ComputerScience Syllabus For M SC
ComputerScience Syllabus For M SC
JOSEPH’S UNIVERSITY
BENGALURU-27
Provide high quality training to the students through the latest computer technology.
To trigger their mind in the field of project, provide an ambiance of learning, inculcate
interdisciplinary approach in project and in working environment.
To enable the students to develop their team building and communication skills with the
professional approach.
FIRST SEMESTER
THEORY
PRACTICAL
SECOND SEMESTER
THEORY
PRACTICAL
THIRD SEMESTER
THEORY
PRACTICAL
THEORY
PRACTICAL
ACTIVITY: 20 Marks
The MSE for PG will be conducted two times for 25 marks for 4 credit courses, and is for 1hour duration, marks
of both activity and MSE will be brought down to 50. 50% of the portion in the syllabus must be covered for the
MSE.
Activity + MSE = 70 which is converted to 50
Part A
Part B
Part C
Three questions out of four (include subparts), each carries 10 marks ( 3 * 10=30marks)
INTERNAL AND End Semester Practical Exam FOR THE PRACTICAL PAPERS.
Every session will be evaluated for 25 marks – Writing 10, Execution 5, Record 5 and Viva 5 marks
End Semester Practical Exam will be 25 marks – Writing 2 programs 10 marks, Execution 10 marks, Viva 5
marks.
PRACTICAL QUESTION PAPER FORMAT
Scheme of valuation:
Total 25 marks
Number of credits 04
Objectives
To introduce the concepts and principles of Java Programming language and to design and implement object-
oriented solutions to the simple and complex problems. Also, to give students experience in Java Programming
and GUI application design with data base.
Unit 1 12Hrs
Unit 2 12Hrs
Inheritance in Java
Inheritance Basics - Multilevel Hierarchy- Using super - Method overriding - Abstract keyword- Using final
with inheritance.
Unit 3 12Hrs
Java Thread Model - Life cycle of a Thread - Java Thread Priorities - Runnable interface and Thread Class-
Thread Synchronization – Inter Thread Communication.
The Collections Overview – Collection Interface – List Interface – Set Interface – SortedSet Interface –
Queue Interface - ArrayList Class – LinkedList Class – HashSet Class – Using an Iterator – The For Each
Statement
Unit 4 12Hrs
Swing Basics – Components and Containers – JLabel and ImageIcons- JTextField – Swing Buttons –
JTabbedPane – JScrollPane – JList – JComboBox – JTable – Swing Menus
Event Handling
Delegation EventModel- Event Classes – Key Event Class – Event Listener Interface –AdapterClasses
Unit 5 12Hrs
Introduction to JDBC, JDBC Drivers and Architecture, Connecting to and querying a database–Automatic
driver recovery- -Creating a Statement for executing query-Executing a query-Processing a Query’s Result
Set
REFERENCES
BLUEPRINT
Program List
CO2 Understand Have developed a very good understanding on Advanced concepts of Java
Programming, syntax and programming conventions.
CO5 Create Be able to develop complete real world problems with appropriate Java
coding knowledge.
Course Content and Outcomes
Semester I
Number of credits 04
Objectives
The Course is designed to give theoretical understanding of the subject from the perspective of formal
languages and to lay foundations for Compiler Design and Concurrent design. To develop Problem Solving
Ability. Through the contents of the course the students will be able to understand Automata Theory, Formal
Languages, Computability Theory, Context Free Grammars and Various Machines.
UNIT-I
Introduction to Finite Automata, Definition of Alphabets, Strings, Languages, Sentences , Transition Functions
and Extended Transition Functions, Notations to represent Automata
UNIT-II
Problem solving in DFA and NFA, Conversions from NFA to DFA, Finite automata with Epsilon-transitions,
Conversions from Epsilon-NFA to DFA, Equivalence and Minimization of DFA
Proving languages not to be regular languages, Closure and Decisive properties of regular languages
UNIT-III
UNIT-IV
Definition of the Pushdown automata and 7 of PDA, Deterministic, nondeterministic and Instantaneous
descriptions of PDAs, Language acceptance by final states and by empty stack. PDA Problems.
UNIT-V
The turning machine; Programming techniques for Turning Machines, Extensions to the basic Turning
Machines, Turing Machine and Computers
b. Decidability 2Hrs
Undecidable Problems in Language Theory, Simple Undecidable Problem and Mapping Reducibility.
References
BLUEPRINT
Chapter Number of Hours Total marks for which the questions are to be
asked (including bonus questions)
Unit I 14 8
Unit II 12 8
Unit III 14 10
Unit IV 10 20
Unit V 10 20
TOTAL 60 66
CO4 Analyze Analyze and design Finite automata, Pushdown automata, Turing
machines, Formal languages, and Grammars.
CO5 Evaluate Solve Computational problems and able toprove the basic result of
Theory of Computation
CO6 Create Construct algorithms for different problems and argue formally about
correctness on different restricted machine models of computation.
Semester I
Number of credits 04
Objectives
This paper introduces the paradigms and approaches used to analyze and design algorithms and to appreciate the
impact of algorithm design in practice. It introduces the classic algorithms in the various domains and the
different techniques for designing efficient algorithms.
UNIT 1 12 HRS
INTRODUCTION
The Role of Algorithms in Computing. Analyzing Algorithms, Growth of functions using Asymptotic Notation,
Recurrence relations. Design Methods: General Consideration, Algorithm design paradigms and representative
problems.
UNIT 2 12 HRS
UNIT 3 12 HRS
GREEDY METHOD
Minimal Spanning Tree, Shortest Paths, Knapsack Problem. Dynamic Programming, Chained Matrix
Multiplication, Optimal Storage on Tapes, Shortest Paths (Dijkstra’s and Floyd– Warshall algorithm), Optimal
Search Trees.
UNIT 4 12 HRS
BACKTRACKING METHOD
8-queens problem, Graph Coloring, Hamiltonian Cycles, Branch and Bound -0/1 Knapsack problem, Travelling
Salesman problem, Approximation Graph Coloring, Task Scheduling, Bin Packing.
UNIT 5 12 HRS
GRAPH ALGORITHMS
BFS, DFS and its applications. Polynomial Evaluation, Intractable Problems: Basic Concepts, Nondeterministic
Algorithms, NP Completeness, Cook's Theorem, Examples of NP-Hard and NP-Complete problems.
REFERENCES:
Unit I 12 8
Unit II 12 8
Unit III 12 10
Unit IV 12 20
Unit V 12 20
TOTAL
60 66
Maximum marks for the paper (Excluding bonus question)= 50
Practical II
Program List
1. Implementing Divide and Conquer MinMax Algorithm find the greatest and the smallest numbers from a
given set of numbers.
2. Sort a given set of elements using the Quicksort method and determine the time required to sort the elements.
3. Implement Merge Sort algorithm to sort a given set of elements and determine the time required to sort the
elements
5. Compute the transitive closure of a given directed graph using Warshall's algorithm.
7. From a given vertex in a weighted connected graph, find shortest paths to other vertices using Dijkstra's
algorithm.
8. Find Minimum Cost Spanning Tree of a given undirected graph using Kruskal's algorithm.
9. Print all the nodes reachable from a given starting node in a digraph using BFS method.
10. Check whether a given graph is connected or not using DFS method.
Course Outcomes: At the end of the course, the student should
CO1 Knowledge Demonstrate a familiarity with major algorithms and data structures.
CO2 Understand Ability to understand how the choice of data structures and the
algorithm design methods impact the performance of programs
CO2 Apply Ability to choose appropriate algorithm design techniques for solving
problems
CO3 Analyze Ability to analyze the performance of algorithms
CO4 Evaluate Be able to evaluate the algorithms based on its time and space
complexity.
CO5 Create Developing efficient algorithms for simple computational tasks
Semester I
Number of credits 04
Objectives
This course deals with how to protect information and information infrastructure in cyberspace, build capabilities
to prevent and respond to cyber threats, reduce vulnerabilities and minimize damage from cyber incidents through
a combination of institutional structures and cyber laws.
.
UNIT-I
Cryptography 12 Hours
Introduction to Cryptography, Symmetric key Cryptography, Asymme tric key Cryptography ,Convention
Encryption Model, Classical Encryption Techniques, Simplified DES, Block Cipher Principles, The Data
Encryption Standard, The Strength Of DES, Differential And Linear Cryptanalysis Block Cipher, Design
Principles, Block Cipher Modes Of Operations, Conventional Encryption Algorithms, Public Key Encryption.
UNIT-2
Network Security 14 Hours
Introduction To The Concepts Of Security, Security Approaches, Principles Of Security, Types Of Attacks,
Intruders, (IDS and IPS)Intrusion Detection And Prevention System, Message Authentication, Digital
Signatures, Applications of Cryptography. Overview of Firewalls- Types of Firewalls, User Management,
VPN Security Protocols: - security at the Application Layer- PGP and S/MIME, Security at Transport
Layer- SSL and TLS, Security at Network Layer-IPSec.
UNIT- 3
UNIT-4
Introduction, Cyber Security Regulations, Roles of International Law, the state and Private Sector in
Cyberspace, Cyber Security Standards. The INDIAN Cyberspace, National Cyber Security Policy 2013.
UNIT-5
REFERENCES:
Stallings, “Cryptography & Network Security - Principles & Practice”, Prentice Hall, 3rd Edition.
Dan Shoemaker and Wm. Arthur Conklin, Cyber security: The Essential Body Of Knowledge, Delmar
Cengage Learning; 1 edition
BLUEPRINT
Unit I 12 8
Unit II 14 8
Unit III 12 10
Unit IV 10 20
Unit V 12 20
TOTAL
60 66
Maximum marks for the paper (Excluding bonus question) = 50
Course Outcomes: At the end of the course, the student should
CO1 Knowledge Have developed a good knowledge about securing both clean and corrupted systems,
protect personal data, and secure computer networks.
CO2 Understand Have developed a very good understanding on key terms and concepts in cyber law,
intellectual property and cyber-crimes, trademarks and domain theft.
CO5 Create Be able to develop policies and procedures to manage enterprise security risks
Semester II
Number of credits 04
Objectives
This paper covers database design and SQL; it also provides an understanding of relational Database, Parallel
Database and Data Warehouse. It emphasis on a practical approach to design a Complete database for various
entities.
UNIT I
Database Concepts:
All SQL commands with certain entities. (Bank, Education Institution, Library Management System etc.)
UNIT II
Definition of Transaction and ACID properties, transaction Recovery, Concurrency Control Techniques: Lock
based Concurrency control -Optimistic Concurrency ControlTimestamp based Concurrency Control, Deadlocks.
Security Issues, Control Measures- Discretionary, mandatory and role based access control.
Recovery Concepts- Deferred Update and Immediate Update techniques, Shadow Paging – ARIES.
UNIT III
PARALLEL DATABASES:
Inter and Intra Query Parallelism – Inter and Intra operation Parallelism Design of Parallel Systems.
Distributed Data Storage – Distributed Transactions – Commit Protocols – Concurrency Control – Distributed
Query Processing.
Comparative study between inter and intra operation parallelism (Case Study)
UNIT IV
OLTP Systems, Differences between OLTP Systems and Data Warehouse, Characteristics of Data Warehouse,
Functionality of Data Warehouse, Advantages and Applications of Data Warehouse.
b. Methodology 6 Hrs
Top- Down and Bottom-Up Development Methodology, Tools for Data warehouse development, Data
Warehouse Types.
UNITV
Data Warehouse Architecture:
a. Introduction 4 Hrs
Components of Data warehouse Architecture, Dimensional Modeling- Introduction, E-R Modeling, E-R
Modeling VS Dimensional Modeling.
Star Schema, Inside Dimensional Table, Inside Fact Table, Fact Less Fact Table, Granularity, Star Schema
Keys, Snowflake Schema, Fact Constellation Schema.
Introduction to OLAP, Characteristics of OLAP, Steps in the OLAP Creation Process, Advantageous of OLAP,
What is Multidimensional Data.
MOLAP, ROLAP, HOLAP, Data Warehouse and OLAP-Hypercube & Multi cubes.
REFERENCES:
• Jeffrey D. Ullman “Principles of Database Systems”, Third Edition, Galgotia Publication
Pvt. Ltd.
• R. Elmasri, S.B. Navathe, “Fundamentals of Database Systems”, Fifth Edition,Pearson Education/Addison
Wesley, 2008.
• .Henry F Korth, Abraham Silberschatz, S. Sudharshan, “Database System Concepts”,
sixth Edition, McGraw Hill, 2011.
• C.J.Date, A.Kannan, S.Swamynathan, “An Introduction to Database Systems”,
Eighth Edition, Pearson Education, 2006.
• Alex Berson and Stephen J.Smith, “Data Warehousing, Data Mining and OLAP”, Tata McGraw – Hill
Edition, Thirteenth Reprint 2008.
• Jiawei Han and Micheline Kamber, “Data Mining Concepts and Techniques”, Third Edition, Elsevier, 2012.
BLUEPRINT
UNIT I 12 8
UNIT II 12 8
UNIT III 12 10
UNIT IV 12 20
UNIT V 12 20
TOTAL 60 66
CO1 Knowledge Have developed a good knowledge of the DBMS tools used to
design Database
CO2 Understand Have developed a very good understanding of advanced
feature to modify the content of the database
CO3 Apply Be able to implement various commands in manipulating and
maintaining the Database for various entities
CO4 Analyze Able to estimate the query based cost for an efficient and
dynamic Database.
CO5 Evaluate Able to select best tools required for the front end design along
with database.
CO6 Create Able to create complete Database and maintain without
anomalies.
Course Content and Outcomes
Semester II
Number of credits 04
Objectives
This paper enables students to acquire basic knowledge in machine learning techniques and learn to apply
the techniques in the area of pattern recognition and data analytics. Also this paper introduces python
programming language as a machine learning tool.
UNIT 1 12Hrs
INTRODUCTION
Machine Learning, types of machine learning, examples. Supervised Learning: Learning class from
examples, learning multiple classes, regression, model selection and generalization, Parametric Methods,
parametric classification.
UNIT 2 12Hrs
DIMENSIONALITY REDUCTION
Introduction, subset selection, principal component analysis, factor analysis, linear discriminant analysis.
CLUSTERING
Introduction, mixture densities, k-means clustering, hierarchical clustering, Spectral clustering, choosing
the number of clusters.
UNIT 3 12Hrs
DECISION TREES
Introduction, univariate trees, pruning, rule extraction from trees, learning rules from data.
BAYESIAN CLASSIFIER
Conditional probability, Bayes Theorem, Naïve Bayes algorithm, using numeric features with Naïve
Bayes algorithm.
MULTILAYER PERCEPTRON
UNIT 4 12Hrs
KERNEL MACHINES
Introduction, optical separating hyper plane, v-SVM, kernel tricks, vertical kernel, defining kernel,
multiclass kernel machines, one-class kernel machines.
Introduction, discrete Markov processes, hidden Markov models, basic problems of HMM, evaluation
problem, finding the state sequence, learning model parameters, Continuous observations, HMM with
inputs, model selection with HMM.
REINFORCEMENT LEARNING
Introduction, single state case, elements of reinforcement learning, temporal difference learning,
generalization, partially observed state.
UNIT 5 12Hrs
Data framing: numpy: Ndarray, Array attributes Array creation routines, Indexing and slicing, Array
Broadcasting, Array manipulation, Mathematical functions, Statistical functions, Search, sort and
counting functions, Matrix Library, Linear algebra.
Pandas: Series, Data frame, Panel, Basic functionality: axes, dtype, empty, ndim, size, values, head, tail.
Descriptive Statistics, Reindexing, iterations, sorting, options and Customization, Indexing and Selecting
Data, Statistical Functions,Window Functions, Aggregation, Missing data, Group by, Merging,
concatenation, Categorical data, I/O tools:read_csv,read_table.
Data Visualization: Matplotlib, Barplot, Histograms, Box plots, Area plot, Scatter plot, Pie chart,
Scikit: Classifiers: K-nearest, SVM, Naive base, Linear Regression. Clustering: K Means, Spectral,
Hierarchical, DBSCAN, OPTICS.
SELF STUDY –6 hours of self-study will be assigned from the above units.
References
BLUEPRINT
Code number: CS8221
Title of the paper: MACHINE LEARNING WITH PYTHON
10 10 8
12 12 8
12 12
10
16 16 20
16 16
20
66 66
66
Maximum marks for the paper (Excluding bonus question)= 50
Practical I
1. For a given set of training data examples stored in a .CSV file, implement and demonstrate the Candidate-
Elimination algorithm to output a description of the set of all hypotheses consistent with the training
examples.
2. Demonstrate the working of the decision tree based ID3 algorithm. Use an appropriate data set for
building the decision tree and apply this knowledge to classify a new sample.
3. Build an Artificial Neural Network by implementing the Backpropagation algorithm and test the same
using appropriate data sets.
4. Implement the naïve Bayesian classifier for a sample training data set stored as a .CSV file. Compute
the accuracy of the classifier, considering few test data set
5. Assuming a set of documents that need to be classified, use the naïve Bayesian Classifier model to
perform this task. Calculate the accuracy, precision, and recall for your data set.
6. Apply K-Means clustering algorithm to cluster a set of data stored in a .CSV file.
7. Implement k-Nearest Neighbour algorithm to classify the iris data set. Print both correct and wrong
predictions.
8. Implement the parametric Linear Regression algorithm in order to fit data points. Select appropriate
data set for your experiment and draw graphs.
CO1 Knowledge Have developed a good knowledge of basic principles of machine learning
techniques and have developed a good knowledge of machine learning
capabilities of python.
CO2 Understand Have developed a very good understanding of types of machine learning
techniques like supervised and un supervised learning.
CO5 Create Be able to design and build small machine learning applications which can be
used to solve various real time problems.
Course Content and Outcomes
Semester II
Number of credits 04
Objectives
This paper provides an insight to develop a website using essential tools of Angular and an integration of
ASP .NET for interactive web pages. This paper also focuses on back-end support in building queries and
introduction of Firebase.
UNIT I
a. HTML 3 Hrs
Basic syntax, Standard structure, Basic text markup, Images, Hyper Links. Lists, Tables, Forms, Frames
(attributes for all HTML elements).
Introduction, Style syntax ,Types of style sheets, , Selector forms, Property value forms, Font properties,
List properties, Color, Alignment of text, The box model, Background images, The <span> and <div> tags.
Overview of JavaScript, Object orientation and JavaScript, Syntactic characteristics, data types, operators
and expressions, Screen output and keyboard input, Control statements, Object creation and
modification, Arrays, Strings, Functions(built-in and user defined), Constructors, DOM,Events and Event
Handling.
UNIT II
UNIT III
UNIT IV
UNIT V
Modifying Data-Implementing POST, PUT & DELETE. Integration of front end and back end.
Overview, Environment Setup, Data, Arrays, write Data, Write List Data, Write Transactional Data,
Read Data, Event Types, Detaching Callbacks and Queries.
NOTE: 6 hours of self- study will be assigned from the above units.
REFERENCES
The Ng-book — The Complete Book on Angular by Nate Murray, Felipe Coury, Ari Lerner
BLUEPRINT
UNIT I 12 8
UNIT II 12 8
UNIT III 12 10
UNIT IV 12 20
UNIT V 12 20
TOTAL 60 66
Practical II
Program List
CO1 Knowledge Have developed a good knowledge of the tools (Angular) used
to design web page with a backend.
CO2 Understand Have developed a very good understanding of advanced
techniques to develop and test the web pages.
CO3 Apply Be able to integrate web based applications with suitable
database applications.
CO4 Analyze Able to test and debug the codes in developing effective web
sites.
CO5 Evaluate Able to compare and implement better codes to reduce the
complexity of the web design process.
CO6 Create Able to create and host the web site with domain knowledge.
Semester II
Number of credits 04
Objectives
Compiler Design will teach students the fundamental concepts and techniques used for building a simple
compiler, To understand the phases of complier, creation and execution of parse tree with symbol tables,
errors encountered by the complier and code optimization. The discussion will also include the
examination of intermediate code states, machine code optimization techniques and support for advanced
language features
UNIT-I
Introduction to compilers 12
Hrs
Analysis of source program – Phase of compiler – Cousins of compilers – Simple one pass compiler:
overview – Syntax definition Lexical analysis: removal of white space and comments – Constants –
Recognizing identifiers and keywords – Lexical analysis – Role of a lexical analyzer – Input buffering –
Specification of tokens – Recognition tokens-Introduction to LEX .
UNIT-2
Symbol Tables 12
Hrs
Symbol table entries – List data structures for symbol table – - Hash tables – Representation of scope
information – Syntax Analysis: Role of parser – Context free grammar – Writing a grammar – Top down
parsing: Brute force method, Recursive Descent, LL(1) parser – Simple bottom up parsing:– Shift
reducing parsing, Operator precedence ,LR parsers.
UNIT- 3
Syntax Analysis 12
Hrs
UNIT-4
Run time Environment 12
Hrs
Run-time environment: Source language issues – Storage organizations – Storage location strategies -
Intermediate code generation: Intermediate languages – Declarations – Assignment statements Code
Optimization: Code Optimization Global Data Flow Analysis, A Few Selected Optimizations like
Command Sub Expression Removal, Loop Invariant Code Motion, Strength Reduction.
UNIT-5
Code Generation 12
Hrs
Issues in the Design of a Code Generator, The Target Machine, Run-Time Storage Management, Basic
Blocks and Flow Graphs, Next-Use Information, A Simple Code Generator, Register Allocation and
Assignment, The DAG Representation of Basic Blocks, Peephole Optimization, Generating Code from
DAGs, Dynamic Programming Code-Generation Algorithm, Code Generator Generators.
REFERENCES:
Alfred V. Aho, Ravi Sethi, Jeffrey D. Ullman, “Compilers :principles,Techniques, and Tools,
Pearson Education Asia.
Dhamdhere D.M., “Compiler Construction: Theory andPractice”, McMillan India Ltd.
Holub Allen, “Compiler Design in C”, Prentice Hall of India.(2ndRevised Edition)
BLUEPRINT
CO1 Knowledge Have developed a good knowledge about the role of complier to translate the
source code to object code.
CO2 Understand Have developed a very good understanding on the six phases of complier and
increase the efficiency of the compiler in understanding
CO2 Apply Be able toWrite a scanner, parser, and semantic analyzer without the aid of
automatic generators
CO3 Analyse Be able to Specify and analyse the lexical, syntactic and semantic structures of
advanced language
CO4 Evaluate Be able to Design the structures and support required for compiling advanced
language features.
CO5 Create Be able to create a compiler using the tools YACC and LEX
Course Content and Outcomes
Semester II
Number of credits 04
Objectives
This paper introduces the students to the fundamentals of software project management and to give an
insight into the project planning phase, selection of an appropriate project approach and an in-depth study
of software project models. This paper will get the students to understand the concepts of effort
estimation, activity planning, risk management in software projects. The paper formally introduces the
students to the concepts of resource management, role of quality in software and build people
management skills.
UNIT 1 12 Hrs
UNIT 2 12 Hrs
UNIT 3 12 Hrs
SOFTWARE EFFORT ESTIMATION AND ACTIVITY PLANNING
Estimation Techniques top-down estimation, bottom-up estimation, Albrecht function point analysis,
expert judgment, staffing pattern.
Activity planning: Objectives of plan, project schedules, projects and activities, sequencing and
scheduling the activities, network planning models, formulating a network model, adding time
dimension, forward pass, backward pass, identifying critical path, activity float, shortening project
duration, identifying critical activities, activity-on-arrow networks.
UNIT 4 12 Hrs
RISK MANAGEMENT
Nature of risk, types of risk, managing risk, hazard identification, hazard analysis, risk planning and
control, evaluating risks to the schedule.
UNIT 5 12 Hrs
MANAGING PEOPLE AND ORGANIZING TEAMS
Understanding behavior, organizational behavior: a background, selecting the right person for the job,
instruction in the best methods, motivation, working in groups, becoming a team, decision making,
leadership, organizational structures, stress, health and safety.
SOFTWARE QUALITY
Place of software quality in project planning, importance of project quality, defining software quality,
ISO 9126, practical software quality measures, techniques to help enhance software quality, quality plans.
Self study: COCOMO Model, various process models, case study on project planning and any one of the
ISO standards.
REFERENCES
Hughes, Bob and Cotterell, Mike, Software project Management, 4th Edition,
TMH.
Kathy Schwalbe, Information Technology Project Management, VikasPublishing
House.
Kieron Conway, Software Project Management – From Concept toDeployment,
Unit I 12 8
Unit II 12 8
Unit III 12 10
Unit IV 12 20
Unit V 12 20
TOTAL
60 66
Maximum marks for the paper (Excluding bonus question) = 50
Course Outcomes: At the end of the course, the student should
CO1 Knowledge Have developed a good knowledge of the fundamentals of the discipline
of Software Project Management and the role of Managers in managing
projects
CO2 Understand Have developed a very good understanding of the different process
models, effort estimation techniques, risk analysis techniques, quality
assessment methods, managing teams and understanding team structures
CO2 Apply Be able to apply the policies for better management of software projects.
CO3 Analyze Be able to analyze various techniques and methods of management of all
the aspects of a software project and select the best approach.
CO4 Evaluate Be able to critique the various techniques of software project management
CO5 Create To be able to work in a group as a team leader or active team member in
an IT project.