6 CS 7 To 8 Scheme Syllabus
6 CS 7 To 8 Scheme Syllabus
Scheme & Syllabus of 4thYear B. Tech. (CS) for students admitted in Session 2017-18 onwards.Page 2
RAJASTHAN TECHNICAL UNIVERSITY, KOTA
Scheme & Syllabus
IV Year- VII Semester: B. Tech. (Computer Science & Engineering)
Scheme & Syllabus of 4thYear B. Tech. (CS) for students admitted in Session 2017-18 onwards.Page 3
RAJASTHAN TECHNICAL UNIVERSITY, KOTA
Scheme & Syllabus
IV Year- VII Semester: B. Tech. (Computer Science & Engineering)
Scheme & Syllabus of 4thYear B. Tech. (CS) for students admitted in Session 2017-18 onwards.Page 4
RAJASTHAN TECHNICAL UNIVERSITY, KOTA
Scheme & Syllabus
IV Year- VII Semester: B. Tech. (Computer Science & Engineering)
Total 40
Scheme & Syllabus of 4thYear B. Tech. (CS) for students admitted in Session 2017-18 onwards.Page 5
RAJASTHAN TECHNICAL UNIVERSITY, KOTA
Scheme & Syllabus
IV Year- VII Semester: B. Tech. (Computer Science & Engineering)
Scheme & Syllabus of 4thYear B. Tech. (CS) for students admitted in Session 2017-18 onwards.Page 6
RAJASTHAN TECHNICAL UNIVERSITY, KOTA
Scheme & Syllabus
IV Year- VII Semester: B. Tech. (Computer Science & Engineering)
7 Demonstrate intrusion detection system using any tool (snort or any other
s/w).
8 Demonstrate how to provide secure data storage, secure data transmission
and for creating digital signatures.
PROJECT:In a small area location such as a house, office or in a classroom,
there is a small network called a Local Area Network (LAN). The project aims
to transfer a file peer-to-peer from one computer to another computer in the
same LAN. It provides the necessary authentication for file transferring in
the network transmission. By implementing the Server-Client technology,
use a File Transfer Protocol mechanism and through socket programming,
the end user is able to send and receive the encrypted and decrypted file in
the LAN. An additional aim of the project is to transfer a file between
computers securely in LANs. Elements of security are needed in the project
because securing the files is an important task, which ensures files are not
captured or altered by anyone on the same network. Whenever you transmit
files over a network, there is a good chance your data will be encrypted by
encryption technique.
Any algorithm like AES is used to encrypt the file that needs to transfer to
another computer. The encrypted file is then sent to a receiver computer and
will need to be decrypted before the user can open the file.
Scheme & Syllabus of 4thYear B. Tech. (CS) for students admitted in Session 2017-18 onwards.Page 7
RAJASTHAN TECHNICAL UNIVERSITY, KOTA
Scheme & Syllabus
IV Year- VII Semester: B. Tech. (Computer Science & Engineering)
Total 40
Scheme & Syllabus of 4thYear B. Tech. (CS) for students admitted in Session 2017-18 onwards.Page 8
RAJASTHAN TECHNICAL UNIVERSITY, KOTA
Scheme & Syllabus
IV Year- VII Semester: B. Tech. (Computer Science & Engineering)
Scheme & Syllabus of 4thYear B. Tech. (CS) for students admitted in Session 2017-18 onwards.Page 9
RAJASTHAN TECHNICAL UNIVERSITY, KOTA
Scheme & Syllabus
IV Year- VII Semester: B. Tech. (Computer Science & Engineering)
1 a) Write a program that calculates the area and perimeter of the circle.
And find the Coverage & Test Cases of that program using JaButi Tool.
b) Write a program which read the first name and last name from console
and matching with expected result by using JaBuTi.
c) Write a program that takes three double numbers from the java console
representing , respectively, the three coefficients a,b, and c of a
quadratic equation.
d) Write a program that reads commercial website URL from a url from file
.you should expect that the URL starts with www and ends with .com.
retrieve the name of the site and output it. For instance, if the user
inputs www.yahoo.com, you should output yahoo. After that find the
test cases and coverage using JaButi.
e) Write a program for a calculator and find the test case and coverage and
Def-use-graph.
f) Write a program that reads two words representing passwords from the
java console and outputs the number of character in the smaller of the
two. For example, if the words are open and sesame, then the output
should be 4, the length of the shorter word, open. And test this program
using JaButi
Scheme & Syllabus of 4thYear B. Tech. (CS) for students admitted in Session 2017-18 onwards.Page 10
RAJASTHAN TECHNICAL UNIVERSITY, KOTA
Scheme & Syllabus
IV Year- VII Semester: B. Tech. (Computer Science & Engineering)
5 Generate Test sequences and validate using Selenium tool for given websites
below:
Scheme & Syllabus of 4thYear B. Tech. (CS) for students admitted in Session 2017-18 onwards.Page 11