BCA Semester 5 2019
BCA Semester 5 2019
ir
CC306 Software Development Project – I 28
SEC301(A) Software Project Management 31
ls
SEC301(B) Information Security 34
SEC301(C) Mobile Applications Development 37
ea
FC301(A) Operation Research 40
FC301(B) Management Information System 42
FC301(C) Computer Graphics 46
R
G
@
ir
COURSE CREDIT 3
ls 40 HOURS
DETAIL SYLLABUS
TEACHING
UNIT TOPIC / SUB TOPIC HOURS
@
INTRODUCTION TO ASP.NET 10
Introduction to .NET Platform and Web
Introduction to ASP (Server-side Technology)
.NET Framework (FCL and CLR)
Overview of IIS
Processing of ASP.NET page (Execution model)
Features of .NET IDE
1 Features of ASP.NET
Working with ASP.NET
Coding Model (Inline and Code-behind)
Introduction to Web-Forms and its Events
ASP.NET Built-in directory structure
App_data
App_code
Bin
ir
Tooltip
Width
ID
ls
Runat
Text
Label
EnableViewState
ea
AssociatedControlID
TextBox
AutoCompleteType
AutoPostBack
Columns
R
MaxLength
ReadOnly
TextMode
G
Literal
Mode
Panel
Use of Panel
@
ir
AutoPostBack
DataSource
RepeateColumns
ls
RepeateDirection
TextAlign
Items
SelectedIndex
ea
SelectedItem
SelectedItems
Event
OnSelectedIndexChanged
ListBox, DropdownList
R
Properties
AutoPostBack
DataSource
G
Items
SelectionMode (ListBox)
Event
OnSelectedIndexChanged
@
Rich Controls:
Calendar
Properties
NextMonthText
PrevMonthText
SelectedDate
SelectedDates
4
SelectionMode
Event
DayRender
Adrotator control (showing advertisement from XML file and
Database)
FileUpload control
3 Master page, Navigation, Validation, Login controls 10
ir
LoginView
PasswordRecovery
LoginStatus
ls
LoginName 5
CreateUserWizard
ChangePassword
Creating and Managing Roles
ea
Creating and Managing Access Rules
Creating and Managing Profile
Authentication, Authorization and Data controls 10
Membership class
Methods
R
CreateUser
DeleteUser
FindUserByName and FindUserByEmail
G
GeneratePassword
GetAllUsers
GetUser
Role class
@
Methods
AddUsresToRole
4 AddUserToRole
CreateRole
DeleteRole
FindUserInRole
GetUsersInRole
IsUserInRole
RemoveUserFromRole(s)
ProfileManager class
Methods
DeleteInactiveProfiles
DeleteProfile
DeleteProfiles
FindProfileByUserName
ir
Close
Command
Properties
ls
CommandText
Connection
Methods
ExecuteNonQuery
ea
ExecuteReader
ExecuteScalar
DataReader
Property
Items
R
Method
Read
DataAdapter
G
Properties
SelectCommand
InsertCommand
@
UpdateCommand
DeleteCommand
Methods
Fill
Update
DataSet
CommandBuilder
TEXT BOOK/S:
1. Professional ASP.NET 3.5 (Sp1) In C# and VB by Bill Evjen, Scot
Hanselman and David Rader (Wrox)
REFERENCE BOOKS:
1. ASP.NET 4 UNLEASED by Stephen Walther (Pearson)
REQUIRED SOFTWARE/S
ir
ls
ea
R
G
@
COURSE TITLE
CC302 Python Programming
COURSE CODE CC-302
COURSE CREDIT 3
SESSIONS PER WEEK 4
TOTAL TEACHING HOURS 40 HOURS
AIM
This course introduces students the fundamentals of core python programming
ir
language and to use it for different applications development.
LEARNING OUTCOMES
On the completion of the course students will:
1. To recognize why python is extensively used by developers in the industry.
ls
2. To study and employ different datatypes, operators, I/O and control
statements.
3. To define & implement class and different levels of inheritance.
4. To learn creating modules and data structures like List, Tuples and
ea
Dictionaries
5. To handle exceptions and work with the built in standard libraries.
6. To create a virtual environment.
7. To implement python database connectivity.
DETAIL SYLLABUS
R
Introduction to Python
Python, Features of Python, Viewing of Byte Code, Flavours
of Python, PVM, Memory Management in Python, Garbage 3
collection in python, Comparisons between C-Java-Python,
@
ir
accessing Tuple elements, Basic operations on Tuples,
Functions to process tuples, Nested Tuples and its sorting.
Dictionaries
ls
Introduction to Dictionaries, Operations on Dictionaries, 2
Dictionary methods, Converting List into Dictionary, Passing
dictionaries to functions.
Classes, Inheritance and Polymorphism 10
Classes
ea
Creating a class, The Self variable, Constructor, Types of 3
variables, Types of methods, Passing members of one class to
3 another.
Inheritance
Implementing inheritance, Constructors in inheritance,
R
Polymorphism
Introduction to polymorphism, Duck Typing Philosophy of 3
Python, Operator overloading, method overloading, method
overriding.
@
10
ir
https://www.programiz.com/python-programming/tutorial
REQUIRED SOFTWARES:
Python 3.4.1 or higher
ls
IDE: IDLE
Database: MySQL
ea
R
G
@
11
COURSE CREDIT 3
ir
Total Teaching Hours 40 HOURS
AIM
To provide knowledge of Software Project Management.
ls
LEARNING OUTCOMES
On the completion of the course students will be able to :
To become familiar with the fundamentals of data communication and
networking.
ea
To understand different network technologies.
To get insights into different advanced network technologies that can be used
to connect different networks.
DETAIL SYLLABUS
R
TEACHING
UNIT TOPIC / SUB TOPIC
HOURS
Introduction to Data communications and Networking 10
G
Introduction 3
Fundamental concepts
Data communications
Protocols
@
Standards
Signal propagation
Analog and digital signals
Bandwidth of a signal and a medium
1 Analog and Digital transmission 4
Introduction
Analog signal, Analog transmission
Digital signal, Digital transmission
Digital signal, Analog transmission
Baud rate and bits per second
Analog signal, Digital transmission (excluding: Adaptive
and Delta modulation)
Modes of data transmission 3
Introduction
Parallel and Serial communication
12
ir
Transmission Media 10
Introduction 5
Guided media
ls
Twisted pair
Coaxial cable
Optical fiber
Unguided media
ea
Microwave
Satellite communication
Cellular telephones
Network topologies and Switching 5
Introduction
3 Topologies
R
Mesh
Star
Tree
G
Ring
Bus
Hybrid
Basics of switching
@
Types of switching
Circuit
Packet
Message
13
ir
FDDI
Introduction
Properties
ls
Operation
Self healing mechanism
Introduction to WAN
Introduction (Note: Overview of this topics should be 2
ea
covered)
ISDN, Architecture, Channel types, interfaces
Bluetooth
Infrared communication
Wireless LAN
R
Internetworking devices
Repeaters
Bridges
G
Routers
Gateway
@
Textbook
Data Communications and Networks, 2nd Edition
Publisher: McGraw Hill
By Achyut S Godbole, Atul Kahate
REFERENCE BOOKS:
1. Business data communication
Publisher: Cengage publications
By Selly Cashman
2. Data communications and networking
Publisher: McGraw Hill
By Behrouz Forouzan
3. Computer networks
Publisher: Pearson
By Andrew S. Tanenbaum
14
ir
COURSE CREDIT 3
ls
Total Teaching Hours 40 HOURS
AIM
To provide knowledge of advance concepts of dynamic and interactive web
application using ASP.NET and C#.NET as language.
ea
LEARNING OUTCOMES
On the completion of the course students will:
1. Be able to develop dynamic and interactive web pages using C# language.
2. Understand use of different .NET web controls.
3. Know How to manage security and personalization in ASP.NET website.
R
TEACHING
UNIT TOPIC / SUB TOPIC
HOURS
@
INTRODUCTION TO ASP.NET 10
1. Design .aspx page, having 4 Textboxes (First name,
Last name, Email and Mobile). Place a button on the
page. On the click even of the button user will be
redirected on another page, having same 4 Textboxes
1 having AutoComplete capability. On another page user
do not have type First name, Last name, Email, and
Mobile number but it will be AutoComplete by pressing
one or two keys in each textbox. (Demo of
AutoCompleteType property).
15
ir
label control placed on the web page. (Use of App_code
directory).
4. Create .dll class library file having 2 classes and each
ls
class has at least two methods. Add the .dll file into
the ASP.NET website. Design a web page to invoke the
methods of .dll files. Use appropriate textboxes, label
ea
and button controls. (Use of Bin directory).
5. Create a page which will show number of visitors of a
page in label (using global.asax).
6. Design a webpage which has textbox and a button.
User will enter his/her name in the textbox. On the
R
16
ir
Border style as solid
Border color as blue
Border width as 2px
ls
Text as “Hello!”
When user moves mouse over the label, its
background color should change it to yellow. Add
one more web form which contains button. When
ea
user clicks on it change its fore color as pink using
external css.
• A DropDownList
• A Button
• A Label
G
2 center of a form.
Add the following more controls:
• Two labels
• A TextBox
• A Button
One of the labels is displayed adjacent to the textbox,
displaying the message “Enter the quantity:” When the
user enters the quantity in the textbox and clicks the
button, the total cost is evaluated and displayed in another
label.
17
ir
client’s machine.
5. Display name of country in dropdown list when page is
loaded. Allow the user to select the country and display the
name of states of that country selected by user in another
ls
dropdown list. (Also perform through datareader)
6. Write code to upload only image files (.bmp, .jpg, .gif) and
less than 1 kb in folder “Image-Folder”. Also display
uploaded image files on the same web page using datalist
ea
control.
7. Accept Item No, Item Name, Item Price, Item Quantity. Store
information in cookie. Display stored information in next
page.
8. Take single image having 3 rectangle shapes horizontally
R
18
ir
3. Design a web form and perform the following validations:
ls
and “1/1/2000”.
Email should be valid id.
Contact number exactly of 10 digits
4. Create one registration page and perform the following
ea
validations.
To validate email_id
3 To compare new password and retype password
The rollno should contain first 3 characters BCA.
Example BCA01, BCA02
R
10
19
ir
ls
ea
R
G
@
20
ir
client’s machine.
5. Display name of country in dropdown list when page is
loaded. Allow the user to select the country and display the
name of states of that country selected by user in another
ls
dropdown list. (Also perform through datareader)
6. Write code to upload only image files (.bmp, .jpg, .gif) and
less than 1 kb in folder “Image-Folder”. Also display
uploaded image files on the same web page using datalist
ea
control.
7. Accept Item No, Item Name, Item Price, Item Quantity. Store
information in cookie. Display stored information in next
page.
8. Take single image having 3 rectangle shapes horizontally
R
18
ir
3. Design a web form and perform the following validations:
ls
and “1/1/2000”.
Email should be valid id.
Contact number exactly of 10 digits
4. Create one registration page and perform the following
ea
validations.
To validate email_id
3 To compare new password and retype password
The rollno should contain first 3 characters BCA.
Example BCA01, BCA02
R
10
19
ir
ls
ea
R
G
@
20
ir
Customer name, Product name, and Line total (Unit price *
Quantity) is shown using FormView and GridView.
ls
TEXT BOOK:
1. Professional ASP.NET 3.5 (Sp1) In C# and VB by Bill Evjen, Scot
Hanselman and David Rader (Wrox)
ea
REFERENCE BOOKS:
2. ASP.NET 4 unleased by Stephen Walter (PEARSON)
R
G
@
22
ir
and scores in a match. Also we are retrieving runs by
entering the player’s name.
22. Write a program to convert the elements of two lists into
ls
key-value pairs of a dictionary.
23. Create a python function to accept python function as a
dictionary and display its elements.
Classes, Inheritance and Polymorphism 10
ea
1. Write a program to create a Student class with name,
age and marks as data members. Also create a method
named display() to view the student details. Create an
object to Student class and call the method using the
object.
2. Write a program to create Student class with a
R
25
ir
make it act on the class objects.
17. Write a program to show method overloading to find sum
of two or three numbers.
ls
18. Write a program to override the super class method in
subclass.
Exception Handling, Standard Library, Creating Virtual 10
Environment and Python Database connectivity
ea
1. Write a program to handle some built in exceptions like
ZeroDivisionError.
2. Write a program to handle multiple exceptions like
SyntaxError and TypeError
3. Write a program to import “os” module and to print the
current working directory and returns a list of all module
R
functions
4. Write a program to provide a function for making file lists
from directory wildcard searches.
5. Write a program to import datetime module and format
G
4
“Sample_DB” in MySQL(). [First ensure connection is
made or not and then check if the database Sample_DB
already exists or not, if yes then print appropriate
message]
7. Write a program to retrieve and display all the rows in
the employee table. [First create an employee table in the
Sample_DB with the fields as eid, name, sal . Also enter
some valid records]
8. Write a program to insert several rows into employee
table from the keyboard.
9. Write a program to delete a row from an employee table
by accepting the employee identity number (eid) from the
user.
10. Write a program to increase the salary (sal) of an
employee in the employee table by accepting the
employee identity number (eid) from the user.
26
ir
https://www.python.org/about/apps/
https://www.w3schools.com/python/default.asp
https://www.tutorialspoint.com/python3/index.htm
ls
https://www.programiz.com/python-programming/tutorial
REQUIRED SOFTWARES:
Python 3.4.1 or higher
IDE: IDLE
ea
Database: MySQL
R
G
@
27
COURSE CREDIT 5
ir
Total Teaching Hours 40 HOURS
AIM
This course provides an opportunity for students to apply the knowledge and
ls
skills acquired in the core courses to larger and more complex problems and to
gain experience in working in teams.
LEARNING OUTCOMES
The student would be able to..
ea
1. Students will be exposed to software development process by choosing a
typical business/scientific/administrative/system application.
2. Define project scope, assess feasibility, and establish a project schedule.
3. Get some experience in working with a client organization.
4. Gain experience in working in a group for successfully developing the
R
deliverables.
Mode of study: Half / One day off to work on the project in a week. (Atleast
three hours must be allotted in weekly timetable for discussion/preparation of
G
deliverables)
COURSE CONTENT
Students are expected to work on the following during the
@
semester.
1. Doing System Analysis
2. Preparing System Flow Diagram
3. Developing Entity Relationship Diagram
4. Developing Data Flow Diagram / UML Diagram
5. Building Data Dictionary
Guidelines:
Group size: 2 or 3 students
Where to look for Project?
Government Organizations
Local Self Government (Municipalities, Panchayats,
Urban Development Authorities etc.) or public / private
bodies or NGOs.
Public Sector Organizations
Educational institutes
28
ir
processing.
Conventional small applications such as
Library Management
ls
Examination (conduct or Results)
Educational Institute Management
Payroll
Accounting system or inventory
ea
Human Resource
Note: Students can take up any of the above only if the
application would handle real volume and will have substantial
complexities.
Preferred Projects:
R
Biometrics
Bioinformatics, GIS etc.
Challenging uses of Communication and Internet
@
Scientific applications
Graphics applications
Systems software and utilities
Embedded software
o ERP modules
Preferred Tools:
Students should feel free to use the tools of their choice
subject to permission of the organization.
Working on any acceptable project would give good
exposure to use of analytical tools, programming skills and
development tools. Hence, any programming or development
environment should be acceptable.
Deliverables by the students:
At the end of the semester, the student should be able
29
Documentation:
A hard copy of the documentation should consist of the
following:
Cover Page
Company Certificate
College Certificate
Acknowledgement
Index (with page nos.)
Organization / Company Profile
Project Profile
Existing System
Proposed System
ir
Development Tools and Technology used
System Flow Diagram (if applicable)
UML Diagram/Data Flow Diagram *
Entity Relationship Diagram *
ls
Data Dictionary/Table Design *
In applications which uses database.
Presentation:
ea
Presentations can be prepared through slides using any
Open Source / PowerPoint /Flash or any other
multimedia tool, covering the work shown in the
documentation.
During viva examination, students will be expected to
R
30
COURSE CREDIT 3
ir
Total Teaching Hours 40 HOURS
AIM
To provide knowledge of Software Project Management.
ls
LEARNING OUTCOMES
On the completion of the course students will:
1. To get familiar with the characteristics of a project, project management
overview, risk in environment and the management of challenges for
ea
effective project management.
2. To understand and use the project planning principles across all phases of
a project.
3. To demonstrate competency in the management of a project plan,
especially in monitor and controlling a project schedule and budget,
R
TEACHING
UNIT TOPIC / SUB TOPIC
HOURS
Introduction to Software Project Management, Project
@
31
ir
The Waterfall Model
The Spiral Model
Software Prototyping
ls
Incremental Delivery
Atern/Dynamic Systems Development Method
Software Effort Estimation
2
Introduction
ea
Where are Estimates Done?
Problems with Over-and-Under-Estimates
The Basis for Software Estimating
Software Effort Estimation Techniques
Bottom-Up Estimating
R
Introduction
Projects and Activities (Defining Activities)
Network Planning Models
Formulating a Network Model
3 Adding the Time Dimension
7
The Forward Pass
The Backward Pass
Identifying the Critical Path
Activity Float
Shortening the Project Duration
o Identifying Critical Activities
32
ir
Introduction
Visualizing Progress
4
Earned Value Analysis
ls
Managing Contracts
Introduction
Types of Contracts
Stages in Contract Placement
ea
Software Quality
Introduction
Defining Software Quality
Textbook
Software Project Management (5th Edition)
R
REFERENCE BOOKS:
@
33
COURSE
TITLE SEC301 Information Security
COURSE CODE SEC-301
COURSE CREDIT 3
ir
Total Teaching Hours 40 HOURS
AIM
This course familiarizes the students with the security issues and
ls
technologies involved in modern information systems, including computer
systems and networks. Students will gain an understanding of the various
ways in which information systems can be attacked and trade-offs in
ea
protecting networks..
LEARNING OUTCOMES
The student would be able
To identify the information assets.
To identify threats to information assets.
To define an information security strategy and architecture.
R
TEACHING
UNIT TOPIC / SUB TOPIC
HOURS
Introduction ,Principles of Success, Law and
@
Ethics 10
Information Security 2
Introduction
Opportunities
Contextualizing Information Security
Information Security Principles of Success 3
The Information Security Common Body of 2
1
Knowledge
Law, Investigations and Ethics 3
Introduction
Types of Computer Crime
How Cyber Criminals Commit Crimes
The Computer and the Law
Intellectual Property Law
Privacy and the Law
34
ir
Operations Security Process and Controls
Operations Security Controls in Action
Access Control System and Methodology and
ls
Cryptography 10
Access Control Systems Methodology 4
Introduction
Terms and Concepts
ea
Principles of Authentication
Biometrics
Single Sign-On
3 Remote User Access and Authentication
R
Cryptography
6
Introduction
Applying Cryptography to Information
Systems
G
35
ir
REFERENCE BOOKS:
ls
1. Information Security Theory and Practice
Publisher: PHI
By Dhiren R. Patel
2. Computer Security Fundamentals
ea
Publisher: Pearson
By Chuck Eastiom
R
G
@
36
COURSE CREDIT 3
ir
Session Per Week 3
ls
Total Teaching Hours 40 HOURS
AIM
To develop the skill about the basic mobile application development using
ea
Android
To create android apps with different features and basic functionalities
LEARNING OUTCOMES
On the completion of the course students will:
R
37
ir
Working with permissions
Managing Application Resources
Working with different types of resources
6
ls
String, color, Dimensions, Drawables, images,
animation, menu
User Interface Elements 10
Android views and layouts
ea
TextView, Spinner, Buttons, Checkboxes,
Switches, RadioGroups
ToggleButton, Date and Time Controls 6
Progressbar, Seekbar, Ratingbar, Chonometer,
clocks
R
3
User Interfaces and Layouts
Viewgroups
G
4 Fragment Lifecyle
List Fragment
WebView Fragment
Working with Dialogs 4
Types of Dialogs
Lifecycle of a Dialog
TEXT BOOK/S:
38
WEB RESOURCES:
https://developer.android.com/training/index.html
http://www.androidhive.info/2011/
https://developer.android.com/guide/components/index.html
ir
REQUIRED SOFTWARE/S
Android Studio 2.3 ( https://developer.android.com/studio/index.html)
ls
Java version 1.8
ea
R
G
@
39
COURSE
TITLE SEC301 Information Security
COURSE CODE SEC-301
COURSE CREDIT 3
ir
Total Teaching Hours 40 HOURS
AIM
This course familiarizes the students with the security issues and
ls
technologies involved in modern information systems, including computer
systems and networks. Students will gain an understanding of the various
ways in which information systems can be attacked and trade-offs in
ea
protecting networks..
LEARNING OUTCOMES
The student would be able
To identify the information assets.
To identify threats to information assets.
To define an information security strategy and architecture.
R
TEACHING
UNIT TOPIC / SUB TOPIC
HOURS
Introduction ,Principles of Success, Law and
@
Ethics 10
Information Security 2
Introduction
Opportunities
Contextualizing Information Security
Information Security Principles of Success 3
The Information Security Common Body of 2
1
Knowledge
Law, Investigations and Ethics 3
Introduction
Types of Computer Crime
How Cyber Criminals Commit Crimes
The Computer and the Law
Intellectual Property Law
Privacy and the Law
34
ir
Operations Security Process and Controls
Operations Security Controls in Action
Access Control System and Methodology and
ls
Cryptography 10
Access Control Systems Methodology 4
Introduction
Terms and Concepts
ea
Principles of Authentication
Biometrics
Single Sign-On
3 Remote User Access and Authentication
R
Cryptography
6
Introduction
Applying Cryptography to Information
Systems
G
35
ir
REFERENCE BOOKS:
ls
1. Information Security Theory and Practice
Publisher: PHI
By Dhiren R. Patel
2. Computer Security Fundamentals
ea
Publisher: Pearson
By Chuck Eastiom
R
G
@
36
COURSE CREDIT 3
ir
Session Per Week 3
ls
Total Teaching Hours 40 HOURS
AIM
To develop the skill about the basic mobile application development using
ea
Android
To create android apps with different features and basic functionalities
LEARNING OUTCOMES
On the completion of the course students will:
R
37
ir
Key e-CRM features
Evolving to e-CRM
Technological and business issues involved in e-
ls
CRM
E-CRM business drivers
E-CRM assessment
Issues on Implementing e-CRM system
ea
E-CRM Architecture
eCRM components
The five Engines of e-CRM
Implementing of E-CRM
Challenges in delivering true E-CRM
Knowledge Management System and Decision
R
support system 10
Knowledge Management System
Knowledge Management
G
4
Artificial intelligence Management System
Expert system
Decision support system
Introduction
Decision making and MIS
Decision support system
Group decision Support System
Textbook
Management Information System: An Insight
Publisher: International Book House Pvt. Ltd.
By Hitesh Gupta
44
ir
ls
ea
R
G
@
45
COURSE CREDIT 3
ir
Total Teaching Hours 40 HOURS
AIM
This course aims to familiarize students with the concepts in computer graphics.
ls
This course also aims to introduce the students to apply presentation graphics,
image processing, graphics system, output primitives, two-dimensional viewing and
other graphics system.
LEARNING OUTCOME
ea
The student would be able
1. To familiarize with the concepts, tools and practices of graphics system.
2. To understand what is need of output devices and input devices, with
references to graphics system.
3. To familiar with two-dimensional geometric transformation and viewing.
R
DETAIL SYLLABUS
TEACHING
UNIT TOPIC / SUB TOPIC HOUR
G
S
Survey of Computer Graphics and Overview of Graphics
System 10
@
46
ir
Coordinate Representations
Graphics Functions
Software Standards
ls
PHIGS Workstations
Output Primitives 10
Points and Lines
ea
Line-Drawing Algorithms, DDA Algorithm, Bresenham’s
Line Algorithm
Loading the Frame Buffer
2 Circle-Generating Algorithm, Properties of Circles,
R
47
ir
Donald Hearn, M. Pauline Baker
ls
ea
R
G
@
48