Final TYBScIT Syllabus Semester-V Semester-VI 2024-2025
Final TYBScIT Syllabus Semester-V Semester-VI 2024-2025
UNIVERSITY OF MUMBAI
*The choice of Practical course is based on the theory Course. For Semester V, USIT504, USIT505, USIT506 and
USIT507, the practical courses are USIT5P4, USIT5P5 USIT5P6, USIT5P7. For Semester VI, USIT604, USIT605
the practical courses are USIT6P4, USIT6P5 respectively. Practical Course USIT6P6 is compulsory.
Semester-V
Software Project Development
B. Sc. (Information Technology) Semester – V
Course Name: Software Project Development Course Code: USIT501
Periods per week (1 Period is 50 minutes) 5
Credits 2
Hours Marks
Evaluation System Theory Examination 2½ 75
Internal -- 25
Course Objective:
● Understanding on the need for Software Project Management.
● Understanding the basic steps of project evaluation, planning.
● Understanding the basic steps of activity planning, risk management.
● Understanding the basic steps of controlling cost, managing contracts, managing people.
● Understanding how to work in team, maintaining quality and successfully closing the project.
Course Outcome:
After completing the course, the learner will be able to:
CO1: Describe the basic concepts of software project management with its life cycle
CO2: Apply project estimation and evaluation techniques to real world problem
CO3: Apply Key project management system techniques like PERT, CRM
CO4: Identify project risk, monitor and track project deadlines
CO5: Work in teams to evaluate the different modes of communication among people.
Internet of Things: Theory and Practice
B. Sc. (Information Technology) Semester – V
Course Name: Internet of Things: Theory and Practice Course Code: USIT502
Periods per week (1 Period is 50 minutes) 5
Credits 2
Hours Marks
Evaluation System Theory Examination 2½ 75
Internal -- 25
Course Objectives:
To understand the concept of the Internet of Things and its impact on technology
To learn about the design principles of connected devices for a seamless user experience
To delve into the workings of the internet and its communication protocols
To explore different techniques of prototyping embedded devices and their physical design
To gain knowledge about various business models and funding options for Internet of Things startups.
Course Outcomes:
Upon completion of the course, students will be able to:
CO1. Explain the concept of the Internet of Things and its applications in real-life scenarios.
CO2. Apply design principles to create user-friendly and connected devices.
CO3. Understand the communication protocols of the internet and design efficient web-connected devices.
CO4. Prototype embedded devices and create their physical design using various tools and techniques.
CO5. Understand the business models and funding options available for startups in the Internet of Things domain
and apply them to real-life scenarios.
Advanced Web Development
Web reference:
NuGet package :- https://learn.microsoft.com/en-us/nuget/quickstart/install-and-use-a-package-in-
visual-studio
Course Outcome:
After completing the course, the learner will be able to:
CO1: Learner will explore the foundations of .NET Development, .NET Ecosystem, C# and
Fundamental Concepts
CO2: Comprehensive Understanding and Practical Application using controls.
CO3: ASP.NET Web Development Essentials: Tracing, Debugging, and State Management
Techniques
CO4: Mastering Data Access in ASP.NET: ADO.NET Essentials and Azure Integration
CO5: Securing ASP.NET Applications: Authentication, Authorization, and Advanced Techniques
with Ajax and Bootstrap
Artificial Intelligence and Applications
B. Sc. (Information Technology) Semester – V
Course Name: Artificial Intelligence and Applications Course Code: USIT504
(Elective 1)
Periods per week (1 Period is 50 minutes) 5
Credits 2
Hours Marks
Evaluation System Theory Examination 2½ 75
Internal -- 25
Pre-requisites:
1. Proficiency in at least one programming language such as C++, Python or Java.
2. Knowledge of fundamental data structures (arrays, linked lists, stacks, queues, trees, graphs) and their
algorithms.
3. Understanding of discrete mathematics, linear algebra, probability and statistics.
4. Familiarity with logical reasoning.
Course Objectives:
To understand the fundamental concepts and history of Artificial Intelligence, including the current state of the
field and its foundational principles.
To develop proficiency in problem-solving techniques using various search algorithms, both uninformed and
informed, and apply heuristic functions effectively.
To gain knowledge and skills in adversarial search, including strategies for games, optimal decision-making, and
dealing with uncertainty in partially observable environments.
To master logical reasoning and inference methods, including propositional and first-order logic, and apply them
to knowledge representation and problem-solving tasks.
To explore advanced topics such as planning algorithms, including classical planning and multi-agent planning,
as well as generative AI techniques and their applications.
Course Outcomes:
After completing the course, the learner will be able to:
CO1: Articulate the historical development and current trends in Artificial Intelligence, demonstrating a
comprehensive understanding of its foundations and principles.
CO2: Demonstrate proficiency in implementing and analyzing various search algorithms, utilizing both
uninformed and informed strategies to solve complex problems efficiently.
CO3: Apply adversarial search techniques to decision-making in competitive environments, including games,
and effectively manage uncertainty and partial observability.
CO4: Demonstrate competency in logical reasoning and inference, utilizing propositional and first-order logic
to represent and solve real-world problems in AI applications.
CO5: Gain practical experience in planning algorithms and generative AI techniques, enabling them to design
and implement AI systems capable of planning actions and generating novel content autonomously.
Linux Server Administration
B. Sc. (Information Technology) Semester – V
Course Name: Linux Server Administration Course Code: USIT505
(Elective-I)
Periods per week (1 Period is 50 minutes) 5
Credits 2
Hours Marks
Evaluation System Theory Examination 2½ 75
Internal -- 25
Course Objective:
● To gain a deep understanding of various Linux distributions.
● To be able to install, configure, and optimize for specific server roles.
● To develop expertise in securing Linux servers from unauthorized access, attacks, and vulnerabilities.
● To acquire the skills to monitor server performance, identify bottlenecks, and optimize resource
utilization.
● To understand Bash scripting language to automate repetitive tasks and server management processes.
Course Outcome:
After completing the course, the learner will be able to:
CO1: Demonstrate a comprehensive understanding of various Linux distributions, packages and
proficiency in developing effective access control lists to manage users and group accounts.
CO2: Acquire the ability to manage storage and partitions, and develop efficiency in configuring
network and infrastructure services.
CO3: Implement different servers with their server configuration roles and parameters.
CO4: Analyze system logs to identify potential problems and security incidents.
CO5: Develop expertise in implementing security measures like firewalls, access controls,
password policies, and encryption to protect the system and ability to write scripts to automate
tasks
Advanced Java Technologies
Course Objective:
To understand the concept of and develop applications using servlets and database
connectivity.
To develop applications that can handle cookies, sessions and file operations.
To understand the concept of and design applications using Java server pages.
To understand the concept of and design applications using Enterprise Java Beans.
To understand the concepts of persistence, Hibernate and develop JPA applications,
Hibernate applications.
Course Outcome:
After completing the course, the learner will be able to:
CO1: Proficiently understand and apply servlets and database connectivity concepts to develop
dynamic web applications.
CO2: Demonstrate the ability to develop applications capable of managing cookies, sessions, and
performing file operations effectively.
CO3: Proficient in understanding and designing applications using Java Server Pages (JSP),
enabling dynamic and interactive web content creation.
CO4: Adept at comprehending and designing applications utilizing Enterprise Java Beans (EJB),
facilitating the development of scalable and distributed enterprise-level applications.
CO5: Possess a thorough understanding of persistence concepts, Hibernate framework, and the
ability to develop Java Persistence API (JPA) and Hibernate applications proficiently.
Emerging Technologies
Course Objective:
To gain a comprehensive understanding of Big Data, develop insights into NoSQL
databases, their history, advantages, and differences from SQL databases.
To have an in-depth understanding of MongoDB's data modeling techniques, and to be
proficient in using the MongoDB shell.
To have a comprehensive understanding of MongoDB's storage engine and indexing
mechanisms, be able to identify and address limitations in MongoDB deployments.
To gain a comprehensive understanding of the evolution and advantages of SSD,
exploring technologies such as TimesTen, Redis etc, while also mastering jQuery for
efficient DOM traversal and manipulation.
To understand and apply JSON grammar, syntax, and data types; create, parse, and persist
JSON objects and arrays; compare JSON with XML for data interchange.
Unit Details Lectures
Big Data: Getting Started, Big Data, Facts About Big Data, Big Data Sources,
Three Vs of Big Data, Volume, Variety, Velocity, Usage of Big Data, Visibility,
Discover and Analyze Information, Segmentation and Customizations, Aiding
Decision Making, Innovation, Big Data Challenges, Policies and Procedures,
Access to Data, Technology and Techniques, Legacy Systems and Big Data,
Structure of Big Data, Data Storage, Data Processing, Big Data Technologies
I NoSQL: SQL, NoSQL, Definition, A Brief History of NoSQL, ACID vs. BASE, 12
CAP Theorem (Brewer’s Theorem), The BASE, NoSQL Advantages and
Disadvantages, Advantages of NoSQL, Disadvantages of NoSQL, SQL vs.
NoSQL Databases, Categories of NoSQL Databases
Introducing MongoDB: History, MongoDB Design Philosophy, Speed,
Scalability, and Agility, Non-Relational Approach, JSON-Based Document Store,
Performance vs. Features, Running the Database Anywhere, SQL Comparison
The MongoDB Data Model: The Data Model, JSON and BSON, The Identifier
(_id), Capped Collection, Polymorphic Schemas, Object- Oriented Programming,
Schema Evolution
Using MongoDB Shell: Basic Querying, Create and Insert, Explicitly Creating
II Collections, Inserting Documents Using Loop, Inserting by Explicitly Specifying 12
_id, Update, Delete, Read, Using Indexes, Stepping Beyond the Basics, Using
Conditional Operators, Regular Expressions, MapReduce, aggregate(),Designing
an Application’s Data Model, Relational Data Modeling and Normalization,
MongoDB Document Data Model Approach
MongoDB Architecture: Core Processes, mongod, mongo, mongos, MongoDB
Tools, Standalone Deployment, Replication, Master/Slave Replication, Replica
Set, Implementing Advanced Clustering with Replica Sets, Sharding, Sharding
Components, Data Distribution Process, Data Balancing Process, Operations,
Implementing Sharding, Controlling Collection Distribution (Tag-Based
Sharding),Points to Remember When Importing Data in a Sharded Environment,
Monitoring for Sharding, Monitoring the Config Servers, Production
Cluster Architecture, Scenario 1,Scenario 2,Scenario 3,Scenario 4
MongoDB Storage Engine: Data Storage Engine, Data File (Relevant for
MMAPv1), Namespace (.ns File), Data File (Relevant for WiredTiger), Reads and
Writes, How Data Is Written Using Journaling, GridFS – The MongoDB File
System, The Rationale of GridFS, GridFSunder the Hood, Using GridFS,
Indexing, Types of Indexes, Behaviors and Limitations
MongoDB Use Cases: Use Case 1 -Performance Monitoring, Schema Design,
Operations, Sharding, Managing the Data, Use Case 2 – Social Networking,
Schema Design, Operations, Sharding
MongoDB Limitations: MongoDB Space Is Too Large (Applicable for
MMAPv1), Memory Issues (Applicable for Storage Engine MMAPv1), 32-bit vs.
III 64-bit, BSON Documents, Namespaces Limits, Indexes Limit, Capped 12
Collections Limit - Maximum Number of Documents in a Capped Collection,
Sharding Limitations, Shard Early to Avoid Any Issues, Shard Key Can’t Be
Updated, Shard Collection Limit, Select the Correct Shard Key, Security
Limitations, No Authentication by Default, Traffi c to and from MongoDB Isn’t
Encrypted, Write and Read Limitations, Case-Sensitive Queries, Type-Sensitive
Fields, No JOIN, Transactions, MongoDB Not Applicable Range
MongoDB Best Practices: Deployment, Hardware Suggestions from the
MongoDB Site, Few Points to be Noted, Coding, Application Response Time
Optimization, Data Safety, Administration, Replication Lag, Sharding,
Monitoring
The End of Disk? SSD and In-Memory Databases: The End of Disk?, Solid
State Disk, The Economics of Disk, SSD-Enabled Databases, In-Memory
IV Databases, TimesTen, Redis, SAP HANA, VoltDB, Oracle 12c “in-Memory 12
Database, Berkeley Analytics Data Stack and Spark, Spark Architecture
jQuery: Introduction, Traversing the DOM, DOM Manipulation with jQuery,
Events, Ajax with jQuery, jQuery Plug-ins, jQuery Image Slider
JSON: Introduction, JSON Grammar, JSON Values, JSON Tokens, Syntax,
JSON vs XML, Data Types, Objects, Arrays, Creating JSON, JSON Object,
V Parsing JSON, Persisting JSON, Data Interchange, JSON PHP, JSON HTML, 12
JSONP
Course Outcome:
After completing the course, the learner will be able to:
CO1: Understand and articulate the foundational concepts and practical applications of
Big Data, and compare and contrast SQL and NoSQL databases.
CO2: Design and implement effective MongoDB data models utilizing JSON, BSON,
and various schema strategies; efficiently perform data operations using the MongoDB
shell.
CO3: Understand and utilize MongoDB's storage engine, journaling, and GridFS file
system; effectively design and implement MongoDB use cases.
CO4: Evaluate the benefits and implications of transitioning from traditional disk storage
to SSD and in-memory databases, proficiently use technologies like TimesTen, Redis,
etc., and effectively utilize jQuery for DOM manipulation.
CO5: Understanding of JSON, including its grammar, syntax, and data types, and be able
to create, parse, and persist JSON objects and arrays. They will also learn to compare
JSON with XML for data interchange and effectively use JSON in various web
development contexts.
Internet of Things: Theory and Practice Practical
B. Sc. (Information Technology) Semester – V
Course Name: Internet of Things: Theory and Practice Practical Course Code: USIT5P2
Practical No Details
0 Starting Raspbian OS, Familiarizing with Raspberry Pi Components and interface,
Connecting to ethernet, Monitor, USB.
1 Displaying different LED patterns with Raspberry Pi.
List of Practical
1. Write the program for the following:
a. Create an application to print on screen the output of adding, subtracting, multiplying and
dividing two numbers entered by the user in C#.
b. Create an application to print Floyd’s triangle till n rows in C#.
c. Create an application to demonstrate following operations i. Generate Fibonacci series. ii. Test
for prime numbers.
List of Practical
1. Write programs for the following:
a. Implement depth first search algorithm.
b. Implement breadth first search algorithm.
List of Practical
0. Installation of RHEL6.x
1. Working with Users, Groups, and Permissions
a. Creating and Managing Users
b. Creating and Managing Groups
c. Using Permissions and Advanced Permissions
List of Practical
1. Implement the following Simple Servlet applications.
a. Create a simple calculator application using servlet.
b. Create a servlet for a login page. If the username and password are correct then it says
message “Hello <username>” else a message “login failed”
c. Create a registration servlet in Java using JDBC. Accept the details such as Username,
Password, Email, and Country from the user using HTML Form and store the registration
details in the database.
List of Practical
1. MongoDB Basics
a. Write a MongoDB query to create and drop database.
b. Write a MongoDB query to create, display and drop collection
c. Write a MongoDB query to insert, query, update and delete a document.
3. Implementing Aggregation
a. Write a MongoDB query to use sum, avg, min and max expression.
b. Write a MongoDB query to use push and addToSet expression.
c. Write a MongoDB query to use first and last expression.
9. jQuery Advanced
a. jQuery Animation effects, jQuery Chaining
b. jQuery Callback, jQuery Get and Set Contents
c. jQuery Insert Content, jQuery Remove Elements and Attribute
Course Objective:
To understand the effective testing techniques for ensuring high quality software.
To become familiar with quality assurance metrics and comprehend test tool capabilities.
To become proficient in test project planning, test case and data design, testing operations.
To understand the challenges and solutions related to software test automation.
To understand the taxonomy of testing tools.
Course Outcome:
After completing the course, the learner will be able to:
CO1: Learners understand various software testing methods.
CO2: Learners can identify defects and manage those defects for improvement in quality.
CO3: Learners analyze and comprehend the use of modern software testing tools and procedures
for their projects testing.
CO4: Understand and apply methods for verifying and validating software to ensure it meets
requirements and functions correctly.
CO5: Gain comprehensive knowledge of various testing levels and methodologies to ensure
thorough software quality assurance from requirements to system testing stages.
Information Security
B. Sc. (Information Technology) Semester – VI
Course Name: Information Security Course Code: USIT602
Periods per week (1 Period is 50 minutes) 5
Credits 2
Hour Marks
s
Evaluation System Theory Examination 2½ 75
Internal -- 25
Course Objective:
● To understand the importance of Information protection
● To learn current best practices in storage capacity
● To understand the fundamental security aspects of network devices and learn techniques
for hardening network devices against attacks.
● To familiarize Intrusion Detection and Prevention Systems, Voice over IP(VoIP) and PBX
security
● To understand the security considerations for virtual machines and security aspects of
cloud computing
Course Outcome:
After completing the course, the learner will be able to:
CO1: Understanding the importance of information protection.
CO2: Comprehending the evolution of information security.
CO3: Utilize established methodologies for implementing and managing security
CO4: Analysing Intrusion Detection and Prevention Systems, Voice over IP(VoIP) and PBX
security
CO5: Understanding the security considerations for virtual machines and security aspects of
cloud computing
Business Intelligence and Data Analytics
B. Sc. (Information Technology) Semester – VI
Course Name: Business Intelligence and Data Analytics Course Code: USIT603
Periods per week (1 Period is 50 minutes) 5
Credits 2
Hour Marks
s
Evaluation System Theory Examination 2½ 75
Internal -- 25
Course Objective:
● To understand the importance of business intelligence in facilitating effective and timely
decision-making processes within organizations.
● Explore different classes of mathematical models and their applications in various decision-
making scenarios.
● Understand the concept of classification problems and their applications in various
domains.
● Study relational marketing models and their application in building and maintaining
customer relationships.
● Study different types of organizational culture, including hierarchical, clan, adhocracy and
market cultures.
Course Objective:
● To understand the principles of Geographical Information System
● To learn Data Management and Processing Systems Hardware and Software Trends
● To understand Spatial Referencing and Positioning
● To understand the Classification of analytical GIS Capabilities
● To understand Data visualization and its strategies
Unit Details Lectures
A Gentle Introduction to GIS: The nature of GIS: Some fundamental
observations, Defining GIS, GISystems, GIScience and GIApplications,
Spatial data and Geoinformation.
The real world and representations of it: Models and modelling, Maps,
Databases, Spatial databases and spatial analysis Geographic Information
and Spatial Database Models and Representations of the real world
I Geographic Phenomena: Defining geographic phenomena, types of 12
geographic phenomena, Geographic fields, Geographic objects, Boundaries
Computer Representations of Geographic Information: Regular
tessellations, irregular tessellations, Vector representations, Topology and
Spatial relationships, Scale and Resolution, Representation of Geographic
fields, Representation of Geographic objects Organizing and Managing
Spatial Data The Temporal Dimension
Data Management and Processing Systems, Hardware and Software
Trends
Geographic Information Systems: GIS Software, GIS Architecture and
functionality, Spatial Data Infrastructure (SDI)
Stages of Spatial Data handling: Spatial data handling and preparation,
Spatial Data Storage and maintenance, Spatial Query and Analysis, Spatial
II 12
Data Presentation.
Database management Systems: Reasons for using a DBMS, Alternatives
for data management, The relational data model, Querying the relational
database.
GIS and Spatial Databases: Linking GIS and DBMS, Spatial database
functionality.
Spatial Referencing and Positioning
III Spatial Referencing: Reference surfaces for mapping, Coordinate 12
Systems, Map Projections, Coordinate Transformations
Satellite-based Positioning: Absolute positioning, Errors in absolute
positioning, Relative positioning, Network positioning, code versus phase
measurements, Positioning technology Data Entry and Preparation
Spatial Data Input: Direct spatial data capture, Indirect spatial data
capture, Obtaining spatial data elsewhere
Data Quality: Accuracy and Positioning, Positional accuracy, Attribute
accuracy, temporal accuracy, Lineage, Completeness, Logical consistency
Data Preparation: Data checks and repairs, Combining data from multiple
sources
Point Data Transformation: Interpolating discrete data, Interpolating
continuous data
Spatial Data Analysis: Classification of analytical GIS Capabilities
Retrieval, classification and measurement: Measurement, Spatial selection
queries, Classification
Overlay functions: Vector overlay operators, Raster overlay operators
Neighbourhood functions: Proximity computations, Computation of
IV 12
diffusion, Flow computation, Raster based surface analysis
Analysis: Network analysis, interpolation, terrain modeling GIS and
Application models: GPS, Open GIS Standards, GIS Applications and
Advances Error Propagation in spatial data processing: How Errors
propagate, Quantifying error propagation
Data Visualization: GIS and Maps, The Visualization Process
Visualization Strategies: Present or explore? The cartographic toolbox:
What kind of data do I have? How can I map my data? How to map? How
V 12
to map qualitative data, How to map quantitative data, How to map the
terrain elevation, How to map time series Map Cosmetics, Map
Dissemination
Course Objective:
To understand and apply network design principles, including architectures, lifecycle, and high
availability protocols.
To master enterprise LAN and data center design, focusing on Ethernet rules, storage, and data
center infrastructure.
To explore wireless LAN technologies, including design considerations, security, and quality of
scalable networks.
To develop an IPv4 addressing plan for a hierarchical network infrastructure
To develop Internet Protocol design, security management, and integrating security mechanisms
into network infrastructure.
Course Outcome:
After completing the course, the learner will be able to:
CO1: understand the working of Network design models
CO2: describe Enterprise LAN Design, and data center design.
CO3: remember and describe various WAN technologies .
CO4: Successfully implement route summarization to optimize routing table size and efficiently
utilize IPv4 address space within the network.
C O 5 : understand Internet Protocol and describe how to manage security.
IT Infrastructure Management
B. Sc (Information Technology) Semester – VI
Course Name: IT Infrastructure Management Course Code: USIT606
(Elective-II)
Periods per week (1 Period is 50 minutes) 5
Credits 2
Hours Marks
Evaluation System Theory Examination 2½ 75
Internal -- 25
Course Objectives:
Course Outcomes:
CO 1: Apply the principles and concepts of ITIL 4 to enhance IT service management practices.
CO 2: Demonstrate proficiency in implementing ITIL management practices.
CO 3: Successfully drive stakeholder value and engage in value co-creation.
CO 4: Develop the skills to create, deliver, and support services within the ITIL service value
system.
CO 5: Understand the principles and techniques of High-Velocity IT and foster a culture of
continual improvement.
IT act and Cyber Law
B. Sc. (Information Technology) Semester – VI
Course Name: IT act and Cyber Law Course Code: USIT607
(Elective-II)
Periods per week (1 Period is 50 minutes) 5
Credits 2
Hours Marks
Evaluation System Theory Examination 2½ 75
Internal -- 25
Course Objective:
To understand the legal framework for arrests without warrant, penalties, adjudication,
and appeals in cybercrime cases under the IT Act, 2000.
To explore the formation, validity, and jurisdictional issues of contracts in the digital and
cyber world.
To examine legal strategies and protections against cyber-squatting and copyright
infringement in the digital realm.
To analyze the challenges of e-commerce taxation and understand the role of digital
signatures, certifying authorities, and e-governance in the digital economy.
To compare the Indian Evidence Act of 1872 with the IT Act of 2000 and explore
protections for cyber consumers in India.
Course Outcome:
After completing the course, the learner will be able to:
CO1: Gain a detailed understanding of the legal procedures and enforcement mechanisms for
cybercrimes, including arrest without warrant, penalties, adjudication, and appeals under the IT
Act, 2000.
CO2: understand the legal principles governing digital contracts and jurisdictional challenges
in the cyber world.
CO3: Equipped with knowledge of legal remedies and strategies to combat cyber squatting and
protect copyrights in the digital world.
CO4: Understand the complexities of e-commerce taxation and the significance of digital
signatures, certifying authorities, and e-governance in modern digital transactions.
CO5: Comprehend the interplay between the Indian Evidence Act of 1872 and the Information
Technology Act of 2000, and gain insights into the legal safeguards for cyber consumers in
India.
Information Security Practical
B. Sc. (Information Technology) Semester – VI
Course Name: Information Security Practical Course Code: USIT6P2
Periods per week (1 Period is 50 minutes) 3
Credits 2
Hour Marks
s
Evaluation System Practical Examination 2½ 50
Internal -- --
List of Practical
1. Configure Routers:
a. OSPF MD5 authentication.
b. NTP.
c. to log messages to the syslog server.
7. Layer 2 Security
a. Assign the Central switch as the root bridge.
b. Secure spanning-tree parameters to prevent STP manipulation attacks.
c. Enable port security to prevent CAM table overflow attacks.
List of Practical
1. Perform the analysis for the following:
a. Import the data warehouse data in Microsoft Excel and create the Pivot table and Pivot
Chart.
b. Import the cube in Microsoft Excel and create the Pivot table and Pivot Chart to perform data
analysis.
2. Apply the what – if Analysis for data visualization. Design and generate necessary reports
based on the data warehouse data. Use Excel.
5. Perform the Linear regression on the given data warehouse data using R/Python.
6. Perform the logistic regression on the given data warehouse data using R/Python.
7. Write a Python program to read data from a CSV file, perform simple data analysis, and
generate basic insights. (Use Pandas is a Python library).
9. Create the Data staging area for the selected database using SQL.
10. Create the cube with suitable dimension and fact tables based on ROLAP, MOLAP and
HOLAP model.
List of Practical
1. Familiarizing Quantum GIS: Installation of QGIS, datasets for both Vector
and Raster data, Maps.
2. Creating and Managing Vector Data: Adding vector layers, setting properties, formatting,
calculating line lengths and statistics
3. Exploring and Managing Raster data: Adding raster layers, raster styling and analysis, raster
mosaicking and clipping
4. Making a Map, Working with Attributes, Importing Spreadsheets or CSV files Using Plugins,
Searching and Downloading OpenStreetMap Data
8. Managing Data Tables and Saptial data Sets: Table joins, spatial joins, points in polygon
analysis, performing spatial queries
9. Advanced GIS Operations 1: Nearest Neighbor Analysis, Sampling Raster Data using Points
or Polygons, Interpolating Point Data
List of Practical
1. Configuring OSPF – I
a. Single-Area OSPF Link Costs and Interface Priorities
b. Multi-Area OSPF with Stub Areas and Authentication
2. Configuring OSPF – II
a. OSPF Virtual Links and Area Summarization
b. OSPF over Frame Relay
4. BGP
a. Configuring BGP with Default Routing
b. Using the AS_PATH Attribute
c. BGP Route Reflectors and Route Filters
5. IPv6
a. Configuring OSPF for IPv6
b. Configuring 6to4 Tunnels
Practical Details
No
0 Introduction to Android, Introduction to Android Studio IDE, Application Fundamentals:
Creating a Project, Android Components, Activities, Services, Content Providers, Broadcast
Receivers, Interface overview, Creating Android Virtual device, USB debugging mode, Android
Application Overview. Simple “Hello World” program.
1 Programming Resources
Android Resources: (Color, Theme, String, Drawable, Dimension, Image),
4 Programming UI elements
AppBar, Fragments, UI Components
1. Practical Question 1 20
2. Practical Question 2 20
3. Journal 5
4. Viva Voce 5
OR
1. Practical Question 40
2. Journal 5
3. Viva Voce 5
Project Dissertation Semester V and
Project Implementation Semester VI
Chapter 1 to 4 should be submitted in Semester V in spiral binding. These chapter have also to be included in
Semester VI report. Semester VI report has to be hard bound with golden embossing. Students will be evaluated
based on the dissertation in semester V and dissertation and viva voce in Semester VI.
I. OBJECTIVES
Describe the Systems Development Life Cycle (SDLC).
Evaluate systems requirements.
Complete a problem definition.
Evaluate a problem definition.
Determine how to collect information to determine requirements.
Perform and evaluate feasibility studies like cost-benefit analysis, technical feasibility, time feasibility
and Operational feasibility for the project.
Work on data collection methods for fact finding.
Construct and evaluate data flow diagrams.
Construct and evaluate data dictionaries.
Evaluate methods of process description to include structured English, decision tables and decision trees.
Evaluate alternative tools for the analysis process.
Create and evaluate such alternative graphical tools as systems flow charts and state transition diagrams.
Decide the S/W requirement specifications and H/W requirement specifications.
Plan the systems design phase of the SDLC.
Distinguish between logical and physical design requirements.
Design and evaluate system outputs.
Design and evaluate systems inputs.
Design and evaluate validity checks for input data.
Design and evaluate user interfaces for input.
Design and evaluate file structures to include the use of indexes.
Estimate storage requirements.
Explain the various file update processes based on the standard file organizations.
Decide various data structures.
Construct and evaluate entity-relationship (ER) diagrams for RDBMS related projects.
Perform normalization for the unnormalized tables for RDBMS related projects
Decide the various processing systems to include distributed, client/server, online and others.
Perform project cost estimates using various techniques.
Schedule projects using both GANTT and PERT charts.
Perform coding for the project.
Documentation requirements and prepare and evaluate systems documentation.
Perform various systems testing techniques/strategies to include the phases of testing.
Systems implementation and its key problems.
Generate various reports.
Be able to prepare and evaluate a final report.
Brief the maintenance procedures and the role of configuration management in operations.
To decide the future scope and further enhancement of the system.
Plan for several appendices to be placed in support with the project report documentation.
Decide the various processing systems to include distributed, client/server, online and others.
Perform project cost estimates using various techniques.
Schedule projects using both GANTT and PERT charts.
Perform coding for the project.
Documentation requirements and prepare and evaluate systems documentation.
Perform various systems testing techniques/strategies to include the phases of testing.
Systems implementation and its key problems.
Generate various reports.
Be able to prepare and evaluate a final report.
Brief the maintenance procedures and the role of configuration management in operations.
To decide the future scope and further enhancement of the system.
Plan for several appendices to be placed in support with the project report documentation.
Work effectively as an individual or as a team member to produce correct, efficient, well organized
and documented programs in a reasonable time.
Recognize problems that are amenable to computer solutions, and knowledge of the tool necessary for
solving such problems.
Develop of the ability to assess the implications of work performed.
Get good exposure and command in one or more application areas and on the software
Develop quality software using the software engineering principles
Develop of the ability to communicate effectively.
IV. Introduction
The project report should be documented with scientific approach to the solution of the problem that the students
have sought to address. The project report should be prepared in order to solve the problem in a methodical and
professional manner, making due references to appropriate techniques, technologies and professional standards.
The student should start the documentation process from the first phase of software development so that one can
easily identify the issues to be focused upon in the ultimate project report. The student should also include the
details from the project diary, in which they will record the progress of their project throughout the course.
The project report should contain enough details to enable examiners to evaluate the work. The important points
should be highlighted in the body of the report, with details often referred to appendices.
1.1 PROJECT REPORT:
Title Page
Original Copy of the Approved Proforma of the Project Proposal
Certificate of Authenticated work
Role and Responsibility Form
Abstract
Acknowledgement
Table of Contents
Table of Figures
CHAPTER 1: INTRODUCTION
1.1 Background
1.2 Objectives
1.3 Purpose, Scope, and Applicability
1.3.1 Purpose
1.3.2 Scope
1.3.3 Applicability
1.4 Achievements
1.5 Organisation of Report
CHAPTER 7: CONCLUSIONS
7.1 Conclusion
7.1.1 Significance of the System
7.2 Limitations of the System
7.3 Future Scope of the Project
REFERENCES
GLOSSARY
APPENDIX A
APPENDIX B
V. EXPLANATION OF CONTENTS
Title Page
Sample format of Title page is given in Appendix 1 of this block. Students should follow the given format.
Abstract
This should be one/two short paragraphs (100-150 words total), summarising the project work. It is
important that this is not just a re-statement of the original project outline. A suggested flow is background,
project aims and main achievements. From the abstract, a reader should be able to ascertain if the project
is of interest to them and, it should present results of which they may wish to know more details.
Acknowledgements:
This should express student‟s gratitude to those who have helped in the preparation of project.
Table of Contents:
The table of contents gives the readers a view of the detailed structure of the
report. The students would need to provide section and subsection headings with associated pages. The
formatting details of these sections and subsections are given below. Table of Figures: List of all Figures,
Tables, Graphs, Charts etc. along with their page numbers in a table of figures.
Chapter 1: Introduction
The introduction has several parts as given below:
Background: A description of the background and context of the project and its relation to work already
done in the area. Summarise existing work in the area concerned with the project work.
Objectives: Concise statement of the aims and objectives of the project. Define exactly what is going to
be done in the project; the objectives should be about 30 /40 words.
Purpose, Scope and Applicability: The description of Purpose, Scope, and Applicability are given below:
Purpose: Description of the topic of the project that answers questions on why this project is being done.
How the project could improve the system its significance and theoretical framework.
Scope: A brief overview of the methodology, assumptions and limitations. The students should answer
the question: What are the main issues being covered in the project? What are the main functions of the
project?
Applicability: The student should explain the direct and indirect applications of their work. Briefly
discuss how this project will serve the computer world and people.
Achievements: Explain what knowledge the student achieved after the completion of the work. What
contributions has the project made to the chosen area? Goals achieved - describes the degree to which the
findings support the original objectives laid out by the project. The goals may be partially or fully
achieved, or exceeded.
Organisation of Report: Summarizing the remaining chapters of the project report, in effect, giving the
reader an overview of what is to come in the project report.
Chapter 7: Conclusions
Conclusion: The conclusions can be summarised in a fairly short chapter (2 or 3 pages). This chapter
brings together many of the points that would have made in the other chapters. Limitations of the System:
Explain the limitations encountered during the testing of the project that the students were not able to
modify. List the criticisms accepted during the demonstrations of the project.
Future Scope of the Project describes two things: firstly, new areas of investigation prompted by
developments in this project, and secondly, parts of the current work that was not completed due to time
constraints and/or problems encountered.
REFERENCES
It is very important that the students acknowledge the work of others that they have used or adapted in
their own work, or that provides the essential background or context to the project.
The use of references is the standard way to do this. Please follow the given standard for the references
for books, journals, and online material. The citation is mandatory in both the reports.
E.g:
Linhares, A., & Brum, P. (2007). Understanding our understanding of strategic scenarios: What role do
chunks play? Cognitive Science, 31(6), 989-1007.
https://doi.org/doi:10.1080/03640210701703725
Lipson, Charles (2011). Cite right : A quick guide to citation styles; MLA, APA, Chicago, the sciences,
professions, and more (2nd ed.). Chicago [u.a.]: University of Chicago Press. p. 187.
ISBN 9780226484648.
Elaine Ritchie, J Knite. (2001). Artificial Intelligence, Chapter 2 ,p.p 23 - 44. Tata McGrawHill.
GLOSSARY
If you the students any acronyms, abbreviations, symbols, or uncommon terms in the project report then
their meaning should be explained where they first occur. If they go on to use any of them extensively
then it is helpful to list them in this section and define the meaning.
APPENDICES
These may be provided to include further details of results, mathematical derivations, certain
illustrative parts of the program code (e.g., class interfaces), user documentation etc.
In particular, if there are technical details of the work done that might be useful to others who wish to
build on this work, but that are not sufficiently important to the project as a whole to justify being
discussed in the main body of the project, then they should be included as appendices.
VI. SUMMARY
Project development usually involves an engineering approach to the design and development of a
software system that fulfils a practical need. Projects also often form an important focus for discussion at
interviews with future employers as they provide a detailed example of what the students are capable of
achieving. In this course the students can choose your project topic from the lists given in Unit 4:
Category-wise Problem Definition.
This is to certify that the project entitled, "Title of The Project ", is bonafied work of NAME OF
THE STUDENT bearing Seat.No: (NUMBER) submitted in partial fulfillment of the requirements
for the award of degree of BACHELOR OF SCIENCE in INFORMATION TECHNOLOGY from
University of Mumbai. (12, times new roman, justified)
External Examiner
ACKNOWLEDGEMENT
(20, BOLD, ALL CAPS, CENTERED)
The acknowledgement should be in times new roman, 12 font with 1.5 line spacing, justified.
Marks Distribution:
Semester V: 50 Marks
Documentation: 50 marks
1. Practical Question 1 20
2. Practical Question 2 20
3. Journal 5
4. Viva Voce 5
OR
1. Practical Question 40
2. Journal 5
3. Viva Voce 5