BCA Syllabus 1st To 6th Sem
BCA Syllabus 1st To 6th Sem
First Semester
Course Name: Programming Concepts Using C Language Subject Code: TBC 101
Program BCA
Name:
1 Contact Hours: 42 L 2 T 1 P 0
4 Credits: 0 3
5 Semester:
Autumn Spring Both
9 Course Outcome: A student who successfully fulfills the course requirements will be
able to
CO1 Understand the basic terminology used in computer programming
CO2 Understand efficient use of datatypes, control statements and operators.
CO3 Design solution of computation problems using algorithms, flowcharts
and develop C programs.
CO4 Identify and locate various errors in C programs.
CO5 Organize a complex problem into less complex sub problems and develop
modular application.
CO6 Implement the concept of pointers, string, arrays, structure, derived data
types and other basic construct of C language
10 Details of the Course:
Unit CONTENT CONTACT
No. HOURS
1 Problem Solving Tools: Algorithms: Definition, Flowcharts: Symbols, A 9
sequential flowchart, Conditional and iterative flowchart, Control Flow
Statements: Sequential, Selection – If-else, Switch-Case; Iteration, Program
Design Methodologies: Top-down and bottom-up design approaches, Modular
approach, History, Importance of C, Structure of C program, Data Types,
primitive type and user defined type: typedef and enum, Variables and
Constants, String Constant, Numeric Constant, Declaration of variables
Modifiers, Identifiers and keywords, Symbolic constants; Statements &
Expressions.
2 Operators & Expression: Unary operators, Arithmetic & logical operators, 8
Bitwise operators, Assignment operators; Conditional operator, precedence and
order of evaluation. Basic Input-Output Statements: formatted & unformatted
input and output statements, Storage classes: automatic, external, register and
static, Decision Making, Branching and Looping Decision making with if
statement, The switch statement, the ?: operator, goto statement.
Loops: while, do-while, for, Break and continue statements.
3 Arrays: One-dimensional Arrays, Declaration of one-dimensional Arrays, 9
Initialization of one-dimensional Arrays, Two-dimensional Arrays, Initializing
two dimensional Arrays. Character Arrays and Strings: Declaring, writing
strings to screen and reading strings from Terminal, String handling functions.
Functions: Definition, User Defined function, Library function, Function calls:
by reference and by value, Category of functions: Nesting of functions,
Recursion, Passing arrays to functions, Passing strings to functions.
Preprocessor directives, Macros, macro vs. function and conditional
compilation, Variable number of arguments. Command line arguments.
4 Pointers: Declaring and Initialization of Pointer variables, accessing a variable 8
through its pointer; Pointer arithmetic.
Structure: Definition, declaration, accessing structure members, structure
initialization, copying and comparing structure variables. Array’s of structures,
Array’s within structures, nested structures, structures and functions.
Union: definition, comparing union with a structure, Bit-Fields
5 File Handling And System Calls File Introduction, File types – Binary, Text 8
files; Access mode, Opening and Closing files; Formatted –Unformatted
input/output to files; Errors in opening files; File navigation operation-
functions, System Calls Introduction: open(), close(), system(), System calls vs.
library calls
11 Suggested Books:
Sl. NAME OF AUTHERS/BOOKS/PUBLISHERS YEAR OF
NO. PUBLICATI
ON
1 E. Balagurusamy, “Programming in ANSI C”, 8th Edition, Tata McGraw Hill. 2019
2 Yashwant Kanetkar ,“Let Us C”, 15th Edition, BPB Publication. 2018
9 Course Outcome: A student who successfully fulfills the course requirements will be able to
CO1: Bridge the fundamental concepts of computers with the present
level of knowledge of the students.
CO2: Explain the needs of hardware and software required
for a computation task.
CO3: Understand number systems and Implement various arithmetic
operations on them.
CO4: Demonstrate the use of Operating system and its various
components.
CO5: Develop working skills with productivity tools, graphics designing
and Internet.
CO6: State typical provisions of cyber law that govern the proper
usage of Internet and computing resources.
10 Details of the Course:
Unit CONTENT CONTACT
No. HOURS
1 Evolution of Computers: 8
Introduction to computer and information technology: Introduction to
information technology, Computer definition, functions, characteristics,
capabilities and limitations, changed scenario of computing, applications in
today’s world.
Components of Computer: Hardware-(Input devices & Output devices)
Software with its types, Humanware; Functional Block diagram of a computer.
Categories of Computers: Analog, digital, hybrid, general purpose and special
purpose computers, microcomputers, mini computers and super computers.
Generation of Computers: First, Second, Third, Fourth and Fifth with
advantages and disadvantages of each generation.
Hardware Organization of a Computer: Central Processing Unit (CPU); CPU
Subunits- Arithmetic Logic Unit (ALU),Registers, Control Unit (CU).
2 Number Systems: Decimal, Binary, Octal and Hexadecimal; r’s, (r-1)’s 08
complements, Conversions of One number system to another, BCD numbers,
GRAY code, Conversion from binary to grey code.
Data Representation: Integer Representation: Signed Magnitude
Representation, Signed 1’s Compliment Representation, Signed 2’s compliment,
Floating Point representation.
Main Memories: Cache, RAM - Static, Dynamic; ROM – PROM, EPROM
and EEPROM with its uses, capacity and features.
Secondary Storage Devices: Introduction to Magnetic Tapes; Magnetic Disks -
Hard Disk Drives, Floppy Disks; Optical Disks - CD, DVD, Magneto-Optical
Disks, Zip Drive and Flash drives.
3 Basic Operating System Concepts: MS-DOS with its basic Commands 9
(internal and external), Managing File and Directories in various operating
Systems,, WINDOWS, Functional knowledge of these operating systems, role
and function of operating system, Types of Operating Systems (general Purpose,
Single user, Multi – User, Multi-tasking, Multi-Threading, Batch operating,
Time Sharing, Real Time)
DOS Kingdom OF DOS- ROM Software, ROM Startup routines, ROM-BIOS
Routines, BOOT TIME process.
4 Introduction to Internet: Introduction, History of internet with its uses, 9
advantages and applications; How to Connect to Internet (Dial Up, BroadBand,
Lease Line, wi-fi, hot-spot) Devices: Modems, Repeater, Computer network :
LAN, WAN, MAN, Network Connecting Devices: Bridges, Routers, Gateways;
Internet Services: World Wide Web, EMAIL, USENET, WAIS etc.
Concept of Security: Introduction to Firewalls, Cyber Laws, Cookies, Hackers
and Crackers, Terms of security (Secrecy, Privacy, Authentication,
Authorization, Password protection, File Permissions) only Introduction
5 Programming Models: 8
Computer Languages, Classification of Computer Languages: Machine Level,
Assembly Language, High Level Language, Advantages and Disadvantages of
Procedural programming languages.
Introduction to Object Oriented Programming,4GL and 5GL languages with
features and advantages.
TOTAL 42
11 Suggested Books:
Sl. NO. NAME OF AUTHERS/BOOKS/PUBLISHERS YEAR OF
PUBLICATION
1 Norton, Peter, “Introduction to Computers”, McGraw-Hill. 2011
2 Leon, Alexis & Leon, Mathews, “Introduction to Computers”, Leon Tech World. 2012
3 P.K.Sinha and PreetiSinha, “Computer Fundamentals”,BPB. 2010
4 Rajaraman, V., “Fundamentals of Computers”,PHI. 2011
5 ReemaThareja , ”Computer Fundamentals and Programming in C” 2014
Course Name: Bachelor of Computer Applications
Subject Name: Mathematical Foundation of Computer Science Subject Code: TBC-103
1 Contact Hours: 42 L 3 T0 P 0
2 Examination Duration(Hrs): Theory 0 3 Practical 0 0
3 Relative Weightage: CWE: 25 MTE: 25 ETE: 50
4 Credits: 0 3
5 Semester:
Autumn Spring Both
6 Pre-Requisite: Basic knowledge of mathematics
7 Subject Area: Mathematics and Computer Science
8 Objective: To familiarize students with the logics used in the field of computer science
along with the relations and functions.
9 Course Outcome: A student who successfully fulfills the course requirements will be able to-
a. Understand the concept of relations, Posets and Hasse Diagram.
b. Implement the concept of Functions and their types.
c. Analyze and implement the concept of mathematical induction and generating functions.
d. Implement the concept of linear recurrence relation with coefficients.
e. Understand and implement the concept of algebraic structure.
f. Understand and apply the basics of prepositional logic.
10 Details of the Course:
Unit CONTENT CONTACT
No. HOURS
1 Relation: Type and compositions of relations, Pictorial representation of relations, 8
Equivalence relations, Partial ordering relation, Posets, Hasse Diagram.
2 Function: Types, Composition of functions, Recursively defined functions. 8
11 Suggested Books:
Sl. NO. YEAR OF
NAME OF AUTHERS/BOOKS/PUBLISHERS PUBLICATION
1 J. K. Sharma, “Discrete Mathematics”, Macmillan 2005
2 S.A.Sarkar, "Discrete Mathematics",S.Chand Publication 2003
3 Discrete Mathematical Structure with Application to Computer Science”, TMH 2007
4 Kenneth H. Rosen, ” Discrete Mathematics and its applications”, TMH 2008
5 Doerr Alan & Levasseur Kenneth, “Applied Discrete Structures for Computer Science”, 2009
Galgotia Pub. Pvt. Ltd
6 Gersting,“Mathematical Structure for Computer Science”,WH Freeman & Macmillan 2008
7 Kumar Rajendra, “Theory of Automata: Languages and Computation”, PPM 2007
8 Hopcroft J.E, Ullman J.D., “Introduction to Automata theory, Languages and 2003
Computation”, Narosa Publishing House, New Delhi
Course Name: Bachelor of Computer Applications
Subject Name: Communication and Soft Skills Subject Code: TBC-104
1 Contact Hours: 30 L 2 T0 P 0
2 Examination Duration(Hrs): Theory 0 2 Practical 0 0
3 Relative Weightage: CWE: 25 MTE: 25 ETE: 50
4 Credits: 0 2
5 Semester:
Autumn Spring Both
6 Pre-Requisite: Basic understanding of the human nature and skills.
7 Subject Area: Management
8 Objective: To familiarize students with the human traits and their interpersonal skills.
9 Course Outcome: A student who successfully fulfills the course requirements will be able to-
a. Use theories of interpersonal communication to explain and evaluate their own behavior in
interpersonal relationships.
b. Synthesize and apply appropriate and effective conflict management strategies.
c. Understand the ways of effective writing.
d. Understand and to develop skills of effective technical communication;
e. To Develop the Cross culture Communication Skill.
TOTAL 30
11 Suggested Books:
Sl. NO. YEAR OF
NAME OF AUTHERS/BOOKS/PUBLISHERS PUBLICATION
1 K.K.Sinha ,”Business Communication”,Galgotia 2005
2 Elias M. Awad ,”System analysis & Design” 2006
3 Lessical & prath ,”B.C. Theory & Application” 2007
4 K. Aswathappa,” Organisational Behavior” 2003
Course Name: Bachelor of Computer Applications
Subject Name: Principles of Management Subject Code: TBC-105
1 Contact Hours: 42 L 3 T0 P 0
2 Examination Duration(Hrs): Theory 0 3 Practical 0 0
3 Relative Weightage: CWE: 25 MTE: 25 ETE: 50
4 Credits: 0 3
5 Semester:
Autumn Spring Both
6 Pre-Requisite: Basic functioning of the organization
7 Subject Area: Management
8 Objective: To familiarize students with the knowledge of management studies.
9 Course Outcome: A student who successfully fulfills the course requirements will be able to-
a. Understand managers manage business organizations in the dynamic global environment.
b. Evaluate how organizations develop and maintain competitive advantage.
c. Analyze Business decisions made using various tools and techniques to remain competitive.
d. To understand and apply of recent management techniques.
e. To Understand the and evaluate Strategic Management in India
10 Details of the Course:
Unit CONTENT CONTACT
No. HOURS
1 Nature of Management: 8
Meaning, Definition, it's nature purpose, importance & Functions, Management
as Art, Science & Profession- Management as social System Concepts of
management-Administration-Organization
Evolution of Management Thought: Contribution of F.W.Taylor, Henri Fayol
,Elton Mayo, Chester Barhard & Peter Drucker to the management thought.
2 Functions of Management: 9
Planning - Meaning - Need & Importance, types levels – advantages &
limitations. Forecasting - Need & Techniques. Decision making steps and
Process, Organizing - Elements of organizing & processes: Types of
organizations, Delegation of authority - Need, difficulties in delegation –
Decentralization.
3 Functions of Management: 8
Staffing - Meaning & Importance,Direction-Nature–Principles Communication-
Types & Importance, Motivation - Importance – theories Leadership - Meaning -
styles, qualities & functions of leaders
Controlling - Need, Nature, importance, Process & Techniques Coordination -
Need – Importance
4 Strategic Management: 8
Definition of strategy and strategic management, various levels of strategies –
corporate, business and functional level,
Relevance of Strategic Management and its Benefits, Strategic Management in
India
5 Recent Trends in Management: 9
Social Responsibility of Management – Management of Crisis, Total Quality
Management, Stress Management, Management of Change.
TOTAL 42
11 Suggested Books:
Sl. NO. YEAR OF
NAME OF AUTHERS/BOOKS/PUBLISHERS PUBLICATION
1 Dr. L.M.Parasad ,”Principles & practice of management “, Sultan Chand & Sons - New Delhi 2005
2 Horold Koontz and Iteinz Weibrich ,”Essential of Management “,McGrawhills International 2003
3 Dr. Y.K. Bhushan ,”Business Organization & Management “, 2002
4 J. S. Chandan ,”Management: Concept and Strategies “, Vikas Publishing 2001
5 Principles of Management, By Tripathi, Reddy Tata McGraw Hill 2007
6 Business organization and Management by Talloo by Tata McGraw Hill 2004
7 Management Theory & Practice - J.N.Chandan 2005
8 K.Aswathapa ,”Essential of Business Administration”, Himalaya Publishing House 2006
Second Semester
Subject Name: Data Structures and File Organization Subject Code: TBC-201
1 Contact Hours: 42 L 2 T1 P 2
2 Examination Duration(Hrs): Theory 0 3 Practical 0 2
3 Relative Weightage: CWE: 25 MTE: 25 ETE: 50
4 Credits: 0 3
5 Semester:
Autumn Spring Both
6 Pre-Requisite: Basic knowledge of the C programming Concepts
7 Subject Area: Programming
8 Objective: To familiarize students with the basic knowledge of the data structures
which are applied at the various levels of the computer science.
9 Course Outcome: A student who successfully fulfills the course requirements will be able to-
a. Have a comprehensive knowledge of the data structures and algorithms on which file structures
and data bases are based.
b. Understand the importance of data and be able to identify the data requirements for an
application.
c. Have a solid understanding and practical experience of algorithmic design and implementation.
d. Understand the basics of searching and sorting algorithms.
e. Understand the concepts of trees in data structure.
10 Details of the Course:
Unit CONTENT CONTACT
No. HOURS
1 Algorithm Basics: Basic Terminology, types and characteristics, Algorithm 8
Complexity and Time-Space trade-off.
Introduction to Data Structure: Elementary Data Organization, Data Structure
operations,
Pointers Review; Static and Dynamic Memory Allocation;
Arrays: Definition, Representation and Analysis, Single and Multidimensional
Arrays, address calculation, application of arrays, Character, Array as
Parameters, Ordered list, Sparse Matrices, and Vector.
2 Stacks: Array Representation and Implementation of stack, Operations and 9
Stacks: Push and POP, Array Representation of Stack, Linked Representation of
stack, Operations Associated with Stacks, Application of stack, Conversion of
Infix to Prefix and Postfix Expressions, Evaluation of postfix expression using
stack.
Queues: Array and linked representation and implementation of queues,
Operations on Queue; Create, Add, Delete, Full and Empty, Circular queue, De-
que, and Priority Queue.
3 Link List (s): Representation and implementation of Singly linked lists, Header 8
Linked List, Insertion and deletion to from Linked Lists Traversing and
Searching of Linked List, Overflow and Underflow, , Insertion and deletion
Algorithms, Doubly linked list, Polynomial representation and addition,
Generalized linked list, Garbage Collection and Compaction.
4 Searching : Linear and Binary searching, Hashing ,Hash table, Hash collisions 8
removal techniques.
Sorting: Bubble sort technique, Selection sort technique, Insertion sort
technique, Merge sort technique, quick sort technique.
Recursion: definition, types of recursion, call stack, iteration – recursion
difference.
5 Trees: Basic terminology, types; 9
Binary Trees : Binary Tree, Binary tree representation algebraic Expressions,
Complete Binary Tree, Extended Binary Tree, Array and Linked Representation
of Binary trees, Traversing Binary trees;
Binary Search Trees: insertion, traversing, search, deletion operations
Threaded binary tree, AVL tree(Height balance tree),
Huffman algorithm : Huffman tree and Codes;
Multi-way Search trees: B –Trees, B+ Tree;
File organizations :Introduction to file system ,Sequential file organization,
Index sequential organization, Relative file organization, Multi-key file
organization.
TOTAL 42
11 Suggested Books:
Sl. NO. YEAR OF
NAME OF AUTHERS/BOOKS/PUBLISHERS PUBLICATION
1 G.S.Baluja ,”Data Structure through C”,Dhanpat Rai 2007
2 Lipschutz ,”Data Structure”,TMH 2002
3 Data Structure and Program Design in C-Tanenbaum 1998
Subject Name: Object Oriented Programming Using C++ Subject Code: TBC 202
1 Contact Hours: 42 L 2 T 1 P 0
4 Credits: 0 3
5 Semester:
Autumn Spring Both
11 Suggested Books:
Sl. NAME OF AUTHERS/BOOKS/PUBLISHERS YEAR OF
NO. PUBLICAT
ION
1 E. Balagurusamy, Object oriented Programming with C++, 7/ed, TMH. 2017
2 Lippman. S. B. et al.,“C++ Primer” Fifth Edition, Addition Wesley. 2013
3 B. Stroustrup, The C++ Programming Language, Fourth Edition, 2013
Addison-Wesley.
4 P.M. Chilean: Programming in C++ Merril Pub. 2008
5 Deitel H. M. & Deitel P. J., “How to Program C+”, Fifth Edition PHI. 2006
Subject Name: Operating Systems Subject Code: TBC 203
1 Contact Hours: 42 L 3 T 0 P 0
4 Credits: 0 3
5 Semester: *
Autumn Spring Both
8 Objective: To familiarize students with the Concept of Operating Systems that are used
to manage various system components including files and processes.
9 Course Outcome:
A student who successfully fulfills the course requirements will be able to:
CO 1 Classify operating systems as per user or process requirements
CO 2 Evaluate and Implement an appropriate CPU scheduling algorithm to improve overall
system throughput along with improved average turnaround time, waiting and
response time.
CO 3 Identify and Design a suitable solution for different issues, such as process
synchronization and deadlock, that are associated with simultaneous execution of
multiple processes.
CO 4 Analyze and compare different algorithms given for management of the primary
memory (RAM).
CO 5 Evaluate and select an appropriate mechanism for improved management of files and
directories.
CO 6 Analyze and select a suitable security solution for protection of his/her system’s
resources.
11 Suggested Books:
Sl. NAME OF AUTHERS/BOOKS/PUBLISHERS YEAR OF
NO. PUBLICATION
1 Silberschatz, Galvin: Operating System Concept, 7th Edition, John 2005
Wiley and Sons.
2 William Stallings: Operating Systems: Internals and Design Principles, 2012
7th Edition PHI.
3 Sumitabha Das: UNIX Concepts and Application, 4th Edition, McGraw 2008
Hill
Subject Name: Digital Electronics Subject Code: TBC 204
1 Contact Hours: 42 L 3 T 0 P 0
4 Credits: 0 3
5 Semester:
Autumn Spring Both
9 Course Outcomes: A student who successfully fulfills the course requirements will be able to:
CO 1: Illustrate the Binary, Octal, Hexadecimal number system, conversion, complements
and various types of codes.
CO 2: Cognize and describe the various logic gates and simplification of the Boolean
expressions using K map.
CO 3: Describe the design procedure of various combinational circuits.
CO 4:Analyze the design procedure of various sequential circuits and conversion process of
flip flops.
CO 5: Differentiate between registers and counters and the functionality of counters.
CO 6: Review the basic working/design principles of combinational and sequential circuits
and their usefulness and applications in real life.
2 LOGIC GATES 9
Logic Gates, AND, OR, NOT GATES and their Truth tables, NOR,
NAND, XOR and XNOR gates, Universal Gates and their
implementation. Boolean Algebra, Basic Boolean Law's, Demorgan's
theorem, Minterms and Maxterms, K-MAP Simplification, Minimization
techniques, Sum of Product & Product of Sum. Canonical forms.
3 COMBINATIONAL CIRCUITS: 8
Design procedure – Adders-Subtractors – Serial adder/ Subtractor -
Parallel adder/ Subtractor. Multiplexer/Demultiplexer, Encoder /
Decoder. Implementation of combinational logic circuits.
4 SEQUENTIAL CIRUITS: 8
Flip-flops- Types of flip-flops,SR, JK, T, D and Master slave –
Characteristic table and equation. Realization of one flip flop using other
flip-flops. Definition of registers, types of registers.Basic Shift Registers
Applications of registers
5 COUNTERS: 8
Definition of counters, types of counters, asynchronous counters,
synchronous counters, Ring counters, up/down counters etc. Applications
of counters.
TOTAL 42
11 Suggested Books:
Sl. NAME OF AUTHERS/BOOKS/PUBLISHERS YEAR OF
NO. PUBLICAT
ION/REPRI
NT
1 M. Morris Mano, Digital Design, 3.ed., Prentice Hall of India Pvt. Ltd., 2009
New Delhi, 2003/Pearson
2 R.P.Jain, Modern Digital Electronics, 3 ed., Tata McGraw–Hill publishing 2008
company limited, New Delhi
3 Donald P.Leach and Albert Paul Malvino, Digital Principles and 2010
Applications, 5 ed., Tata McGraw Hill
4 Thomas L. Floyd, Digital Fundamentals, Pearson Education, Inc, New 2011
Delhi, 2003
Course Name: Bachelor of Computer Applications
Subject Name: Discrete Mathematical Structures and Graph Theory Subject Code: TBC-205
1 Contact Hours: 42 L 3 T0 P 0
4 Credits: 0 3
5 Semester:
Autumn Spring Both
8 Objective: To familiarize students with the working of the Graphs used in computer
science.
9 Course Outcome: A student who successfully fulfills the course requirements will be able to-
a. Understand the theory and techniques of logic, graphs and trees, and algebraic systems.
b. Apply the knowledge and skills obtained to investigate and solve a variety of discrete
mathematical problems.
c. Communicate mathematical ideas.
d. Make effective use of appropriate technology.
e. Understand the concept of Paths, Cycles , cut vertex, cut set and bridges.
11 Suggested Books:
Sl. YEAR OF
NO. NAME OF AUTHERS/BOOKS/PUBLISHERS PUBLICAT
ION
1 J. K. Sharma, “Discrete Mathematics”, Macmillan 2006
2 Liptschutz, Seymour, “Discrete Mathematics”, TMH 2007
3 Trembley, J.P & R. Manohar, “Discrete Mathematical Structure with Application 2004
to Computer Science”, TMH
4 Kenneth H. Rosen, ” Discrete Mathematics and its applications”, TMH 2002
5 Doerr Alan & Levasseur Kenneth, “Applied Discrete Structures for Computer 2001
Science”, Galgotia Pub. Pvt. Ltd
6 Gersting,“Mathematical Structure for Computer Science”,WH Freeman & 1998
Macmillan
7 Kumar Rajendra, “Theory of Automata: Languages and Computation”, PPM 2009
8 Hopcroft J.E, Ullman J.D., “Introduction to Automata theory, Languages and 2007
Computation”, Narosa Publishing House, New Delhi
Subject Name: Environmental Studies Subject Code: TEV-211
1 Contact Hours: 30 L 2 T0 P 0
4 Credits: 0 2
5 Semester:
Autumn Spring Both
9 Course Outcome: A student who successfully fulfills the course requirements will be able to-
a. Understand the natural environment and its relationships with human activities.
b. Characterize and analyze human impacts on the environment.
c. Integrate facts, concepts, and methods from multiple disciplines and apply to environmental
problems.
d. Understand the Important Environmental Issues, Management and legislation.
e. Project work/Assignment on recent environmental issues and reporting/ Review writing.
1. Suggested Books:
Subject Name: Data Communication and Computer Networks Subject Code: TBC-301
1 Contact Hours: 42 L 1 T 1 P 0
4 Credits: 0 3
5 Semester:
Autumn Spring Both
9 Course Outcome: A student who successfully fulfills the course requirements will be
able to-
CO1 Describe the basis and structure of an abstract layered protocol model
CO2 Describe, analyse and compare a number of datalink, network, and transport layer
protocols.
CO3 Design and implement datalink or network layer protocols within a simulated
networking environment.
CO4 Describe and analyse various related technical, administrative and social aspects of
specific computer network protocols from standards documents and other primary
materials found through research.
CO5 Identify and apply basic theorems and formulae for the information-theoretic basis of
communication and the performance of physical, datalink and network protocols
.
11 Suggested Books:
Sl. YEAR OF
NO. NAME OF AUTHERS/BOOKS/PUBLISHERS PUBLICAT
ION
1 Forouzan, “Data Communication and Networking”, TMH 2007
2 A.S Tanenbaum, “Computer Networks, 3rdEdition”, PHI 2005
3 W. Stallings, “Data and Computer Communication”, Macmillan Press 2005
4 Comer, “Computer Networks & Internet”, PHI 2003
5 Forouzan, “TCP/IP Networking”, TMH 2007
6 Peter Norton, “Complete Guide to Networking”.,Techmedia 2006
Subject Name: Database Management System Subject Code: TBC 302
1 Contact Hours: 42 L 2 T 1 P 0
4 Credits: 0 3
5 Semester:
Autumn Spring Both
9 Course Outcomes: A student who successfully fulfills the course requirements will be
able to:
CO 1 Understand the concepts of database management and can differentiate the database
approach with the file system approach.
CO 2 Sketch and develop Entity Relationship Diagrams for real world problems and design
databases.
CO 3 Apply and analyze Relational database queries with the help of Structured Query
Language (SQL) and construct simple and moderately advanced database queries in
SQL.
CO 4 Evaluate and Apply logical database design principles, including keys, constraints and
database normalization and design normalized databases.
CO 5 Understand and defend the importance of concurrency control in Transaction Processing
Systems.
CO 6 Examine the importance of recovery management in databases and solve deadlock
related problems.
11 Suggested Books:
Sl.N NAME OF AUTHERS/BOOKS/PUBLISHERS YEAR OF
O PUBLICAT
ION/REPRI
NT
1 Elmasri and Navathe: Fundamentals of Database Systems, 5th Edition, Pearson 2007
Education.
2 Silberschatz, Korth and Sudharshan: Data base System Concepts,5th Edition, 2006
Mc-GrawHill.
3 C.J. Date, A. Kannan, S. Swamynatham: A Introduction to Database Systems, 1996
8th Edition, Pearson education.
4 Raghu Ramakrishnan and Johannes Gehrke: Database Management Systems, 2003
3rd Edition, McGraw-Hill.
Subject Name: JAVA Programming Subject Code: TBC 303
Course Name: Bachelor of Computer Applications (BCA)
1 Contact Hours: 42 L 3 T 0 P 0
2 Examination Duration (Hrs): Theory 0 3 Practical 0 0
3 Relative Weightage: CWE: 25 MTE: 25 ETE: 50
4 Credits: 0 3
5 Semester: *
Autumn Spring Both
6 Pre-Requisite: Knowledge of programming
7 Subject Area: Java 16 or JDK 16 released on March, 16th 2021
8 Objective: To familiarize students with object-oriented concepts and the power of Java
language , enrich them with robust tools of Java language.
9 Course Outcome:
CO 1 Apply and characterize the Java programming features to develop programs for
demonstrate the same.
CO 2 Make use of object oriented concepts to develop applications using servlets.
CO 3 Classify exceptions and demonstrate applications for file handling and multithreading.
CO 4 Evaluate and select the most reliable approaches for developing applications using
proper exception handling techniques using several networking classes.
CO 5 Compare and utilize collection framework to create programming applications by
describing and developing applications for GUI.
CO 6 Design and describe applications by deploying for event handling and accessing
databases using Java features.
10 Details of the Course:
Unit CONTENT CONTACT
No. HOURS
1 Introduction to Java :Importance and features of Java, Concepts of Java 9
Virtual machine (JVM) Keywords, Constants, Variables and data types,
operators and expressions, Control statements, Conditional statements,
loops and iterations.
Object Oriented Programming concepts: Inheritance, super classes,
multilevel hierarchy, abstract and final classes, overloading and
overriding. .
Networking: Networking Basics, Java and the Net, TCP/IP Client sockets,
URL, URLConnection, TCP/IP Server sockets, Datagram.
5 JDBC: Concept of JDBC, JDBC Driver Types, JDBC Packages, Database 9
Connection, Associating the JDBC/ODBC Bridge with the Database, JDBC
URL, Statement Objects, ResultSet, Transaction Processing, commit,
savepoint, rollback, ResultSet Metadata, Database Metadata, Data Types,
SQL Exception, Prepared Statement, Callable Statement, Batch updates.
Storing and Retrieving images via JDBC.
Java Servlets: Servlet basics, Servlet API basic, Life cycle of a Servlet,
Running Servlet, HTTP Redirects, Cookies, Session Management,
Introduction to Java Server pages (JSP), Use of Bean in JSP.
. 42
11 Suggested Books:
1. Patrick Naughton and Herbert Schildt,“Java 2 The Complete Reference”, 9th edition, McGraw
Hill Education, 2017.
2. Bruce Eckel, “Thinking in Java”, 4th edition,Pearson Education India, 2008
3. E. Balaguruswamy, “Programming with Java a Primer”, 4thedition, Tata McGraw Hill, 2009.
Reference Books:
1. Cay S Horstmann and Gary Cornell, “Core Java Volume –I and II”, Standard edition, Sun
Microsystems, 2001
2. Harvey Deitel and Paul Deitel, “Java How to Program” , 4thedition, PHI Learning, 2004.
Course Name: Bachelor of Computer Application
Subject Name: Computer Organization and Architecture Subject Code: TBC 304
1 Contact Hours: 42 L 3 T0 P 0
4 Credits: 0 3
5 Semester:
Autumn Spring Both
11 Suggested Books:
Sl. YEAR OF
NO. NAME OF AUTHERS/BOOKS/PUBLISHERS PUBLICAT
ION
1 Mano Morris, “Computer System Architecture”, PHI 2005
2 William Stalling, “Computer Organization & Architecture”, Pearson 2006
education Asia
3 Zaky&Hamacher, “Computer Organization”, McGraw Hill 2002
4 B. Ram, “Computer Fundamental Architecture & Organization”, New Age. 2005
5 Tannenbaum, “Structured Computer Organization”, PHI. 2007
Course Name: Bachelor of Computer Applications
1 Contact Hours: 42 L 2 T1 P 0
4 Credits: 0 3
5 Semester:
Autumn Spring Both
9 Course Outcome: A student who successfully fulfills the course requirements will be
able to-
CO1 Understand and apply software engineering principles and development life cycle
models in real life projects.
CO2 Develop software requirement specification and design documents for software projects.
CO3 Understand and apply design and coding principles in software projects.
CO4 Create and develop test cases using black box and white testing techniques.
CO5 Evaluate software in terms of size, cost and schedule using project management
principles.
CO6 Understand and analyze the importance of quality and reliability in software projects
11 Suggested Books:
Sl. YEAR OF
NO. NAME OF AUTHERS/BOOKS/PUBLISHERS PUBLICAT
ION
1 Pressman, Roger S., “Software Engineering: A Practitioner’s Approach Ed. 2004
Boston: McGraw Hill, 2001
2 Jalote, Pankaj, “Software Engineering Ed.2”, New Delhi: Narosa 2002 2002
3 Schaum’s Series, “Software Engineering”, TMH 1999
4 Ghezzi, Carlo and Others, “Fundamentals of Software Engineering”, PHI 1998
5 Alexis, Leon and Mathews Leon, “Fundamental of Software Engineering”, 2001
Vikas
6 Sommerville, Ian, “Software Engineering”, AWL, 2000 Fairly, “Software 2000
Engineering”, New Delhi: TMH
Subject Name: Career Skills - I Subject Code: TBC 306
1 Contact Hours: 30 L 2 T 0 P 0
4 Credits: 0 3
5 Semester:
Autumn Spring Both
8 Objective: Prepare the students for the logical and analytical reasoning part for campus
placement and competitive exams
9 Course Outcomes: A student who successfully fulfills the course requirements will be
able to:
11 Suggested Books:
Sl. NAME OF AUTHERS/BOOKS/PUBLISHERS YEAR OF
NO. PUBLICAT
ION
1 Lalit Singh and P.A.Anand, Verbal Ability and Reasoning for Competitive 2016
Exams, Wiley, First Edition, January 2016.
2 R.S.Aggarwal, A Modern approach to Verbal and Non-Verbal Reasoning for 2018
Competitive Exams, S Chand Publication, January 2018
3 Shakuntala Devi, Puzzles to Puzzle you, Orient Paperbacks, June 1976. 1976
4 George Summers, The great book of Puzzles and Teasers, Jaico Publishing, 1989
September 1989.
5. P.A.Anand, reasoning book, Savera publication.
Fourth Semester
Program Name: Bachelor of Computer Applications
Course Name: Data Analytics Using Python Course Code: TBC 401
1 Contact Hours: 42 L 2 T 1 P 0
4 Credits: 0 3
5 Semester:
Autumn Spring Both
9 Course Outcome: A student who successfully fulfills the course requirements will be able
to-
a. Define and describe the fundamental aspects of analytics and data science.
b. Implement and examine statistical concepts on real world problems.
c. Describe and implement the fundamental concept of python programming.
d. Examine the data stored in files and evaluate it.
e. Defend and design approach for data analysis using python.
11 Suggested Books:
Sl. YEAR OF
NO. NAME OF AUTHERS/BOOKS/PUBLISHERS PUBLICAT
ION
1 David Dietrich, Barry Heller and Beibei Yang, “Data Science and Big Data 2015
Analytics: Discovering, Analyzing, Visualizing and Presenting Data”, EMC
Education Services, Reprint 2015, Wiley, ISBN: 9788126556533.
2 Wesley J. Chun, ―Core Python Applications Programming, 3rd Edition , 2016
Pearson Education, 2016
3 Downey, A. et al., "How to think like a Computer Scientist: Learning with 2015
Python", John Wiley, 2015
4 John Zelle, ―Python Programming: An Introduction to Computer Science‖, 2013
Second edition, Course Technology Cengage Learning Publications, 2013
Course Name: Bachelor of Computer Applications
1 Contact Hours: 42 L 3 T0 P 0
4 Credits: 0 3
5 Semester:
Autumn Spring Both
9 Course Outcome: A student who successfully fulfills the course requirements will be
able to-
a. The student will be able to analyse, specify, design, write and test assembly language
programs of moderate complexity.
b. The student will be able to select an appropriate ‘architecture’ or program design to
apply to a particular situation; e.g. an interrupt-driven I/O handler for a responsive real-
time machine.
c. Following on from this, the student will be able to design and build the necessary
programs.
d. The student will be able to calculate the worst-case execution time of programs or parts
of programs, and to design and build, or to modify, software to maximise its run time
memory or execution-time behavior.
e. The student will be able to characterize and predict the effects of the properties of the
bus on the overall performance of a system.
11 Suggested Books:
Sl. YEAR OF
NO. NAME OF AUTHERS/BOOKS/PUBLISHERS PUBLICAT
ION
1 R.S Goankar, “Microprocessor architecture, programming and application 2012
with the 8085” , Pen Ram International.
2 Daniel Tabak, “Advanced Microprocessor”, McGraw Hill 2010
3 Kenneth J. Ayala - 8051 Micro controller - Thomson 2010
Subject Name: Software Project Management and Information Systems
2. Contact Hours: 42 L: 2 T: 1 P: 0
5. Credits: 0 3
6. Semester:
9. Objective: To familiarize students with the how the software project are handled
A student who successfully fulfills the course requirements will be able to:
a) Understand and apply software project planning strategies.
e) Understand and apply design principles in Information Systems and planning and
control.
1 Contact Hours: 42 L 2 T1 P 0
4 Credits: 0 3
5 Semester:
CO 3 Design a basic web site using HTML and CSS to demonstrate responsive web design.
CO 5 Implement Client Side Scripting i.e. JavaScript to design dynamic web pages.
CO 6 Create simple web application using server side PHP programming and implement Database
Connectivity using MySQL.
1 History of the Internet and World Wide Web, Gopher, HTML Protocols – 8
HTTP, SMTP, POP3, MIME, IMAP. FTP, Telnet, Load Balancing, Web server
and Application server, Email, ISP, URL address, DNS. Static VS Dynamic
Websites, and Website VS Web Applications.
11 Suggested Books:
Sl. NO. NAME OF AUTHERS/BOOKS/PUBLISHERS YEAR OF
PUBLICATION
Subject Name: Computer Based Numerical & Statistical Subject Code: TBC-405
Techniques
1 Contact Hours: 42 L 3 T0 P 2
4 Credits: 0 3
5 Semester:
9 Course Outcome: A student who successfully fulfills the course requirements will be
able to-
TOTAL 42
11 Suggested Books:
Sl. YEAR OF
NO. PUBLICAT
NAME OF AUTHERS/BOOKS/PUBLISHERS ION
1 Contact Hours: 30 L 2 T 0 P 0
4 Credits: 0 2
5 Semester:
Autumn Spring Both
8 Objective: Prepare the students for the quantitative aptitude part for campus placement and
competitive exams
9 Course Outcomes: A student who successfully fulfills the course requirements will be
able to:
11 Suggested Books:
Sl. NAME OF AUTHERS/BOOKS/PUBLISHERS YEAR OF
NO. PUBLICAT
ION
1 R.S.Aggarwal, Quantitative Aptitude for Competitive Exams, S.Chand, 20th 2013
Edition.
2 P.A.Anand, Quantitative Aptitude for Competitive Exams, Wiley Publication, 2015
First Edition.
Fifth Semester
Subject Name: Android Programming Subject Code: TBC 501
1 Contact Hours: 42 L 2 T 1 P 0
4 Credits: 0 3
5 Semester:
Autumn Spring Both
6 Pre-Requisite: Object oriented programming using Java Language is expected for the
course.
8 Objective: To provide the students with the knowledge and skills needed to develop
Mobile Applications by using Android Programming.
11 Suggested Books:
Sl. NAME OF AUTHERS/BOOKS/PUBLISHERS YEAR OF
NO. PUBLICAT
ION
1 Android Application Development Cookbook, by Wei-Meng Lee, John 2013
Wiley and Sons, 2013
2 Professional Android 4 Development by Reto Meier, John Wiley and 2012
Sons, 2012
3 Android in Action, Third Edition, by W. Frank Ableson, RobiSen, Chris 2012
King, C. Enrique Ortiz, 2012
4 Beginning Android 4, by Grant Allen, Apress, 2011 2011
Course Name: Bachelor of Computer Applications
1 Contact Hours: 42 L 2 T1 P 2
4 Credits: 0 3
5 Semester:
Autumn Spring Both
8 Objective: To provide the students with the knowledge and skills needed to
develop web based Microsoft .NET products by using C#.
9 Course Outcome: A student who successfully fulfills the course requirements will be
able to-
a. Design and implement applications and distributed systems on the .NET platform.
b. Describe and apply the advanced techniques of object-oriented programming in web
application development.
c. Investigate and create solutions to programming problems using the C# programming
language that contain an analysis, solution design and documented code.
d. Development of web applications using .Net Technology.
e. Programming Web Applications with ASP.NET.
11 Suggested Books:
Sl. YEAR OF
NO. NAME OF AUTHERS/BOOKS/PUBLISHERS PUBLICAT
ION
1 ASP.NET MVC 4 Jamie Kurtz, Apress 2013
2 Pro C# 5.0 and the .NET 4.5 Framework Sixth Edition, Andrew Troelsen 2012
3 C# Programming Language (C# 4.0), 4th Edition, Anders Hejlsberg, 2010
Mads Torgersen, Scott Wiltamuth, and Peter Golde
4 C# 4.0 in a Nutshell: The Definitive Reference by Joseph Albahari and 2010
Ben Albahari
5 Designing Microsoft ASP.NET Applications Microsoft Press, Douglas J. 2010
Reilly
6 Head First C#, 2E: A Learner’s Guide to Real-World Programming with 2009
Visual C# and .NET (Head First Guides) by Andrew Stallman and
Jennifer Greene
Course Name: Bachelor of Computer Applications
1 Contact Hours: 42 L 3 T P 0
4 Credits: 0 3
5 Semester:
Autumn Spring Both
9 Course Outcome: A student who successfully fulfills the course requirements will be
able to-
a. Ability to formulate a wide range of management problems that can be solved to
optimality by classical combinatorial optimization techniques.
b. The knowledge of alternative solution approaches such as metaheuristics that can find
nearly optimal solutions.
c. Understand the concept of game theory
d. Understand the concept of PERT and CPM
e. Understand the time Estimation in critical path analysis.
11 Suggested Books:
Sl. YEAR OF
NO. NAME OF AUTHERS/BOOKS/PUBLISHERS PUBLICAT
ION
1 S.D. Sharma, Operation Research, Kedar Nath Ram Nath 2001
2 Ravinder Philips and solberg, Operation Research Principles and Practice 2003
John Willy & Sons.
3 H.A. Taha, Operation Research, prentice Hall of India 2004
4 Rounetran , Phillips,solberg: Operation Research: Willy DreamTech India 2002
Pvt Ltd.
Course Name: Bachelor of Computer Applications
1 Contact Hours: 42 L 3 T0 P 0
4 Credits: 0 3
5 Semester:
Autumn Spring Both
9 Course Outcome: A student who successfully fulfills the course requirements will be
able to-
a. Identify some of the factors driving the need for security and cryptography.
b. Identify and classify particular examples of attacks.
c. Understand the basics of symmetric key cryptography.
d. Understand the basics of Asymmetric key cryptography.
e. Understand the concept of Hash functions and their use.
f. Understand the basics Digital Signatures.
11 Suggested Books:
Sl. YEAR OF
NO. NAME OF AUTHERS/BOOKS/PUBLISHERS PUBLICAT
ION
1 William Stallings, “Cryptography and Network Security: Principles and 2002
Practice”, Prentice Hall, New Jersey.
2 Johannes A. Buchmann, “Introduction to cryptography”, Springer- 2004
Verlag.
3 Atul Kahate, “Cryptography and Network Security”, TMH 2008
4 Behrouz A Forouzan, “Cryptography and Network Security”, McGraw 2016
Hill, 3rd ED.
Subject Name: Distributed Systems Subject Code: TBC 505 (1)
1. Contact Hours: 42 L: 3 T: 0 P: 0
0 0
2. Examination Duration(Hrs): Theory 0 3 Practical
3
25 3 25 50
3. Relative Weightage: CWE 3 MTE ETE
3
0 3 3
4. Credits:
5. Semester: √
1 Contact Hours: 42 L 3 T0 P 0
4 Credits: 0 3
5 Semester:
Autumn Spring Both
8 Objective: To introduce the students with the idea of cloud computing and its
application
9 Course Outcome: A student who successfully fulfills the course requirements will be
able to
a. Defineand differentiate between various Cloud deployment
models.
b. Classify and demonstrate the use of various service models.
c. Describe and demonstrate the functionalities of various storage
architectures.
d. Classify and interpret the concepts of virtualization.
e. Select vendors of a secure Cloud model based on requirements.
f. Define and examine the security concerns for cloud.
10 Details of the Course:
Unit CONTENT CONTACT
No. HOURS
1 Cloud computing Fundamentals – Short history of cloud computing, 9
CloudStorage, Pros and Cons of cloud computing, Benefits from
cloudcomputing.Basic and Essential characteristic of cloud computing
model.Use and application of Cloud computing.
2 Cloud Platform Architecture: NIST cloud reference architecture, Cloud 8
Computing and service Models: IAAS, PAAS, SAAS, Cloud Deployment
models, public, private, hybrid and community models and their
comparative study.
3 Storage Architectures: Evolution of storage technology, storage models, 8
file systems and database, distributed file systems, general parallel file
systems. Google file system. Prevalent Storage technologies like DAS,
RAID, NAS and SAN architectures, Data centers for Cloud Computing.
11 Suggested Books:
Sl. NAME OF AUTHERS/BOOKS/PUBLISHERS YEAR OF
NO. PUBLICAT
ION
1 J. W. Rittenhouse and J. F. Ransome “Cloud Computing, 2010
Implementation, Management, and Security”, CRC Press.
2 A. S. Tanenbaum,"Modern Operating Systems, 3rd Edition", by Andrew 2007
S. Tanenbaum, Prentice Hall.
Program BCA
Name:
1 Contact Hours: 42 L 3 T 0 P 0
4 Credits: 0 3
5 Semester:
6 Pre-Requisite: Nothing
8 Objective: To familiarize students with the Computer design and organization and
architecture of computer. This course also includes functional units of the
PC, basic working of CPU, memory organization and I/O device etc.
CO 1 Understand different soft computing techniques like Genetic Algorithms, Fuzzy Logic,
Neural Networks and their applications
CO 4 Apply soft computing techniques to solve engineering or real life problems. Define the
fuzzy systems
TOTAL 42
11 Suggested Books:
Sl. NO. NAME OF AUTHERS/BOOKS/PUBLISHERS YEAR OF
PUBLICATION
3 D.E. Goldberg, Genetic algorithms, optimization and machine learning, Addison 2000
Wesley.
4 Martin T. Hagan, Howard B. Demuth, Mark Beale, Neural Network Design, 2002
Thomson Learning, India.
Subject Name: Agile Software Development Subject Code: TBI 505
(4)
Course Name: Bachelor of Computer Application
1 Contact Hours: 42 L 3 T 0 P 0
2 Examination Duration(Hrs): Theory 0 3 Practical 0 0
3 Relative Weightage: CWE: 25 MTE: 25 ETE: 50
4 Credits: 0 3
5 Semester:
Autumn Spring Both
6 Pre-Requisite: 12. Basic knowledge of Computer Fundamentals
9 Learning Outcome: A student who successfully fulfills the course requirements will be
able to:
11 Suggested Books:
Sl. NO. NAME OF AUTHERS/BOOKS/PUBLISHERS YEAR OF
PUBLICATION
1 Ken Schawber, Mike Beedle ,“Agile Software Development with Scrum”, 2008
Pearson
2 R. S. Pressman, “Software Engineering – A Practitioner’s Approach”, 2007
McGraw Hill Int. , 7th Ed.
3 Mike Cohn, “User Stories Applied: For Agile Software Development”, 2004
Addison-Wesley
4 Robert C. Martin, “Agile Software Development, Principles, Patterns, and 2002
Practices”, PHI; 1st edition
Subject Name: Career Skills - III Subject Code: TBC 506
1 Contact Hours: 30 L 2 T 0 P 0
4 Credits: 0 2
5 Semester:
Autumn Spring Both
8 Objective: Prepare the students for the verbal ability part for campus placement and
competitive exams
9 Course Outcomes: A student who successfully fulfills the course requirements will be
able to:
TOTAL 30
11 Suggested Books:
Sl. NAME OF AUTHERS/BOOKS/PUBLISHERS YEAR OF
NO. PUBLICAT
ION
1 Martin Hewings- Advanced English grammar, Cambridge University Press, 1999
November 1999.
2 Raymond Murphy- English grammar in use (Intermediate level), Cambridge 1999
University Press, November 1999.
3 Norman Lewis-Word Power Made Easy, Distributed Art Publishers, June 2011. 2011
4 Any other reading as suggested by the faculty.
Sixth Semester
1 Contact Hours: 42 L 2 T1 P 2
4 Credits: 0 3
5 Semester:
9 Course Outcome:
CO1 Understanding of the structure of an interactive computer graphics system, and the
CO3 Design and apply two dimensional and three dimensional graphics and transformations.
CO5 Apply and implements the clipping and filling techniques on graphics objects.
Filling: Inside Tests, Flood fill algorithm, Boundary-Fill Algorithm and scan-line
polygon fill algorithm.
GKS Standards, GKS Primitives – Polyline, Polymarker, and Fill area, Text,
GKS Workstation and Metafiles.
TOTAL 42
11 Suggested Books:
Sl. NO. NAME OF AUTHERS/BOOKS/PUBLISHERS YEAR OF
PUBLICATI
ON/REPRI
NT
1 Donald Hearn and M. Pauline Baker, “Computer Graphics”, PHI 2008
4 P. K. Singh, Rajendra Kumar, ”Computer Graphics (GBTU)”, First Edition, Vikas 2010
Publishing House Pvt. Ltd.
5 Newman and Sproul, “Principle of to Interactive Computer Graphics”, McGraw Hill 2005
Course Name: Bachelor of Computer Applications
Subject Name: Network Security and Cyber Law Subject Code: TBC-602
1 Contact Hours: 42 L 3 T0 P 0
4 Credits: 0 3
5 Semester:
9 Course Outcome: A student who successfully fulfills the course requirements will be
able to-
TOTAL 42
11 Suggested Books:
Sl. YEAR OF
NO. PUBLICAT
NAME OF AUTHERS/BOOKS/PUBLISHERS
ION
1 Zeinab Karake Shalhoub, Sheikha Lubna Al Qasimi Cyber Law And 2010
Cyber Security In Developing And Emerging Economies.
2 Sunit Belapure and Nina Godbole,Cyber Security: Understanding Cyber 2010
Crimes, Computer Forensics And Legal Perspectives.
3 Gerald R Ferrera, Margo E K Reder, Stephen D Lichtenstein,Cyber Law: 2011
Text and Cases.
Subject Name: Fundamentals of Machine Learning Subject Code: TBC- 603
1 Contact Hours: 42 L 2 T 1 P 2
4 Credits: 0 3
5 Semester: *
Autumn Spring Both
8 Objective: To enable student to learn and understand the concepts of Machine Learning
and its implementation in Python.
5 Validation Techniques: Hold out, K-Fold Cross Validation, Leave one out, 9
Bootstrapping.
Supervised Learning Algorithms:Linear Regression, Logistic Regression,
Decision Trees, Support Vector Machine, K-Nearest Neighbours, CN2
Algorithm, Naive Bayes, Artificial Neural Networks.
TOTAL 42
11 Suggested Books:
Sl. NAME OF AUTHERS/BOOKS/PUBLISHERS YEAR OF
NO. PUBLICATION
1 John Paul Mueller and Luca Massaron ,"Machine Learning 2017
ForDummies"
2 Machine Learning using Python by U Dinesh Kumar Manaranjan 2019
Pradhan , Wiley
3 Introduction to Machine Learning with Python: A Guide for Data 2016
Scientists by Andreas Muller
4 Python Machine Learning by Sebastian Raschka, Vahid Mirjalili 2017
5 Introduction to Machine Learning by Alpaydin Ethem, PHI 2015
Subject Name: Data Warehousing and Data Mining Subject Code: TBC-604(1)
1 Contact Hours: 42 L 3 T0 P 0
4 Credits: 0 3
5 Semester:
Autumn Spring Both
8 Objective: To familiarize students with the concepts of the ecommerce and its models.
9 Course Outcome: A student who successfully fulfills the course requirements will be able to-
a. Discuss the role of data warehousing and enterprise intelligence in industry and government.
b. Summarize the dominant data warehousing architectures and their support for quality attributes.
c. Recognize and describe at least three computational approaches to data clustering, taking
cognizance of the contribution of paradigms from the fields of Artificial Intelligence and
Machine learning.
d. Compare and contrast the dominant data mining algorithms.
e. Understand the Advanced Features of Data Mining.
TOTAL 42
11 Suggested Books:
Sl. YEAR OF
NO. NAME OF AUTHERS/BOOKS/PUBLISHERS PUBLICAT
ION
1 Alex Berson and Stephen J. Smith, “ Data Warehousing, Data Mining & OLAP”, 2007
TataMcGraw – Hill Edition, Tenth Reprint
2 Jiawei Han and Micheline Kamber, “Data Mining Concepts and Techniques”, 2007
Second Edition, Elsevier
Subject Name: Mobile Computing Subject Code: TBC-604(2)
1 Contact Hours: 42 L 3 T0 P 0
4 Credits: 0 3
5 Semester:
Autumn Spring Both
9 Course Outcome: A student who successfully fulfills the course requirements will be able to-
a. A working understanding of the characteristics and limitations of mobile hardware devices
including their user-interface modalities.
b. The ability to develop applications that are mobile-device specific and demonstrate current
practice in mobile computing contexts.
c. A comprehension and appreciation of the design and development of context-aware solutions
for mobile devices.
d. An awareness of professional and ethical issues, in particular those relating to security and
privacy of user data and user behavior.
e. Understand the Ad-hoc Network and Routing in Ad-hoc Mobile Networks.
11 Suggested Books:
Sl. YEAR OF
NO. NAME OF AUTHERS/BOOKS/PUBLISHERS PUBLICAT
ION
1 Shambhu Upadhyaya, Abhijeet Chaudhary, Kevin Kwiat, Mark Weises, “Mobile 2002
Computing”, Kluwer Academic Publishers
2 UWE Hansmann, Lothar Merk, Martin-S-Nickious, Thomas Stohe, “Principles 2003
of Mobile Computing”, Springer International Edition
Course Name: Fundamentals of Artificial Intelligence Subject Code: TBC 604(3)
Program BCA
Name:
1 Contact Hours: 42 L 3 T 0 P 0
2 Examination Duration(Hrs): Theory 0 3 Practical 0 0
3 Relative Weightage: CWE: 25 MTE: 25 ETE: 50
4 Credits: 0 3
5 Semester:
Autumn Spring Both
6 Pre-Requisite: 13. knowledge of Data structures, and discrete mathematics
7 Subject Area: Computer Applications
8 Objective: To enable the student to apply the artificial intelligence techniques in applications
which involve perception, reasoning and learning.
9 Learning Outcome: A student who successfully fulfills the course requirements will be
able to
11 Suggested Books:
Sl. NO. NAME OF AUTHERS/BOOKS/PUBLISHERS YEAR OF
PUBLICATION
1 Nils J. Nilsson, “Artificial Intelligence: A new Synthesis”, Harcourt Asia Pvt. 2007
Ltd.
2 Elaine Rich and Kevin Knight, “Artificial Intelligence”, 2nd Edition, Tata 2009
McGraw-Hill.
3 George F. Luger, “Artificial Intelligence-Structures And Strategies For Complex 2007
Problem Solving”, Pearson Education / PHI.
Subject Name: Multimedia Technologies Subject Code: TBC 604(4)
1 Contact Hours: 42 L 3 T 0 P 0
4 Credits: 0 3
5 Semester:
Autumn Spring Both
9 Course Outcomes: A student who successfully fulfills the course requirements will be able
to:
a) Define what is multimedia.
b) Discuss the effects of multimedia in your daily life.
c) Identify five multimedia components.
d) Explain why multimedia is so powerful to increase human-
computer interaction.
e) Examine multimedia applications in several areas
11 Suggested Books:
Sl. NAME OF AUTHERS/BOOKS/PUBLISHERS YEAR OF
NO. PUBLICATIO
N
1 Tay Vaughan, “Multimedia: Making It Work,” The McGraw-Hill 2015
Companies, Inc.
2 Ze-Nian Li and Mark S. Drew, “Fundamentals of Multimedia”, Pearson 2016
Education.
3 Rosch, “Multimedia Bible”, Sams Publishing. 2016