNITV NeuroFuzzySystems 19
Adaptive Neuro Fuzzy based inference systems – classification and regression trees: decision
tress,Cart algorithm – Data clustering algorithms: K means clustering, Fuzzy C means clustering,
Mountainclustering, Subtractive clustering – rule base structure identification – Neuro fuzzy control:
FeedbackControlSystems,ExpertControl,InverseLearning,SpecializedLearning,Backpropagationthroug
h
Real–TimeRecurrentLearning.
TotalLectureHours 90
Hours
Page 63 of
89
B. Sc. Computer Science with Data Analytics2020-21 onwards - Affiliated Colleges - Annexure No.27A10
SCAA DATED: 23.09.2020
TextBook(s)
1 “NeuroFuzzyandSoftcomputing”,JangJ.S.R.,SunC.TandMizutaniE–Pearson education,
2004
2 ”FundamentalsofNeuralNetworks”, LaureneFauseett,PrenticeHall India,NewDelhi,1994.
ReferenceBook(s)
1 ”FuzzyLogicEngineeringApplications”,TimothyJ.Ross,McGrawHill,NewYork,1997.
2 “Neuralnetworks, Fuzzylogics,and Geneticalgorithms”,S.Rajasekaranand
G.A.VijayalakshmiPaiPrenticeHallofIndia,2003
3 ”FuzzySetsandFuzzyLogic”,GeorgeJ.KlirandBoYuan,PrenticeHall Inc.,New
Jersey,1995
4 “PrinciplesofSoftComputing”S.N.Sivanandam, S.N.DeepaWileyIndiaPvt Ltd.
RelatedOnlineContents(MOOC,SWAYAM,NPTEL,Websitesetc)
1 https://onlinecourses.swayam2.ac.in/aic20_sp06/preview
2 https://onlinecourses.swayam2.ac.in/arp19_ap79/preview
CourseDesignedby :
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 L L L L L L L L L L
CO2 M L L L L L L L L L
CO3 S M L L L L L L L L
CO4 S M L L L L L L L L
*S-Strong;M-Medium;L-Low
Page 64 of
89
B. Sc. Computer Science with Data Analytics2020-21 onwards - Affiliated Colleges - Annexure No.27A10
SCAA DATED: 23.09.2020
SixthSemester
Page 65 of
89
B. Sc. Computer Science with Data Analytics2020-21 onwards - Affiliated Colleges - Annexure No.27A10
SCAA DATED: 23.09.2020
CourseCode LinuxandShellProgramming L T P C
Core/elective/Supportive Core:10 6 0 0 4
Pre- requisite BasicknowledgeaboutOperatingSystems Syllabus I
version
CourseObjectives
TointroducetheconceptsofLinuxoperatingsystem
ToexplainthevariousconstructsassociatedwithLinux
ExpectedCourseOutcomes
1 IllustratethevariousdirectoryandfiecommandsinLINUX K2
2 ExplainthemethodsofsecuringfilesinLinux K2
3 ExplainthevariouskernelcomponentsofLinux K2
4 Applythevariouscommandsof Linuxtoperformseveraloperations K3
5 SolvevariousnetworkadministrativeissuesbywritingLinuxshellscripts K3
K1–Remember K2 –Understand K3–applyK4-AnalyzeK5–evaluateK6-Create
UNITI IntroductiontoLinux 15
IntroductiontoLINUXOperatingSystem:Introduction-TheLINUXOperatingSystem-Basic
commandsin Linux
UNITII ManagingFiles&Directories 18
ManagingFilesandDirectories:Introduction–Directory CommandsinLINUX–
FileCommandsinLINUX.Creatingfilesusingthevieditor:Texteditors–
Thevieditor.ManagingDocuments:
Locatingfilesin LINUX–Standardfiles–Redirection–Filters–Pipes.
UNITIII Shellscript 20
SecuringfilesinLINUX:Fileaccesspermissions–viewingFileaccesspermissions–
ChangingFileaccesspermissions.AutomatingTasksusingShellScripts:Introduction–Variables-Localand
GlobalShellvariables–CommandSubstitution.
UNITIV Conditional&LoopingStatements 19
Using Conditional Execution in Shell Scripts: Conditional Execution – The case…esac
Construct.Managing repetitive tasks using Shell Scripts: Using Iteration in Shell Scripts – The while
construct –untilconstruct–forconstruct–breakandcontinuecommands–SimpleProgramsusingShell
Scripts.
UNITV Kernel&SystemRecovery 18
LinuxKernel-KernelComponents-compilingakernel-Customizingakernel–systemstartup-
Customizingthebootprocess-SystemRecovery
TotalLectureHours 90
Hours
TextBook(s)
1 OperatingSystemLINUX,NIIT,PHI,2006,EasternEconomyEdition.
ReferenceBook(S)
1 RichardPetersen,Linux:TheComplete Reference,SixthEdition,TataMcGraw-Hill
PublishingCompanyLimited, NewDelhi, Edition2008.
RelatedOnlineContents(MOOC,SWAYAM,NPTEL,Websitesetc)
Page 66 of
89
B. Sc. Computer Science with Data Analytics2020-21 onwards - Affiliated Colleges - Annexure No.27A10
SCAA DATED: 23.09.2020
1 https://onlinecourses.swayam2.ac.in/aic20_sp06/preview
2 https://onlinecourses.swayam2.ac.in/arp19_ap79/preview
CourseDesignedby :
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 L L L L L L L L L L
CO2 M L L L L L L L L L
CO3 S M L L L L L L L L
CO4 S S M L L L L L L L
CO5 S S S L L L L L L L
*S-Strong;M-Medium;L-Low
Page 67 of
89
B. Sc. Computer Science with Data Analytics2020-21 onwards - Affiliated Colleges - Annexure No.27A10
SCAA DATED: 23.09.2020
CourseCode LinuxandShellProgrammingLab L T P C
Core/elective/Supportive CoreLab:7 0 0 5 4
Pre- requisite Basicknowledge Linux commands Syllabus I
version
CourseObjectives
Tointroduceheconceptsof Linux operatingsystemcommandsexecutionandvariousprogramming
constructionin Linux shellscript.
ExpectedCourseOutcomes
1 Tocreatethedirectory,howtochange andremovethedirectory. K1
2 ToevaluatetheconceptofshellscriptingprogramsbyusinganAWKandSED K2
commands
3 TodemonstratethebasicknowledgeofLinuxcommandsandfilehandlingutilitiesby K3
usingLinuxshellenvironment.
K1–Remember K2 –Understand K3–applyK4-AnalyzeK5–evaluateK6-Create
EXERCISE1 6
WriteaShell scriptthat displayslist ofall thefiles inthecurrentdirectorytowhich theuserhasread,
writeand executepermissions.
EXERCISE2 6
Writeanawk scriptto findthe numberofcharacters,words andlines inafile?
EXERCISE3 9
WriteaShellscriptthataccepts a filename,startingandendinglinenumbersasargumentsand
displaysallthelinesbetween the givenlinenumbers?
EXERCISE4 9
Writeashellscript to sortnumber inascendingorder.
EXERCISE5 12
Writeashellscript(smallcalculator)thatadds, subtracts,multipliesanddividesthetwogiven
numbers.
EXERCISE6 9
Writeashellscript to determinewhether a givennumberisa primenumberor not.
EXERCISE7 12
Writeashell scriptto printthe firstn Fibonaccinumbers.
EXERCISE8 9
Writeashellscript tofind theGCD oftwogivennumbers.
EXERCISE9 9
Writeashellscript tocheck whether given stringis palindromeor not.
EXERCISE
9
10
Writeashell scriptto findthefactorialofgiveninteger.
TotalLectureHours 90
Hours
TextBook(s)
Page 68 of
89
B. Sc. Computer Science with Data Analytics2020-21 onwards - Affiliated Colleges - Annexure No.27A10
SCAA DATED: 23.09.2020
1 OperatingSystemLINUX,NIIT,PHI,2006,EasternEconomyEdition.
ReferenceBook(S)
1 RichardPetersen,Linux:TheCompleteReference,SixthEdition,TataMcGraw-Hill
PublishingCompanyLimited, NewDelhi, Edition2008.
CourseDesignedby :
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 S M L L L L L L L L
CO2 S S M L L L L L L L
CO3 S S S L L L L L L L
*S-Strong;M-Medium;L-Low
Page 69 of
89
B. Sc. Computer Science with Data Analytics2020-21 onwards - Affiliated Colleges - Annexure No.27A10
SCAA DATED: 23.09.2020
CourseCode ProjectWorkLab L T P C
Core/elective/Supportive Core-11 0 0 3 6
theproject
5 Generatealternativesolutions,comparethemandselecttheoptimumone K6
K1–Remember K2 –Understand K3–applyK4-AnalyzeK5–evaluateK6-Create
Aimoftheprojectwork
1. The aim of the project work is to acquire practical knowledge on the implementation of
theprogrammingconcepts studied.
2. Each student should carry out individually one project work and it may be a work using
thesoftware packages that they have learned or the implementation of concepts from the papers
studiedorimplementation of anyinnovative ideafocusingon application oriented concepts.
3. Theprojectwork should be compulsorilydonein thecollegeonlyunderthe supervision of
thedepartmentstaff concerned.
VivaVoce
1. Viva-Voce will be conducted at the end of the year by both Internal (Respective Guides)
andExternalExaminers,afterdulyverifyingtheAnnexureReport availableinthe College,foratotal
of200marks at the last dayofthe practical session.
2. Outof200 marks,160marksforproject reportand 40marksfor VivaVoce.
Page 70 of
89
B. Sc. Computer Science with Data Analytics2020-21 onwards - Affiliated Colleges - Annexure No.27A10
SCAA DATED: 23.09.2020
ProjectWork Format
PROJECTWORK
TITLEOFTHEDISSERTATION
bySTUDENT
NAMEREG.NO.
<NameoftheDegree>
ofBharathiar University,Coimbatore-46.
CollegeLogo
HODSubmittedfortheViva-VoceExaminationheldon
InternalExaminer External
ExaminerMonth– Year
CONTENTS
Acknowledgement
Page 71 of
89
B. Sc. Computer Science with Data Analytics2020-21 onwards - Affiliated Colleges - Annexure No.27A10
SCAA DATED: 23.09.2020
Contents
Synopsis
1. Introduction
1.1 OrganizationProfile
1.2 SystemSpecification
1.2.1 HardwareConfiguration
1.2.2 SoftwareSpecification
2. SystemStudy
2.1 ExistingSystem
2.1.1 Drawbacks
2.2 ProposedSystem
2.2.1 Features
3. SystemDesign andDevelopment
3.1 FileDesign
3.2 InputDesign
3.3 OutputDesign
3.4 DatabaseDesign
3.5 SystemDevelopment
4. TestingandImplementation
5. ConclusionBibliographyAppendices
Page 72 of
89
B. Sc. Computer Science with Data Analytics2020-21 onwards - Affiliated Colleges - Annexure No.27A10
SCAA DATED: 23.09.2020
A. DataFlow Diagram
B. TableStructure
C. SampleCoding
D. Sample Input
E. SampleOutput
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 S S S S M L L L L L
CO2 S S S S M L L L L L
CO3 S S S S M M M L L L
CO4 S S S S M M M L L L
CO5 S S S S M M M L L L
*S-Strong;M-Medium;L-Low
Page 73 of
89
B. Sc. Computer Science with Data Analytics2020-21 onwards - Affiliated Colleges - Annexure No.27A10
SCAA DATED: 23.09.2020
CourseCode MachineLearning L T P C
Core/elective/Supportive Skillbasedsubject:4 4 0 0 3
UNITI IntroductiontoLearning 12
Algorithmicmodelsoflearning,Learningclassifiers,functions,relations,grammars,probabilisticmodels,val
uefunctions,behaviorsandprogramsforexperience.Bayesian,maximumsomeposterior,
andminimumdescriptionlengthframeworks.
UNITII LearningModels 12
Parameter Estimation, sufficient statistics, decision trees, neural networks, support vector
machines,Bayesian networks, bag of words classifiers, N-gram models; Markov and Hidden Markov
models,probabilisticrelationalmodels,associationrules,nearestneighborclassifiers,locallyweightedregres
sion,ensembleclassifiers.
UNITIII ComputationalLearning 12
Computational Learning theory, mistake bound analysis, sample complexity analysis, VC
dimension,Occam learning, accuracy and confidence boosting, Dimensionality reduction: Principal
componentAnalysis,featureselection and visualization.
UNITIV UnsupervisedLearning 12
UnsupervisedLearning:Clustering,mixturemodels,k-
meansclustering,hierarchicalclustering,distributional clustering, Reinforcement learning; Learning
from heterogeneous, distributed, data andknowledge.
Page 74 of
89
B. Sc. Computer Science with Data Analytics2020-21 onwards - Affiliated Colleges - Annexure No.27A10
SCAA DATED: 23.09.2020
UNITV LearningApplications 12
Selectedapplicationsindatamining,automatedknowledgeacquisition,patternrecognition,programsynthesis
,textandlanguageprocessing,internet-basedinformationsystems,humancomputer
interaction,semanticweb,andbioinformaticsand computationalbiology.
TotalLectureHours 60
Hours
TextBook(s)
1 Bishop,C.(2006).PatternRecognitionandMachineLearning. Berlin:Springer-Verlag.
ReferenceBook(s)
1 Russel,S.AndNorving,P.(2003).ArtificialIntelligence:AModern Approach.2ndEdition,
NewYork:Prentice-Hall.
2 Baldi,P.,Frasconi,P.,Smyth,P.(2002).Bioinformatics:AMachineLearningApproach.
Cambridge,MA:MITPress.
3 Baldi,P.,Frasconi,P.,Smyth,P.(2003).Modelingthe InternetandtheWeb–Probabilistic
MethodsandAlgorithms.NewYork:Wiley.
4 Bishop,C.M.NeuralNetworksforpatternrecognition.NewYork: OxfordUniversitypress
(1995).
5 Hastie,T.,Tibshirani,R.,andFriedman,J.(2001).TheelementsofStatisticalLearning–Data
mining,Inference,andPrediction,Berlin:Springer-Verlag.
6 Cohen,P.R.(1995)EmpiricalMethodsinArtificial Intelligence.Cambridge,MA:MITPress.
7 Cowell,R.G.,Dawid,A.P., Lauritzen,S.L., andSpiegelhalter.D.J.(1999). GraphicalModels
andExpertSyatems. Berlin:Springer.
RelatedOnlineContents(MOOC,SWAYAM,NPTEL,Websitesetc)
1 https://onlinecourses.swayam2.ac.in/aic20_sp06/preview
2 https://onlinecourses.swayam2.ac.in/arp19_ap79/preview
CourseDesignedby :
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 M L L L L L L L L L
CO2 M L L L L L L L L L
CO3 S M L L L L L L L L
CO4 S S M L L L L L L L
*S-Strong;M-Medium;L-Low
Page 75 of
89
B. Sc. Computer Science with Data Analytics2020-21 onwards - Affiliated Colleges - Annexure No.27A10
SCAA DATED: 23.09.2020
CourseCode WebApplicationSecurity L T P C
Core/elective/Supportive Elective:II 5 0 0 4
Pre- requisite None Syllabus I
version
CourseObjectives
Tointroducetheconcepts of securityinwebapplications
Toexplainabout crimeprevention androutinedutiesinapolicestation
ExpectedCourseOutcomes
1 Illustrate abouttheconceptofHTML,DHTML,CSSandJavaScript K2
2 Explainthehistory,characteristics,technologies,concepts,usageinweb2.0andweb K2
3.0
3 Applythe core concepts ofwebapplicationstocreatewebpages K3
4 Applytheconcepts ofservers sideprogramming K3
K1–Remember K2 –Understand K3–applyK4-AnalyzeK5–evaluateK6-Create
UNITI Introductiontowebapplications 14
DatawithURL-HTML-DHTML:CascadingStyleSheets,CommonGatewayInterface:ProgrammingCG!
Scripts-HTMLForms-:-CustomDatabaseQueryScripts-ServerSideIncludes-
Server_securityissues.
UNITII IntroductiontoScriptingLanguages 14
XHTML:Introduction,CSS-Scriptinglanguages-JavaScript:Controlstatements,Functions,Arrays,
Objects-DOM- Aiaxenablerichinternetapplications.
UNITIII ServerSideProgramming 15
ServersideProgramming-Activeserverpages-Javaserverpages-JavaServlets:Servletcontainer-
Exceptions-SessionsandSessionTracking_-UsingServletcontext-DynamicContentGeneration-
ServletChainingand Communications.
UNITIV HTML5 &CSS3 15
HTML review,Featuredetection,TheHTML5newElements,Canvas,Videoandaudio,Webstorage, Geo
location, Offline Web pages , Micro data, HTML5 APLS, Migrating from HTML4 toHTML5,CSS3 .
UNITV Web2.0 17
WEB2.0-
HISTORY,characteristics,technologies,concepts,usage,web2.0ineducation,philanthropy,socialwork.W
eb3.0-Theory-
andhistoryunderstanding.basicwebartifactsandapplications,implementation.MSsharepoint-
Sharepoint2013overview,share(Putsocialtowork
,Share your stuff, Take share point on the go), Discover (find experts, discover answers, find what
youarelookingfor), Manage(cost, risk, time)
TotalLectureHours 75
Hours
TextBook(s)
1 Deitel,DeitelandNeita,-InternetandWorldWide_Web-Howtoprogramll,PearsonEducation Asia,
Page 76 of
89
B. Sc. Computer Science with Data Analytics2020-21 onwards - Affiliated Colleges - Annexure No.27A10
SCAA DATED: 23.09.2020
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 L L L L L L L L L L
CO2 M L L L L L L L L L
CO3 S M L L L L L L L L
CO4 S M L L L L L L L L
*S-Strong;M-Medium;L-Low
Page 77 of
89
B. Sc. Computer Science with Data Analytics2020-21 onwards - Affiliated Colleges - Annexure No.27A10
SCAA DATED: 23.09.2020
CourseCode SoftwareAgents L T P C
Core/elective/Supportive Elective:II 5 0 0 4
Pre- requisite None Syllabus I
version
CourseObjectives
Toexplainthefundamentalsofagentsandagentprogrammingparadigms.
Toexplainabout agentsandsecurity
ExpectedCourseOutcomes
1 Understandingthe fundamentalsof agents and agent programmingparadigms. K2
2 Discussingthe basics ofjavaagents. K2
3 Learningtheconceptsof multivalentsystems. K2
4 Understandingtheconceptsofintelligentsoftwareagents. K2
5 Understandingtheagentsandsecurity. K2
K1–Remember K2 –Understand K3–applyK4-AnalyzeK5–evaluateK6-Create
UNITI AGENTS–OVERVIEW 15
UNITIAgentDefinition–AgentProgrammingParadigms–AgentVsObject–Aglet–Mobile
Agents–AgentFrameworks–AgentReasoning
UNITII JAVAAGENTS 15
UNITIIProcesses–Threads–Daemons–Components–JavaBeans–ActiveX–Sockets–RPCs–
DistributedComputing–AgletsProgramming–JiniArchitecture–ActorsandAgents–Typedand
ProactiveMessages
UNITIII MULTIAGENTSYSTEMS 15
InteractionbetweenAgents–ReactiveAgents–CognitiveAgents–InteractionProtocols–
AgentCoordination–Agentnegotiation–AgentCooperation–AgentOrganization–Self-InterestedAgents
inElectronicCommerce Applications
UNITIV INTELLIGENTSOFTWAREAGENTS 15
InterfaceAgents–AgentCommunicationLanguages–AgentKnowledgeRepresentation–Agent
Adaptability–Belief DesireIntension–MobileAgentApplications
UNITV AGENTSANDSECURITY 15
AgentSecurityIssues–MobileAgentsSecurity–ProtectingAgentsagainstMaliciousHosts–
UntrustedAgent– BlackBoxSecurity–AuthenticationforAgents–SecurityIssues forAglets
TotalLectureHours 75
Hours
TextBook(s)
1 Bigus &Bigus,“ConstructingIntelligentagentswithJava”,Wiley,2010.
2 Bradshaw,“SoftwareAgents”,MITPress,2012.
ReferenceBook(s)
1 Russel&Norvig,“ArtificialIntelligenceamodernapproach”,PrenticeHall,1994.
2 RichardMurchandTonyJohnson,“IntelligentSoftwareAgents”,Prentice Hall,2000.
3 MichaelWooldridge, “An IntroductiontoMultiAgentSystems”,JohnWiley,2002.
Page 78 of
89
B. Sc. Computer Science with Data Analytics2020-21 onwards - Affiliated Colleges - Annexure No.27A10
SCAA DATED: 23.09.2020
RelatedOnlineContents(MOOC,SWAYAM,NPTEL,Websitesetc)
1 https://onlinecourses.swayam2.ac.in/aic20_sp06/preview
2 https://onlinecourses.swayam2.ac.in/arp19_ap79/preview
CourseDesignedby :
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 L L L L L L L L L L
CO2 M L L L L L L L L L
CO3 S M L L L L L L L L
CO4 S M L L L L L L L L
CO5 S M L L L L L L L L
*S-Strong;M-Medium;L-Low
Page 79 of
89
B. Sc. Computer Science with Data Analytics2020-21 onwards - Affiliated Colleges - Annexure No.27A10
SCAA DATED: 23.09.2020
CourseCode EmbeddedSystems L T P C
Core/elective/Supportive Elective:II 5 0 0 4
Pre- requisite None Syllabus I
version
CourseObjectives
Tointroducetheconceptsofembeddedsystemsanditsarchitecture
ExpectedCourseOutcomes
1 Understandhardwareandsoftwaredesignrequirementsofembeddedsystems. K2
2 Explainaboutthearchitectureofmicroprocessorandoperatingsystemsinembedded K2
systems
3 Analyzetheembeddedsystems‟specificationanddevelopsoftwareprograms. K4
4 EvaluatetherequirementsofprogrammingEmbeddedSystems,relatedsoftware K5
architecturesandtoolchainforEmbeddedSystems.
K1–Remember K2 –Understand K3–applyK4-AnalyzeK5–evaluateK6-Create
UNITI IntroductiontoEmbeddedSystems 15
ExamplesofEmbeddedSystems–TypicalHardware–Memory–Microprocessors–Busses–
DirectMemoryAccess– Introductionto8051Microcontroller –Architecture-Instructionset –
Programming.
UNITII Microprocessors 16
Microprocessor Architecture–InterruptBasics– The Shared-Data problem–InterruptLatency-Round–
Robin Architecture - Round–Robin with Interrupts Architecture - Function-
QueueSchedulingArchitecture– Real-TimeOperatingSystemsArchitecture– SelectionofArchitecture.
UNITIII Tasks&Semaphores 14
TasksandTaskStates–TasksandData–SemaphoresandSharedData–SemaphoreProblems–
Semaphorevariants.
UNITIV MessageQueues& RTOS 15
MessageQueues–Mailboxes–Pipes–TimerFunctions–Events–MemoryManagement–
InterruptRoutinesinRTOSEnvironment.RTOSdesign–Principles–EncapsulationSemaphoresandQueues
–Hard Real-Time SchedulingConsiderations–SavingMemorySpace– SavingPower.
UNITV Host&Target Machines 15
HostandTargetMachines–Linker/LocatorforEmbeddedSoftware-
GettingEmbeddedSoftwareintotheTargetSystem.Testingonyour HostMachine –
InstructionSetSimulators–LaboratoryTools
usedforDebugging.
TotalLectureHours 75
Hours
TextBook(s)
1 The8051Microcontroller
Architecture,Programming&Applications,KennethJ.Ayala,PenramInternational.
2 AnEmbeddedSoftwarePrimer,DavidE.Simon,PearsonEducation,2005.
Page 80 of
89
B. Sc. Computer Science with Data Analytics2020-21 onwards - Affiliated Colleges - Annexure No.27A10
SCAA DATED: 23.09.2020
ReferenceBook(s)
1 EmbeddedSystems:Architecture,ProgrammingandDesign,RajKamal,TataMcGraw-Hill
Education,2008
RelatedOnlineContents(MOOC,SWAYAM,NPTEL,Websitesetc)
1 https://onlinecourses.swayam2.ac.in/aic20_sp06/preview
2 https://onlinecourses.swayam2.ac.in/arp19_ap79/preview
CourseDesignedby :
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 L L L L L L L L L L
CO2 M L L L L L L L L L
CO3 S M M L L L L L L L
CO4 S S M L L L L L L L
*S-Strong;M-Medium;L-Low
Page 81 of
89
B. Sc. Computer Science with Data Analytics2020-21 onwards - Affiliated Colleges - Annexure No.27A10
SCAA DATED: 23.09.2020
CourseCode ClientServerComputing L T P C
Core/elective/Supportive Elective:III 5 0 0 4
Pre- requisite None Syllabus I
version
CourseObjectives
Tointroducetheconcepts ofclient andserver
Todescribethevariouscomponents ofclientservercomputing
ExpectedCourseOutcomes
1 Explainaboutthe variouscomponentsof clientservercomputing K2
2 Understandthe rolesof client andserverin anetwork K2
3 AnalyzethecomponentsofClientServercomputingintermsofconnectivity, K3
hardware/softwareandserviceandsupport
4 Analyzethevarioustypesofwormsandviruses K3
K1–Remember K2 –Understand K3–applyK4-AnalyzeK5–evaluateK6-Create
UNITI Introduction 14
Client/ ServerComputing–Advantages ofClient /ServerComputing–TechnologyRevolution–
Connectivity–Ways toimprovePerformance–How toreducenetworkTraffic.
UNITII ComponentsofClient/ServerApplications 16
Components of Client / Server Applications–The Client: Role of a Client–Client Services– Requestfor
Service. Components of Client / Server Applications – The Server: The Role of a Server –
ServerFunctionalityinDetail–TheNetworkOperatingSystem–WhataretheAvailablePlatforms–The
ServerOperatingsystem.
UNITIII Connectivity&IPC 15
Components of Client / Server Applications–Connectivity: Open System Interconnect –
CommunicationsInterfaceTechnology– Inter-processcommunication–WANTechnologies.
UNITIV ComponentsofC/Sapplication H/W&S/W 14
ComponentsofClient/ServerApplications–Software.ComponentsofClient/ServerApplications–
Hardware.
UNITV Service&Support 16
ComponentsofClient/Serverapplications–
ServiceandSupport:SystemAdministration.TheFutureofClient /Server Computing:
EnablingTechnologies– TransformationalSystems.
TotalLectureHours 75
Hours
TextBook(s)
1 Client/ServerComputing,PatrickSmith,SteveGuenferich,2ndedition,PHI.(Chapters1-8&
10)
ReferenceBook(s)
1 RobertOrfali,DanHarkey, JeriEdwards:TheEssentialClient/ServerSurvivalGuide,2nd
edition,GalgotiaPublications.
2 DewireandDawanaTravis,Client/ServerComputing,TMH
RelatedOnlineContents(MOOC,SWAYAM,NPTEL,Websitesetc)
Page 82 of
89
B. Sc. Computer Science with Data Analytics2020-21 onwards - Affiliated Colleges - Annexure No.27A10
SCAA DATED: 23.09.2020
1 https://onlinecourses.swayam2.ac.in/aic20_sp06/preview
2 https://onlinecourses.swayam2.ac.in/arp19_ap79/preview
CourseDesignedby :
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 L L L L L L L L L L
CO2 M L L L L L L L L L
CO3 S M M L L L L L L L
CO4 S S M L L L L L L L
*S-Strong;M-Medium;L-Low
Page 83 of
89
B. Sc. Computer Science with Data Analytics2020-21 onwards - Affiliated Colleges - Annexure No.27A10
SCAA DATED: 23.09.2020
CourseCode OpenSourceSoftware L T P C
Core/elective/Supportive Elective:III 5 0 0 4
UNITI Introductiontoopensources 14
Introduction to open sources–Need of open sources–advantages of open sources–application of
opensources. Open source operating systems: LINUX: Introduction – general overview –Kernel mode
andusermode–process–advancedconcepts–scheduling–personalities–cloning–signals–
developmentwith Linux.
UNITII MySQL 16
MySQL:Introduction–settingupaccount–starting,terminatingandwritingyourownSQLprograms-
recordselectionTechnology–workingwithstrings–DateandTime–sortingQueryresults–
generatingsummary–workingwith meta data–usingsequences– MySQLand Web.
UNITIII PHP 16
PHP: Introduction–programming in web environment–variables- constants–data types –operators –
statements – functions – arrays – OOP – string manipulations and regular expression – file
handlinganddatastorage–PHPandSQLdatabase–PHPandLDAP–PHPconnectivity–sendingand
receivingE-mails –debugginganderror handling– security–templates
UNITIV Python 14
Syntaxandstyle–pythonobjects–numbers–sequences–strings–listsandtuples–dictionaries–
conditionalloops–files–inputandoutput–errorsandexceptions–functions–modules–classesand
OOP–executionenvironment
UNITV Pearl 15
Pearloverview–pearlparsingrules–variablesanddata–statementsandcontrolstructures–subroutines
-,packagesandmodules–workingwithfiles–datamanipulation.
TotalLectureHours 75
Hours
TextBook(s)
1 TheLinuxKernelBook,RemyCard,EricandFrank Mevel,WileyPublications2003
Page 84 of
89
B. Sc. Computer Science with Data Analytics2020-21 onwards - Affiliated Colleges - Annexure No.27A10
SCAA DATED: 23.09.2020
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 L L L L L L L L L L
CO2 M L L L L L L L L L
CO3 S M M L L L L L L L
CO4 S S M L L L L L L L
*S-Strong;M-Medium;L-Low
Page 85 of
89
B. Sc. Computer Science with Data Analytics2020-21 onwards - Affiliated Colleges - Annexure No.27A10
SCAA DATED: 23.09.2020
CourseCode PrinciplesofSecureCoding L T P C
Core/elective/Supportive Elective:III 5 0 0 4
Pre- requisite None Syllabus I
version
CourseObjectives
Tounderstandthesecure softwaredevelopmentlifecycle
Toexplain about thesecurecodingtechniques
ExpectedCourseOutcomes
1 Explainaboutthesecure softwaredevelopmentlifecycle K2
2 Understandthesecurecodingtechniques K2
3 Demonstratethethreatmodelingprocessand benefits K2
4 Explainaboutthe databaseandweb specificissues K2
K1–Remember K2 –Understand K3–applyK4-AnalyzeK5–evaluateK6-Create
UNITI Needforsecuresystems 14
Need for secure systems: Proactive Security development process, Secure Software
DevelopmentCycle (S-SDLC) , Security issues while writing SRS, Design phase security,
Development Phase, TestPhase,MaintenancePhase,WritingSecureCode-
BestPracticesSD3(Securebydesign,defaultand
deployment),Securityprinciplesand SecureProductDevelopmentTimeline
UNITII Threatmodellingprocessanditsbenefits 14
Threatmodellingprocessanditsbenefits:IdentifyingtheThreatsbyUsingAttackTreesandratingthreatsusing
DREAD,RiskMitigationTechniquesandSecurityBestPractices.Securitytechniques,
authentication,authorization.DefenseinDepthandPrincipleof LeastPrivilege.
UNITIII SecureCodingTechniques 17
SecureCodingTechniques:ProtectionagainstDoSattacks,ApplicationFailureAttacks,CPUStarvationAtta
cks,InsecureCodingPracticesInJavaTechnology.ARPSpoofinganditscountermeasures. Buffer Overrun-
Stack overrun, Heap Overrun, Array Indexing Errors, Format StringBugs. Security Issues in C
Language: String Handling, Avoiding Integer Overflows and UnderflowsandTypeConversionIssues-
MemoryManagementIssues,CodeInjectionAttacks,Canarybased
counter measures using Stack Guard and Pro police. Socket Security, Avoiding Server
Hijacking,SecuringRPC.
UNITIV DatabaseandWeb-specificissues 16
Database and Web-specific issues: SOL Injection Techniques and Remedies, Race conditions, Time
ofCheckVersusTimeofUseanditsprotectionmechanisms.ValidatingInputandInterprocessCommunicatio
n,SecuringSignalHandlersandFileOperations.XSSscriptingattackanditstypes-
PersistentandNonpersistentattackXSSCountermeasuresandBypassingtheXSSFilters.
UNITV TestingSecureApplications 14
TestingSecureApplications: Securitycodeoverview, securesoftwareinstallation. TheRole
oftheSecurityTester,Building theSecurityTest Plan. TestingHTTP-Based Applications,
TestingFile-
Based Applications,TestingClientswithRogue Servers
TotalLectureHours 75
Hours
Page 86 of
89
B. Sc. Computer Science with Data Analytics2020-21 onwards - Affiliated Colleges - Annexure No.27A10
SCAA DATED: 23.09.2020
TextBook(s)
1 WritingSecureCode,MichaelHowardandDavid LeBlanc,MicrosoftPress,2ndEdition,2004
ReferenceBook(s)
1 ProgrammingPHP,RasmusLerdorfandLevinTatroe,O‗Reilly,2002
2 CorePythonProgramming,WesleyJ.Chun, PrenticeHall,2001
3 Perl:TheComplete Reference,2ndEdn,MartinC. Brown,TMH, 2009
4 MySQL:TheComplete Reference,2ndEdn,VikramVaswani,TMH,2009
RelatedOnlineContents(MOOC,SWAYAM,NPTEL,Websitesetc)
1 https://onlinecourses.swayam2.ac.in/aic20_sp06/preview
2 https://onlinecourses.swayam2.ac.in/arp19_ap79/preview
CourseDesignedby :
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 L L L L L L L L L L
CO2 M L L L L L L L L L
CO3 S M L L L L L L L L
CO4 S M M L L L L L L L
*S-Strong;M-Medium;L-Low
Page 87 of
89
B. Sc. Computer Science with Data Analytics2020-21 onwards - Affiliated Colleges - Annexure No.27A10
SCAA DATED: 23.09.2020
Case Study / Demo / Role Play / Discussion / Quiz will cover the
following topics:
Case structure – Objectives, Target audience, Executive summary, Background, Yourevaluation,
Proposed solution, Conclusion
Case Study #1: List Foundations of HealthCare Industries
Page information
Patient medical records contain sensitive 88 of that must be protected from
unauthorized access. 89
B. Sc. Computer Science with Data Analytics2020-21 onwards - Affiliated Colleges - Annexure No.27A10
SCAA DATED: 23.09.2020
Financial institutions handle large amounts of sensitive financial data, such as accountnumbers
and transaction history, which must be protected from cyber threats
Demo
Scenario based role play (Cybersecurity strategy development, Incident response plan)
Group discussion
Quiz
Course 2 - Cyber Security Introduction : Broad Overview of Cyber Security will cover the
followingtopics:
2.1 Cybersecurity, 2.2 Cybers attacks, 2.3 Social Engineering, 2.4 Cybersecurity Defences (Firewall,
AV, SIEM, Patch, Password etc), 2.5 Cloud security, 2.6 Endpoint security, 2.7 Mobile security, 2.8
Zero trust, 2.9 IOT, 2.10 Layers of cybersecurity, 2.11 Hacking, 2.12 Incident management, 2.13
Security operations
Case Study / Demo / Role Play / Discussion / Quiz will cover the
following topics:
Case Study #3: Define cyber security governance structure for CISO in bank
Case Study #4: Define cyber security structure for CISO in Auto manufacturing
Scenario based role play (Cybersecurity strategy development, Incident response plan)
Group discussion
Quiz
3.5 Application of Cryptography – Virtual Private Network (VPN), Secure Socket Layer (SSL), Digital
Signature
3.6 Cloud security – Identity and Access management (IAM), Key management, Governance, Risk and
Compliance (GRC), Legal, Data sovereignty, Business continuity, Disaster recovery, Cloud security
models
3.7 Block chain security, 3.8 Zero Trust, 3.9 XDR, 3.10 AI, 3.11 MUD, 3.12 Context aware
Case Study / Demo / Role Play / Discussion / Quiz will cover the
following topics:
Case Study #5: What are the Fundamental Network protections used in Any Industry
Firewalls, IDS, IPS, VPN, Antivirus, SIEM
Case Study #6: List methods to Secure Data in transit and Data at rest
Encryption, Hashing,
Case Study #7: How many ways can you protect any user account in applications
2FA, MFA, Password Management
Demo
Scenario based role play (Cybersecurity strategy development, Incident response plan)
Group discussion
Quiz
Course 4 - Core Threat Intelligence Engineering: Broad Overview of threat intelligence will
cover the following topics:
4.1 Threat model, 4.2 Tactical, operations and strategic threat intelligence, 4.3 How to detect, respond
and defeat threats, 4.4 Adversary data, 4.5 Reactive and proactive threat approach , 4.6 IOC, 4.7 Cyber
kill chain,. 4.8 MITRE ATT@ACK
Case Study / Demo / Role Play / Discussion / Quiz will cover the
following topics:
Case Study #8: How many Levels of User expertise are involved to form an Threat Intelteam
Case Study #9: What are the roles included in Threat Intelligence at Industry level
Demo
Scenario based role play (Cybersecurity strategy development, Incident response plan)
Group discussion
Quiz
Page 90 of
89
B. Sc. Computer Science with Data Analytics2020-21 onwards - Affiliated Colleges - Annexure No.27A10
SCAA DATED: 23.09.2020
Case Study / Demo / Role Play / Discussion / Quiz will cover the
following topics:
Case Study #10: What are few examples of an Vulnerability as per Industry orientedapplications
Case Study #11: Explain RACI Matrix in banking environment
Demo
Scenario based role play (Cybersecurity strategy development, Incident response plan)
Group discussion
Quiz
Course 6 - Core Penetration test techniques: Broad Overview of penetration test techniques
will cover the following topics:
6.1 what is penetration testing, vulnerability, Threats, Risks, Exploitation, 6.2 Computer ports /
protocols, 6.3 Port Scanning, 6.4 Tools, 6.5 Attack Toolset – Metasploit, Nessus, nmap, Burpsuite, 6.6
Basic defence measures - Antivirus, Intrusion Detection / Prevention systems,
Penetration test approach, tools, 6.8 Pen test reporting, 6.9 Pen test rules, 6.10
Gray box, White box, Black box , 6.11 Sniffing, 6.12 DOS, 6.12 Social
engineering, 6.13 Session hijacking, SQL Injection
Case Study / Demo / Role Play / Discussion / Quiz will cover the
following topics:
Case Study #12: How to do network scanning in banking industry
Case Study #13: How to do social engineering (email phishing) in
auto manufacturing
Demo
Scenario based role play (Cybersecurity strategy development, Incident response plan)
Group discussion
Quiz
Page 91 of
89
B. Sc. Computer Science with Data Analytics2020-21 onwards - Affiliated Colleges - Annexure No.27A10
SCAA DATED: 23.09.2020
Course 7 - Core Cyber Exploitations: Broad Overview of cyber exploitation will cover the
following topics:
7.1 Exploitation, 7.2 Types of exploits, 7.3 Identify, Protect, Detect, Respond, Recover, 7.3Honey pot,
7.4 Data collection, analytics 7.5 Proactive and reactive exploitation, 7.6 Red , blue
team, and purple team, 7.7 Incident management, 7.8 Data breach, 7.9 Ransomware,
7.10 Zero day attack, 7.11 Man in the middle
Case Study / Demo / Role Play / Discussion / Quiz will cover the
following topics:
Case Study #14: Difference between Vulnerability and Exploitations. How to identify
exploitation in banking industry
Case Study #15: What Network vectors are considered for exploitation. How to
implementin healthcare
Demo
Scenario based role play (Cybersecurity strategy development, Incident response plan)
Group discussion
Quiz
Course 8 – Global attack trends: Broad Overview of cyber-attack trends will cover the
following topics:
8.1 Past, present & future trends of cyber threat landscape (Worldwide)
8.2 Cybercrime landscape in Asia Pacific
8.3 Organizational processes, Security roles and responsibilities, Due care and Due diligence
8.4 Cybersecurity threats – Malware, Viruses and Worms, Trojan horses, Botnets, Zero-dayexploits,
Phishing, Spear phishing, Whaling, Social engineering, etc.
8.5 Risk management concepts, Personnel security policies, Information security training andawareness
8.6 Critical infrastructure protection, Privacy by design
Case Study / Demo / Role Play / Discussion / Quiz will cover the
following topics:
Case Study #16: Explain Ransomware behaviour and impact within the industries.
Case Study #17: What is a Malware and how to setup malware protection
in hospital
Case Study #18: Will Linux and Mac have any Attacks and Malware. Consider
ecommerce services
Demo
Scenario based role play (Cybersecurity strategy development, Incident response plan)
Page 92 of
89
B. Sc. Computer Science 2020-21 onwards - Affiliated Colleges - Annexure No.27A2
SCAA DATED: 23.09.2020
Group discussion
Quiz
Case Study / Demo / Role Play / Discussion / Quiz will cover the
following topics:
Case Study #19: What is Security posture for any healthcare industry
Case Study #20: What is SOC in food chain industry
Demo
Scenario based role play (Cybersecurity strategy development, Incident response plan)
Group discussion
Quiz
Course 10 – Security Incident Management : Broad Overview of incident management will cover
the following topics:
10.1 Incident handling and response, 10.2 Incident RACI, 10.3 Forensic package , critical incident
package, 10.4 Malware incidents, 10.5 Email security and phishing incidents , 10.6 Threat reporting,
10.7 Third party incidents, 10.8 Feedback process, 10.9 TTX
Case Study / Demo / Role Play / Discussion / Quiz will cover the
following topics:
Case Study #21: What is Zero Day? Does it have any impact on any industry applications.Define
process framework
Case Study #22: How are Incidents managed for HealthCare , FinTech,
SCADA andAutomotive industries
Demo
Scenario based role play (Cybersecurity strategy development, Incident response plan)
Group discussion
Quiz
Page 93 of
87
B. Sc. Computer Science 2020-21 onwards - Affiliated Colleges - Annexure No.27A2
SCAA DATED: 23.09.2020
Course 11 – Web and Mobile security Techniques: Broad Overview of web and mobile
securitytechniques will cover the following topics:
11.1 Web environment setup for scan and tools, 11.2 Scan web application, 11.3 Exploit
vulnerabilities, 11.4 Deep analysis, 11.5 Reporting
11.6 Mobile environment setup for scan and tools, 11.7 Scan mobile application, 11.8
Exploit vulnerabilities, 11.9 Deep analysis, 11.10 Reporting
Case Study / Demo / Role Play / Discussion / Quiz will cover the
following topics:
Cyber breach case study (Equifax, Uber, Target, Stuxnet, SWIFT)
Case Study #23: What’s the Top standard followed in Web Applications
Case Study #24: What the Top standard followed in Mobile Applications
Case Study #25: List secure frameworks used in Mobile App Development
Demo
Scenario based role play (Cybersecurity strategy development, Incident response plan)
Group discussion
Quiz
Course 12 – Privacy and online rights: Broad Overview of privacy techniques will cover the
followingtopics:
12.1 Privacy concept, 12.2 Privacy regulations, 12.3 GDPR, 12.4 Online privacy challenges
12.5 Online marketing/ sales privacy challenges, 12.6 Privacy protection and penalties
Case Study / Demo / Role Play / Discussion / Quiz will cover the
following topics:
Cyber breach case study (Equifax, Uber, Target, Stuxnet, SWIFT)
Case Study #26: What data is considered as Privacy issue in online ecommerce
Case Study #27: Whats the impact if your company related data is available online?
Demo
Scenario based role play (Cybersecurity strategy development, Incident response plan)
Group discussion
Quiz
Page 94 of
87
B. Sc. Computer Science 2020-21 onwards - Affiliated Colleges - Annexure No.27A2
SCAA DATED: 23.09.2020
Course 13 – Best Practices for keeping Systems and Data safe: Broad overview of Security
best practices will cover the following topics:
13.1 Understand your data and risk, 13.2 Protect your systems, 13.3 Cyber Insurance, 13.4 AV, 13.5
Data leakage , 13.6 Security guidelines – NIST, ISO 27001, GDPR, 13.7 Risk Management
Frameworks and Security Standards
NIST SP800-30: Evaluating security risks
ISO 27000 - Information Security Management Standards (ISMS)
DO-178C - Software Considerations in Airborne Systems and Equipment Certification
ISO/IEC 27034 – Application security guidelines
SS 584 : Singapore Standard for Multi Tier Cloud Security
Case Study / Demo / Role Play / Discussion / Quiz will cover the
following topics:
Case Study #28: How can you assure your data is safe in Public network and corporatenetwork
Case Study #29: List 3 simple methods to keep your system safe from malware
Demo
Scenario based role play (Cybersecurity strategy development, Incident response plan)
Group discussion
Quiz
Course 14 – Cloud security engineering: Broad Overview of cloud security will cover the
following topics:
14.1 Cloud security fundamentals, 14.2 Cloud providers, 14.3 Tools for cloud security, 14.4 Cloud
recovery, 14.5 Cloud Monitoring, 14.6 Cloud compliance, certification, audit and compliance, Pen test
Case Study / Demo / Role Play / Discussion / Quiz will cover the
following topics:
Case Study #30: How the Cloud services or applications can be targeted to hackers
Case Study #31: What are the Different methods to store data safe
Demo
Scenario based role play (Cybersecurity strategy development, Incident response plan)
Group discussion
Quiz
Page 95 of
87
B. Sc. Computer Science 2020-21 onwards - Affiliated Colleges - Annexure No.27A2
SCAA DATED: 23.09.2020
Course 15 – Industry Infosec Governance: Broad Overview of Industry security governance will
coverthe following topics:
15.1 Industry roles and student skill identification, 15.2 Industry training, certification, 15.3 Industry career path,
15.4 How to become industry cybersecurity expert, 15.5 Job application process, 15.6 Salary / perks, 15.7 Working
in healthcare industry
Case Study / Demo / Role Play / Discussion / Quiz will cover the following topics:
Cyber breach case study (Equifax, Uber, Target, Stuxnet, SWIFT)
Case Study #32: Abbreviated CIA and give one example for Healthcare industry
Case Study #33: Are Policies, procedures and standards important to protect CIA for an Industry
Demo
Scenario based role play (Cybersecurity strategy development, Incident response plan)
Group discussion
Quiz
B. Sc. Computer Science 2020-21 onwards - Affiliated Colleges - Annexure No.27A2
SCAA DATED: 23.09.2020
Annexure
B. Sc. Computer Science 2020-21 onwards - Affiliated Colleges - Annexure No.27A2
SCAA DATED: 23.09.2020
B.Sc.ComputerSciencewithData Analytics
Syllabus
(Witheffect from2020-21)
ProgramCode:
DEPARTMENTOFCOMPUTERSCIENCE
BharathiarUniversity
(AStateUniversityAccreditedwith“a”byNAAACand13th
Rank among Indian Universities by MHRD-
NIRF)Coimbatore641046,INDIA
B. Sc. Computer Science 2020-21 onwards - Affiliated Colleges - Annexure No.27A2
SCAA DATED: 23.09.2020
MISSION
TodevelopITprofessionalswithethicalandhumanvalues.
To organize, connect, create and communicate mathematical ideas effectively,
throughindustry4.0.
Toprovide alearningenvironment to enhanceinnovations, problem
solvingabilities,leadershippotentials, team-spirit and moral tasks.
Tonurturetheresearch valuesin thedevelopingareas
ofComputerScienceandinterdisciplinaryfields.
Promote inter-disciplinary research among the faculty and the students to create state
ofartresearch facilities.
Topromotequalityand ethicsamongthe students.
Motivatethestudentstoacquireentrepreneurialskillstobecomegloballeaders.