0 Bewertungen 0% fanden dieses Dokument nützlich (0 Abstimmungen) 2K Ansichten 20 Seiten Makaut - 3RD Sem - 2025-2026
Das Dokument enthält den Lehrplan für den Bachelor of Computer Applications (BCA) an der Maulana Abul Kalam Azad University of Technology, West Bengal, für das akademische Jahr 2023-24. Es umfasst Kurse in Python-Programmierung und Datenstrukturen, einschließlich Kursziele, Ergebnisse und detaillierte Themen, die in den Modulen behandelt werden. Zusätzlich werden praktische Übungen und empfohlene Literatur für die Studierenden bereitgestellt.
KI-verbesserte Titel und Beschreibungen
Copyright
© © All Rights Reserved
Verfügbare Formate
Als PDF herunterladen oder online auf Scribd lesen
Zu den vorherigen Artikeln Weiter zu den nächsten Artikeln
MAKAUT_3RD SEM_2025-2026 für später speichern
MAULANA ABUL KALAM AZAD UNIVERSITY OF TECHNOLOGY, WEST BENGAL
(Formerly West Bengal University of Technology)
Syllabus of BCA’
(Effective from 2023-24 Academic Sessions)
SEMESTER: IL
DEFINITION OF CREDIT
‘LHR LECTURE PER WEEK CREDIT
‘LHR TUTORIAL PER WEEK CREDIT
2 HR PRACTICAL PER WEEK CREDIT
SUBJECT NUMBERING SCHEME:
CODE FOR THE DEPT. SUBJECT TYPE [SEM | SUBJECT CODE
OFFERING SUBJECT
©___| CORE MAIOR
SUBJECT NAME: Python Programming Credit
SUBJECT CODE: BCAC301
3L+2P
COURSE OBJECTIVE:
The course objectives of a Python programming course typically aim to equip students with the
fundamental knowledge and skills needed to understand and utilize Python as a programming
language effectively. students should have a solid foundation in Python programming, enabling
them to write Python code independently, understand and contribute to Python-based projects,
and pursue further specialization in specific areas of Python development.
COURSE OUTCOME
‘COI | Will gain a solid understanding of Python programming fundamentals, including
syntax, data types, control structures, and function
‘CO2 | Will lear techniques for acquiring, cleaning, and analyzing data‘CO3_] Will be able to design and implement modular programs using functions and modules
to improve code reusability and maintainability.
COd | Will be
ipable of reading from and writing to files, as well a
formats for data input and output operations.
handling different file
COS _| Will understand the principles of object-oriented programming and be able to create
classes, objects, and inheritance hierarchies to model real-world entit
problems.
and solve
DETAILED SYLLABUS:
‘Module No:
NAME OF THE TOPIC
HOURS
MARKS
MI
INTRODUCTION:
Features of Python, Execution of
Python Program, Viewing the byte
code, Python Virtual machine,
Frozen binaries, Memory
management of Python, Compare
between C and Python, Comapre
between Java and Python
M2
Python Fundaments:
python character set, Tokens
(Keywords, Identifiers, Literals,
Operators, Punctuations), Comments
in Python (Single line and Multi
line), Variables and assignments
(Creating a variables, Multiple
assignments)
MB
Data Handling and Flow Control:
Data Types, Mutable and Immutable
types, Operators, Negative Number
artithmetic in Python, Evaluation of
Expression, Type casting
Flow Control: if statement, [Link],
[Link] statement, range
function, while loop, for loop, nested
Joop, break statement, Continue
statement, return statementM4
String and Character:
Introduction, Traversing the
string,String concatenation and
replication, Membership operator,
comparision operator, determine
unicode value of single character,
slicing, built in functions (len(,
capitalize(), count), find),
index(),isalpha(), isalnumd), isdigit(),
isspace(), islower(),Jower(), upper(),
strip(0,Istrip(), rstripO, join(), titled,
split0, partition), endswith),
startswith@, replaced)
MS
Functions: Differenece Function and
method,define a function, Calling a
function, Return results from
function, Return multiple values
from function, Formal and Actual
arguments, Positional arguments,
Default arguments, Keyword
arguments, Variable length
arguments Local and Global
variable, Recursive function, using
Lambdas with filter(), lambdas with
map)
M6
Lists: Creation of listempty Tist,
nested list, use of list(), Accessing
list, length of list, indexing and
slicing of list, Traverse the list,
Compare the list, Joining the list,
Replication of list, Making the true
copy of list, index(0, append() and
extend(), insert, pop(). popitem),
del and clear(), count), reversed)
sort and sorted, two dimensional list
10
M7
Tuples: Creation of tuple (empty
tuple, single element, create tuple
from existing sequence, nested
tuple), Accessing tuples, Traverse
tuple, join, len(), max), minM8
Dictionary: Creating dictionary
‘empty dictionary, add key-value pair
in dictionary, use of dict(), specify
value pair Separately in sequence,
‘Add ewlements to dictionary, Check
existence of a key in dictionary,
get0, items(), keys0), values(), lend,
fromkeys(), extens! update dictionary
with new value, making shallow
copy of dictionary, delete elemnts
from dictionary( clera(), pop0,
poitem(), del) , max(), min, sumO
10
M9
“Text file: opening a text file, text file
open modes (r+, W, Wh, a, a+),
closing a text file, opening a file
using with clause, writing/appending
data to a text file using writeQ and
writelines(), reading
from a text file using read(),
readline() and readlines(), seek and
tell methods, manipulation of data in
a file
M10
Class and Object:
Features of OOPs Programming,
Creation of class, self evariable,
Constructor, types of variable,
namespace, types of
methods(Instance method, class
ethos, static method)
Inheritance: Constructor in
inheritance, super(), Types of
inheritance, Method of resolution
order, Ploymorphism, operator and
method overloading, abstract class,
and interface
5
INTERNAL EXAMINATION
30
TOTAL
48
100Practic
SUBJECT NAME: Python Programming Lab
SUBJECT CODE: BCAC391
3
4.
9,
List of Practical:
Fizz Buzz: Write a program that prints the numbers from 1 to 100. But for multiples of
three, print "Fiz2” instead of the number, and for the multiples of five, print "Buzz"
For numbers that are multiples of both three and five, print "Fizz Buz
Palindrome Checker: Write a function to determine ifa given string is a palindrome
(reads the same forwards and backwards). Ignore spaces, punctuation, and
capitalization
Factorial Calculation: Write a function to calculate the factorial of a given number
recursively,
Prime Number Generator: Write a function to generate a list of prime numbers up to a
given number using the Sieve of Eratosthenes algorithm.
Word Count: Write a program that takes a string as input and counts the frequency of,
each word in the string, Ignore case and punctuation.
Reverse a Linked List: Implement a function to reverse a singly linked list in-place.
Binary Search: Implement the binary search algorithm to find the index of a given
‘element in a sorted lst.
Anagram Checker: Write a function to determine if two strings are anagrams of each
other (contain the same characters in a different order).
Matrix Transpose: Write a function to transpose a given matrix (convert rows to
columns and vice versa)
‘Tower of Hanoi: Implement the Tower of Hanoi puzzle using recursion.
Sum of List Elements: Write a program that calculates the sum of all elements in a list
of numbers.
Maximum and Minimum Element in List: Write a program to find the maximam
and minimum elements in a list
List Reversal: Write a program to reverse a given list.
List Sorting: Write a program to sorta list of numbers in ascending or descending
order.
List Filtering: Write a program to filter out even or odd numbers from a list
List Coneatenation: Write a program to concatenate two lists into one.
List Intersection: Write a program to find the intersection of two lists (ie. elements
that appear in both list).
List Union: Write a program to find the union of two lists (i.e, all unique elements,
from both lists).
List Flattening: Write a program to flatten a nested list (Le., convert a list of lists into
a single list).
List Element Removal: Write a program to remove all occurrences of a specific
‘element froma list.I. List Rotation: Write a program to rotate a list by a given number of positions.
12, List Comprehensions: Write a program to generate a new list based on a given list
using list comprehensions (e.g., square each element of alist).
Dictionary:
Word Frequency Counter:
Write a program that takes a string as input and counts the frequency of each word using a
dictionary. Ignore case and punctuation,
Merge Two Dictionaries:
Write a function to merge two dictionaries into one, where the values of duplicate keys are
added together.
Dictionary Key Sot
Write a function to sort the keys of a dictionary in alphabetical order and return a new
dictionary with the sorted keys
Nested Dictionary Access:
Write a function to access a value in a nested dictionary given a list of keys. For example,
given the dictionary {'a: 'b': ('c: 1}}} and the keys [a,b], the function should return 1.
Dictionary Inversion:
Write a function to invert a dictionary, where the keys become values and the values become
keys. Assume that the values are unique.
Dictionary Intersection:
Write a function to find the intersection of two dictionaries (i. keys that appear in both
dictionaries) and return a new dictionary with the common keys and their values.
SUGGESTED READING:
|. Introduction to Computing & Problem Solving With PYTHON, Jeeva Jose, Khanna
Publishing House
Python Programming: A Modular Approach" by Sheetal Taneja and Naveen Kumar
(Publisher: Oxford University Press India)
3. Introduetion To Python Programming, Venkatesh, Nagaraju Y, Khanna Publishing
House
4, Python for Beginners: A Step-by-Step Guide to Learn Python from Zero with
Hands-on Exercises" by Ajit Kumar (Publisher: BPB Publications)
“Python: A Practical Introduction to Programming” by Subin Si
Publications)
6. “Taming Python Programming" by Jeeva Jose (Publisher: Khanna Publishing House)
7. “Python Programming: A Beginner's Guide to Learn Python in 7 Days” by Darshan
Patel (Publisher: BPB Publications)
Wy (Publisher: BPBSUBJECT NAME: Data Structure through C
SUBJECT CODE: BCAC302
3L+2P
COURSE OBJECTIVE:
‘The course aims to provide students with a solid foundation in fundamental data structures and.
algorithms, as well as proficiency in implementing them using C. This will empower students
with the knowledge, skills, and problem-solving abilities necessary to tackle complex
computational problems and excel in their academic and professional pursuits in the field of
computer application,
COURSE OUTCOME
COL] Students will comprehend the fundamental concepts of data structures, including
arrays, linked lists, stacks, queues, and trees, and how they are implemented in the C
programming language.
‘CO2 | Gain proficiency in implementing various data structures using C programming.
language, including dynamic memory allocation, pointers, and structures.
‘COS _| Develop the ability to analyze problems and choose appropriate data structures and
algorithms to solve them efficient
‘COF | Enhance problem-solving skills by applying data structures and algorithms to solve
real-world problems and algorithmic challenges.
‘COS | Collaborate effectively in team projects involving the design and implementation of
complex data structures and algorithms, fostering communication and teamwork
Sparse Matrices. Polynomial representation,
Implementation of Stack and Queue, Example of
Infix, Postfix, and prefix, Priority Queue
skills
DETAILED SYLLABUS:
Module | NAME OF THE TOPIC HOURS | MARKS
No:
MI ‘Structure and Union, typedef definition, 4 3
Implementation of structure and Union, Accessing
‘members of the structure, Pointer to
structure,passing structure in function, Passing
structure through pointer, Self-referential pointer,
Nested Structure
M2 ‘Arrays: 1D, 2D and Multi-Dimensional Arrays, Z 10M3
Linked Lists: Singly, Doubly and Circular Lists,
‘Normal and Circular representation of Self
Organizing Lists, Skip Lists, Polynomial
representation, Implementation of Stack and Queue,
Circular List, Stack as Circular list, Queue as
Circular list
15
Ma
Recursion: Definition, Internal Stack representation,
Factorial function, Fibonacci Sequence, Binary
Search, The tower of Hanoi Problem
MS
“Trees : Introduction to Tree as a data structure,
Binary Trees (Insertion, Deletion, Recursive and
Iterative Traversals of Binary Search Trees),
‘Threaded Binary Trees (Insertion, Deletion,
Traversals), Height-Balanced Trees (Various
operations on AVL Trees).
5
M6
‘Searching and Sorting: Linear Search, Binary
Search, Comparison of Linear and Binary Search,
Selection Sort, Insertion Sort, Merge Sort, Quick
sort, Shell Sort, Comparison of Sorting Techniques
2
M7
Hashing : Introduction to Hashing, Deleting from
Hash Table, Efficiency of Rehash Methods, Hash.
Table Reordering, Resolving collision by Open
Addressing, Coalesced Hashing, Separate Chaining,
Dynamic and Extendible Hashing, Choosing a Hash
Function, Perfect Hashing
INTERNAL EXAMINATION
e
TOTAL
100
Practi
SUBJECT NAME: Data Structure Lab
SUBJECT CODE: BCAC392
List of Practica
1. Implementation of array operations.
2. Stacks and Queues: adding, deleting elements.
3. Circular Queue: Adding & deleting elements
4, Merging Probler
6. Implementation of stacks & queues using linked lists:
Evaluation of expressions operations on Multiple stacks & queues
5, Implementation of linked lists: inserting, deleting, and inverting a linked list.7. Polynomial addition, Polynomial multiplication
8, Sparse Matrices: Multiplication, addition.
9, Recursive and Non Recursive traversal of Trees Threaded binary tree travers
tree implementation Application of Trees.
10. Application of sorting and searching algorithms Hash tables’ implementation:
searching, inserting and deleting, searching & sorting techniques.
Assignments:
Based on the curriculum as covered by the subject teacher
SUGGESTED READING:
Expert Data Structures with C by R. B. Patel, Khanna Publishing House
Data Structures Through C in Depth by S. K. Srivastava and Deepali Srivastava - BPB
Publications
Data Structures Through C by Yashavant Kanetkar - BPB Publications
Data Structures: A Pseudocode Approach with C by Richard F. Gilberg and Behrouz
A. Forouzan (Adapted by Dinesh P. Mehta) - Cengage Learning India
ta Structures and Algorithm Analysis in C by Mark Allen Weiss (Adapted by
Dinesh Mehta) - Pearson Education India
Data Structures Using C and C++ by Tanenbaum - Pearson Education India
Data Structures and Algorithms Made Easy by M. S. Kutti Swamy - Pearson.
Education IndiaMaulana Abul Kalam Azad University of Technology, WB
(Formerly known as West Bengal University of Technology)
Paper code: MIM301A,
Mode: Offline Credits: 4
PRINCIPLES OF MARKETING
‘Aims of the course: The objective is to attain a comprehensive understanding ofthe basics of Marketing.
Course Objectives: Upon finishing this course, students should have a grasp of the foundational tenets of Marketing
Management.
Course Outcomes:
CO1: This course equips students with foundational knowledge in Marketing Management.
C02: Through this course, students will know the fundamentals of a Marketing plan
C03: The course wil facilitate active learning and acquiring knowledge regarding emerging marketing management
trends.
(C04: The course is designed to furnish students with decision-making sills relevant to marketing.
COS: Upon completing this course, students will be equipped to find solutions to marketing challenges and explore
possibilities in practical settings.
st Course content Hour allotted
Milfs What is marketing? 6
Tutt ante: Soe, Ses, Een, Experts, Pans, Macs
roperties, Organizations, Information, Ideas
|e Marketer, Demand, Market-types- Consumer market, business market, global
yrarket, non-profit and government market
6 Need, want, Demand
|e Matketing channels: Communication channels, Sales Channels and Distribution
hannels
|e ——_Matketing Orientations: Production Concept, Product Concept, Selling
‘oncept, Marketing Concept, Societal Marketing Concept, Holistic Marketing Concept
le customer value, customer relationship, customer satisfaction, customer-
jenerated marketing, customer retention, and loyalty
m2 ‘4Ps of Marketing: Product, Price, Place, Promotion 6
+ 48s of Marketing: Acceptability, Affordability, Accessibilty, Awareness
‘Additional Ps: People, Processes, Programs
le Marketing Environment: Major components of the micro-environment
(Company, Suppliers, Marketing intermediaries, Competitors, Publics, Customers) and
Fracro environment, Demographic and Economic Environment, Natural and
fechnological Environment, Political and Social-Cultural EnvironmentMaulana Abul Kalam Azad University of Technology, WB
(Formerly known as West Bengal University of Technology)
M3 Je Marketing research :
f+ Marketing strategy: Building customer value, engagement and relationships
fe Marketing strategy and marketing minx segmentation (geosrapic
femographic, psychographic, behavioral) and targeting, differentiation, and positioning
Consumer behavior, consumer behavior model, Characteristics affecting
-onsumer behavior- cultural, social, personal, psychological
wa Fae te vin oduct Caan, Produc and Seis ferent: 5
>roduct Levels, Product Mix (BASIC), Produc Life Cycle, New Product Development ~
lefinition, reasons, new product development process
Fun atta Sere Decons oduct and Serve Abe, rang
ackaging, Labeling and Logos, Support Services
lo Product Line Decision
|e Product Mix Decisions
Je Branding strategy: What isa brand, brand image, identity and Brand Equity,
rand Value, Brand Positioning,
Sle The New Role of Intermediaries a
Je Factors influencing Distribution Decisions
Evaluation of Channel Alternatives
fe Channel Management
Me ‘Marketing Communication Channels 4
Promotion Mix
M7 Whats price? 7
| __ Pricing Strategies: Customer Value-Based Pricing, Cost-Based Pricing,
‘ompetition-Based Pricing, Other Internal and External Considerations affecting pricing
MB Sustainable Marketing and Marketing Ethics a
|e ital Marketing
le Emerging Marketing Challenges
‘Making a marketing plan
Learning Outcome/ Skills: Students should be able to understand the basic concepts of marketing and create a rudimentary
marketing planMaulana Abul Kalam Azad University of Technology, WB
(Formerly known as West Bengal University of Technology)
jodule tent fotalHours Peof questions Bloom Level Remarks,
a
Number (applicable) ™
THEORY
ia Introduction to Marketing 3 20 a2 NA
2 farketing Environment and 4 20 123 NA
strategy
3 Iarket Research and Consumer) @ 2 32 NA
behavior
ima oduct and Branding 7 10 123 NA
ims icing and Marketing Channels | 6 10 123 Na
6 stanalemaieting and eis) 8 2 123 NA
Total Theory ry 100
TUTORIAL @
Tora @
Reference Books:
Principles of Marketing (19° Edition) by Philip Kotler, Gary Armstrong and Sridhar BalasubramanianAE Course: The Constitution, Human Rights and Law
Code- AECC301
Credits: 2
Duration: 30 hours
Course Outcomes:
1 Understand and infer the significance of the constitution of India to students from all walks of
life and help them to understand the basic concepts of Indian constitution,
2 Outline the importance of fundamental rights as well as fundamental duties.
3 Relate the functioning of Union, State and Local Governments in the Indian federal system.
4 Explain the procedure and effects of emergency, composition and activities of election
commission and amendment procedure.
UNIT
Introduction to Constitution:
(6 Hours)
Meaning and importance of the Constitution, salient features of Indian Constitution. Preamble of the
Constitution, Fundamental rights- meaning and limitations. Directive principles of state policy and
Fundamental duties -their enforcement and their relevance.Maulana Abul Kalam Azad University of Technology, WB
(Formerly known as West Bengal University of Technology)
UI
Union Government: (S Hours)
Union Executive- President, Vice-president, Prime Minister, Council of Ministers. Union Legislature-
Parliament and Parliamentary proc
powers and functions.
ings. Union Judiciary-Supreme Court of India ~ composition and
UI
1
State and Local Governments: (6 Hours)
State Executive- Governor, Chief Minister, Council of Ministers. State Legislature-State Legislative
Assembly and State Legislative Council. State Judiciary-High court. Local Government-Panchayat raj
system with special reference to 73" and Urban Local Self Govt. with special reference to74 Amendment.
Election provisions, Emergency provisions, Amendment of the constitution (S Hours.)
Election Commission of India-composition, powers and functions and electoral process. Types of
emergency-grounds, procedure, duration and effects. Amendment of the constitution- meaning, procedure
and limitations.
UI
T-5 (8 hours)
HUMAN RIGHTS:
Functioning of different human rights organizations in the country and the National Human Rights
Commission in India, Relationship between Human Rights and Fundamental freedom
NHRC and its working, other organizations working for the cause, Relationship between Human
Rights and fundamental freedom, addressing rights of women, children, disabled and tribals
Comparing diverse issues of tribals, refugees and prisoners.
Challenges faced by legal academicians, activists and NGOs in effective implementation of Human Rights
and laws. Various perspectives and role of Media, Laws safeguarding Human Rights and its implementation
Textbooks
1, M\[Link], “Introduction to the Constitution of India”,4* Edition, Vikas publication,2005.
2. Durga Das Basu( DD Basu) , “Introduction to the constitution of India”, (Student
Edition), 19® edition, Prentice-Hall EEE, 2008,
Reference Book
1. Merunandan, “Multiple Choice Questions on Constitution of India”, 2 "* Edition, Meraga
publication,2007,Maulana Abul Kalam Azad University of Technology, WB
(Formerly known as West Bengal University of Technology)
|Course: Understanding basics of cyber security
[course Code: SEC381 Pemeste
‘Maximum Marks: 100
Teaching Scheme Examination Scheme
Lecture: 2 [End semester Exam:
Tutorial: 0 Iattendance: 0
Practical: 0 ntinuous Assessment: 0
redit: 2 Practical/Sessional internal continuous evaluation: 0
Prectical/ Sessional external examination: 100
SINo. Course Objective
1 _| Analyse and evaluate the importance of personal data its privacy and security.
3 _| Analyse and evaluate the security aspects of socal media platforms and ethical aspects associated with use
of social mediaMaulana Abul Kalam Azad University of Technology, WB
(Formerly known as West Bengal University of Technology)
3 [Analyse and evaluate the cyber security risks,
4 | Based on the Risk assessment, plan suitable security controls, audit and compliance.
ig _| Evaluate and communicate the human role in security systems with an emphasis on ethics, socal
engineering vulnerabilities and training,
6 | increase awareness about cyber-attack vectors and safety against cyber-frauds.
7 _ | Take measures for self-cyber-protection as well as societal cyber protection
‘Mapped
Course Outcomes jnodte/ait
Co1_| Mter completion ofthis module, students would be able to understand the concept of ul
Cyber security and issues and challenges associated with it.
‘Students, at the end of this module, should be able to understand the cybercrimes, their
C02 | nature, legal remedies and as to how report the crimes through available platforms and ulu2
procedures.
Co3 | Oncomaletion ofthis module, students shouldbe able to appreciate various privacy and — [454 5 15
security concerns on online Social media
‘After the completion of this module, students would be able to understand the basi
‘cog | Mer the completion of this module, students would be able to understand the basic ULUauE
concepts related to E-Commerce
After the completion of this module, They will become familiar with various digital payment.
COS. | modes and related cyber security aspects, RBI guidelines and preventive measures against us
digital payment frauds.
co6 | Students, after completion ofthis module willbe able to understand the basic security us
aspects related to Computer and Mobiles.
Learning Outcome/Skills:
The candidate is able to have a detailed understanding of the importance of cyber world and
the ways and means to survive in the cyber world.
Total Hours | %of Bloom’s | Remarks,
Questions | Taxonomy any
THEORY
UL 6 20 1,2,3 NA
U2 6 20 1,2,3 NAMaulana Abul Kalam Azad University of Technology, WB
(Formerly known as West Bengal University of Technology)
us 6 20 12,3 NA
ua 3 10 12 NA
Us 6 20 1,23 NA
Us 3 10 12 NA
30 100%
‘ourse Code: SEC381
Kourse: [enderstanding basics of eyber security Credits:20
Contents
(chapter [ame of the topic Hours
introduction to Cyber security
Defining cyberspace and Overview of Computer and Web-technology,Fundamental
unit. oF data communication and networking, Concept of cyber security, Information 6
kecurity goals (Confidentiality, Integrity and availability), Issues and challenges of
aecacniMaulana Abul Kalam Azad University of Technology, WB
(Formerly known as West Bengal University of Technology)
Unita
sybercrime and Cyber law
yyber laws, What offences are covered under these laws (Hacking, Data theft,
Identity theft (including Password Theft), Email spoofing, Sending offensive
imessages, Voyeurism, Cyber terrorism) Punishment for cybercrime in India, Reporting
f cybercrimes: Organisations dealing with Cybercrime and Cyber security in India
Unit-IL
‘Social Media Overview and Security
Introduction to Social networks. Types of Social media, Social media platforms, Social
Imedia monitoring, Hash tag, Viral content, Social media marketing, Best practices fo
he use of Social media.
[E-commerce
Definition of E- Commerce, Main components of E-Commerce, Elements of E-
“ommerce security, E-Commerce threats, E-Commerce security best practices
Unit-v
igital Payments
Introduction to digital payments, Components of digital payment and stake holders,
IModes of digital payments- Banking Cards, Unified Payment Interface (UPI), e
allets, Unstructured Supplementary Service Data (USSD), Aadhar enable
uidelines on digital payments and customer protection in unauthorized bank
ransactions. Relevant provisions of Payment Settlement Act 2007
Unit-vi
[Digital Devices Security
Password policy, Security patch management, Data backup, Downloading and
Imanagement of third-party software, Device security policy, Cyber Security bes
practices
Total
30
List of Books
[Name of Author TTitle of the Book lame of the Publisher
Steps
Debtoru Chatterjee Cyber Crime and Its Prevention in Easy | Khanna Publishing House
Simple
Debtoru Chatterjee Cyber Attacks and Counter- Measures Made| Khanna Publishing House
(india) Pvt. Ltd,
Behrouz A. Forouzan Data communication and Networking | McGraw Hill Education|
‘Mayank Bhushan Fundamentals of Cyber Security 'BPB PublicationsMaulana Abul Kalam Azad University of Technology, WB
(Formerly known as West Bengal University of Technology)
Gupta & Gupta
Information Security & Cyber Laws
Khanna Publishing House
MM. Oka
E-Commerce
Everest Publishing House.
Jeeva Jose & Vijo Mathew
Introduction to Security of Cyber-Physical
Systems
Khanna Publishing HouseMAULANA ABUL KALAM AZAD UNIVERSITY OF TECHNOLOGY, WEST BENGAL
(FORMERLY KNOWN AS WEST BENGAL UNIVERSITY OF TECHNOLOGY)
Main Campus : Haringhate, Nadia, Pin-74 1249
Paper Code: GE6B-06
Paper Name- Values & Ethics
Total Credit: 3
Total hours of lectures: 45 hours
Sl_] Topic/Module Hour.
1. | Module 1: Indian Saciety—Socicty and its types, Features of Tribal Society, | 10
Agrarian Socicty. Industrial Society. Post-Industrial Socicty. Population and
Society - Interface between population size and social development Concepts.
and measurement of population: Birth rate. Death rate, Migration. Population
pyramid of India, Social implications of age sex in India. Population
Explosion & its consequences. Population policy of Govt. of India A Critical
appraisal. problems of implementing growth control measures, causes for
success and failures.
Module social Stratification-Concepts, Types. Social Mobilit
Economic Problems : Poverty. Illiteracy. Unemployment, Child Labour,
Occupational Discascs, Crime. Project Affected People. Aged Population,
Juvenile Delinquency. Strategies to solve’ minimize the problem.
‘Module 3: Industry and Society - Factory as a Social System, Formal and
Informal Organization, Impact of Industry on Society (Family and
Industry ),Social and Cultural Impediments to Industrialization
| Module 4; Value: Definition, Importance and application of Value in Iife-
Formation of Value: Process of Socialization. self and integrated personality.
Types of values: Social, Psychological, Aesthetic, Spiritual, Organizational.
Value crisis in contemporary society: individual, societal cultural and
management level(strategy and case studies)
5. Module 5: Introduction to Business Ethics :Detinition and Important
Ethics in the Workplace: code of conduct. code of ethics:
6. [Module 6 : Corporate Responsibility: Definition and Case Study
Corporate Compliance: Definition, Responsibility &Laws and Regulations
Consumer Rights: Expectations and Reality, connection between Business
and Society
YI
Suggested Readings:
1. Andre Beteille: Society and Politics in India, OUP.
2.C.N. Shankar Rao: Sociology, [Link]
3. Ram Ahuja : Social Problems in India, Rawat Publication.
4. A.C Femando (Late): Business Ethics: An Indian Perspective, 2/e, Pearson.
5. Manna and Chakraborty: Value and Ethics in Business and Profession PHI.
6. Shailendra Kumar and Alok Kumar Rai: Business Ethics, Cengage Leaming India Pvt. Ltd.
129
Das könnte Ihnen auch gefallen