Computer-Application Honours Cbcs
Computer-Application Honours Cbcs
For
BCA(Honours)Submitted
To
Under
Page 1 of 29
Courses
Acade Discipline Core (DC) Discipline Generi Ability Skill Cre Mar
mic Specific c Enhanc Enhance dits ks
Semes Elective Electiv ement ment
ters (DSE) e (GE) Compul (SEC)
sory
(AEC)
DC1:Mathematics
SEM-I DC2:a)Introduction to Programming -- GE-1: -- 20 200
through C ENVS
b)C Programming Lab
DC3: a) Data Structure & Algorithm Commu
SEM- b) Data Structure Lab -- GE-2: nicative -- 20 200
II DC4:Digital Logic System English/
Commu
nicative
Bengali/
Modern
Indian
Languag
e
DC5:Computer Organization &
SEM- Architecture -- GE-3: -- -- 24 200
III DC6: a)Operating System
b)Operating System Lab
DC7:a)Object Oriented
Programming with C++
b)Object Oriented Programming with
C++ Lab
DC8: Discrete Mathematics
SEM- DC9:a)Database Management -- GE-4: -- -- 24 200
IV System
b)Database Management System lab
using MySQL
DC10:a)Introduction to Arduino
sensors
b) Arduino sensors Lab
E2: (a)
Introduction
to Python
Programming
(b) Python
Programming
Lab
Page 2 of 29
DSE2:
E1:Operation
Research
E2:Intelligent
System
E3:Cloud
Computing
E4:Theory of
Computation
Page 3 of 29
SEM-I
Matrices: Review of fundamentals: Definition of matrix, order, Types of matrices: zero, row,
column, square, diagonal, scalar, unit, symmetric, skew-symmetric. Determinant: Value of
determinant of order 2x2, 3x3, minors, cofactors, adjoint, inverse of a matrix. Solutions of linear
equations: Cramers rule and matrix method involving two and three variables. Eigen values and
Eigenvectors: Characteristic equation, characteristic roots, characteristic vectors (without any
theorems) only 2x2 order.
Logarithms: Definition of Logarithm, Indices leading to Logarithms and vice versa, Laws of
Logarithms with proofs, and related Problems.
Permutation and Combination: Fundamental Principle of Counting, Factorial n, Permutations:
Definition, Examples, Derivation of Formula nPr, Permutation when all the objects are not distinct,
Problems, Combinations: Definition, examples, Proving nCr = nPr r!, nCr = nCn-r, nCr + nCr-1 =
n+1Cr, Problems based on above formulae.
Statistics : Definition of Statistics, Raw data, Classification of data, Average, Scatter, range,
Relationship between Mean, Median, Mode, Dispersion, Mean Deviation, Standard Deviation,
Variance.
Probability: Meaning of Probability, Random Experiment and outcome, Sample Space, Sample
Point, Type of Sample Space, Type of Events, and Probability of an Event, Total and Conditional
Probability, Probability distribution of a random Variable, Repeated independent (Bernouli) trials and
Binomial distribution.
Vectors: Definition of vector and scalar, vector addition, dot and cross product, projection of a vector
on the other (no geometrical meaning), area of parallelogram, area of a triangle.
Analytical Geometry in Two Dimensions: Coordinates, Distance formula, Section Formula, Area of
the Triangle formula (no derivation), Locus of point. Straight Line: Slope of a line and angle between
two lines, Various forms of equations of lines – Derivation and Problems. Equation of family of lines
passing through the point of intersection of two lines, Distance of a point from line (only problems).
Basic concepts on Circle, Parabola, Ellipse and its related problems.
Page 4 of 29
10. A Text book of Engineering Mathematics, H. S. Gangwar, P. Gupta, New Age
International Pub.
Page 5 of 29
v) Remove the duplicates from the array
vi) Print the array in reverse order
The program should present a menu to the user and ask for one of the options. The menu should also
include options to re-enter array and to quit the program.
11. WAP that prints a table indicating the number of occurrences of each alphabet in the text entered as
command line arguments.
12. Write a program that swaps two numbers using pointers.
13. Write a program in which a function is passed address of two variables and then alter its contents.
14. Write a program which takes the radius of a circle as input from the user, passes it to another
function that computes the area and the circumference of the circle and displays the value of area and
circumference from the main() function.
15. Write a program to find sum of n elements entered by the user. To write this program, allocate
memory dynamically using malloc() / calloc() functions or new operator.
16. Write a menu driven program to perform following operations on strings:
a) Show address of each character in string
b) Concatenate two strings without using strcat function.
c) Concatenate two strings using strcat function.
d) Compare two strings
e) Calculate length of the string (use pointers)
f) Convert all lowercase characters to uppercase
g) Convert all uppercase characters to lowercase
h) Calculate number of vowels
i) Reverse the string
17. Given two ordered arrays of integers, write a program to merge the two-arrays to get an ordered
array.
18. WAP to display Fibonacci series (i)using recursion, (ii) using iteration.
19. WAP to calculate Factorial of a number (i)using recursion, (ii) using iteration.
20. WAP to calculate GCD of two numbers (i) with recursion (ii) without recursion.
21. Create Matrix class using templates. Write a menu-driven program to perform following
Matrix operations (2-D array implementation):
a) Sum b) Difference c) Product d) Transpose
22. Copy the contents of one text file to another file, after removing all whitespaces.
23. Write a function that reverses the elements of an array in place. The function must accept only one
pointer value and return void.
24. Write a program that will read 10 integers from user and store them in an array.
Implement array using pointers. The program will print the array elements in ascending and descending
order.
Page 6 of 29
SEM-II
Some sample examples are given below. More problems can be included related to the theory.
Use open source C compiler (GCC).
1. Write a program to search an element from a list. Give user the option to perform Linear or Binary
search.
2. WAP using templates to sort a list of elements. Give user the option to perform sorting using
Insertion sort, Bubble sort, Selection sort etc.
3. Implement Singly Linked List. Include functions for insertion, deletion and search of a number,
reverse the list and concatenate two linked lists.
4. Implement Doubly Linked List using templates. Include functions for insertion, deletion and search
of a number, reverse the list.
5. Implement Circular Linked List. Include functions for insertion, deletion and search of a number,
reverse the list.
6. Perform Stack operations using Linked List implementation.
7. Perform Stack operations using Array implementation.
8. Perform Queues operations using Circular Array implementation.
9. Create and perform different operations on Double-ended Queues using Linked List
implementation.
10. WAP to scan a polynomial using linked list and add two polynomials.
11. WAP to calculate factorial and to compute the factors of a given no. (i)using recursion, (ii) using
iteration
12. WAP to display Fibonacci series (i)using recursion, (ii) using iteration.
Page 7 of 29
13. WAP to calculate GCD of 2 number (i) with recursion (ii) without recursion.
14. WAP to create a Binary Search Tree and include following operations in tree:
(a) Insertion (Recursive and Iterative Implementation)
(b) Deletion by copying
(c) Deletion by Merging
(d) Search a no. in BST
(e) Display its preorder, postorder and inorder traversals Recursively
(f) Display its preorder, postorder and inorder traversals Iteratively
(g) Display its level-by-level traversals
(h) Count the non-leaf nodes and leaf nodes
(i) Display height of tree
(j) Create a mirror image of tree
(k) Check whether two BSTs are equal or not
15. WAP to reverse the order of the elements in the stack using additional stack.
Page 8 of 29
Registers: Serial Input Serial Output, Serial Input Parallel Output, Parallel input Serial Output,
Parallel Input parallel Output, Universal Shift Registers.
Counters: Asynchronous Counter: UP/DOWN Counters, Mod - N Counters, BCD Counter,
Synchronous Counter: UP/DOWN Counters, Mod-N Counters.
Text/Reference Books:
1. Digital Circuits, Vol - I & II, D. Ray Chaudhuri, Platinum Publishers.
2. Digital Systems - Principle & Applications, Tocci & Widmer, EEE.
3. Digital Logic & State Machine Design, Comer, Oxford.
4. Digital Principle & Applications, Malvino & Leach, McGraw Hill.
5. Digital Design, Mano, PHI.
6. Digital Integrated Electronics- [Link] & [Link], McGraw Hill.
7. Digital Circuits and Design, Salivahan, Vikas
SEM-III
Page 9 of 29
Programming 8085: Instruction Set of 8085, Different Programming Techniques, Stack and
Subroutines.
Text/Reference Books:
1. Computer System Architecture, Morries Mano, Pearson.
2. Computer Organization & Architecture, Williams Stallings, Pearson.
3. Computer Organization, Hamacher, Vranesic and Zaky, McGraw Hill.
4. Computer Architecture and Organization, Govindrajalu, Tata McGraw Hill.
5. Computer Architecture and Organization, J P Hayes, Tata McGRaw Hill.
6. Structured Computer Organization, Andrew S. Tanenbaum, Austin, Pearson.
7. Microprocessor architecture, programming and applications with 8085/8085A, Wiley eastern Ltd,
by Ramesh S. Gaonkar.
8. Intel Corp: The 8085 / 8085A. Microprocessor Book – Intel marketing communication, Wiley inter
science publications.
Page 10 of 29
Some sample examples/Commands are given below. More problems can be included related to
the theory. Use open source system ( Debian OS ).
1. Usage of following commands: ls, pwd, tty, cat, who, who am I, rm, mkdir, rmdir, touch, cd.
2. Usage of following commands: cal, cat(append), cat(concatenate), mv, cp, man, date.
3. Usage of following commands: chmod, grep, tput (clear, highlight), bc.
4. Write a shell script to check if the number entered at the command line is prime or not.
5. Write a shell script to modify “cal” command to display calendars of the specified months.
6. Write a shell script to modify “cal” command to display calendars of the specified range of months.
7. Write a shell script to accept a login name. If not a valid login name display message – “Entered
login name is invalid”.
8. Write a shell script to display date in the mm/dd/yy format.
9. Write a shell script to display on the screen sorted output of “who” command along with the total
number of users .
10. Write a shell script to display the multiplication table any number,
11. Write a shell script to compare two files and if found equal asks the user to delete the duplicate
file.
12. Write a shell script to find the sum of digits of a given number.
13. Write a shell script to merge the contents of three files, sort the contents and then display them
page by page.
14. Write a shell script to find the LCD(least common divisor) of two numbers.
15. Write a shell script to perform the tasks of basic calculator.
16. Write a shell script to find the power of a given number.
17. Write a shell script to find the factorial of a given number.
18. Write a shell script to check whether the number is Armstrong or not.
19. Write a shell script to check whether the file have all the permissions or not.
20. Program to show the pyramid of special character “*”.
Page 11 of 29
Overview of Function Overloading and Operator Overloading: Need of Overloading functions
and operators, Overloading functions by number and type of arguments, Looking at an operator as a
function call, Overloading Operators (including assignment operators, unary operators)
Inheritance, Polymorphism and Exception Handling: Introduction to Inheritance (Multi-Level
Inheritance, Multiple Inheritance), Polymorphism (Virtual Functions, Pure Virtual Functions),
Abstract class, Basics Exceptional Handling (using catch and throw, multiple catch statements),
Catching all exceptions, Restricting exceptions.
Some sample examples are given below. More problems can be included related to the theory.
Use open source C++ compiler (GNU C++).
1. WAP to print the sum and product of digits of an integer.
2. WAP to reverse a number.
3. WAP to compute the sum of the first n terms of the following series S = 1+1/2+1/3+1/4+……
4. WAP to compute the sum of the first n terms of the following series S =1-2+3-4+5…………….
5. Write a function that checks whether a given string is Palindrome or not. Use this function to find
whether the string entered by user is Palindrome or not.
6. Write a function to find whether a given no. is prime or not. Use the same to generate the prime
numbers less than 100.
7. WAP to compute the factors of a given number.
8. Write a macro that swaps two numbers. WAP to use it.
9. WAP to print a triangle of stars as follows (take number of lines from user):
*
***
*****
*******
*********
10. WAP to perform following actions on an array entered by the user:
[Link] the even-valued elements
[Link] the odd-valued elements
[Link] and print the sum and average of the elements of array
[Link] the maximum and minimum element of array
[Link] the duplicates from the array
[Link] the array in reverse order
The program should present a menu to the user and ask for one of the options. The menu should also
include options to re-enter array and to quit the program.
11. WAP that prints a table indicating the number of occurrences of each alphabet in the text entered
as command line arguments.
12. Write a program that swaps two numbers using pointers.
13. Write a program in which a function is passed address of two variables and then alter its contents.
14. Write a program which takes the radius of a circle as input from the user, passes it to another
function that computes the area and the circumference of the circle and displays the value of area and
circumference from the main() function.
15. Write a program to find sum of n elements entered by the user. To write this program, allocate
Page 12 of 29
memory dynamically using new operator.
16. Write a menu driven program to perform following operations on strings:
a) Show address of each character in string
b) Concatenate two strings without using strcat function.
c) Concatenate two strings using strcat function.
d) Compare two strings
e) Calculate length of the string (use pointers)
f) Convert all lowercase characters to uppercase
g) Convert all uppercase characters to lowercase
h) Calculate number of vowels
i) Reverse the string
17. Given two ordered arrays of integers, write a program to merge the two-arrays to get an ordered
array.
18. WAP to display Fibonacci series (i)using recursion, (ii) using iteration
19. WAP to calculate Factorial of a number (i)using recursion, (ii) using iteration
20. WAP to calculate GCD of two numbers (i) with recursion (ii) without recursion.
21. Create Matrix class using templates. Write a menu-driven program to perform following Matrix
operations (2-D array implementation):
a) Sum b) Difference c) Product d) Transpose
22. Create the Person class. Create some objects of this class (by taking information from the user).
Inherit the class Person to create two classes Teacher and Student class. Maintain the respective
information in the classes and create, display and delete objects of these two classes (Use Runtime
Polymorphism).
23. Create a class Triangle. Include overloaded functions for calculating area. Overload assignment
operator and equality operator.
24. Create a class Box containing length, breath and height. Include following methods in it:
a) Calculate surface Area
b) Calculate Volume
c) Increment, Overload ++ operator (both prefix & postfix)
d) Decrement, Overload -- operator (both prefix & postfix)
e) Overload operator == (to check equality of two boxes), as a friend function
f) Overload Assignment operator
g) Check if it is a Cube or cuboid
Write a program which takes input from the user for length, breath and height to test the above class.
25. Create a structure Student containing fields for Roll No., Name, Class, Year and Total Marks.
Create 10 students and store them in a file.
26. Write a program to retrieve the student information from file created in previous question and
print it in following format:
Roll No. Name Marks
27. Copy the contents of one text file to another file, after removing all whitespaces.
28. Write a function that reverses the elements of an array in place. The function must accept only one
pointer value and return void.
29. Write a program that will read 10 integers from user and store them in an array. Implement array
using pointers. The program will print the array elements in ascending and descending order.
Page 13 of 29
1. C++: The Complete Reference, Herbtz Schildt,McGraw Hill.
2. The C++ Programming Language, Bjarne Stroustrup, Addison-Wesley.
3. Programming -- Principles and Practice using C++,Bjarne Stroustroup, Addison-Wesley.
4. Object Oriented Programming with C++, E Balaguruswamy, Tata McGraw-Hill Education.
5. C++ How to Program, Paul Deitel, Harvey Deitel, Prentice Hall.
6. Programming with C++, John R. Hubbard,Schaum's Series.
7. Accelerated C++, Andrew Koeni, Barbara, E. Moo, Published by Addison-Wesley.
8. Effective C++, Scott Meyers, Published by Addison-Wesley.
9. Head First C++ Programming: The Definitive Beginner's Guide, Harry, H. Chaudhary, First Create
space Inc, O-D Publishing, LLC USA.
10. Problem Solving with C++,Walter Savitch, Pearson Education.
11. C++ Primer, Stanley B. Lippman, JoseeLajoie, Barbara E. Moo, Published by Addison-Wesley.
SEM-IV
Page 14 of 29
DC9: a) Database Management System: 60 hours
Introduction: Drawbacks of file System; Advantages of DBMS; Layered Architecture of Database,
Data Independence; Data Models; Schemas And Instances; Database Languages; Database Users,
DBA; Data Dictionary; Functional Components of a DBMS.
Entity Relationship(ER) Modelling: Entity, Attributes and Relationship, Structural Constraints,
Keys, ER Diagram of Some Example Database, Weak Entity Set, Specialization and Generalization,
Constraints of Specialization and Generalization, Aggregation.
Relational Model: Basic Concepts of Relational Model; Relational Algebra.
Integrity Constraints: Domain Constraints, Referential Integrity, Assertions, Triggers.
Relational Database Design: Problems of Un-Normalized Database; Functional Dependencies (FD),
Derivation Rules, Closure of FD Set, Membership of A Dependency, Canonical Cover;
Decomposition to1NF, 2NF, 3NF and BCNF Using FD; Lossless Join Decomposition; Dependency
preservation.
SQL: Basic Structure, Data Definition, Constraints and Schema Changes; Basic SQL Queries
(Selection, Insertion, Deletion, Update); Order by Clause; Complex Queries, Aggregate Function and
Group by Clause; Nested Sub Queries; Correlated Sub Queries; Views (Insert-Able and Updatable),
Joined Relations; Set Comparisons (All, Some).
Record Storage and File Organization (Concepts only): Fixed Length and Variable Length
Records; Spanned and Un-Spanned Organization of Records; Primary File Organizations and Access
Structures Concepts; Unordered, Sequential, Hashed; Concepts of Primary and Secondary Index;
Dense and Sparse Index; Index Sequential Files; Multilevel Indices.
Transaction Processing (Concepts only): ACID Properties; Transaction States, Concurrent
Execution; Serializability (Conflict and View), Recoverability, Test for Serializability.
Page 15 of 29
Some sample examples are given below. More problems can be included related to the theory.
Use open source system.
DDL Commands
• Create table, alter table, drop table.
DML Commands
• Select , update, delete, insert statements
• Condition specification using Boolean and comparison operators (and, or, not,=,<>,>,<,>=,<=)
• Arithmetic operators and aggregate functions(COUNT, SUM, AVG, MIN, MAX)
• Multiple table queries (join on different and same tables)
• Nested select statements
• Set manipulation using (any, in, contains, all, not in, not contains, exists, not exists, union, intersect,
minus, etc.)
• Categorization using group by, having
• Arranging using order by
Page 16 of 29
15. Make a list of all project numbers for projects that involve an employee whose last name is
'Narayan’ either as a worker or as a manager of the department that controls the project.
16. Increase the salary of all employees working on the 'ProductX' project by 15%. Retrieve employee
name and increased salary of these employees.
17. Retrieve a list of employees and the project name each works in, ordered by the employee's
department, and within each department ordered alphabetically by employee first name.
18. Select the names of employees whose salary does not match with salary of any employee in
department 10.
19. Retrieve the name of each employee who has a dependent with the same first name and same sex
as the employee.
20. Retrieve the employee numbers of all employees who work on project located in Bellaire,
Houston, or Stafford.
21. Find the sum of the salaries of all employees, the maximum salary, the minimum salary, and the
average salary. Display with proper headings.
22. Find the sum of the salaries and number of employees of all employees of the ‘Marketing’
department, as well as the maximum salary, the minimum salary, and the average salary in this
department.
23. Select the names of employees whose salary is greater than the average salary of all employees in
department 10.
24. For each department, retrieve the department number, the number of employees in the department,
and their average salary.
25. For each project, retrieve the project number, the project name, and the number of employees who
work on that project.
26. Change the location and controlling department number for all projects having more than 5
employees to ‘Bellaire’ and 6 respectively.
27. For each department having more than 10 employees, retrieve the department no, no of employees
drawing more than 40,000 as salary.
28. Insert a record in Project table which violates referential integrity constraint with respect to
Department number. Now remove the violation by making necessary insertion in the Department
table.
29. Delete all dependents of employee whose ssn is ‘123456789’.
30. Delete an employee from Employee table with ssn = ‘12345’( make sure that this employee has
some dependents, is working on some project, is a manager of some department and is supervising
some employees). Check and display the cascading effect on Dependent and Works on table. In
Department table MGRSSN should be set to default value and in Employee table SUPERSSN should
be set to NULL
31. Perform a query using alter command to drop/add field and a constraint in Employee table.
Page 17 of 29
DC10: a) Introduction to Arduino Sensors: 60 hours
Introduction: Arduino Basics, The Arduino UNO platform, Block Diagram, Architecture.
Arduino Basic programming essentials: Arduino Control structure, Arduino Functions, Arduino
operators, Arduino Sketch Structure.
Interfacing: LED with Arduino, Working of LED, Sketch for blinking LED using delay function,
Sketch Explanation, Interfacing LCD display with Arduino, Interfacing different sensors with
Arduino Sensor.
IR Sensor: Introduction to IR Sensor, Working of IR sensor, Pinouts of IR sensor, Connection of IR
sensor with Arduino, Sketch showing working of IR sensor, Sketch explanation Sensor.
Interfacing with Sensors: Introduction to HC-SR04, Working of HC-SR04, Pinouts of HC-SR04,
Connection of HC-SR04 with Arduino. Interfacing with Humidity sensor (DHT22), Temperature
sensor (LM35), PIR SENSOR, GPS.
Text/Reference books:
1. Make: Sensors, Book by Kimmo Karvinen, Tero Karvinen, and Ville Valtokari.
2. Getting Started with Sensors: Measure the World with Electronics, Arduino and Raspberry Pi by
Kimmo Karvinen and Tero Karvinen
3. Arduino Programming in 24 Hours, Sams Teach Yourself, Pearson
SEM-V
DC11: Data Communication &Networking: 60 hours
Data Communication Concepts: Analog and Digital Signals, Periodic and Non-periodic signals,
Time and Frequency Domain, Bandwidth and Data rate, Signal rate, Serial and Parallel Transmission.
Protocol.
Various modes of transmission: Simplex/ Half Duplex, Duplex; Features of guided and unguided
transmission media; Circuit Switching, Packet Switching; transmission impairment.
Physical structure of Network: Types of connections (Topologies), Categories of Computer
Network: LAN, MAN, WAN; Digital to Digital conversion: line coding schemes;Analog to Digital
Conversion: PCM, DM; Digital to Analog conversion: ASK,PSK,FSK,QAM; Modulation and
Encoding: AM, FM, PM; Multiplexing: FDM, TDM, WDM; OSI &TCP/IP Model.
Error detection and correction: CRC, Checksum, Hamming Code;
Page 18 of 29
Protocols: IP, ARP, RARP, TCP, UDP, SMTP, FTP, DNS, DHCP etc.
Text/Reference books:
1. Data Communications and Networking ,B. A. Forouzan, THM.
2. Computer Networks , A.S. Tanenbaum, PHI.
3. Data and Computer Communication, W. Stallings, PHI/ Pearson Education
4. Data & Computer Communication, Black, PHI.
Page 19 of 29
DS[Link] a) Introduction to Java Programming: 60 hours
Introduction to Java: Java Architecture and Features, Compiling and Executing a Java Program,
Variables, Constants, Keywords Data Types, Operators (Arithmetic, Logical and Bitwise) and
Expressions, Comments, Doing Basic Program Output, Decision Making Constructs (conditional
statements and loops) and Nesting, Java Methods (Defining, Scope, Passing and Returning
Arguments, Type Conversion and Type and Checking, Built-in Java Class Methods),
Arrays, Strings and I/O: Creating & Using Arrays (One Dimension and Multi-dimensional),
Referencing Arrays Dynamically, Java Strings: The Java String class, Creating & Using String
Objects, Manipulating Strings, String Immutability & Equality, Passing Strings To & From Methods,
String Buffer Classes. Simple I/O using [Link] and the Scanner class, Byte and Character
streams, Reading/Writing from console and files.
Object-Oriented Programming Overview: Principles of Object-Oriented Programming, Defining &
Using Classes, Controlling Access to Class Members, Class Constructors, Method Overloading, Class
Variables & Methods, Objects as parameters, final classes, Object class, Garbage Collection.
Inheritance, Interfaces, Packages, Enumerations, Auto-boxing and Metadata: Single Level and
Multilevel, Method Overriding, Dynamic Method Dispatch, Abstract Classes, Interfaces and
Packages, Extending interfaces and packages, Package and Class Visibility, Using Standard Java
Packages (util, lang, io, net), Wrapper Classes, Autoboxing/Unboxing, Enumerations and Metadata.
Exception Handling, Threading, Networking and Database Connectivity: Exception types,
uncaught exceptions, throw, built-in exceptions, Creating your own exceptions; Multi-threading: The
Thread class and Runnable interface, creating single andmultiple threads. Accessing and manipulating
databases using JDBC.
Applets and Event Handling: Java Applets: Introduction to Applets, Writing Java Applets, Working
with Graphics, Incorporating Images & Sounds. Event Handling Mechanisms, Listener Interfaces,
Adapter and Inner Classes. The design and Implementation of GUIs using the AWT controls, Swing
components of Java Foundation Classes such as labels, buttons, text fields, layout managers, menus,
events and listeners; Graphic objects for drawing figures such as lines, rectangles, ovals, using
different fonts. Overview of servlets.
Page 20 of 29
should also show that primitive data types are passed by value and objects are passed by reference and
to learn use of final keyword
12. Write a program to show the use of static functions and to pass variable length arguments in a
function.
13. Write a program to demonstrate the concept of boxing and unboxing.
14. Create a multi-file program where in one file a string message is taken as input from the user and
the function to display the message on the screen is given in another file (make use of Scanner
package in this program).
15. Write a program to create a multilevel package and also creates a reusable class to generate
Fibonacci series, where the function to generate Fibonacii series is given in a different file belonging
to the same package.
16. Write a program that creates illustrates different levels of protection in classes/subclasses
belonging to same package or different packages
17. Write a program ―DivideByZero‖ that takes two numbers a and b as input, computes a/b, and
invokes Arithmetic Exception to generate a message when the denominator is zero.
18. Write a program to show the use of nested try statements that emphasizes the sequence of
checking for catch handler statements.
19. Write a program to create your own exception types to handle situation specific to your
application (Hint: Define a subclass of Exception which itself is a subclass of Throwable).
20. Write a program to demonstrate priorities among multiple threads.
21. Write a program to demonstrate multithread communication by implementing synchronization
among threads (Hint: you can implement a simple producer and consumer problem).
22. Write a program to create URL object, create a URLConnection using the openConnection()
method and then use it examine the different components of the URLand content.
23. Write a program to implement a simple datagram client and server in which a message that is
typed into the server window is sent to the client side where it is displayed.
24. Write a program that creates a Banner and then creates a thread to scrolls the message in the
banner from left to right across the applet„s window.
25. Write a program to get the URL/location of code (i.e. java code) and document(i.e. html file).
26. Write a program to demonstrate different mouse handling events like mouseClicked(),
mouseEntered(), mouseExited(), mousePressed, mouseReleased() and mouseDragged().
27. Write a program to demonstrate different keyboard handling events.
28. Write a program to generate a window without an applet window using main() function.
Page 21 of 29
Introduction to Python: Python Interpreter, Using Python as calculator, Python shell, Indentation,
Atoms, Identifiers and keywords, Literals, Strings, Operators(Arithmetic operator, Relational
operator, Logical or Boolean operator, Assignment, Operator, Ternary operator, Bit wise operator)
Creating Python Programs: Input and Output Statements, Control statements (Branching, Looping,
Conditional Statement, Exit function, Difference between break, continue and pass.), Defining
Functions, default arguments, Exception handling.
Iteration and Recursion: Conditional execution, Alternative execution, Nested conditionals, Return
statement, Recursion, Stack diagrams for recursive functions, Multiple assignment, while statement,
for statement.
Strings and Lists: String as a compound data type, Length, Traversal and the for loop, String slices,
String comparison, A find function, Looping and counting, List values, Accessing elements, List
length, List membership, Lists and for loops, List operations, List deletion; Nested lists.
Object Oriented Programming: Introduction to Classes, Objects and Methods, Standard Libraries.
Page 22 of 29
2. Schaum's Outline of Operations Research, Richard Bronson and GovindasamiNaadimuthu,
McGraw-Hill Education
3. Operations Research: An Introduction, Hamady.A. Taha, TMH
4. Operations Research: Applications and Algorithms, Wayne L. Winston, Duxbury Press
5. Operations Research Techniques for Management by [Link], Sultan Chand and Sons
6. Introduction to Operations Research, Frederick S. Hillier and G. Lieberman, McGraw-Hill Higher
Education
Introduction: Introduction to Artificial Intelligence, Background and Applications, Turing Test and
Rational Agent approaches to AI, Introduction to Intelligent Agents, their structure, behavior and
environment.
Problem Solving and Searching Techniques: Problem Characteristics, Production Systems, Control
Strategies, Breadth First Search, Depth First Search, Hill climbing and its Variations, Heuristics
Search Techniques: Best First Search, A* algorithm, Constraint Satisfaction Problem, Means-End
Analysis, Introduction to Game Playing, Min-Max and Alpha-Beta pruning algorithms.
Knowledge Representation: Introduction to First Order Predicate Logic, Resolution Principle,
Unification, Semantic Nets, Conceptual Dependencies, Frames, and Scripts, Production Rules,
Conceptual Graphs. Programming in Logic (PROLOG)
Dealing with Uncertainty and Inconsistencies: Truth Maintenance System, Default Reasoning,
Probabilistic Reasoning, Bayesian Probabilistic Inference, Possible World Representations.
Page 23 of 29
2. Cloud Computing: Principles and Paradigms, Rajkumar Buyya, James Broberg, Andrzej M.
Goscinski, Wiley.
3. Cloud Computing: Principles, Systems and Applications, Nikos Antonopoulos, Lee Gillam,
Springer.
4. Cloud Computing: A Hands-on Approach, ArshdeepBahga and Vijay Madisetti, University Press.
5. Cloud Security: A Comprehensive Guide to Secure Cloud Computing, Ronald L. Krutz, Russell
Dean Vines, Wiley-India.
6. Cloud Computing, A Practical Approach, Toby Velte, Anthony Velte, Robert Elsenpeter, McGraw
Hills.
7. Cloud Computing Strategies , Dimitris N. Chorafas, CRC Press.
Page 24 of 29
M2M and IoT Technology Fundamentals- Devices and gateways, Local and wide area networking,
Data management, Business processes in IoT, Everything as a Service(XaaS), M2M and IoT
Analytics, Knowledge Management.
M2M to IoT – A Market Perspective– Introduction, Some Definitions, M2M Value Chains, IoT
Value Chains, An emerging industrial structure for IoT, The international driven global value chain
and global information monopolies. M2M to IoT-An Architectural Overview– Building architecture,
Main design principles and needed capabilities, An IoT architecture outline, standards considerations.
IoT Reference Architecture- Introduction, Functional View, Information View, Deployment and
Operational View, Other Relevant architectural views.
Real-World Design Constraints- Introduction, Technical Design constraintshardware is popular
again, Data representation and visualization, Interaction and remote control.
Industrial Automation- Service-oriented architecturebased device integration, SOCRADES:
realizing the enterprise integrated Web of Things, IMC-AESOP: from the Web of Things to the Cloud
of Things
SEM-VI
DC13: Software Engineering: 60 hours
Introduction: Defining system, open and closed system, modelling of system through computer
hardware, communication systems, external agents and software systems; Importance of Engineering
Methodology towards computerization of a system
Software Life Cycle: Classical and Iterative Waterfall Model; Spiral Model and its importance
towards application for different system representations, Comparative Studies
Software Requirement and Specification Analysis: Requirements Principles and its analysis
principles; Specification Principles and its representations
Software Design Analysis – Different level of DFD Design, Physical and Logical DFD, Use and
Conversions between them, Process Representation – Pseudo English, Tight English, Decision Tables
and Trees, Structured analysis – Structure Chart Conversion from DFD: Transform Centric and
Transaction Centric conversions algorithms, Coupling and Cohesion of the different modules
Software Cost Estimation Modelling – Heuristic and Empirical Modelling; COCOMO
Software Testing: Software Verification and Validation; Testing objectives, Testing Principles,
Testability; Error and Faults; Unit Testing, White Box and Blank Box Testing, Test Case Design: Test
Vector.
Software Quality Assurances: Concepts of Quality, Quality Control, Quality Assurance, SQA
Activities, IEEE Standard for Statistical Software Quality Assurances (SSQA) criterions.
Page 25 of 29
Text/ Reference Books:
1. Software Engineering: A Practitioner’s Approach by R.S. Pressman, McGraw-Hill.
2. An Integrated Approach to Software Engineering by P. Jalote, Narosa Publishing House.
3. Software Engineering by K.K. Aggarwal and Y. Singh, New Age International Publishers.
4. Software Engineering by I. Sommerville, Addison Wesle.
5. Software Engineering for Students by D. Bell, Addison-Wesley.
6. Fundamentals of Software Engineering by R. Mall, PHI.
Introduction: Image definition and its representation, Pixels, Co-ordinate conventions, Image
formats (Study of the image matrix), neighbourhood metrics, Sampling and quantization, Types of
distance measure (concept only).
Spatial Domain: Image enhancement techniques in spatial domain, Contrast stretching, Histogram
Processing, Noise smoothing, Sharpening, Pixel Classification.
Thresholding: Grey level thresholding, global/ local thresholding, Iterative thresholding, Edge
detection operators, Region growing, Split/ merge techniques, Image feature/ primitive extraction,
Background correction, Color enhancement.
Image restoration: Basic Framework, Interactive Restoration, Image deformation and geometric
transformations, image morphing, Restoration techniques, Noise characterization, Noise restoration
filters, Restoration from projections, Hough transform, Huffman coding, Segmentation.
Page 26 of 29
Image Segmentation: Boundary detection based techniques, Point, line detection, Edge detection,
Local processing.
Introduction: Data Analytics Lifecycle Overview, Data Preparation, Model Planning, Model
Building;
Clustering: K-means; Association Rules:Apriori Algorithm;
Regression: Linear Regression; Classification: Decision Trees: Overview of a Decision Tree,
Decision Tree Algorithms, Evaluating a Decision Tree;
The Basics of NumPy Arrays; Basics of Data Manipulation with Pandas and Visualization with
Matplotlib.
Page 27 of 29
Fuzzy Rule based Systems: Linguistic Hedges, Fuzzy Rule based system – Aggregation of fuzzy
Rules, Fuzzy Inference System, Mamdani Fuzzy Models – Takagi-Sugeno Fuzzy Models.
Neural Networks: Introduction to Neural Networks: Advent of Modern Neuroscience, Classical AI
and Neural Networks, Biological Neurons and Artificial neural network; model of artificial neuron.
Learning Methods: Hebbian, competitive, Boltzman.
Neural Network models: Perceptron, Adaline and Madaline networks; single layer network; Delta
rule and back-propagation; and multi layer networks.
DSE-4: Project
Guidelines: Each student of BCA (Honours) SEM- VI will carry out one project work under the
supervision of a faculty member of the college. The project will be assigned at the beginning of SEM-
VI academic session. The maximum size of student group can be of three (03) students. The student
will submit a project report representing the actual work in a suitable format. The student should
defend the project before the examiners. The project work will be evaluated on the basis of
presentation and viva-voce examination. The examination will be as per University guidelines.
Project Report should contain the following:
1 Title of the Project
2 Objectives of the Project
3 Analysis Report in a suitable format
4 Detailed Design steps
5 Circuit Layout/Program Listing
6 Testing and Analysis
7 Conclusion and future scope for development
8 Bibliography
Broad areas: Computer Networking, Network Protocol, Application DBMS, Multimedia, Graphics,
Internet based application, Software Engineering Tool Development, Simulation, any other related
topics, I/O Controller, I/O interfaces, Microprocessor based system, IOT based system etc.
Marks Allotment:
Project Report 08 marks
Presentation 07 marks
Project Work 20 marks
Viva-voce 15 marks
Page 28 of 29
SEC-2: Introduction to PHP: 60 hours
Introduction: PHP introduction, inventions and versions, scope, important tools and software
requirements (like Web Server, Database, Editors etc.), Basic Syntax, PHP variables and constants,
Types of data in PHP , Expressions, scopes of a variable (local, global), PHP Operators: Arithmetic,
Assignment, Relational , Logical operators, Bitwise , ternary and MOD operator, PHP operator
Precedence and associatively.
Handling HTML form with PHP: Basic Input and Attributes, Other Kinds of Inputs, Styling forms
with CSS, Where to Go from Here Capturing Form Data, GET and POST form methods, Dealing with
multi value fields, Redirecting a form after submission.
PHP conditional events and Loops: PHP IF Else conditional statements (Nested IF and Else),
Switch case, while, For and Do While Loops, Goto, Break, Continue and exit.
PHP Functions: Function, Need of Function, declaration and calling of a function, PHP Function
with arguments, Default Arguments in Function, Function argument with call by value, call by
reference, Scope of Function Global and Local, Creating and accessing String, Searching & Replacing
String; Formatting, joining and splitting String, String Related Library functions;
Array: Anatomy of an Array ,Creating index based and Associative array, Accessing array; Looping
with Index based array, with associative array using each() and foreach(); Some useful Library
function. PHP database (MySQL) interface.
Page 29 of 29