BCA NEP Syllabus 2022 2026
BCA NEP Syllabus 2022 2026
Credits Marks
Exam
SL. Course Subject Teaching Contact
Course Title Duration
No. Category Code Department L T P Total Hours CIE SEE Total (Hrs)
Discipline Core-1
1. BCA110 Programming Language CA 3 0 0 3.0 3 50 50 100 3
(DSC-1)
Discipline Core-2
2. BCA120 Mathematics - I Mathematics 3 0 0 3.0 3 50 50 100 3
(DSC-2)
Discipline Core-3
3. BCA130 Operating System CA 3 0 0 3.0 3 50 50 100 3
(DSC-3)
Open Elective-1 Problem Solving
4. BCA140 CA 3 0 0 3.0 3 50 50 100 3
(OE-1) Techniques
Language – 1
5. BCA150 Kannada –I Kannada 3 1 0 3.0 3 50 50 100 3
(L-1)
Language - 2
6. BCA160 English – I English 3 1 0 3.0 3 50 50 100 3
(L-2)
Skill Enhancement Computer Concepts
7. BCA170 CA 2 0 0 2.0 2 50 50 50 1.5
Courses (SEC-1) &Tools
SL. Course Subject Course Title Teaching Credits Contact Marks Exam
No. Category Code Department Hours Duration
L T P Total CIE SEE Total (Hrs)
Object Oriented
Discipline Core-4
1. BCA210 Programming with CA 3 0 0 3.0 3 50 50 100 3
(DSC - 4)
C++
Discipline Core -5
2. BCA220 Data Structures CA 3 0 0 3.0 3 50 50 100 3
(DSC - 5)
Open Elective-2 E-Commerce
3. BCA230 CA 3 0 0 3.0 3 50 50 100 3
(OE-2) Applications
Discipline Elective -1
4. BCA24X Discipline Elective -1 CA 3 0 0 3.0 3 50 50 100 3
(DSE - 1)
Language – 3
5. BCA250 Kannada –II Kannada 3 1 0 3.0 3 50 50 100 3
(L-3)
Language – 4
6. BCA260 English – II English 3 1 0 3.0 3 50 50 100 3
(L-4)
Ability Enhancement
Environmental
7. Compulsory Courses BCA270 Environmental 3 0 0 3.0 3 50 50 100 3
Studies
(AECC-1)
Skill Enhancement Personal
8. BCA280 CA 1 0 2 2.0 2 50 50 50 1.5
Courses (SEC-2) Effectiveness
Object Oriented
Discipline Core-4
9. BCA21L Programming with CA 0 0 1 1.0 2 50 -- 50 --
(DSC - 4)
C++ Laboratory
Total 22 2 3 24 25 450 400 800 -
Discipline Elective - 1
BCA241 Business Systems
BCA242 Enterprise Resource Planning
Scheme of Teaching and Examination
Third Semester BCA
Discipline Core-6
1. BCA310 Mathematics – II Mathematics 3 0 0 3.0 3 50 50 100 3
(DSC-6)
Discipline Core-7
2. BCA320 Java Programming CA 3 0 0 3.0 3 50 50 100 3
(DSC-7)
Open Elective-3
3. BCA330 E-Governance CA 3 0 0 3.0 3 50 50 100 3
(OE-3)
Discipline Elective-2
4. BCA34X Discipline Elective -2 CA 3 0 0 3.0 3 50 50 100 3
(DSE-2)
Language-5
5. BCA350 Kannada –III Kannada 3 1 0 3.0 3 50 50 100 3
(L-5)
Language-6
6. BCA360 English – III English 3 1 0 3.0 3 50 50 100 3
(L-6)
Ability Enhancement
7. Compulsory Courses-2 BCA370 Constitution of India Law 2 0 0 2.0 2 50 50 50 1.5
(AECC-2)
Skill Enhancement Courses Artificial
8. BCA380 CA 1 0 0 1.0 1 50 50 50 1.5
(SEC-2) Intelligence
Discipline Core-7 Java Programming
9. BCA32L CA 0 0 1 1.0 2 50 -- 50 --
(DSC-7) Laboratory
Skill Enhancement Courses Artificial
10. BCA38L CA 0 0 1 1.0 2 50 -- 50 --
(SEC-2) Intelligence Laboratory
Total 21 2 2 23 25 500 400 800 -
Discipline Elective - 2
BCA341 Data Communications and Networking
BCA342 Human Computer Interface
Scheme of Teaching and Examination
Fourth Semester BCA
Discipline Elective - 3
BCA441 Network Security
BCA442 Management Information System
Scheme of Teaching and Examination
Fifth Semester BCA
Discipline Elective - 4
BCA541 Cloud Computing
BCA542 Software Architecture
Scheme of Teaching and Examination
Sixth Semester BCA
Exam
Credits Marks Duration
SL. Course Subject Teaching Contact
Course Title (Hrs)
No. Category Code Department Hours
L T P Total CIE SEE Total
Discipline Elective - 5
BCA641 .NET Technologies
BCA642 Software Testing
Scheme of Teaching and Examination
Seventh Semester BCA
Exam
Credits Marks
SL. Course Subject Teaching Contact Duration (Hrs)
Course Title
No. Category Code Department Hours
L T P Total CIE SEE Total
Discipline Elective - 6
BCA741 Image Processing
BCA742 Advanced DBMS
Scheme of Teaching and Examination
EighthSemesters BCA
Exam
SL. Course Subject Teaching Credits Contact Marks Duration
Course Title (Hrs)
No. Category Code Department Hours
L T P Total CIE SEE Total
Vocational -4
4. BCA840 Innovation Studies CA 3 1 0 3.0 3 50 50 100 3
(Voc-4)
Discipline Elective - 7
BCA831 Soft Computing
BCA832 NoSQL
Credit Pattern for BCA Course
Semester Credits
1 24
2 24
I Year 48
3 23
4 23
II Year 94
5 22
6 20
III Year 136
7 20
8 20
IV Year 176
I Semester
JSS Science and Technology University, Mysuru
Course Outcomes:
Formatted and Unformatted I/O Functions, Decision making, branching and looping: Decision
Making Statements - if Statement, if–else statement, nesting of if-else statements, else–if
ladder, switch statement, operator, Looping - while, do-while, for loop, Nested loop, break,
continue, and goto statements. Functions: Function Definition, prototyping, types of
functions, passing arguments to functions, Nested Functions, Recursive functions.
Unit:3:Arrays 08 Hours
Declaring and Initializing, One Dimensional Arrays, Two Dimensional Arrays, Multi
Dimensional Arrays - Passing arrays to functions. Strings: Declaring and Initializing strings,
Operations on strings, Arrays of strings, passing strings to functions. Storage Classes -
Automatic, External, Static and Register Variables.
Unit:4:Structures 08 Hours
Files - File modes, File functions, and File operations, Text and Binary files, Command Line
arguments. C Preprocessor directives, Macros – Definition, types of Macros, Creating and
implementing user defined header files.
Text Books:
Reference Books:
1. http://www.worldbestlearningcenter.com/index_files/c_tutorial_lesson.htm
2.http://www.cluster2.hostgator.co.in/files/writeable/uploads/hostgator99706/file/letusc-
yashwantkanetkar.pdf
JSS Science and Technology University, Mysuru
Course Outcomes:
CO1: Handle matrix computations that come up in linear algebra like accurate / approximate
solutions of systems of linear equations, eigenvalues, eigenvectors, inverses, etc
CO2: Ability to identify the partial derivatives and solve the problem, to find the total
derivative
and solve the Jacobian problems using partial derivatives.
CO3: Understand polar curves and use these concepts to find different parameters
CO4: Ability to derive the reduction formula for some trigonometric functions and solve
problems
CO5: Understand the graphs and able to to solve the problems using the graphs.
Unit:1: 08 Hours
Elementary row and column operations, equivalent matrices, invariance of rank under
elementary operations, determination of rank of a matrix by reducing it to the echelon form.
Homogeneous and non-Homogeneous systems of ‘m’ linear equations in ‘n’ unknowns,
criterion for uniqueness of solutions. Eigen values and Eigen vectors of a square matrix,
standard properties, reduction of matrix to diagonal form, Cayley-Hamilton theorem (without
proof), and applications.
Unit:2: 08 Hours
Unit:3: 08 Hours
Polar Coordinates- angle between the radius vector and the tangent, angle between polar
curves, length of perpendicular from pole to the tangent, orthogonality of curves & pedal
equations.
Unit:4: 08 Hours
Reduction formulae for Sinnx, Cosnx, SinmxCosnx. Leibnitz’s rule for differentiation under
the integral sign.
Unit:5: 08 Hours
Introduction to Graph Theory: Definitions and Examples, Sub graphs, Complements, and
Graph Isomorphism, Vertex Degree, Euler Trails and Circuits , Trees: Definitions, Properties,
and Examples, Routed Trees, Trees and Sorting, Weighted Trees and Prefix Codes.
Text Books:
Reference Books:
Course Outcomes:
CO1: Understand the basic concepts of Operating System, its functions and services.
CO2: Compare the various algorithms and performance of various algorithms used for
management of Memory, CPU scheduling.
CO3: Apply various concept related with Deadlock to solve problems.
CO4: Understand the concepts of memory management.
CO5: Understand the concepts of virtual memory management.
Unit: 1: 07 Hours
Unit:2: 08 Hours
System Structure: Operating System Services – System Calls – Types of Systems Calls –
System Programs
Unit:3: 07 Hours
Process Concept: Process Scheduling – Operations on Processes – Inter process
Communication – Communications in Client Server Systems
Unit:4: 08 Hours
Process Scheduling: Concepts – Scheduling Criteria – Scheduling Algorithms Synchronization:
The critical section problem – Peterson’s Solution
Unit:5: 10 Hours
Deadlocks: Characterization - Methods for handling deadlocks - Deadlock prevention –
Deadlock Avoidance – Deadlock Detection - Recovery from deadlock. Memory Management:
Swapping – Contiguous Memory Allocation, Paging, Segmentation.
Text Books:
1. https://www.tutorialspoint.com/operating_system/os_linux
2. https://www.cs.uic.edu/~jbell/CourseNotes/OperatingSystems
JSS Science and Technology University, Mysuru
Course Outcomes:
CO1:Understand basics of computer based problem solving
CO2: Able to understand basics of algorithms
CO3:Able to analyze the problem and provide a technique to solve it.
CO4:Understand Factoring and Array techniques.
CO5: Understand the basic merging and sorting techniques
Introduction, Algorithms: Finding the Square Root of a Number, The Smallest Divisor of an
Integer ,The Greatest Common Divisor of Two Integers ,Generating Prime Numbers,
Computing the Prime Factors of an Integer ,Generation of Pseudo-random Numbers
,Raising a Number to a Large Power , Computing the nth Fibonacci Number
Unit:4: Array Techniques 08 Hours
Introduction, Array Order Reversal, Array Counting or Histograrnming, Finding the Maximum
Number in a Set, Removal of Duplicates from an ordered array,Finding the kth Smallest
Element, Longest Monotone Subsequence
Reference Books:
1. Introduction to Algorithms, 3rd Edition (The MIT Press) 3rd Edition by Thomas H.
Cormen.
1. https://ryanstutorials.net/problem-solving-skills/
2. https://www.tutorialspoint.com/creative_problem_solving/index.htm
3. https://www.codementor.io/community/topic/problem-solving-skills
JSS Science and Technology University, Mysuru
Course Outcomes:
¸ÀºÀd ¨sÁμÁ §¼ÀPÉ, £ÀÄrUÀlÄÖUÀ¼ÀÄ, UÁzÉUÀ¼ÀÄ, ¥Àæ§AzsÀ gÀZÀ£É, D±ÀÄ ¨sÁμÀt, ¸ÀAzÀ±Àð£À, ZÀZÉð, ¨sÁμÀtPÀ¯É,
¨sÁó μÁ C£ÀĪÁzÀ, ZÀ®£ÀavÀæ «ªÀıÉð.
Unit:4: ªÁåPÀgÀt: 07 Hours
1. ªÁPÀå-¥ÀzÀ-ªÀtð 7
2. ¥ÀæPÀÈw-¥ÀævÀåAiÀÄ
3. ¥ÀzÀUÀ¼À §UÉUÀ¼ÀÄ
4. ªÀtðªÀiÁ¯É
5. PÀ£ÀßqÀ ¸ÀA¢üUÀ¼ÀÄ
6. £ÁªÀÄ¥ÀzÀzÀ §UÉUÀ¼ÀÄ
Text books:
Unit:5: ªÁåPÀgÀt:
• ²μÀÖ¨sÁμÉAiÀÄ ªÁåPÀgÀt eÁÕ£ÀªÀ£ÀÄß ¨É¼É¸ÀĪÀÅzÀÄ.
• ¨sÁμÁ §¼ÀPÉAiÀÄ ªÉÊ«zsÀåvÉAiÀÄ£ÀÄß w½¸ÀĪÀÅzÀÄ.
• §gÀªÀtÂUÉAiÀÄ P˱À®åªÀ£ÀÄß ¨É¼É¸ÀĪÀÅzÀÄ.
• PÀæªÀħzÀÞªÁV N¢¸ÀĪÀÅzÀÄ
• PÁªÀåUÀ¼À ¨sÁUÀUÀ¼À£ÀÄß ¤Ãr C°ègÀĪÀ ªÁåPÀgÀuÁA±ÀUÀ¼À£ÀÄß UÀÄgÀÄw¸À®Ä w½¸ÀĪÀÅzÀÄ
• ¸ÀA¢ü ªÀÄvÀÄÛ ¸ÀªÀiÁ¸À ¥ÀzÀUÀ¼À £ÀqÀĪÀt ªÀåvÁå¸ÀUÀ¼À£ÀÄß ¥ÀnÖ ªÀiÁr¸ÀĪÀÅzÀÄ
• PÀ£ÀßqÀ ªÁåPÀgÀtPÁgÀgÀ §zÀÄPÀÄ-§gÀºÀ PÀÄjvÀÄ «ZÁgÀ UÉÆÃ¶× K¥Àðr¸ÀĪÀÅzÀÄ.
• ¥ÀzÀ§AzsÀUÀ¼ÀÄ, ªÁPÀåUÀ¼À£ÀÄß gÀa¸À®Ä ªÀÄvÀÄÛ ©r¸À®Ä ¸ÀÆa¸ÀĪÀÅzÀÄ.
• ªÁåPÀgÀtzÀ ¸ÀjgÀÆ¥ÀªÀ£ÀÄß w½¸ÀĪÀ ZÀlĪÀnPÉUÀ¼À£ÀÄß £ÀqɸÀĪÀÅzÀÄ
JSS Science and Technology University, Mysuru
Unit:1: 07 hours
Unit:2: 07 hours
Functional English:
1. Vocabulary Usage: Homonyms, homographs, homophones, prefixes, suffixes
2. Paragraph writing, Essay writing
3 Expansion of ideas, proverbs
4. Words often confused
5. Group discussion, extempore speech, debates
Unit:3: 06 hours
Poetry:
1. Where the mind is without fear- Rabindranath Tagore
2. I wandered lonely as a cloud- William Wordsworth
3. The Darling Thrush by Thomas Hardy.
Unit:4: 10 hours
Prose-Short stories:
1. With the photographer- Stephen Leacock
2: A snake in the grass- R.K.Narayan
3. The Clay mother-in-law. A South Indian Folktale (collected by A.K. Ramanujan)
Unit:5: Sonnets 06 hours
Text Books:
Reference Books:
Course Outcomes:
CO1: Analyze the computer basics, processes and devices used with computers
CO2: Discern operations of computers and importance of hardware components
CO3: Apply the concept of Problem solving and steps involved for algorithm development
CO4: Getting used to business communications tools
CO5: Knowing usage of internet applications
What is an Operating System - the use interface - running programs - managing files -
managing hardware - Enhancing the operating system with utility Software - typical operating
systems in use
Text Books:
1. Computer Fundamentals - P K Sinha,BPB
2. Computers Today - Suresh K Basandra, Galgotia. Maureen Sprankle, Problem solving
and Programming Concepts, Pearson Education, New Delhi.
3. Anupamjain ,NavneetMehra : Computer Fundamentals MS-Office, Vitasta Publishers pvt
ltd, 2015.
4. RizwanAhmed : Internet and its applications, Margham Publications , 2015.
Reference Books:
1. Introduction to Computers - N Subramanian,TMH
2. Understanding Computers - R Rajagopalan. TMH
3. Computers Today - Donald Sanders, MGH
Laboratory Details:
Introductory session : Demonstration of computer and its peripherals
1. Using Ms-Word with suitable examples, write the steps and execute the following with
respect to table handling
a. Creating a table (At least 4 Columns and 6 Rows).
b. Entering appropriate data into the table.
c. Sort the table.
d. Apply the formulas on table numeric values.
2. Using Ms-Word, write the steps and execute for creating “Mail Merge” document for
“FORM LETTERS”.
3. Using Ms-Excel spread sheet, with suitable example, write steps and create worksheet
called “Employee” and calculate the following using formulas
a. Enter Employee Code, Name and Basic Salary.
b. Calculate DA (20% of Basic Salary).
c. Calculate HRA (10% of Basic Salary).
d. Calculate CCA (8.5% of Basic Salary).
e. Calculate Total Salary (Basic Salary + DA + HRA + CCA)
f. Calculate Deductions (10% of Total Salary).
g. Calculate Net Salary (Total Salary – Deductions).
4..Using Ms-Excel spread sheet write the steps and execute the following:
Course Outcomes:
CO1: Understand the basics of Emotional Intelligence & Behaviour
CO2: Understand Building blocks of Emotional Intelligence
CO3: Understand the impact and aspects of Emotional Intelligence
Unit:1: 10 Hours
Unit:2: 8 Hours
Building Blocks of Emotional Intelligence : Ability Based Model (Mayer & Salovey) ,
Perception ,Employment , Comprehension, Management, Trait Model of Self-Efficacy (K.V.
Petrides) Mixed Model (Daniel Goleman) Personal Competence (Self Awareness, Self-
Management & Motivation) Social Competence (Empathy & Social Skills) Empathy
Understanding Empathy Importance of Empathy Application of Self-Efficacy of EI.
Unit: 3: 8 Hours
Text Books:
1. The Language of Emotional Intelligence: The Five Essential Tools for Building
Powerful and Effective Relationships: Jeanne Segal 45 15 (2008).
2. The Brain and Emotional Intelligence: New Insights :Daniel Goleman HBR's 10
Must Reads on Emotional Intelligence (2015)
Additional Learning Resources: 26 Hours
1. http://www.amazon.com/Emotional-Intelligence-2-0-Travis
Bradberry/dp/0974320625/ref=sr_1_4?s=books&ie=UTF8&qid=1328548324&sr=1-4.
2. http://www.amazon.com/EQ-Difference-Powerful-Emotional-
Intelligence/dp/0814408443/ref=cm_lmf_tit_6.
3. http://www.amazon.com/Language-Emotional-Intelligence-Essential-
Relationships/dp/0071544550/ref=cm_lmf_tit_24.
4. http://www.amazon.com/Building-Emotional-Intelligence-Techniques-
Cultivate/dp/1591797896/ref=sr_1_9?s=books&ie=UTF8&qid=1328548324&sr=1-9.
Laboratory Details:
Emotional intelligence activities and exercises are attempts to build, develop, and maintain
one’s emotional intelligence, often called EI or EQ for Emotional Quotient.
1. 7 Emotional Intelligence Activities:
3. 6 EQ Worksheets
Giving Feedback: Improving Your Self-Awareness.
Self-Awareness Activity
Self-Management Activity
Name Game
4. Tips for Enhancing Your Own Emotional Intelligence
5. 5 Online Courses for EI.
JSS Science and Technology University, Mysuru
Course Outcomes:
List of Experiments:
Text Books:
Reference Books:
1. http://www.worldbestlearningcenter.com/index_files/c_tutorial_lesson.htm
2.http://www.cluster2.hostgator.co.in/files/writeable/uploads/hostgator99706/file/letusc-
yashwantkanetkar.pdf
JSS Science and Technology University, Mysuru
Course Outcomes:
CO1: Analyze the computer basics, processes and devices used with computers
CO2: Discern operations of computers and importance of hardware components
CO3: Apply the concept of Problem solving and steps involved for algorithm development
CO4: Getting used to business communications tools
CO5: Knowing usage of internet applications
Reference Books:
1. Introduction to Computers - N Subramanian,TMH
2. Understanding Computers - R Rajagopalan. TMH
3. Computers Today - Donald Sanders, MGH
Course Outcomes:
CO1: Understand the features of C++ supporting object oriented programming
CO2: Understand the relative merits of C++ as an object oriented programming language
CO3: Understand how to produce object-oriented software using C++
CO4: Understand how to apply the major object-oriented concepts to implement object
oriented Programs in C++, encapsulation, inheritance and polymorphism.
Unit: 1: 08 Hours
Unit:2: 08 Hours
Functions: The main function, Function prototyping, Call by Reference, Return by Reference,
Inline functions, Default arguments, const arguments, Function overloading, Friend function.
Unit: 3: 08 Hours
Classes and Objects: Specifying a Class, Defining member functions, Making an Outside
function Inline, Nesting of member functions, Private member functions, Arrays within a Class,
Static data members, Static member functions, Arrays of Objects, Objects as function
arguments, friendly functions, Returning Objects, const member functions, Pointers to
members.
Unit:4: 08 Hours
Constructors and Destructors: Constructors, Parameterized constructors, Multiple
constructors in a class, Constructors with default arguments, Dynamic initialization of objects,
Dynamic constructor, Constructing Two-dimensional arrays, Destructors.
Operator Overloading and Type Conversions: Defining operator overloading, Overloading
unary operators, Overloading Binary operators, Rules for overloading operators, Type
conversions.
Unit:5: 08 Hours
Inheritance and Polymorphism: Programming concepts and types. Console I/O Operations:
C++ streams, C++ stream classes, Unformatted I/O operations, Formatted I/O operations,
managing output with manipulators.
Text Books:
Reference Books:
1. www.tutorialspoint.com
2. www.geeksforgeeks.org
3. www.Javatpoint.com
4. www.begineersbook.com
JSS Science and Technology University, Mysuru
Definition, Types of queue: Linear queue, circular queue, double ended queue, priority queue,
Array Implementations of queue and operations on all types of queues. Definition, Recursion
in C – Fibonacci, GCD.
Definition: Tree, Binary tree, complete binary tree, Binary search tree, Tree terminology: root,
Node, Degree of a node, ancestors of a node, Binary tree, Array representation of tree,
Creation of Binary tree.
Text Books:
Reference Books
1.http://www.tutorialspoint.com/Data-Structures-in-C-Online-Training/classid=13
2. http://nptel.ac.in/datastructures_c
Course Outcomes:
CO1: Understand the basics of E-Commerce and its technicalities
CO2: Understand the importance of E-Commerce for consumers
CO3: Understand the details of Electronic data interchange
CO4: Understand the security aspects in E-Commerce
CO5: Know the issues with E-Commerce
Unit: 1:E-commerce and its Technological Aspects 08 Hours
E-Retailing: Traditional retailing and e retailing, Benefits of e retailing, Key success factors,
Models of e-retailing, Features of e retailing. E services: Categories of e-services, Web-
enabled services, and matchmaking services, Information-selling on the web, e entertainment,
Auctions and other specialized services. Business to Business Electronic Commerce
Benefits of EDI, EDI technology, EDI standards, EDI communications, EDI Implementation,
EDI Agreements, EDI Security. Electronic Payment Systems, Need of Electronic Payment
System: Study and examine the use of Electronic Payment system and the protocols used,
Study Electronic Fund Transfer and secure electronic transaction protocol for credit card
payment. Digital economy: Identify the methods of payments on the net – Electronic Cash,
cheques and credit cards on the Internet.
Text Books:
Reference Books:
1. Efraim Turban, Jae Lee, David King, H.Michael Chung, “Electronic Commerce–A
ManagerialPerspective", Addison-Wesley.
2. Elias M Award, “Electronic Commerce from Vision to Fulfilment”, 3rd Edition, PHI,
3. Judy Strauss, Adel El-Ansary, Raymond Frost, “E-Marketing”, 3RDEdition, Pearson
Education.
Additional Learning Resources:
1. https://www.tutorialspoint.com/e_commerce/index.htm
2. https://blog.templatetoaster.com/what-is-ecommerce/
3. https://www.wisdomjobs.com/e-university/e-commerce-concepts-tutorial-7/
introduction-to-e-commerce-11845.html
S Science and Technology University, Mysuru
Course Outcomes:
Upon successful completion of this course, students will have the ability to,
CO1: Understand the concepts of business, and information system for business.
CO2: Adopt of Information Technology in business for effective management of activities.
CO3: Develop Business and Corresponding IT strategies.
CO4: Design appropriate Business / IT solutions as per the business requirement
CO5: Understand the concepts of functional business systems
Unit:1 8 Hours
Unit:2 8 Hours
Unit:3: 8 Hours
Unit:4: 8 Hours
Unit:5: 8 Hours
Reference Books:
1. https://freevideolectures.com/course/2687/management-information-system
2. https://www.tutorialspoint.com/management_information_system/index.htm
JSS Science and Technology University, Mysuru
Course Outcomes:
Upon successful completion of this course, students will have the ability to,
CO1: Understand the concept of ERP and benefits.
CO2: Understand the related technologies of ERP.
CO3: Understand the ERP implementation concepts.
CO4: Understand the different business models required of ERP
CO5: Understand the importance and future developments of ERP.
Unit:1 6 Hours
Unit:2 8 Hours
Unit:3 9Hours
Unit:4: 9 Hours
ERP Market: ERP Market Place, SAP AG, People Soft, Baan Company, JD Edwards
World Solutions Company, Oracle Corporation, QAD , System Software Associates.
Unit:5: 8 Hours
ERP–Present And Future : Turbo Charge the ERP System, EIA, ERP and E–Commerce,
ERP and Internet, Future Directions in ERP
Text Books:
1. Alexis Leon, “ERP Demystified”, Tata McGraw Hill, 1999.
2. Joseph A. Brady, Ellen F. Monk, Bret J. Wangner, “Concepts in Enterprise Resource
Planning”, Thomson Learning, 2001
Reference Books:
2. Vinod Kumar Garg and N.K .Venkata Krishnan, “Enterprise Resource Planning concepts
and Planning”, Prentice Hall, 1998.
3. Jose Antonio Fernandz, “ The SAP R /3 Hand book”, Tata McGraw Hill
1. www.scribesoft.com/ebook-the_business_case_for_integrating_erp
2. www.deltek.co.uk /erp
JSS Science and Technology University, Mysuru
Course Outcomes: -
1. ªÉÊAiÀÄQÛPÀ ªÀÄvÀÄÛ ¸ÁªÀiÁfPÀ ªÀiË®åUÀ¼À CjªÀÅ.
2. ¸ÀA¸ÁÌgÀªÀAvÀ fêÀ£À ¦æÃwAiÀÄ w½ªÀÅ.
3. ¸ÀAªÀºÀ£À P˱À®åzÀ ªÀÈ¢Þ
4. ²µÀÖ ¨sÁµÉAiÀÄ ªÁåPÀgÀt eÁÕ£À
5. ¥ÀzÀå gÀZÀ£Á PÀæªÀÄzÀ°è bÀAzÀ¹ì£À §¼ÀPÉAiÀÄ CjªÀÅ.
Text Books:
1. ªÉÄʸÀÆgÀÄ «±Àé«zÁ央AiÀÄzÀ PÀ£ÀßqÀ ¥ÀoÀå¥ÀĸÀÛPÀUÀ¼ÀÄ
2. £ÁlPÀ- vÁ½ÃPÀmÉÆÖÃPÀÆÌ°Ã£ÉÃ?-n.¦. PÉʯÁ¸ÀA
3. ªÀZÀ£ÀUÀ¼À ¥ÀĸÀÛPÀUÀ¼ÀÄ
4. ªÀÄAPÀÄwªÀÄä£À PÀUÀÎ -r«f
5. bÀAzÀ¸ÀÄì
6. ªÁåPÀgÀt
Reference Books:
¸ÀàzsÁðvÀäPÀ ¥ÀjÃPÉëUÀ¼À ¥ÀĸÀÛPÀUÀ¼ÀÄ
Tutorial Details:
Unit:1: PÁªÀå : * ¥ÀzÀå/ªÀZÀ£ÀUÀ¼À£ÀÄß ©r¹, ¨sÁªÀ CxÀð w½AiÀÄĪÀAvÉ N¢¸ÀĪÀÅzÀÄ.
* ¥ÀzÀå/ªÀZÀ£ÀUÀ¼À°ègÀĪÀ «±ÉõÀ ¥ÀzÀ, £ÀÄrUÀlÄÖ, UÁzÉ , G¥ÀªÉÄUÀ¼À£ÀÄß UÀÄgÀÄw¹ ¸ÀéAvÀ
ªÁPÀåUÀ¼À°è §¼À¸À®Ä ¸ÀÆa¸ÀĪÀÅzÀÄ.
¥ÀzÀå/ªÀZÀ£ÀUÀ¼À ªÀ¸ÀÄÛ, D±ÀAiÀÄUÀ¼À£ÀÄß ¥Àæ¸ÀÄÛvÀPÉÌ C£Àé¬Ä¹ «ZÁgÀ ªÀÄAqÀ£É , ¥ÀzÀå/ªÀZÀ£ÀUÀ¼À
gÀZÀ£É ªÀiÁr¸ÀĪÀÅzÀÄ.
¥ÀzÀå/ªÀZÀ£ÀUÀ½UÉ gÁUÀ ¸ÀAAiÉÆÃf¹ ºÁqÀ®Ä GvÉÛÃf¸ÀĪÀÅzÀÄ. §ºÀĪÀiÁzsÀåªÀÄUÀ¼À£ÀÄß
§¼À¹PÉÆ¼ÀÄîªÀÅzÀÄ.
¥ÀzÀå/ªÀZÀ£ÀUÀ¼À ªÀ¸ÀÄÛ ªÀÄvÀÄÛ D±ÀAiÀÄUÀ¼À£ÀÄß ¸ÀÈd£ÁvÀäPÀªÁV ZÀlĪÀnPÉUÀ¼À£ÀÄß «zÁåyðUÀ¼À
UÀÄA¥ÀÄUÀ¼À£ÁßV «AUÀr¹ £ÀqɸÀĪÀÅzÀÄ.
Course Outcomes:
Upon successful completion of this course, students will be able to,
Unit:1: 7 hours
Unit:2: 6 hours
Functional English:
1. Précis writing
2. Report writing: Newspaper, journal
3. Letter writing: Personal/Formal letters
4. Usage of phrasal verbs, collocations, idioms & phrases 5. Presentation: preparation of materials
and presentation, e.g., posters, charts
Unit:3: 5 hours
Poetry:
1. Obituary-A.K.Ramanujan
2. The road not taken-Robert Frost
3. Because I could not stop for death – Emily Dickinson
Unit:4: 9 hours
Prose-Novel
Prose : Play
Text Books:
Course Outcomes:
CO1: Understand the principles of ecology and environmental issues that apply to air, land, and
water issues on a global scale.
CO2: Develop critical thinking and/or observation skills, and apply them to the analysis of a
problem or question related to the environment.
CO3: Demonstrate ecology knowledge of a complex relationship between biotic and abiotic
components.
CO4: Apply their ecological knowledge to illustrate and graph a problem and describe the
realities that managers face when dealing with complex issues.
Unit:1 07 Hours
Unit:2 06 Hours
Natural Resources, Water resources – Availability & Quality aspects, Water borne diseases &
water induced diseases, Fluoride problem in drinking water Mineral resources, Forest Wealth
Material Cycles – Carbon Cycle, Nitrogen Cycle & Sulphur Cycle.
Unit:3 06 Hours
Unit:4 09 Hours
Air Pollution & Automobile Pollution: Definition, Effects – Global Warming, Acid rain & Ozone
layer depletion, controlling measures. Solid Waste Management, E – Waste Management
&Biomedical Waste Management - Sources, Characteristics & Disposal methods.
UNIT:5 08 Hours
Introduction to GIS & Remote sensing, Applications of GIS & Remote Sensing in Environmental
Engineering Practices. Environmental Acts & Regulations, Role of government, Legal aspects,
Role of Nongovernmental Organizations (NGOs), Environmental Education & Women
Education
Text Books:
1. Benny Joseph (2005), “Environmental Studies”, Tata McGraw – Hill Publishing Company
Limited.
2. R.J.Ranjit Daniels and JagadishKrishnaswamy, (2009), “Environmental Studies”, Wiley India
Private Ltd., New Delhi.
3. R Rajagopalan, “Environmental Studies – From Crisis to Cure”, Oxford University Press,
2005,
4. Aloka Debi, “Environmental Science and Engineering”, Universities Press (India) Pvt. Ltd.
2012
Reference Books:
Course Outcomes:
CO1: Understand the strengths and weaknesses as individual, as a member of a group /
organization using personality typing.
CO2: Develop self-awareness and to understand the concepts of Neuro-lingistic programming
(NLP).
CO3: Equip with skill and competence to apply positive psychology principles in a range of
environments to increase individual and collective well-being
Introduction, blocks in creative thinking, cycles and funnels of creativity, developing a whole
brain approach to creativity, creative techniques: 1, 2, 3 & 4.Team working: Introduction,
features of successful team, group development, meetings, team roles.
Introduction, status work, rights of work, challenging situations, tricky feelings and emotions,
cultural differences. Negotiation skills: Introduction, principles of negotiation, negotiating
approaches, negotiation strategy and tactics, the negotiation process.
Text Books:
Reference Books:
1. http://dspace.bhos.edu.az/xmlui/bitstream/handle/123456789/885/the-art-of-personal-
effectiveness.pdf?sequence=1.
2. https://www.slideshare.net/e1033930/personal-effectiveness-presentation.
3. https://learning.oreilly.com/library/view/brilliant-personal-effectiveness/9781292077567/
Laboratory Details:
Activity -1: 15 active learning activities to energize the Students in classroom.
Start Time End Time Time Used Activity Type Changes if Any
Activity -3: Group Discussion and Team Work Activities will be conducted like: Poster Making
event, Group Discussion by giving a same topics through debates, Treasure Hunt event and
so on…
Activity-4 : Quiz’s, Role Pay , Stand Up comedy, Try Non-Verbal’s, Dumb Charades, and So
on. Any 2 Activities will be conducted based on students interests.
JSS Science and Technology University, Mysuru
Course Outcomes:
CO1: Understand the features of C++ supporting object oriented programming
CO2: Understand the relative merits of C++ as an object oriented programming language
CO3: Understand how to produce object-oriented software using C++
CO4: Understand how to apply the major object-oriented concepts to implement object
oriented Programs in C++, encapsulation, inheritance and polymorphism.
List of Experiments:
PART-A
1. Write a C++ program to calculate the average of three numbers.
2. Write a C++ program to find the biggest of three numbers.
1. Write a C++ program to find minimum and maximum of two numbers using functions.
2. Write a C++ program to check the given number is palindrome or not
3. Write a C++ program to sum of all even and odd numbers.
4. Write a C++ program to perform arithmetic operations using classes and objects.
5. Write a C++ program to define a student class with user name, to name, total, average
for “n” students.
6. Write a C++ program to illustrate the use of static member function.
7. Write a C++ program to find the mean value using friend function.
8. Write a C++ program to implement multiple inheritances.
9. Write a C++ program to illustrate pointers to objects.
10. Write a C++ program to read a string with get line function.
11. Write a C++ program to display string with write () function.
PART-B
16. Write a C++ program to accept two times (hh:mm:ss) to find subtraction of two times.
17. Write a C++ program to implement processing shopping list using a class with arrays
as data members.
18. Write a C++ program to implement banking scheme.
19. Write a C++ program to show the use of over loaded constructor.
20. Write a C++ program to construct variables at run time using dynamic initialization.
21. Write a C++ program to find the largest value among the set of parameters using
overloaded function.
22. Write a C++ program to add two complex number using operator overloading.
23. Write a C++ program to demonstrate single inheritance.
24. Write a C++ program to implement multilevel inheritance.
25. Write a C++ program to illustrate the use of array of pointer to objects.
26. Write a C++ program to implement reading and writing class objects using files.
Text Books:
Reference Books:
1. www.tutorialspoint.com
2. www.geeksforgeeks.org
3. www.Javatpoint.com
4. www.begineersbook.com
III Semester
JSS Science and Technology University, Mysuru
Department of Computer Applications
III Semester Bachelor of Computer Applications [BCA]
Course Category Code: DSC-6 Course Category Name: Discipline Core-6
Course Code: BCA310 Course Title: Mathematics-II
Total Credits: 3 Credit Structure (L:T:P): 3:0:0
Total Hours: 40 Max. Marks: 100
Course Outcomes:
Introduction, Definitions, Curve Fitting, equation of Straight line, parabola and exponential,
correlation and regression, formula for correlation coefficient, regression lines.
Basic terminology, Definition of probability, Probability and set notations, Addition law of
probability, independent events, conditional probability, multiplication law of probability,
Baye’s theorem.
Definition of probability vector; stochastic matrix and regular stochastic matrix; fixed point
and fixed probability vector; Markov chain definition; transition probabilities and its matrix;
higher transition probabilities; stationary distribution of regular Markov chains; irreducible
Markov chain; absorbing state of a Markov chain
Text Books:
1. SchaumSeries ,Problems in Probability and Statistics 2009.
2. Sheldon Ross ,Introductory Statistics, 2nd Edition 2006.
Reference Books:
1. Richard A,Johnson –Miller & Freund’s Probability and Statistics for Engineers 8 th edition
2011.
2. SantSharan Mishra-Computer Oriented Numerical and Statistical Methods 2013.
1. https://nptel.ac.in/courses/117103067
2. https://www.geeksforgeeks.org/mathematics-probability/
JSS Science and Technology University, Mysuru
Department of Computer Applications
III Semester Bachelor of Computer Applications [BCA]
Course Category Code: DSC-7 Course Category Name: Discipline Core-7
Course Code: BCA320 Course Title: Java Programming
Total Credits: 3 Credit Structure (L:T:P): 3:0:0
Total Hours: 40 Max. Marks: 100
Course Outcomes:
Upon successful completion of this course, students will be able to,
TOPICS COVERED:
Unit:1: Java Basics 8 Hours
History of Java, Java buzzwords, data types, variables, scope and life time of variables,
arrays, operators, expressions, control statements, type conversion and casting, simple java
program, concepts of classes, objects, constructors, methods, access control, this keyword,
garbage collection, overloading methods and constructors, parameter passing, recursion,
nested and inner classes, exploring string class.
The string constructors, string length, special string operations, character extraction, string
comparison, searching strings, data conversion using valueOf(), changing the case of
characters within a string, additional string methods, string buffer, string builder, primitive
type wrappers.
Text Books:
1. Herbert Schildt. Java - The Complete Reference, 7thEdition. Oracle Press, McGraw Hill
Education (India) Edition- 2014.
Reference Books:
1. Cay S. Horstmann, Gary Cornell. Core Java, Core Java Volume-1 – Fundamentals, 9th
Edition, Pearson Education, 2014.
2. Timothy Budd, “Understanding Object-oriented programming with Java”, Updated
Edition, Pearson Education, 2000.
1. http://www.oracle.com/technetwork/java/index-jsp-135888.html
2. http://www.javaworld.com/article/2074929/core-java
3. http://www.javaworld.com/
4. http://www.learnjavaonline.org/
JSS Science and Technology University, Mysuru
Department of Computer Applications
III Semester Bachelor of Computer Applications [BCA]
Course Category Code: OE-3 Course Category Name: Open Elective-3
Course Code: BCA330 Course Title: E-Governance
Total Credits: 3 Credit Structure (L:T:P): 3:0:0
Total Hours: 40 Max. Marks: 100
Course Outcomes:
Upon successful completion of this course, students will be able to,
Problems with Public Data Quality, Hard Solutions to Public Data Quality Problems, Soft
Solutions to Public Data Quality Problems, Hybrid Approaches to Public Data Quality
Activities.Core Management Issues for eGovernment : Position, People, Pelf, Projects,
Politics.Emerging Management Issues for eGovernment : Performance, Policies on Public
Data, Policies on Other Issues Activities.
eGovernment System Lifecycle and Project Assessment, The System Lifecycle, Project
Assessment Activities.Analysis of Current Reality: Methods of Analysis, Recording
Techniques Activities.Design of the New eGovernment System: Setting Objectives,
Information Design, Technology Design, Process Design.
Text Books:
Reference Books:
1.http://hdl.handle.net/123456789/25880
2.http://www.netsuite.com/portal/resource/articlesl
JSS Science and Technology University, Mysuru
Department of Computer Applications
III Semester Bachelor of Computer Applications [BCA]
Course Category Code: DSE-2 Course Category Name: Discipline Elective-2
Data Communications
Course Code: BCA341 Course Title:
and Networking
Total Credits: 3 Credit Structure(L:T:P): 3:0:0
Total Hours: 40 Max. Marks: 100
Course Outcomes:
Upon successful completion of this course, students will be able to,
Data and Signals: Analog and Digital data, Analog and Digital signals, Periodic and Non-
Periodic signals. Periodic Analog Signals: Sine Wave, Phase, Wavelength, Time and
Frequency Domains, Composite Signals, Bandwidth. Digital Signals: Bit rate, Bit length,
Digital signal as a composite Analog signal. Transmission Impairment: Attenuation,
Distortion, Noise. Performance: Bandwidth, Throughput, Latency (delay), Bandwidth Delay
Product, Jitter.
World Wide Web and HTTP: World Wide Web, HyperText Transfer Protocol FTP: Two
Connections, Control Connection, Data Connection, Security for FTP. Electronic Mail:
Architecture, TELNET: Local versus Remote Logging. Secure Shell(SSH): Components,
Applications. Domain Name System (DNS): Name Space, DNS in the Internet, Resolution,
Caching.
Text Books:
Reference Books:
1. https://www.tutorialspoint.com/computer_networks/index.asp
2. https://onlinecourses.swayam2.ac.in/cec22_cs05/preview
3. www.nptel.ac.in/courses
4. http://freevideolectures.com/Course/2276/Computer-Networks
JSS Science and Technology University, Mysuru
Reference Books:
1. Gerard Jounghyun Kim, Human Computer Interaction, CRC Press, 2015
2. Bill Scott and Theresa Neil, Designing Web Interfaces, 1st Edition, O’Reilly Media Inc., 2009.
Additional web resources:
1. https://arl.human.cornell.edu/879Readings/Interaction%20Design%20%20Beyond%20Human-
Computer%20Interaction.pdf
2. https://www.geeksforgeeks.org/human-computer-interaction-through-the-ages/
3. http://prof.mau.ac.ir/images/Uploaded_files/Jenny%20Preece,%20Helen%20Sharp,%20Yvonn
e%20Rogers-Interaction%20Design_%20Beyond%20Human-Computer%20Interaction
Wiley%20(2015)[369707].PDF
4. https://www.youtube.com/watch?v=WW1g3UT2zww&list=PLLssT5z_DsK_nusHL_Mjt87THSTl
grsyJ.
JSS Science and Technology University, Mysuru
Text Books:
1. ªÉÄʸÀÆgÀÄ «±Àé«zÁ央AiÀÄzÀ PÀ£ÀßqÀ ¥ÀoÀå¥ÀĸÀÛPÀUÀ¼ÀÄ
2. ¨sÀgÀvÉñÀ ªÉʨsÀªÀ-gÀvÁßPÀgÀªÀtÂð
3. µÀqÀPÀëjAiÀÄ ¥ÀĸÀÛPÀUÀ¼ÀÄ
4. ªÀqÁÙgÁzsÀ£É-²ªÀPÉÆÃmÁåZÁAiÀÄð
5. £ÁlPÀ: KPÀ®ªÀå- ¹zÀÞ°AUÀAiÀÄå
6. bÀAzÀ¸ÀÄì
7. PÀ£ÀßqÀ ªÀÄzsÀåªÀÄ ªÁåPÀgÀt-wÃ.£ÀA. ²æÃPÀAoÀAiÀÄå
Reference Books:
1¸ÀàzsÁðvÀäPÀ ¥ÀjÃPÉëUÀ¼À ¥ÀĸÀÛPÀUÀ¼ÀÄ
Tutorial Details:
Unit:1: PÁªÀå : * ¥ÀzÀåUÀ¼À£ÀÄß ©r¹, ¨sÁªÀ CxÀð w½AiÀÄĪÀAvÉ N¢¸ÀĪÀÅzÀÄ.
* ¥ÀzÀåUÀ¼À°ègÀĪÀ «±ÉõÀ ¥ÀzÀ, £ÀÄrUÀlÄÖ, UÁzÉ , G¥ÀªÉÄUÀ¼À£ÀÄß UÀÄgÀÄw¹ ¸ÀéAvÀ
ªÁPÀåUÀ¼À°è §¼À¸À®Ä ¸ÀÆa¸ÀĪÀÅzÀÄ.
• ¥ÀzÀåUÀ¼À ªÀ¸ÀÄÛ, D±ÀAiÀÄUÀ¼À£ÀÄß ¥Àæ¸ÀÄÛvÀPÉÌ C£Àé¬Ä¹ «ZÁgÀ ªÀÄAqÀ£É , ¥ÀzÀåUÀ¼À gÀZÀ£É
ªÀiÁr¸ÀĪÀÅzÀÄ.
• ¥ÀzÀåUÀ½UÉ gÁUÀ ¸ÀAAiÉÆÃf¹ ºÁqÀ®Ä GvÉÛÃf¸ÀĪÀÅzÀÄ. §ºÀĪÀiÁzsÀåªÀÄUÀ¼À£ÀÄß
§¼À¹PÉÆ¼ÀÄîªÀÅzÀÄ.
• ¥ÀzÀåUÀ¼À ªÀ¸ÀÄÛ ªÀÄvÀÄÛ D±ÀAiÀÄUÀ¼À£ÀÄß ¸ÀÈd£ÁvÀäPÀªÁV ZÀlĪÀnPÉUÀ¼À£ÀÄß «zÁåyðUÀ¼À
UÀÄA¥ÀÄUÀ¼À£ÁßV «AUÀr¹ £ÀqɸÀĪÀÅzÀÄ.
Tutorial details:
Unit: 1 LANGUAGE COMPONENTS-I
In this unit, students will be taught to:
participate actively in learning of language components.
use Three degrees of comparison.
frame questions knowing the difference between WH and YES/NO questions.
use suitable preposition on time, place and position.
acknowledge the unseen passage and answer the questions.
Unit: 2 LANGUAGE COMPONENTS–II
In this unit students will be taught to:
identify different types of adjectives.
identify different types of adverbs.
learn the format of the job application letter and produce it with their own resume.
write job application letters.
Unit: 3 POETRY
In this unit students will be taught to:
Read the poems with Intonation.
Analyse the background and settings of the poems.
Identify the new words and find out their meanings.
Use new words in their own sentences.
Analyse the poem with their own beef after understanding the core part of the poems.
Unit: 4 PROSE
In this unit students will be taught to:
Read the prose and understand the style of writing.
Identify meaning of new words and use them in their own sentences.
Discuss the content of the prose comparing it to the present situation.
Comprehend the questions with respect to prescribed piece of literature.
Unit: 5 NOVELLAS
In this unit students will be taught to:
Read the novel as and understand the different genre of literature.
Identify the meaning of new words and use them in their own sentences.
Analyse content of the novellas with their own views.
Comprehend questions with respect to prescribe piece of literature.
Exhibit their talents of writing in any piece of literature.
JSS Science and Technology University, Mysuru
Course Outcomes:
Upon successful completion of this course, students will be able to,
CO1:To realise thesignificance of constitution of India to students from all walks of life and
help them to understand the basic concepts of Indian constitution.
CO2:To identify the importance of fundamental rights as well as fundamental duties.
CO3:To understand the functioning of Union, State and Local Governments in Indian federal
system.
CO4:To learn procedure and effects of emergency, composition and activities of election
commission and amendment procedure.
Unit:1 8 Hours
Meaning of the term ―Constitution-Its importance-making of the Indian Constitution salient
features of the constitution. Preamble of the Indian constitution comparative analysis of
Indian constitution with referenced to USA and UK constitution.
Unit:2 8 Hours
Fundamental rights and its limitations. Fundamental Rights - Their content and significance-
Special, rights created in the constitution for Dalits, Backwards, Women, Children and the
Religious and Linguistic Minorities. Directive Principles of state policy Fundamental duties.
Unit: 3 8 Hours
Union executive, union legislature, union judiciary Role and Position of President and Prime
Minister-Adult Franchise System-Election CommissionState legislature, executive, judiciary
Amendment procedures Local bodies Enforcing rights through writs: Certiorari, Mandamus,
Quo Warranto and Habeas Corpus-public interest Litigation emergency provisions
Text Books:
Reference Books:
1. https://www.ijlsi.com/15-separation-of-powers-a-comparative-study-under-india-uk-
and-usa-constitution/
2. https://www.insightsonindia.com/polity/indian-constitution/salient-features-of-indian-
constitution/
3. https://www.clearias.com/constitution-of-india/
JSS Science and Technology University, Mysuru
Text Books:
1. Patterson Dan W Introduction to Artificial Intelligence and Expert Systems 1st Edition 2015
2.Artificial Intelligence: Study Material, of IBM
Reference Books:
1. Dheeraj Mehrotra, AI Basics for School Students: As per the CBSE Inspire Module for Artificial
Intelligence – 24 December 2019
2. Chris Sebastian, Machine Learning for Beginners: Absolute Beginners Guide, Learn Machine
Learning and Artificial Intelligence from Scratch (Python, Machine Learning Book 2) 2019.
Course Outcomes:
Upon successful completion of this course, students will be able to,
CO 1: Understand and implement programs on structure and components of a Java
language
CO 2: Understand classes, objects, members of a class and use packages and
interfaces appropriately.
CO 3: Demonstrate for Java program for multithread, synchronization and exception
handling concepts.
CO 4: Use the concept of string, event handling, simple data structures like arrays and
members of classes of Java API in application development
CO 5: Design and develop Java based UI and Networking applications using applets,
swing components and networking concepts.
Text Books:
1. Herbert Schildt. Java - The Complete Reference, 7thEdition. Oracle Press, McGraw Hill
Education (India) Edition- 2014.
Reference Books
1. Cay S. Horstmann, Gary Cornell. Core Java, Core Java Volume-1 – Fundamentals, 9th
edition, Pearson Education, 2014.
2. Timothy Budd, “Understanding Object-oriented programming with Java”, Updated
Edition, Pearson Education, 2000.
Additional Learning Resources:
1. http://www.learnjavaonline.org/
2. https://www.codecademy.com/learn/learn-java
3. http://www.tutorialspoint.com/java/
4. http://www.java-examples.com/
JSS Science and Technology University, Mysuru
List of Experiments:
CASE STUDY ON:
1. Artificial intelligence in
a) Games.
b) Education
c) cinematography.
d) Health-Sectors.
e) Wildlife Conservation.
f) Agriculture
2. A credit card company typically receives hundreds of applications for a new credit card. It
contains information regarding several different attributes such as, annual salary, outstanding
debt, age etc. The problem is to categorize applications into those who have good credit, bad
credit or somewhere in the middle. Categorization of the application is nothing but a
classification problem.
3. You may want to own a dog but which kind of dog? This is the beginning of a classification
problem. Dogs can be classified in a number of different ways. For example, they can be
classified by breed (examples include beagles, hounds, Pug and countless others). they can
also be classified by their role in the lives of their masters and the work they do (examples
include a dog might be a family pet, a working dog, a show dog, or a hunting dog). In many
cases, dogs are defined both by their breed and their role. Based on different classification
criteria, you decide eventually which one you want to own.
4. A common example of classification comes with detecting spam emails. To write a program to
filter out spam emails, a computer programmer can train a machine learning algorithm with a
set of spam-like emails labeled as “spam” and regular emails labeled as “not-spam”. The idea
is to make an algorithm that can learn characteristics of spam emails from this training set so
that it can filter out spam emails when it encounters new emails.
5. Assume there are 100 images, 30 of them depict a cat, the rest do not. A machine learning
model predicts the occurrence of a cat in 25 of 30 cat images. It also predicts absence of a
cat in 50 of the 70 no cat images. In this case, what are the true positive, false positive, true
negative and false negative?
6. Confusion Matrix Example 1: Do you still remember the shepherd boy story? “A shepherd boy
used to take his herd of sheep across the fields to the lawns near the forest. One day he felt
very bored. He wanted to have fun. So, he cried aloud "Wolf, Wolf. The wolf is carrying away
a lamb". Farmers working in the fields came running and asked, "Where is the wolf?". The boy
laughed and replied "It was just for fun. Now get going all of you". The boy played the trick for
quite a number of times in the next few days. After some days, as the boy was perched on a
tree, singing a song, there came a wolf. The boy cried loudly "Wolf, Wolf, the wolf is carrying a
lamb away." There was no one to the rescue. The boy shouted "Help! Wolf! Help!" Still no one
came to his help. The villagers thought that the boy was playing mischief again. The wolf
carried a lamb away”.
7. Consider a health prediction case, where one wants to diagnose cancer. Imagine that
detecting cancer will trigger further analysis (the patient will not be immediately treated)
whereas if you don't detect cancer, the patient is sent home without further prognosis. This
case is thus asymmetric, since you definitely would like to avoid sending home a sick patient
(False Negative). You can however make the patient wait a little more by asking him/her to
take more tests even if the initial results show them negative for cancer (False Positive). As in
this situation, you would prefer a False Positive over a False Negative.
8. Imagine a patient taking an HIV test. The impacts of a false positive on the patient would at
first be heart breaking; to have to deal with the trauma of facing this news and telling your
family and friends. But on further examination, the doctors will find out that person in question
does not have the virus. Again, this would not be a particularly pleasant experience. But not
having HIV is ultimately a good thing. On the other hand, a false negative would mean that
the patient has HIV but the test shows a negative result. The implications of this are terrifying,
the patient would be missing out on crucial treatment and runs the risk of spreading. Without
much doubt, the false negative here is the bigger problem. Both for the person and for
society.
9. Let us see how this algorithm works using the well-known Iris flower data set -
(https://archive.ics.uci.edu/ml/datasets/iris). This dataset contains four measurements of three
different Iris flowers. The measurements are - Sepal length, Sepal width, Petal length, and
Petal width. The three types of Iris are Setosa, Versicolour, and Virginica as shown below in
the same order.
10. After watching the video “The Ethical Robot” what are the two ethical questions that strike
you? Write them down.
11. With the video “How to build a moral robot” as your baseline, please write down the moral
and ethical values you would like incorporate in your robot? The video is only a guide, let it
not limit your imagination and creativity.
12. Form a group of 5 students and watch the video “Humans need not apply” as a group. Please
watch the video more than once. At the end, submit a paper as a group on your learnings
from the video.
13. Suppose a CCTV camera were to spot your face in a crowd outside a sports stadium. In the
police data center somewhere in the city/ country, an artificial neural network analyzes images
from the CCTV footage frame by-frame. A floating cloud in the sky causes a shadow on your
face and neural network (by mistake) finds your face similar to the face of a wanted criminal. If
the police were to call you aside for questioning and tell you they had reason to detain you,
how would you defend yourself? Was it your fault that your shadowed face has resemblance
by few degrees with a person in the police record?
14. This happened in the USA in 2018. An AI system was being used to allocate care to nearly
200 million patients in the US. It was discovered later that AI system was offering a lower
standard of care to the black patients. Across the board, black people were assigned lower
risk scores than white people. This in turn meant that black patients were less likely to be able
to access the necessary standard of care. The problem stemmed from the fact that the AI
algorithm was allocating risk values using the predicted cost of healthcare. Because black
patients were often less able to pay or were perceived as less able to pay for the higher
standard of care, the AI essentially learned that they were not entitled to such a standard of
treatment. Though the system was fixed / improved after being discovered but the big
question is – whose problem was this? The AI system developers or the US black people data
(which was true to an extent)?
15. Make a list of 10 biases which you observe in your home, classroom or in your society. You
don’t need to get all 10 biases in one go. You can start with one and keep adding as you
observe more.
Text Books:
1. Leelavathi. M, Manoj Kumar, Senthil Kumar, Artificial Intelligence for Beginners, English.
2. Patterson Dan W Introduction to Artificial Intelligence and Expert Systems 1st Edition 2015
3.Artificial Intelligence: Study Material, of IBM.
Reference Books:
1. Dheeraj Mehrotra, Ai Basics for School Students: As per the CBSE Inspire Module for Artificial
Intelligence – 24 December 2019
2. Chris Sebastian, Machine Learning for Beginners: Absolute Beginners Guide, Learn Machine
Learning and Artificial Intelligence from Scratch (Python, Machine Learning Book 2) 2019.
CO1: Understanding the concepts of time and space complexity, worst case, average case
and best-case complexities and the big-O notation.
CO2: Understanding the range of behaviors of algorithms and the notion of tractable and
intractable problems.
CO3: Knowing and understanding a wide range of searching and sorting algorithms
CO4: Developing efficient algorithms for simple computational tasks and computing
complexity measures of algorithms, including recursive algorithms using
recurrence relations.
CO5: Developing algorithms to solve optimization problems and analyzing the limitations of
algorithms
Unit:1: Introduction and the Fundamentals of Algorithmic Problem Solving 7 Hours
Selection Sort and Bubble Sort, Sequential Search and Brute-Force String Matching,
Exhaustive Search: Depth-First Search and Breadth-First Search.
Mergesort, Quicksort, Binary Search, Binary Tree Traversals and Related Properties,
Insertion Sort, Decrease-by-a-Constant-Factor Algorithms: Binary Search, Fake-Coin
Problem.
Presorting, Balanced Search Trees: AVL Trees, 2-3 Trees, Heaps and Heapsort, Input
Enhancement in String Matching: Horspool’s Algorithm, Boyer-Moore Algorithm, Hashing :
Open Hashing, Closed Hashing.
Text Books:
1. Anany Levitin: Introduction to the Design and Analysis of Algorithms, 3rd Edition, Pearson
Education, 2012.
Reference Books:
1. Coremen T.H., Leiserson C.E., and Rivest R.L.: Introduction to Algorithms, PHI, 1998.
2. Horowitz E., Sahani S., Rajasekharan S.: Computer Algorithms, Galgotia Publications,
2001.
3. Harsh Bhasin: Algorithms: Design and Analysis, Oxford University press, 2015.
Text Books:
1. G K Guptha: Database Management Systems, Mc Grawhill Publications, 2018.
Reference Books
1. A.Silberschatz, Henry.F.Korth and S.Sudharshan: Database System Concepts, 6th Edition, Mc
Grawhill Publications, 2019.
2. Ramez Elmasri, Shamkant.B.Navathe: Fundamentals of Database Systems, 6th Edition,
Pearson Education, 2011.
3. Raghu Ramakrishnan and J Gehrke: Database Management Systems, 3rd Edition, Mc Grawhill
Publications, 2007.
4. C.J.Date , AKannan and S.Swamynathan: An Introduction to Database System, 8th Edition,
Pearson Education, 2006.
5. Elmasri and Navathe : Database Systems: Models, Languages, Design and Application
Programming, Pearson Publications, 2011.
Course Outcomes:
CO1: Interpret the impact and challenges posed by IoT networks leading to new
architectural Models.
CO2: Compare and contrast the deployment of smart objects and the technologies to
connect Them to network.
CO3: Appraise the role of IoT protocols for efficient network communication.
CO4: Elaborate the need for Data Analytics.
CO5: Exploring the IOT physical devices like Raspberry Pi & its configuration.
1. David Hanes, Gonzalo Salgueiro, Patrick Grossetete, Robert Barton, Jerome Henry ”IoT
Fundamentals: Networking Technologies, Protocols, and Use Cases for the Internet of
Things”.1st Edition published by Pearson Education, 2022.
2. Srinivasa K G, Siddesh G.M, Hanumantha Raju R- “Internet of Things”- Cengage
Learning 2017.
Reference Books
1.https://nptel.ac.in/courses/106/105/106105195/
2. https://nptel.ac.in/courses/106/105/106105166/
JSS Science and Technology University, Mysuru
Course Outcomes:
Transport layer security, HTTPS, Secure shell(SSH): Transport layer protocol, User
Authentication protocol, Connection protocol, wireless security, Mobile device security, IEEE
802.11 Wireless LAN Security, IP Security.
Internet mail architecture, E-mail formats, E-mail threats and e-mail security, S/MIME 627,
DNS based authentication.
Text Books:
1. William Stalling, “Cryptography & Network Security”, 7th edition, PHI, 2018.
2. Atul Kahate, “Cryptography & Network Security” 2nd edition, McGraw Hill, 2016.
Course Outcomes:
CO1: Able to understand the concepts of system, system components and development
Techniques with case studies.
CO2: Design and develop Information system for business environment by understanding
the need and criticality of type of information and integrate information system into
business Requirement using management techniques.
CO3: Apply the different strategies for the management of business to formulate business
Process.
CO4: Analyze the need for business process re-engineering, and the process of making.
CO5: Understand the concepts and functionalities of enterprise systems like ERP, SCM and
DSS.
TOPICS COVERED:
Unit:1: Management Information System in a digital firm 8 Hours
Essentiality of strategic planning, Tools of planning, Balance score card, Score card and
Dash board, Strategic Management of business performance, What is strategy? Three
Approaches to development of strategy, Class and types of Strategy, EFQM Model: A
prescription for achieving organisation excellence.
Information Security: Threats and Management
Information security: Threats and vulnerability, Controlling security threat and vulnerability,
Managing security threat in E-business, Disaster Management, Application systems security
management, information security management, Measures of information security, network
security, cyber security.
Unit :3: Information Technology: Impact on Society 8 Hours
Decision-Making
Decision-making concepts, Decision-making process, Decision Analysis by analytical
modelling, Behavioural concepts in decision making, Organisational decision making, MIS
and decision making.
Development of long range plans of the MIS, Ascertaining the class of information,
Determining the information requirement, Development and Implementation of the MIS,
Management of information quality in the MIS, Organisation for development of MIS, MIS:
Development process model.
Strategic Design of MIS
Strategic Management of the business, why strategic design of MIS?, Balance score card,
score card and dash board, strategic design of MIS, development process steps for strategic
design(SD) of MIS, Illustrating SD of MIS for big Bazaar, Strategic management of business
and SD of MIS, Business strategy determination, Business strategy implementation.
Text Books:
1. Waman S Jhawadekar: Management Information System, 3rd Edition, Tata McGraw Hill.
2. James A O’Brien and George M Marakas: Management Information System, 7th Edition,
Tata McGraw Hill, 2006
3. Turban, Rainer, and Potter, Introduction to E-Commerce, 2nd edition, 2003
4. H. M. Deitel, P. J. Deitel and T. R. Nieto, E-Business and E-Commerce: How to
Program, Prentice hall, 2001
Reference Books
1. Ralph M Stair and George W Reynolds: Principles of Information Systems, 7th Edition,
Thomson, 2010.
2. Steven Alter: Information Systems - The Foundation of E-Business, 4th Edition, Pearson
Education, 2001.
3. Elizabeth Chang: E-Commerce Fundamentals and Applications, Wile India Edition.
Additional Learning Resources:
1. ncbi.nlm.nih.gov
2. http://www.netsuite.com/portal/resource/articlesl
JSS Science and Technology University, Mysuru
Text Books:
1. ªÉÄʸÀÆgÀÄ «±Àé«zÁ央AiÀÄzÀ PÀ£ÀßqÀ ¥ÀoÀå¥ÀĸÀÛPÀUÀ¼ÀÄ
2. QgÀÄ PÁzÀA§j: ¥ÉæÃªÀÄ©üPÀëÄ-¥Àæ¨sÀıÀAPÀgï
3. ªÀZÀ£ÀUÀ¼À ¥ÀĸÀÛPÀUÀ¼ÀÄ
4. ¥ÀA¥À ¨sÁgÀvÀ
5. ²ªÀgÁªÀÄPÁgÀAvÀgÀ ¥ÀĸÀÛPÀUÀ¼ÀÄ
6. bÀAzÀ¸ÀÄì
7. PÀ£ÀßqÀ ªÀÄzsÀåªÀÄ ªÁåPÀgÀt-wÃ.£ÀA.²æÃPÀAoÀAiÀÄå
Reference Books:
¸ÀàzsÁðvÀäPÀ ¥ÀjÃPÉëUÀ¼À ¥ÀĸÀÛPÀUÀ¼ÀÄ
Tutorial Details:
Unit:1: PÁªÀå : * ¥ÀzÀå/ªÀÄÄPÀÛPÀUÀ¼À£ÀÄß ©r¹, ¨sÁªÀ CxÀð w½AiÀÄĪÀAvÉ N¢¸ÀĪÀÅzÀÄ.
* ¥ÀzÀå/ªÀÄÄPÀÛPÀUÀ¼À°ègÀĪÀ «±ÉõÀ ¥ÀzÀ, £ÀÄrUÀlÄÖ, UÁzÉ , G¥ÀªÉÄUÀ¼À£ÀÄß UÀÄgÀÄw¹ ¸ÀéAvÀ
ªÁPÀåUÀ¼À°è §¼À¸À®Ä ¸ÀÆa¸ÀĪÀÅzÀÄ.
• ¥ÀzÀå/ªÀÄÄPÀÛPÀUÀ¼À ªÀ¸ÀÄÛ, D±ÀAiÀÄUÀ¼À£ÀÄß ¥Àæ¸ÀÄÛvÀPÉÌ C£Àé¬Ä¹ «ZÁgÀ ªÀÄAqÀ£É ,
¥ÀzÀå/ªÀÄÄPÀÛPÀUÀ¼À gÀZÀ£É ªÀiÁr¸ÀĪÀÅzÀÄ.
• ¥ÀzÀå/ªÀÄÄPÀÛPÀUÀ½UÉ gÁUÀ ¸ÀAAiÉÆÃf¹ ºÁqÀ®Ä GvÉÛÃf¸ÀĪÀÅzÀÄ. §ºÀĪÀiÁzsÀåªÀÄUÀ¼À£ÀÄß
§¼À¹PÉÆ¼ÀÄîªÀÅzÀÄ.
• ¥ÀzÀå/ªÀÄÄPÀÛPÀUÀ¼À ªÀ¸ÀÄÛ ªÀÄvÀÄÛ D±ÀAiÀÄUÀ¼À£ÀÄß ¸ÀÈd£ÁvÀäPÀªÁV ZÀlĪÀnPÉUÀ¼À£ÀÄß «zÁåyðUÀ¼À
UÀÄA¥ÀÄUÀ¼À£ÁßV «AUÀr¹ £ÀqɸÀĪÀÅzÀÄ.
Unit:2: «ZÁgÀ ¸Á»vÀå: «ZÁgÀ ¸Á»vÀåzÀ DAiÀÄÝ ¨sÁUÀªÀ£ÀÄß vÀ¦à®èzÀAvÉ N¢¸ÀĪÀÅzÀÄ.
Text Books:
1. Original textbooks of prescribed Poems, Prose’ and Short Stories
Reference Books:
1. English Grammar and Composition Wren and martin.
2. Contemporary English Grammar by J D Murty.
Tutorial details:
Unit: 1 LANGUAGE COMPONENTS - I
In this unit, students will be taught to:
Understand types of sentences according to its structure.
Identify and construct sentences based on structure.
Transform sentences from simple to complex, complex to compound, compound to
simple and vice versa.
Transform sentences from ‘too to' form to ‘so that’ forms.
Unit: 2 LANGUAGE COMPONENTS - II
In this unit, students will be taught to:
Understand types of sentences according to its usage.
Identify the types of sentences is based on its usage.
Transform sentences from assertive to interrogative, assertive to imperative,
assertive to negative, assertive to exclamatory and vice versa.
Unit: 3 POETRIES
In this unit students will be taught to:
Read the poems with Intonation.
Analyse the background and settings of the poems.
Identify the new words and find out their meanings.
Use new words in their own sentences.
Analyse the poem with their own beef after understanding the core part of the poems.
Unit: 4 PROSE
In this unit students will be taught to:
Read the prose and understand the style of writing.
Identify meaning of new words and use them in their own sentences.
Discuss the content of the prose comparing it to the present situation.
Comprehend the questions with respect to prescribed piece of literature.
Unit: 5 SHORT STORIES
In this unit students will be taught to:
Read the short story and understand the different genre of literature.
Identify the meaning of new words and use them in their own sentences.
Analyse content of the story with their own views.
Comprehend questions with respect to prescribe piece of literature.
Exhibit their talents of writing in any piece of literature.
JSS Science and Technology University, Mysuru
Course Outcomes:
Upon successful completion of this course, students will be able to,
CO1: Understand the broad set of technical, social & political aspects of Cyber Security.
CO2: Appreciate the vulnerabilities and threats posed by criminals, terrorist and nation states
to national infrastructure.
CO3: Understand the nature of secure software development, operating systems and data
base Design.
Text Books:
1. Pfleeger, C.P., “Security in Computing, 5th Edition”, Prentice Hall, Copyright 2015
Reference Books
1. Gaurav gupta and Garima gupta, “Cyber Unsafe: A Handbook for Preventing Computer
Frauds and Cyber Crimes, First Edition”, Vilvan publications, 2021.
2. Schneier, Bruce. “Applied Cryptography, Second Edition”, John Wiley & Sons, 1996.
Additional Learning Resources:
1. https://digitalguardian.com/blog/what-cyber-security
2. https://www.forcepoint.com/cyber-edu/cybersecurity
3. https://www.youtube.com/watch?v=inWWhr5tnEA
JSS Science and Technology University, Mysuru
Course Outcomes:
Course Outcomes:
CO1: Analyse the concepts of data models and modelling notations, understanding the
need of database, developing a database.
CO2: Relate and Design the Entity Relationship models, diagrams.
CO3: Solve algebraic expressions/ operations on relational database and mapping.
CO4: Use of SQL, design the queries to handle all the basic and advanced operations on
DBMS, need and modes of normalising the databases.
CO5: Design of applications which handles the operations involved in RDBMS.
Case Studies:
1. Learn different types of DBMS languages
Data Definition Language (DDL)
Write the following queries in SQL. No duplicates should be printed in any of the answers.
Find the names of all Juniors (level = JR) who are enrolled in a class taught
by Prof. XYZ
Find the names of all classes that either meet in room R128 or have five or
more Students enrolled.
Find the names of all students who are enrolled in two classes that meet at
the same time.
Find the names of faculty members who teach in every room in which
some class is taught.
Find the names of faculty members for whom the combined enrollment of
the courses that they teach is less than five.
Note that the Employees relation describes pilots and other kinds of employees as well;
certified for some aircraft, and only pilots are certified to fly.
Write each of the following queries in SQL.
3. Consider the following database of student enrollment in courses & books adopted
for each course.
STUDENT (regno: string, name: string, major: string,
bdate:date)
COURSE (course #:int, cname:string, dept:string)
ENROLL ( regno:string, course#:int, sem:int, marks:int)
BOOK _ ADOPTION (course# :int, sem:int, book-ISBN:int)
TEXT (book-ISBN:int, book-title:string, publisher:string,
author:string)
Create the above tables by properly specifying the primary keys and the
foreign keys.
Enter at least five tuples for each relation.
Demonstrate how you add a new text book to the database and make this
book be adopted by some Department.
Produce a list of text books (include Course #, Book-ISBN, Book-title) in
the alphabetical order for Courses offered by the ‘CS’ department that use
more than two books.
List any department that has all its adopted books published by a specific
publisher.
Generate suitable reports.
Create suitable front end for querying and displaying the
results.
Create the above tables by properly specifying the primary keys and the
foreign keys.
Enter at least five tuples for each relation.
Give the details of the authors who have 2 or more books in the catalog
and the price of the books is greater than the average price of the books in
the catalog and the year of publication is after 2000.
Find the author of the book which has maximum sales.
Demonstrate how you increase the price of books published by a specific
publisher by 10%.
Generate suitable reports.
Create suitable front end for querying and displaying the results.
5. Consider the following database for a banking enterprise
Text Books:
1. G K Guptha: Database Management Systems, Mc Grawhill Publications, 2018.
Reference Books
1. A.Silberschatz, Henry.F.Korth and S.Sudharshan: Database System Concepts, 6th
Edition, Mc Grawhill Publications, 2019.
2. Ramez Elmasri, Shamkant.B.Navathe: Fundamentals of Database Systems, 6th Edition,
Pearson Education, 2011.
Course Outcomes:
CO1: Ability to understand the broad set of technical, social & political aspects of Cyber
Security.
CO2: Appreciate the vulnerabilities and threats posed by criminals, terrorist and nation states
to national infrastructure.
CO3: Understand the nature of secure software development, operating systems and data
base Design.
List of Experiments:
CASE STUDY ON:
1. Describe a situation in which you have experienced harm as a consequence of a
failure of computer security. Was the failure malicious or not? Did the attack target
you specifically or was it general and you were the unfortunate victim?
2. Describe an example (other than the ones mentioned in this chapter) of data whose
confidentiality has a short timeliness, say, a day or less. Describe an example of data
whose confidentiality has a timeliness of more than a year.
3. Do you currently use any computer security control measures? If so, what? Against
what attacks are you trying to protect?
4. Suggest an efficient scheme for maintaining a per-user protection scheme. That is,
the system maintains one directory per user, and that directory lists all the objects to
which the user is allowed access. Your design should address the needs of a system
with 1000 users, of whom no more than 20 are active at any time. Each user has an
average of 200 permitted objects; there are 50,000 total objects in the system.
7. List three reasons people might be reluctant to use biometrics for authentication. Can
you think of ways to counter those objections?
8. List three authentication questions (but not the answers) your credit card company
could ask to authenticate you over the phone. Your questions should be ones to
which an imposter could not readily obtain the answers. How difficult would it be for
you to provide the correct answer (for example, you would have to look something up
or you would have to do a quick arithmetical calculation)?
9. If you forget your password for a website and you click [Forgot my password],
sometimes the company sends you a new password by email but sometimes it sends
you your old password by email. Compare these two cases in terms of vulnerability of
the website owner.
10. Suggest a source of some very long unpredictable numbers. Your source must be
something that both the sender and receiver can readily access but that is not obvious
to outsiders and not transmitted directly from sender to receiver.
11. Telecommunications network providers and users are concerned about the single
point of failure in “the last mile,” which is the single cable from the network provider’s
last switching station to the customer’s premises. How can a customer protect against
that single point of failure? Comment on whether your approach presents a good cost-
benefit trade-off.
12. Suppose you have a high-capacity network connection coming into your home and
you also have a wireless network access point. Also suppose you do not use the full
capacity of your network connection. List three reasons you might still want to prevent
an outsider from obtaining free network access by intruding into your wireless
network.
13. How can a website distinguish between lack of capacity and a denial-of-service
attack? For example, websites often experience a tremendous increase in volume of
traffic right after an advertisement displaying the site’s URL is shown on television
during the broadcast of a popular sporting event. That spike in usage is the result of
normal access that happens to occur at the same time. How can a site determine
when high traffic is reasonable?
14. For large applications, some websites use load balancers to distribute traffic evenly
among several equivalent servers. For example, a search engine might have a
massive database of content and URLs, and several front-end processors that
formulate queries to the database manager and format results to display to an
inquiring client. A load balancer would assign each incoming client request to the least
busy front-end processor. What is a security advantage of using a load balancer?
15. The FTP protocol is relatively easy to proxy; the firewall decides, for example,
whether an outsider should be able to access a particular directory in the file system
and issues a corresponding command to the inside file manager or responds
negatively to the outsider. Other protocols are not feasible to proxy. List three
protocols that it would be prohibitively difficult or impossible to proxy. Explain your
answer.
Text Books:
1.Pfleeger, C.P., Security in Computing, 5th Edition, Prentice Hall, Copyright 2010.
Reference Books
2.Gaurav gupta and Garima gupta, “Cyber Unsafe: A Handbook for Preventing Computer
Frauds and Cyber Crimes, First Edition”, Vilvan publications, 2021.
3.Schneier, Bruce. Applied Cryptography, Second Edition, John Wiley & Sons, 1996.
1. https://digitalguardian.com/blog/what-cyber-security
2. https://www.forcepoint.com/cyber-edu/cybersecurity
3. https://www.youtube.com/watch?v=inWWhr5tnEA
V Semester
JSS Science and Technology University, Mysuru
Department of Computer Applications
V Semester Bachelor of Computer Applications [BCA]
Course Category Code: DSC-10 Course Category Name: Discipline Core-10
Course Code: BCA510 Course Title: Web Programming
Total Credits: 3 Credit Structure (L:T:P): 3:0:0
Total Hours: 40 Max. Marks: 100
Course Outcomes:
Upon successful completion of this course, students will be able to,
CO1: Understand the basic concepts of HTML and exploring Hyperlinks, Lists and Images.
CO2: Demonstrate practical skills, workflows and methods used to create websites using
Style sheets.
CO3: Exploring JavaScript’s and its basic Functions and Operations.
CO4: Understanding Objects and Dynamic HTML Concepts like Validation, Exception
Handling, and Cookies etc.
CO5: Understanding the basic concepts of PHP and building a Web application using PHP.
Introduction: HTML, XML, and the World Wide Web. Hypertext Mark-up Language: Basic
HTML, The Document Body, Text, Hyperlinks, Adding more formatting, Lists, Using colour
and images, Images.
More HTML: Tables, Multimedia Objects, Frames, Forms-Toward Interactivity, The HTML
Document Head in detail, XHTML-An Evolutionary Mark-up. Cascading Style sheets:
Introduction, Using Styles, Defining your own Styles, Properties and Values in Styles, Style
sheets, Formatting Blocks of Information, Layers.
An Introducing to PHP: PHP, Introducing PHP, Including PHP in a page, Data Types,
Program control, Arrays, User-Defined Functions, Built-in Functions, Regular Expression,
Using Files. Building Web Applications With PHP: Using Databases, Handling XML.
Text Books:
1. Chris Bates: Web Programming Building Internet Applications, 3rd Edition, Wiley
India, 2015
Reference Books
1. Christopher Murphy, Richardclark, OliStudholme, Divys Manian, Beginning HTML5
and CSS3, Apress Publication,2012.
2. Matt Doyle, Beginning PHP 5.3,Wiley Publisher,2010.
Additional Learning Resources:
1. www.w3schols.com
2. www.afterhoursprograming.com
JSS Science and Technology University, Mysuru
Department of Computer Applications
V Semester Bachelor of Computer Applications [BCA]
Course Category Code: DSC-11 Course Category Name: Discipline Core-11
Course Code: BCA520 Course Title: Python Programming
Total Credits: 3 Credit Structure (L:T:P): 3:0:0
Total Hours: 40 Max. Marks: 100
Course Outcomes:
Finding average and standard Deviation, fixed size lists or arrays, Append works by side
effect, List and loops, Assignment and references, Identity and equality, Sorted list, Example
sorted list of names and ages, Tuples, Tuples and String Formatting, String functions, an
example palindrome testing, an example date conversion, Encryption, Triple Quoted Strings,
Raw Strings, An Escape Characters, Dictionaries, Example Counting Elements, Combining
Two Dictionaries with Update, Making Copies, Zip List Initialization, Loops, Example a
Concordance, Persistent Variable, Example a Telephone Database.
Opening a file for write removes old values, rewriting word count program, Operating system
commands, files and for statements, recovering from exceptions, standard input and output,
persistence and pickle, example- file sort, reading from a url.
Classes, constructors, respect class boundaries, calling methods from inside other methods,
exception within methods, Objects are references, printing, inheritance, The is-a test,
Inheritance and Software Reuse, Overriding, classes, types and test, class variables,
Multiple Inheritance, Classes as dynamic records.
The Functional programming paradigm, mapping, filtering, and reduction, lambda functions,
list comprehensions, Example – Computing an intersection, insertion sort, quick sort, simple
reductions, computing variance of list, combining functional and object-oriented
programming, iterating over multiple lists.
Text Books:
Reference Books
1.http://docs.python.org/tutorial/
2.http://zetcode.com/tutorials/pythontutorial/
3.http://www.sthurlow.com/python/ http://www.tutorialspoint.com/python/
JSS Science and Technology University, Mysuru
Department of Computer Applications
V Semester Bachelor of Computer Applications [BCA]
Course Category Code: DSC-12 Course Category Name: Discipline Core-12
Course Code: BCA530 Course Title: Software Engineering
Credit Structure
Total Credits: 3.0 3:0:0
(L:T:P):
Total Hours: 40 Max. Marks: 100
Course Outcomes:
Professional software development, Software engineering ethics with case studies, Software
process- Software process models: The waterfall model, Incremental development,
Integration and configuration, Process activities- Software specification, Software design and
implementation, Software validation, Software evolution, Coping with change, Prototyping,
Incremental delivery, Process improvement. Agile methods, plan-Driven and agile-
development, Case studies.
Text Books:
Reference Books
1. Roger S.Pressman and Bruce R. Maxim,, Software engineering- A practitioner’s
Approach, McGraw-Hill, Eight edition,2015
2. Pankaj Jalote- An Integrated Approach to Software Engineering, Springer Verlag, Third
edition, 2019
3. Rajib Mall, “Fundamentals of Software Engineering”, PHI 2018, 5th Edition,2018
Additional Learning Resources:
1. http://software-engineering-book.com/videos/software-engineering/
2. http://softwaretestingfundamental.com
3. https://www.coursera.org/learn/systems‐engineering
JSS Science and Technology University, Mysuru
Department of Computer Applications
V Semester Bachelor of Computer Applications [BCA]
Course Category Code: DSE-4 Course Category Name: Discipline Elective-4
Course Code: BCA541 Course Title: Cloud Computing
Total Credits: 03 Credit Structure (L:T:P): 3:0:0
Course Outcomes:
Upon successful completion of this course, the student will be able to:
CO 2: Understand the cloud architectures, and use of service models by application types.
CO 3: Work on any real cloud service considering all the cloud services.
CO 4: Know importance the service management and security of cloud.
CO 5: Connect to the cloud, with various computing paradigms and cloud computing.
UNIT :1- Defining Cloud Computing, Assessing the Value Proposition. 8 Hours
Defining Cloud Computing, Cloud types: The NIST model, The Cloud Cube Model, Deployment
models, Service models, Examining the Characteristics of Cloud Computing: paradigm shift,
benefits of cloud computing, disadvantages of cloud computing, Assessing the role of open
standards.
Assessing the Value Proposition: Measuring the Cloud’s Value: Early adopters and new
application, the laws of cloudonomics, Cloud computing obstacles, Behavioural factors relating
to cloud adoption, Measuring cloud computing costs. Avoiding Capital Expenditures: Right-
sizing. Computing the total cost of ownership, specifying service level agreements, Defining
licensing models.
UNIT:4 – Exploring Platform as a Service, Managing the Cloud, Understanding the Cloud
Security. 8 Hours
Exploring Platform as a Service: Defining Services: Salesforce.com versus Force.com: SaaS
versus PaaS, Using PaaS Application Frameworks: Drupal, Eccentex AppBase 3.0, Long
Jump, Squarespace, Wave Maker, Wolf Frameworks.
Managing the Clouds: Administrating the Clouds: Management responsibilities, Lifecycle
management, Cloud Management Products, Emerging Cloud Management Standards: DMTF
cloud Management standards, Cloud Commons and SMI.
Understanding Cloud Security: Securing the cloud: The security boundary, Security service
Boundary, Securing data: Brokered cloud storage access, Storage location and tenancy,
Encryption, Auditing, and compliance - briefing.
UNIT: 5 - Moving Applications to the Cloud, working with Cloud-Based Storage 8 Hours
Moving Application to the Cloud: Application in the Cloud: Functionality Mapping, Application
attributes, Cloud service attributes, System abstraction, Cloud bursting, Applications and cloud
APIs.
Working with cloud-based storage: Measuring the digital universe: Cloud storage in the digital
universe, Cloud Storage definition, Provisioning Cloud Storage: Unmanaged cloud storage,
managed cloud storage, creating cloud storage systems, Virtual storage containers. Exploring
Cloud Backup Solutions: Backup Types, Cloud Backup features, Cloud attached backup.
Text Books:
1.Barrie Sosinsky “Cloud Computing Bible” Published by Wiley, 2018.
Reference Books:
1. Cloud Computing Principles and Paradigms by Rajkumar Buyya.
2. Cloud Computing Theory and Practice by Dan C.Marinescu.
The role of software architect: The architecture definition process, The role of the architect,
Interrelationships between the core concepts, Architectural specializations, The
organizational context, The architect skills, The architect responsibilities. The Architecture
definition process: Guiding Principles, Process outcomes, The Process Context, Supporting
Activities, Architecture definition activities, Process exit criteria, Architecture definition in the
software development lifecycle.
Unit:4: Creating the architectural description and Evaluating the Architecture 8 Hours
Standards: What are Standards, Why use standards, Drawback of standards, When to
adopt, Specific Standards, Conceptual standards, Notational standards, SysML, Standard
Tools, Telelogic System /architect, Process Standards, Rational Unified Process, Model-
Driven Architecture.
Text Books:
Reference Books:
1. Len Bass, Paul Clements, Rick Kazman: Software Architecture in Practice, 4th
Edition, Pearson Education, 2021.
1. http://www.sei.cmu.edu/architecture/
2. http://handbookofsoftwarearchitecture.com/
3. https://leanpub.com/software-architecture-for-developers/read
JSS Science and Technology University, Mysuru
Department of Computer Applications
V Semester Bachelor of Computer Applications [BCA]
Course Category Code: Voc-1 Course Category Name: Vocational-1
What is multimedia: Definitions – CD-ROM and the Multimedia highway- where to use multimedia-
Introduction to Making Multimedia: The stages of a project- what you need- Multimedia skills and
Training: The terms – Macintosh and windows production platforms: Macintosh Versus PC – The
Macintosh and Windows Computers- Hardware Peripherals: connection- Memory and storage
Devices – Input Devices- Output Hardware- Communication Devices.
Basic Tools: Text Editing and Word Processing Tools – OCR Software- Painting and Drawing Tools
– 3-D Modelling and Animation Tools – Image – Editing Tools – Sound Editing Tools – Animation,
Video and Digital Movies Tools – Helpful Accessories – Making Instant Multimedia : Linking
Multimedia Object – Office suites- Word Processors – spread sheets – Databases- presentation
Tools. Multimedia Authoring Tools : Types of Authoring Tools – card and page Based Authoring
Tools- Icon – Based Authorized Tools – Time Based Authoring Tools – Object – Oriented Authoring
Tools – Cross – Platform Authoring Notes.
Text: The Power of Meaning – About Fonts and Faces –Using Text in Multimedia – Computers and
Text – Font Editing and Design Tools – Hypermedia and Hypertext- Sound: The Power of Sound –
Multimedia System Sounds- MIDI Versus Digital Audio – Digital Audio – Making MIDI Audio – Audio
file formats – Working with sound on the Macintosh – Notation Interchange File Format (NIFF) –
Adding Sound to your multimedia project – Towards professional sound – The Red Books standard
production tips.
Images: Making Still Images – color- Image File formats. Animation: The Power of motion –
Principles of Animation - Making Animation That Work – Video : Using video – How video works –
Broadcast Video Standards – Integrating Computers and Television – shooting and Editing Video –
Video Tips – Recording Formats – Digital video.
Meaning of animation, Types of animation, Principles of animation, Color theory, Basic Art,
Advanced Art: Character creation, Perspective drawing, Background creation.
Introduction to flash cs5: New feature in flash cs5, launching flash on the computer, creating a new
flash file, exploring flash cs5 interfaces, working with workspace.
Drawing Tools: Exploring drawing mode in flash, working with drawing tools in flash, using colors in
flash, adding filters.
Working with objects and text: Selecting objects in flash, moving an object, copying an object,
deleting an object, editing objects, transforming objects, working with text in flash, editing text field.
Text Books:
Reference Books
1. John F koegel Buford – Multimedia Systems – Addison Wesley – First Indian Reprint.2015
2. Adobe flash CS5 in Simple Steps by Kogent Solution Inc, Published by Dreamtech
Press,2013
1. Introduction
Department of Computer Applications aims to impart value based technical education with
right blend of computation skills, analyzing, designing and managing projects. The Project
work constitutes a major component in most of the professional programmers. The project
work not only aims at the partial fulfilment of the BCA requirements, but also provides a
mechanism to demonstrate the student’s skills, abilities and specialization of interest. As
the program covers a wide range of theoretical and practical subjects related to computer
applications, it is an opportunity for a student to showcase the combined practical
implementation of all the courses covered in the earlier 5 semesters effectively and
efficiently. The project work should compulsorily include the software development life
cycle, documentation, and demonstration of the same within the stipulated period of
18weeks.
2. Aim
The main aim of the project is to make students aware of the process of project
implementation using their domain knowledge and to provide computer-based
solutions/applications for the industry, academic & research oriented real time problems.
3. Objective
The objective of the project is in such way that it helps the student in developing the ability
to apply theoretical knowledge and practical tools/techniques.
4. Outcome
At the end of implementation of project, student is capable of,
Understanding and applying Systems Development Life Cycle (SDLC).
Identifying systems requirements.
Applying different data gathering and analyzing techniques.
Performing and evaluating feasibility studies like cost-benefit analysis, technical
feasibility, time feasibility and operational feasibility for the project.
Designing and developing of system architectures and data flow diagrams.
Evaluating methods of process description to include structured, decision tables and
decision trees.
Creating and evaluating such alternative graphical tools as systems flow charts and
state transition diagrams.
Decide the software requirement specifications and hardware requirement
specifications.
Plan the systems design phase of the SDLC.
Distinguish between logical and physical design requirements.
Designing and evaluating system inputs and outputs.
Estimate storage requirements.
Explain the various file update processes based on the standard file organizations.
Construct and evaluate Entity-Relationship (ER) diagrams for RDBMS related projects.
Perform normalization for the un-normalized tables for RDBMS related projects.
Research Stream
The problem formulation should made it clear to everyone, students should aim to address
whom and where it is relevant. Chosen areas can be any of the following or any area of
research.
Public health, Epidemiology & Health Services
Bio medical.
Clinical sciences and health practice.
Neurosciences & Behavioural sciences.
Cloud services
Big data
Data science
Image processing
Internet(IOT)
Any engineering topics where software plays vital role.
One of the most important early steps in a research projects is the literature survey. A
literature survey is done to identify related research done already and to set the current
research work within a conceptual and theoretical context.
6. Problem Formulation
Students should follow the following steps (Respective guides to encourage students to follow
these steps while formulating the problem for the project).
Tailoring the idea to the targeted topic of the work programme.
Describe the objectives and applications of the project – setting the specific objectives
of the topic.
Set up the project implementation phases and structure of the project – what activities
you need to achieve the objectives and what expertise/knowledge is needed.
Describe the end results (project outputs) and the impact of the project outcome.
Highlight the added value, the innovative element of your project.
Chosen project concept should address the main questions: WHY? WHAT? HOW?
WHO? WHERE?
o Environment: Where?
This should address area of domain, your application or work will be useful.
7. Evaluation Process
The project duration is 18 weeks; 16 weeks for development and 2 weeks for preparation
of the project report. Students needs to maintain the project dairy, consult their internal
guide and update the status of the work and get it reviewed every week. Students are be
required to provide their project implementation details, methodology and results to the
department. Otherwise students will forfeit the claim for having done the project work.
Project screening
Student projects will be screened based on following points
a) Relevance to current technology
b) Gauging whether project work involves 16 week man hours of work.
c) Place of execution: Industry/Research organization/College
d) Project relevance to Computer Science and Applications
e) Understanding of the project work by the student
Finalization of Synopsis
Finalization of Synopsis is done based on the previous stage of evaluation
Based on recommendation of the panel comprising of all the staff members of the
department.
Verifying whether suggestions of the previous evaluation incorporated or not.
Evaluation of system study and requirement analysis
Evaluation criteria in this step as follows.
a) Whether student understood the problem in depth.
b) Whether scope and objective of the project defined properly.
c) Whether student studied and understands the system thoroughly/completely.
d) Whether functional requirements and non functional requirements defined properly.
Evaluation of project design
In this level evaluated for
a) Architectural Design
b) Detailed Design
c) Database Design
d) External Interface Design
e) Algorithm Design
Evaluation of coding, testing and implementation
Evaluation of coding, testing and implementation criteria as follows.
a) Pseudo code
b) Test case generation
c) Actual Testing
d) Users Manual
e) Implementation strategy
f) Draft report submission
g) Checking whether the implementation has meet requirements specified in SRS
document or not.
h) Demo of the final working model of the system.
JSS Science and Technology University, Mysuru
Course Outcomes:
Upon successful completion of this course, students will be able to,
Definition of ethics, Importance of Integrity, The Difference Between Morals, Ethics, and Laws,
Ethics in the Business World-Corporate Social Responsibility, Improving Corporate Ethics,
Creating an Ethical Work Environment, develop a Problem Statement, Identify Alternatives,
Evaluate and Choose an Alternative, Implement the Decision, Evaluate the Results and Ethics in
Information Technology (IT).
Text Books:
1. George Reynolds: Ethics in Information Technology, CENAGE Learning, 2014
2. Emotional Intelligence, Self-Awareness, HBR EMOTIONAL INTELLIGENCE SERIES.
Reference Books
1. Introduction to Engineering Ethics Mike W. Martin, Roland Scherzinger,2009
2. Computer ethics 3rd edition by Deborah g Johnson,2001
Additional Learning Resources:
1. https://wikinav.creaform3d.com/gourmet/smoke/sql.php?title=computer-ethics-deborah-g-
johnson-third-edition-pdf&asin=a36006b6fd693856646ac4dae49dd9dd
2. https://cdn-cms.f-static.com/uploads/1259807/normal_5d6094f3de006.pdf
JSS Science and Technology University, Mysuru
Department of Computer Applications
V Semester Bachelor of Computer Applications [BCA]
Course Category Code: (DSC-10) Course Category Name: Discipline Core-10
Web Programming
Course Code: BCA51L Course Title:
Laboratory
Total Credits: 01 Credit Structure (L:T:P): 0:0:1
Total Hours: 32 Max. Marks: 50
Course Outcomes:
Upon successful completion of this course, students will be able to,
CO1: Understand the basic concepts of HTML and exploring Hyperlinks, Lists and Images.
CO2: Demonstrate practical skills, workflows and methods used to create websites using
Style sheets.
CO3: Exploring JavaScript’s and its basic Functions and Operations.
CO4: Understanding Objects and Dynamic HTML Concepts like Validation, Exception Handling,
Cookies etc.
CO5: Understanding the basic concepts of PHP and building a Web applications using PHP.
List of Experiments:
HTML
1. Develop a program to create links to other HTML documents or web resources.
2. Develop a program to insert images into the HTML document.
3. Develop a program to create ordered, unordered, definition, nested list.
4. Program on creating an image –map-An image with clickable regions.
JAVASCRIPT
PHP
1. Write a PHP program to print factorial of a number.
2. Write a PHP program to print Fibonacci series.
3. Write a PHP program to swap two numbers with and without using third variable.
4. Write a PHP program to print star triangle.
5. Develop a program in PHP and JavaScript that demonstrates insert, update and delete
operation.
6. Construct PHP documents by using string, arrays, methods and also database access
through PHP.
7. Create a HTML form for login and registration page using PHP and MySQL to store and
retrieve the login credentials.
8. Create a student form with following details USN, Student name, six subject marks, total,
average and display the same.
9. Create an employee form with following details. Salary of an employee given his basic
pay, HRA=10% of basic pay, TA=5% of his basic pay and IT=2.5% of his basic pay.
Text Books:
1. Chris Bates: Web Programming Building Internet Applications, 3rd Edition, Wiley India,
2007
Reference Books:
1. http://php.net/manual/
2. www.w3schols.com
JSS Science and Technology University, Mysuru
Department of Computer Applications
V Semester Bachelor of Computer Applications [BCA]
Course Category Code: DSC-11 Course Category Name: Discipline Core-11
Python Programming
Course Code: BCA52L Course Title:
Laboratory
Total Credits: 1 Credit Structure (L:T:P): 0:0:1
Total Hours: 32 Max. Marks: 50
Course Outcomes:
Upon successful completion of this course, students will be able to,
Text Books:
1. Timothy A. Budd: Exploring Python, Tata McGraw-Hill, 2011.
Reference Books
Course Outcomes:
Upon successful completion of this course, the student will be able to:
CO 1: Understand the fundamental processes, concepts and techniques of data mining and
warehousing.
CO 2: Develop an appreciation for the inherent complexity of the data-mining and
warehousing tasks
CO 3: Analyze the Advance programming skills relevant to the data-mining and
warehousing task.
CO 4: Demonstrate the contemporary data-mining and warehousing systems.
CO 5: Analyze the strategies and methodologies related to the design and construction of
efficient data mining systems
UNIT:1 – Data Warehouse 8 Hours
Data Warehouse basic concept, Data Warehouse Modeling: Data Cube and OLAP, Data
Warehouse design and usage, Data warehouse implementation, Data Generalization by
Attribute-oriented Introduction. Data Cube Technology: Data Cube computation: Preliminary
concepts, Data Cube computation Methods.
Introduction: Data Mining, Different kinds of data used for mining, Technologies used,
applications of Data Mining, issues in Data Mining, Data objects and attributes type, Basic
statistical description of data, Data Visualization.
Data Processing: an overview, Data cleaning, Data Integration, Data Reduction, Data
Transformation and Data Discretization. Basic concepts of Frequent Itemset, Frequent Itemset
Mining methods and Pattern Evaluation Methods.
Pattern Mining: A road map, Pattern Mining in Multilevel, Multidimensional Space, and
Classification: Basic Concepts, Decision tree Introduction, Bayes Classification method.
UNIT 5–Clustering and Data Mining Trends and Applications 8 Hours
Text Books:
1.Jiawei Han, MichelineKamber, “Data Mining Concepts and Techniques”, Morgan Kauf Mann
Publishers.2017
2.Arun.K.Poojari, “Warehousing and Mining”, PHI 2019
Reference Books:
1. Liu. B, “Web Data Mining, Exploring Hyperlinks, Contents and Usage Data”, Springer, 2018.
1. web.cse.ohio-state.edu/~srini/674/part1.ppt.
2. www.cse.iitb.ac.in/~dbms/Data/Talks/datamining-intro-IEP.
JSS Science and Technology University, Mysuru
Reference Books
1. Paul Zikopoulos, Chris Eaton, Understanding Big Data: Analytics for Enterprise Class Hadoop
and Streaming Data: Analytics for Enterprise Class Hadoop and Streaming Data,McGraw Hill
Professional, 2012.
2. Glenn J. Myatt, Wayne P. Johnson, Making Sense of Data I :A practical guide to Exploratory
data analysis and data mining, second Edition, 2014,
3. Chuck Lam, “Hadoop in Action”, Dreamtech Press 2011 Edition.
1. https://www.tutorialspoint.com/big_data_tutorials.html .
2. https://www.lynda.com/Big-Data-training-tutorials/2061-0.html .
3. https://www.tutorialspoint.com/hadoop/hadoop_big_data_overview.html .
4. https://bigdatauniversity.com
JSS Science and Technology University, Mysuru
Text Books:
1. Image Processing, Analysis, and Machine Vision Fourth Edition Milan Sonkathe University of
Iowa, Iowa City Vaclav Hlavac Czech Technical University, 4th Edition 2017
2. Pattern Recognition An Algorithm Approach NarasimhaMurty, V. Susheela Devi.
Reference Books:
1. Richard Szeliski, Computer Vision: Algorithms and Applications, Springer, 2018.
2. Pattern Classification, 2edition Paperback – 1 January 2007by Richard Duda, Peter Hart, (1
January 2019)
Course Outcomes:
What is an event? What is event-driven programming, ASP.NET events, Events in html, server
control events in ASP.Net, event-driven programming and postback. Objects in ASP.NET:
Namespaces, The page class, ASP.NET core objects. ASP.NET Web Forms Structure: The
ASP.NET Page Structure Options, ASP.NET 4.5 Page Directives, ASP.NET Page Events,
Dealing with Post backs.
ASP.NET Server Controls, HTML Server Controls, Identifying ASP.NET Server Controls.
ASP.NET Web Server Controls: An Overview of Web Server Controls: The Label Server
Control, The Literal Server Control, The TextBox Server Control, The Button Server Control,
The DropDownList Server Control, The RadioButton Server Control, AdRotator Server Control.
Validation Server Controls: Understanding Validation, Client-Side versus Server-Side
Validation, ASP.NET Validation Server Controls.
Unit: 4: Data Binding: 8 hours
Data Source Controls: SqlData Source Control, Access Data Source Control, Xml Data Source
Control. Data-Bound Controls. Working With Services: Communication between Disparate
Systems, Building a Simple XML Web Service, Consuming a Simple XML Web Service,
Overloading Web Methods, Caching Web Service Responses, Using SOAP Headers.
Reference Books
1. Beginning ASP.NET 1.0 with C# Published by Wiley Publishing, Inc 2012.
2. .NET Framework Essentials, 3rd Edition by Thuan L. Thai, Hoang Lam, O'Reilly
Media, Inc 2003.
1. https://dotnet.microsoft.com/en-us/learn/dotnet/what-is-dotnet-framework
2. https://dotnet.microsoft.com/en-us/apps/aspnet
3. https://www.tutorialspoint.com/asp.net/asp.net_data_binding.htm
JSS Science and Technology University, Mysuru
Reference Books
1. https://www.ibm.com/topics/software-testing
2. https://www.softwaretestingmaterial.com
JSS Science and Technology University, Mysuru
Department of Computer Applications
VI Semester Bachelor of Computer Applications [BCA]
Course Category Code: Voc-2 Course Category Name: Vocational Course-2
Android Application
Course Code: BCA650 Course Title:
development
Total Credits: 3 Credit Structure (L:T:P): 3:0:0
Total Hours: 40 Max. Marks: 100
Course Outcomes:
Upon successful completion of this course, students will be able to,
Unit:3: Displaying Pictures & Menus with Views, Data Persistence 9 Hours
Using Image Views to Display Pictures: ImageView View, ImageSwitcher, GridView. Using
Menus with Views: Creating the Helper Methods, Options Menu, Context Menu, Using WebView,
WebView. Saving and Loading User Preferences: Accessing Preferences Using an Activity,
Programmatically Retrieving and Modifying the Preferences Values. Persisting Data to Files:
Saving to Internal Storage, Saving to External Storage (SD Card), Choosing the Best Storage
Option. Creating and Using Databases: Creating the DBAdapter Helper Class, Using the
Database Programmatically. Sharing Data in Android. Using a Content Provider: Predefined
Query String Constants, Projections, Filtering, Sorting. Creating Your Own Content Providers,
Using the Content Provider.
SMS Messaging: Sending SMS Messages Programmatically, Sending SMS Messages Using
Intent, Receiving SMS Messages, Caveats and Warnings, Sending Email. Displaying Maps:
Creating the Project, Obtaining the Maps API Key, Displaying the Map, Displaying the Zoom
Control, Changing Views, Navigating to a Specific Location, Getting the Location That Was
Touched, Geocoding and Reverse Geocoding, Getting Location Data, Monitoring a Location.
Text Books:
1. J. F. DiMarzio. Beginning Android® Programming with Android Studio, 4th Edition, Wrox
Publications, 2017.
Reference Books
1. Neil Smyth. iOS 12 App Development Essentials – First Edition, Payload Media, Inc. 2018
2. Ian F. Darwin. Android Cookbook - Problems and Solutions for Android developers. 2nd
Edition, O’Reilly Publications, 2017.
Reference Books
1. https://www.thoughtco.com/professional-communication-1691542
2. https://hrdevelopmentinfo.com/top-professional-communication/
3.https://www.subhartidde.com/slms/Professional%20Communication%20(MCA-%20101).pdf
JSS Science and Technology University, Mysuru
Upon successful completion of this course, the student will be able to:
CO 1: Understand the fundamental processes, concepts and techniques of data mining and
warehousing.
CO 2: Develop an appreciation for the inherent complexity of the data-mining and
warehousing tasks
CO 3: Analyze the Advance programming skills relevant to the data-mining and
warehousing task.
CO 4: Demonstrate the contemporary data-mining and warehousing systems.
CO 5: Analyze the strategies and methodologies related to the design and construction of
efficient data mining systems
Text Books:
1.Jiawei Han, Micheline Kamber, “Data Mining Concepts and Techniques”, Morgan Kauf Mann
Publishers.2017
2.Arun.K.Poojari, “Warehousing and Mining”, PHI 2019
Reference Books:
1. Liu. B, “Web Data Mining, Exploring Hyperlinks, Contents and Usage Data”, Springer, 2018.
Additional Learning Resources:
1. web.cse.ohio-state.edu/~srini/674/part1.ppt.
2. www.cse.iitb.ac.in/~dbms/Data/Talks/datamining-intro-IEP.
JSS Science and Technology University, Mysuru
Department of Computer Applications
VI Semester Bachelor of Computer Applications [BCA]
Course Category Code: DSC-14 Course Category Name: Discipline Core-14
Big Data Analytics
Course Code: BCA62L Course Title:
Laboratory
Total Credits: 1 Credit Structure (L:T:P): 0:0:1
Total Hours: 32 Max. Marks: 50
Course Outcomes:
Text Books:
1. Big Data, Black Book by DT Editorial Services 2016 Edition.
Reference Books
1. Paul Zikopoulos, Chris Eaton, Understanding Big Data: Analytics for Enterprise Class Hadoop
and Streaming Data: Analytics for Enterprise Class Hadoop and Streaming Data, McGraw Hill
Professional, 2012.
2. Glenn J. Myatt, Wayne P. Johnson, Making Sense of Data I :A practical guide to Exploratory
data analysis and data mining, second Edition, 2014
3. Chuck Lam, “Hadoop in Action”, Dreamtech Press 2011 Edition
1. https://www.tutorialspoint.com/big_data_tutorials.html .
2. https://www.lynda.com/Big-Data-training-tutorials/2061-0.html .
3. https://www.tutorialspoint.com/hadoop/hadoop_big_data_overview.html .
4. https://bigdatauniversity.com.
VII Semester
JSS Science and Technology University, Mysuru
Department of Computer Applications
VII Semester Bachelor of Computer Applications [BCA]
Course Category Code: DSC-16 Course Category Name: Discipline Core-16
Course Code: BCA710 Course Title: Agile Software Engineering
Total Credits: 3 Credit Structure (L:T:P): 3:0:0
Total Hours: 40 Max. Marks: 100
Course Outcomes:
Upon successful completion of this course, students will be able to:
Agile Software Development – Traditional Model vs. Agile Model - Classification of Agile Methods –
Agile Manifesto and Principles – Agile Project Management – Agile Team Interactions – Ethics in
Agile Teams - Agility in Design, Testing – Agile Documentations – Agile Drivers, Capabilities and
Values.
Impact of Agile Processes in RE–Current Agile Practices – Variance – Overview of RE Using Agile –
Managing Unstable Requirements – Requirements Elicitation – Agile Requirements Abstraction Model
– Requirements Management in Agile Environment, Agile Requirements Prioritization – Agile
Requirements Modeling and Generation – Concurrency in Agile Requirements Generation.
Agile Metrics – Feature Driven Development (FDD) – Financial and Production Metrics in FDD – Agile
Approach to Quality Assurance - Test Driven Development – Agile Approach in Global Software
Development.
Text Books:
1. David J. Anderson and Eli Schragenheim, ―Agile Management for Software
Engineering: Applying the Theory of Constraints for Business Results‖, Prentice Hall, 2003.
2. Hazza and Dubinsky, ―Agile Software Engineering, Series: Undergraduate Topics in
Computer Science‖, Springer, 2009.
Reference Books
Systems of Linear Equations, Matrices, Solving Systems of Linear Equations, Vector Spaces, Linear
Independence, Basis and Rank, Norms, Inner Products, Lengths and Distances, Angles and
Orthogonality, Determinant and Trace, Eigen values and Eigenvectors.
Unit:3: When models meet Data and Linear regression analysis 8 Hours
Data, Models and Learning, Empirical Risk Minimization, Parameter Estimation, Probabilistic
Modelling and Interference, Directed Graphical Models, Overview of Linear regression, Problem
Formulation, Parameter Estimation.
Separating Hyper planes, Primal Support Vector Machine, Dual Support Vector Machine, Kernels,
Decision Tree.
Text Books:
1. Mathematics for Machine Learning Book by A. Aldo Faisal, Cheng Soon Ong, and Marc
Peter Deisenroth-April 2020.
2. Machine Learning Mathematics Study Deep Learning Through Data Science. 2021 Edition by
Samuel Hack, Samuel Hack.
Reference Books:
1. Machine Learning: An Applied Mathematics Introduction Paperback – 20 May 2019 by
Paul Wilmott.
2. Introduction to Linear Algebra, 3rd Edition Textbook by Gilbert Strang
1. https://www.youtube.com/watch?v=1VSZtNYMntM
2. https://course.ccs.neu.edu/ds4420sp20/readings/mml-book.pdf
JSS Science and Technology University, Mysuru
Department of Computer Applications
VII Semester Bachelor of Computer Applications [BCA]
Introduction: Data Visualization, Importance of Data Visualization, Data Wrangling, Tools and
Libraries for Visualization Overview of Statistics: Measures of Central Tendency, Measures of
Dispersion, Correlation, Types of Data, Summary Statistics NumPy: NumPy Operations - Indexing,
Slicing, Splitting, Iterating, Filtering, Sorting, Combining, and Reshaping Pandas: Advantages of
pandas over NumPy, Disadvantages of pandas, Pandas operation - Indexing, Slicing, Iterating,
Filtering, Sorting and Reshaping using Pandas
Comparison Plots: Line Chart, Bar Chart and Radar Chart; Relation Plots: Scatter Plot, Bubble Plot,
Correlogram and Heatmap; Composition Plots: Pie Chart, Stacked Bar Chart, Stacked Area Chart,
Venn Diagram; Distribution Plots: Histogram, Density Plot, Box Plot, Violin Plot; Geo Plots: Dot Map,
Choropleth Map, Connection Map; What Makes a Good Visualization? A Deep Dive into Matplotlib
Introduction, Overview of Plots in Matplotlib, Pyplot Basics: Creating Figures, Closing Figures, Format
Strings, Plotting, Plotting Using pandas DataFrames, Displaying Figures, Saving Figures; Basic Text
and Legend Functions: Labels, Titles, Text, Annotations, Legends; Basic Plots: Bar Chart, Pie Chart,
Stacked Bar Chart, Stacked Area Chart, Histogram, Box Plot, Scatter Plot, Bubble Plot; Layouts:
Subplots, Tight Layout, Radar Charts, GridSpec; Images: Basic Image Operations, Writing
Mathematical Expressions.
Unit:3: Simplify Visualization using Seaborn 8 Hours
Introduction, Advantages of Seaborn Controlling Figure Aesthetics: Seaborn Figure Styles, Removing
Axes Spines, Contexts; Color Palettes: Categorical Color Palettes, Sequential Color Palettes,
Diverging Color Palettes; Interesting Plots in Seaborn: Bar Plots, Kernel Density Estimation, Plotting
Bivariate Distributions, Visualizing Pairwise Relationships, Violin Plots.
Introduction, Geoplotlib, The Design Principles of Geoplotlib, Geospatial Visualizations, Tile Providers,
Custom Layers. Introduction to Folium Visualizing Data: Building a Google map from geocoded data,
Visualizing networks and interconnection and Visualizing mail data Making Things Interactive with
Bokeh Introduction, Bokeh, Concepts of Bokeh, Interfaces in Bokeh, Output, Bokeh Server,
Presentation, Integrating, Adding Widgets.
Networked Programs HyperText Transfer Protocol – HTTP, The World’s Simplest Web Browser,
Retrieving an image over HTTP, Retrieving web pages with urllib, Parsing HTML and scraping the
web, Parsing HTML using regular expressions, Parsing HTML using BeautifulSoup, Reading binary
files using urllib Using Web Services extensible Markup Language – XML, Parsing XML, Looping
through nodes, JavaScript Object Notation – JSON, Parsing JSON.
Text Books:
1. Data Visualization workshop, Tim Grobmann and Mario Dobler, Packt Publishing, 1’st Edition,
2020.
2. Python for Everybody: Exploring Data Using Python 3, Charles R. Severance, Create Space
Independent Publishing Platform, 1’st Edition, 2016.
Reference Books
1. “Data Visualization”: A Successful Design Process, Kirk, Andy, Packt Publishing Ltd,2012.
2. Think Python: How to Think Like a Computer Scientist, Allen B. Downey, Green Tea Press,
2nd Edition, 2015.
3. Interactive Data visualization for the Web, Murray, Scott, O’Reilly Media, Inc., 2013 4.
Visualizing Data: Exploring and Explaining Data with The Processing Environment, Fry, Ben,
O’Reilly Media, Inc., 2007.
1. https://studentsblog100.blogspot.com/2018/08/cp5009-data-visualization-technique.
2. https://tutorialspoint.com/business_writing_skills/data_visualization.
JSS Science and Technology University, Mysuru
CO1: Understand the concept of Digital image and different steps involved in image processing
CO2: Ability to understand the fundamental concepts of the digital image
CO3: Analyzing the concept basic intensity transformation functions and spatial filtering
CO4: Understand the concept of image segmentation and morphological process
CO5: Understanding the basic concepts of representation and description
1. Rafael C. Gonzales, Richard E. Woods, “Digital Image Processing”, Third and Fourth Edition,
Pearson Education, 2008 and 2018.
Reference Books
1. Rafael C. Gonzalez, Richard E. Woods, Steven L. Eddins, “Digital Image Processing Using
MATLAB”, Third Edition Tata McGraw Hill Pvt. Ltd., 2011.
2. Anil Jain K. “Fundamentals of Digital Image Processing”, PHI Learning Pvt. Ltd., 2011.
1. https://www.tutorialspoint.com/dip/applications_and_usage.htm
2. https://www.geeksforgeeks.org/digital-image-processing-basics
3. https://www.sciencedirect.com/topics/engineering/image-processing
4. https://www.javatpoint.com/digital-image-processing-tutorial
JSS Science and Technology University, Mysuru
Department of Computer Applications
VII Semester Bachelor of Computer Applications [BCA]
Course Category Code: DSE-6 Course Category Name: Discipline Elective-6
Course Code: BCA742 Course Title: Advanced DBMS
Total Credits: 3 Credit Structure (L:T:P): 3:0:0
Total Hours: 40 Max. Marks: 100
Course Outcomes:
Upon successful completion of this course, students will be able to,
CO1: Select the appropriate high-performance database to design using Relational design and
apply normalization for the given application.
CO2: Design and analyse the real-world data using Transaction Management and
Concurrency Techniques.
CO3: Appraise the architectures for parallel and distributed databases.
CO4: Design, implement the relational database and check for data security and recovery
to present various views of the selected database.
CO5: Choose real world database for better performance by considering enhanced
models for interoperability
Relational Data Model and Relational Database Constraints: Relational model concepts; Relational
model constraints and relational database schemas; Update operations, transactions and dealing with
constraint violations. The Enhanced Entity–Relationship (EER) Model: Subclasses, Super classes,
and Inheritance, Specialization and Generalization, Constraints and Characteristics of Specialization
and Generalization Hierarchies, Modelling of UNION Types Using Categories, Mapping EER to
Relational Mapping.
Introduction, Possible Undesirable Properties of Relations and Schema Refinement, Functional
Dependencies, Single-Valued Normalization, Desirable Properties of Decompositions, Multivalued
Dependencies, Denormalization, Inclusion Dependency.
Architectures for parallel databases; Parallel query evaluation; Parallelizing individual operations;
Parallel query optimizations; Distributed Database Concepts: Data Fragmentation, Replication, and
Allocation Techniques for Distributed Database Design. Overview of Concurrency Control and
Recovery in Distributed Databases, Overview of Transaction Management in Distributed Databases,
Query Processing and Optimization in Distributed Databases, Types of Distributed Database
Systems, Distributed Database Architectures, Distributed Catalogue Management. Introduction to
NOSQL Systems, The CAP Theorem.
Introduction, database system failure, database backup, recovery from a failure, the concept of a log,
recovery and buffer management, log-based transaction recovery techniques, types of recovery
techniques, log-based immediate update recovery technique, log-based differed update recovery
technique, system checkpoints, implementing a log-based recovery system-ARIES, summary,
shadow page schemes, evaluation of recovery technique’s, recovering from a media failure.
Some Advanced Applications: Active database concepts and triggers; Temporal, Spatial, and
Deductive Databases – Basic concepts. More Recent Applications: Mobile databases; Multimedia
databases; Geographical Information Systems; Genome data management. The ODMG Object Model
and the Object Definition Language ODL, Object Database Conceptual Design, The Object Query
Language OQL, Overview of the C++ Language Binding in the ODMG Standard. Comparing RDBMS,
OODBMS and ORDBMS.
Text Books:
Reference Books
1. https://vpmpce.wordpress.com/adbms-3340701/.
2. https://mcqmate.com/topic/955/advanced-database-management-systems-set-3/.
3. https://www.slideshare.net/jass12345/adbms.
JSS Science and Technology University, Mysuru
Course Outcomes:
CO1: Explain the role & importance of digital marketing in a rapidly changing business landscape.
CO2:Use Search Engine Marketing and Identification of an appropriate media based for
advertising.
CO3:Understanding the role of Social Media Marketing indigital landscape and Use of Various
platforms.
CO4: Analyze the role ofSocial Media Marketing specific to platforms like Twitter, Instagram,
Snapchat & Mobile Marketing.
CO5: Identify the importance of Search Engines in Digital Marketing Ecosystem and Usage of
Analytics in digital space.
Concept of Digital Marketing: Origin, Traditional versus Digital Marketing; Digital Marketing Strategy:
The P-OE-M Framework, Digital Landscape; Digital advertising Market in India; Skills required in Digital
Marketing, Digital Marketing Plan.
Display Advertising: Concept of Display Advertising, Types of Display Ads, Buying Models, Display
plan.
Display Advertising: Targeting, What makes a good Ad? Programmatic Digital Advertising, Analytics
Tools.
Search Engine Advertising: Why Pay for Search Advertisements, Understanding Ad Placement,
Understanding Ad Ranks.
Unit:3: Social Media Marketing: 8 Hours
Social Media Marketing: Introduction to Social Media Platforms, Penetration & Characteristics; Building
a successful social media marketing strategy.
Facebook Marketing: Facebook for Business, Facebook Insights.
LinkedIn Marketing:LinkedIn Strategy, LinkedIn Analytics.
Unit:4:Social Media Marketing(continue) 8 Hours
Twitter Marketing: How is twitter different? , Building Content Strategy, Twitter usage, Twitter
Analytics.
Instagram and Snapchat: Instagram, Snapchat.
Mobile Marketing: Mobile Advertising, Mobile Marketing Features, Campaign Development
Process,Trackingof Mobile Campaigns - Mobile Analytics. .
Search Engine Optimization: Search Engines: How Search Engines Work, Concept of SEO, SEO
Phases, On Page Optimization, Off Page Optimization, SEO Tactics.
Web Analytics: Data collection, Multichannel Attribution, Types of Tracking Codes, Universal
Analytics.
Text Books:
1. Seema Gupta, “Digital Marketing”, Published by Mc-Graw Hill Education(India) Pvt. Ltd ,
Reference Books:
Course Category Code: DSE-7 Course Category Name: Skill Enhancement Courses
Course Code: BCA760 Course Title: Research Methodology
Total Credits: 3 Credit Structure (L:T:P): 3:0:0
Total Hours: 40 Max. Marks: 100
Course Outcomes:
Upon completion of this course students are able to,
CO 1: Understand the basics of research methodology and its importance in research.
CO 2: Define research problem and design the research process.
CO 3: Learn to design the sample for the research and understand different sampling
techniques.
CO 4: Understand the usage of different data collection techniques and perform hypothesis
analysis for the same.
CO 5: Interpret, analyze and document the findings of the research or work.
UNIT:1 – Introduction to Research Methodology 8 Hours
What is research problem, Selecting the research problem, Necessity of defining the problem,
technique involved in defining the problem, an illustration, Importance of literature review in defining
a problem, survey of literature, primary and secondary sources? Research Design: Meaning of
research design, Need for research design, features of good design, importance concepts relating to
research design, different research designs, basic principles of experimental designs.
Introduction, Sample design, Steps in sample design, characteristics of a good sample design, Types
of sample designs – Non-probability sampling, Probability Sampling and Complex random sampling
designs. Measurement & Scaling techniques: Classification of measurement scales, Sources of error
in measurement, Techniques of developing measurement tools, Goodness of measurement scales:
Qualities, Scaling-classification, Scaling techniques, Data collection and collection of primary data.
UNIT:4 - Methods of Data Collection and Testing of Hypothesis 8 Hours
Collection of Primary Data, Observation Method, Interview Method, Collection of Data through
Questionnaires, Collection of Data through Schedules, Difference between Questionnaires and
Schedules, Some Other Methods of Data Collection, Collection of Secondary Data Selection of
Appropriate Method for Data Collection, Case Study Method. What is a Hypothesis? Characteristics
of hypothesis, Basic concepts concerning testing of hypothesis, Procedure for hypothesis testing –
flow diagram, Data analysis with statistical packages.
Text Books:
1. Ranjith kumar, Research Methodology: a step-by-step guide for beginners, 3 rd Edition, Sage
publications Ltd. 2018
Reference Books:
1. C. R. Kothari and Gaurav Garg, Research Methodology: Methods & Techniques, 3 rd Edition,
New age international publications, 2018.
1. https://explorable.com/research-methodology.
2. https://www.sophia.org/tutorials/research-methods--9.
3. http://edutechwiki.unige.ch/en/Methodology_tutorial.
JSS Science and Technology University, Mysuru
CO1: Explore agile software development processes: how to plan and execute the same.
CO2: Implementation of social aspects on software development success.
CO3: Develop and Design the techniques and tools for improving team collaboration and software
quality.
1. Write a report of agile methodology for a self driving cars by considering following challenges:
a) Road Conditions
b) Weather Conditions
c) Traffic Conditions
d) Accident liability
e) Radar Interface
4. Write a report of agile methodology for Smart watch by considering following challenges:
a) Migration from gadget like design to style conscious design
b) Lack of manufacture on use case and functionality
c) Distribution channel confusion
d) Consumer ambivalence to current smart watch pricing
e) Battery life
5. Write a report of agile methodology for Messaging App by considering following challenges:
a) Authorization
b) Importing Contacts
c) File Sharing
d) Instant Messaging
e) Tracking Location
f) Encryption
Additional features
a)In app voice-video calls
b) Channels
c) self destructing messages
d) Availability across multiple platform
e)Cloud synchronization
6. Write a report of agile methodology for Online Voting by considering following challenges:
a) Security
b) Voter Verification and Privacy
c) Election Verifiability
d) Legal Frameworks
e) Trust and Transparency
f) Investment
7. Write a report of agile methodology for Online service provider app by considering following
challenges:
a) Capitalization of Data
b) Customers’ Exploding Expectations
c) Agility Challenge
d) Personalization Approach
e) Being Consistent
f) Facing Competition
g) Data Security
h) Technology Partnerships
i) Customer Retention
j) Relevant Leads
8. Write a report of agile methodology for E-Commerce app by considering following challenges:
a) Table of Contents hide
b) Lack of Technical Skills to Develop a Web Store
c) Making a Customer Friendly Payment & Checkout Process
d) Creating a Single Account for Online and Offline (in-store) Payments
e) Privacy and Security
f) Order Fulfilment
g) Building Customer Loyalty
h) Handling Product Returns Efficiently and Return Policy
i) Disrupting New Markets for Business Growth
j) Omni channel Shopping Experience
k) Limitations of Online Business Models
9. Write a report of agile methodology for web application development by considering following
challenges:
a) User interface and user experience
b) Scalability
c) Performance
d) Knowledge of framework and platforms
e) Security
10. Write a report of agile methodology for Online Ticket Reservation by considering following
challenges:
a) Single Platform Multiple Booking Types
b) Slot Management: Close Bookings
c) Booking Cancellation Option for Customers
d) Price Per Booking: Time Slot Management
e) Manage Bookings via Calendar
f) Streamline Online Booking Process
g) Handle Customer Complaints
11. Write a report of agile methodology for Online Transportation by considering following
challenges:
a) Automatic order allocation
b) Vehicle capacity utilization
c) Automated Route planning and optimization + dynamic route planning
d) Real-time trip tracking
e) Transparency with the end-customer
12. Write a report of agile methodology for Transferring of Data from one media to other by
considering following challenges:
a) Security
b) File Size
c) Access Restrictions
d) Time limit
e) System compatibility
f) Lack of visibility
13. Write a report of agile methodology for developing Biometrics by considering following
challenges:
a) Security mechanism to protect information systems or other resources
b) Vulnerabilities of the biometric system itself.
c) Performance
d) Trust and Transparency
e) Authorization
14. Write a report of agile methodology for Insulin pump by considering following challenges:
a) Types of insulin
1)Rapid-acting insulin
2) Long-acting insulin
3) Regular or short-acting insulin
4) Intermediate-acting insulin
b) Characteristics of insulin
1) Onset
2) Peak time
3) Duration
c) Insulin strength
15. Write a report of agile methodology for Online bank transaction by considering following
challenges:
a) Traditional banking habits.
b) Security and fraud instances.
c) Cross-border transactions.
d) Technical issues.
e) Multi-currency and payment methods.
Text Books:
1. David J. Anderson and Eli Schragenheim, ―Agile Management for Software Engineering:
Applying the Theory of Constraints for Business Results‖, Prentice Hall, 2003.
2. Hazza and Dubinsky, ―Agile Software Engineering, Series: Undergraduate Topics in Computer
Science‖, Springer, 2009.
Reference Books
1. Craig Larman, ―Agile and Iterative Development: A Managers Guide‖, Addison-Wesley, 2004.
2. Kevin C. Desouza, ―Agile Information Systems: Conceptualization, Construction, and
Management‖, Butterworth-Heinemann, 2007.
List of Experiments:
Text Books:
1. Mathematics for Machine Learning Book by A. Aldo Faisal, Cheng Soon Ong, and Marc Peter
Deisenroth-April 2020
2. Machine Learning Mathematics Study Deep Learning Through Data Science. 2021 Edition by
Samuel Hack, Samuel Hack
Reference Books:
1. Machine Learning: An Applied Mathematics Introduction Paperback – 20 May 2019 by
Paul Wilmott
2. Introduction to Linear Algebra, 3rd Edition Textbook by Gilbert Strang
Additional web resources:
1. https://www.youtube.com/watch?v=1VSZtNYMntM
2. https://course.ccs.neu.edu/ds4420sp20/readings/mml-book.pdf
VIII Semester
JSS Science and Technology University, Mysuru
Department of Computer Applications
VIII Semester Bachelor of Computer Applications [BCA]
Course Category Code: DSC-19 Course Category Name: Discipline Core-19
Course Code: BCA810 Course Title: Intelligent Algorithms
Total Credits: 3 Credit Structure (L:T:P): 3:0:0
Total Hours: 40 Max. Marks: 100
Course Outcomes:
CO1: Understand the importance of algorithm analysis and specific to recursive techniques.
CO2: Implement techniques to solve real time application by graph.
CO3: Design and develop algorithms to address match and searching problem.
CO4: Understand and explore the intelligent web elements using applications.
CO5: Realize creating suggestions and recommendations using applications.
3. Haralambos Marmanis and Dmitry Babenko, Algorithms of the Intelligent Web, Manning
Publications, 2009.
Reference Books
1. Sartaj Sahni, S.Rajasekharan: Fundamentals of Computer Algorithms, Ellis Horowitz,2019
Text Books:
1. Bob Hughes and Mike Cotterell, “Software Project Management, 5th edition”, Published by
McCraw-Hill Education, 2009
Reference Books:
1. Maylor, “Project Management” , 3rd edition , Published by Pearson, 2004
2. Vibrant and Kalpesh Ashar, “Project Management and Agile Essentials” , 5 th Edition,
Published by Vibrant Publishers, 2020
Course Outcomes:
Upon successful completion of this course, students will be able to,
CO1: Learn and understand various concepts of soft computing.
CO2: Familiarize with design of various neural networks and extend to solve the classification
problems
CO3: Explore fuzzy logic and its importance in machine intelligence.
CO4: Explore fuzzy membership functions and defuzzification.
CO5: Understand the concepts of genetic programming and its applications.
1. S.N. Sivanandam and S.N. Deepa, “Principles of Soft Computing”, Wiley India Pvt Ltd,
2016, 3rd edition.
2. J.S.R. Jang, C.T. Sun and E. Mizutani, “Neuro-Fuzzy and Soft Computing”, PHI /
Pearson Education,2015. (chapter-1)
Reference Books
1. https://sites.google.com/a/sharbani.org/www/home2/soft-computing-1
2. https://cse.iitkgp.ac.in/~dsamanta/courses/sca/index.html
3. https://www.javatpoint.com/what-is-soft-computing
4. https://nptel.ac.in/courses/106105173
JSS Science and Technology University, Mysuru
Department of Computer Applications
VIII Semester Bachelor of Computer Applications [BCA]
Course Category Code: DSE-7 Course Category Name: Discipline Elective-7
Course Code: BCA832 Course Title: NoSQL
Total Credits: 3 Credit Structure (L:T:P): 3:0:0
Total Hours: 40 Max. Marks: 100
Course Outcomes:
Text Books:
1.Shashank Tiwari, Professional NoSQL, Wrox Press, Wiley, 2015
Reference Books
1. Pramod Sadalage and Martin Fowler, NoSQL Distilled, Addison-Wesley Professional, 2012
2. NoSQL For Dummies®, 2015 by John Wiley & Sons, Inc
3. Gaurav Vaish, Getting Started with NoSQL, Packt Publishing, 2013.
Course Outcomes:
Upon successful completion of this course, students will be able to,
CO1: Define, list, label, name and describe the Innovation, drivers and types of protection in
the real world.
CO2: Comprehensively classify, compare discuss and demonstrate the need, drivers and
models of innovation with examples.
CO3: Distinguish types of innovations and illustrate applications related to past, present and
quantify future needs and describe methods of protection to innovations.
CO4: Classify, summarize, and report innovations of the past and the present and restate the
need for the future, list and express protection to innovation.
CO5: Create and develop conceptual design of products/services relevant to branch along
with case studies.
Reference Books
1. The Innovator’s DNA - Jeff Dyer, Hal Gregersen, Clayton M. Christensen, Harvard Business
School Press – 2013.
2. Innovation. - Growth Engine for Nation -. Nice Buzzword but Often Misunderstood. Compiled
By. Dr. Rajiv V. Dharaskar.
Additional Learning Resources:
1. https://youmatter.world/en/definition/definitions-innovation-definition-types-examples/
2. https://sprigghr.com/blog/hr-technology/7-examples-of-innovation-key-takeaways/
3. https://ideas.repec.org/s/hhs/lucirc.html
Tutorials Details:
1.Materials for Group/Individual Assignments
2. Paper Clippings – From News Papers, Magazines,
3. Articles from Work Books
4. Presented Papers of Conferences, Seminar/Symposia Articles
5. Company Brochures, Pamphlets
6. Advertisements Published in News Papers/Magazines
7. Branch’s Relevant National and International Society Information
8. Any Other Materials Available in Websites
JSS Science and Technology University, Mysuru
Department of Computer Applications
VIII Semester Bachelor of Computer Applications [BCA]
Course Outcomes:
Upon successful completion of this course, students will be able to,
CO1: Apply the knowledge acquired within and beyond the curriculum.
CO2: Formulate and investigate a problem which is of current trend.
CO3: Apply Software Engineering methodologies by following Software Development Life
Cycle (SDLC).
CO4: Communicate, interpret, design and implement efficiently.
CO5: Document and present the processes involved in project implementation.
1. Introduction
Department of Computer Applications aims to impart value based technical education with
right blend of computation skills, analysing, designing and managing projects. The Project
work constitutes a major component in most of the professional programmers. The project
work not only aims at the partial fulfilment of the BCA requirements, but also provides a
mechanism to demonstrate the student’s skills, abilities and specialization of interest. As the
program covers a wide range of theoretical and practical subjects related to computer
applications, it is an opportunity for a student to showcase the combined practical
implementation of all the courses covered in the earlier 5 semesters effectively and
efficiently. The project work should compulsorily include the software development life
cycle, documentation and demonstration of the same within the stipulated period of
18weeks.
2. Aim
The main aim of the project is to make students aware of the process of project
implementation using their domain knowledge and to provide computer-based
solutions/applications for the industry, academic & research oriented real time problems.
3. Objective
The objective of the project is in such way that it helps the student in developing the ability
to apply theoretical knowledge and practical tools/techniques.
4. Outcome
At the end of implementation of project, student is capable of,
Understanding and applying Systems Development Life Cycle (SDLC).
Identifying systems requirements.
Applying different data gathering and analyzing techniques.
Performing and evaluating feasibility studies like cost-benefit analysis, technical
feasibility, time feasibility and operational feasibility for the project.
Designing and developing of system architectures and data flow diagrams.
Evaluating methods of process description to include structured, decision tables and
decision trees.
Creating and evaluating such alternative graphical tools as systems flow charts and
state transition diagrams.
Decide the software requirement specifications and hardware requirement
specifications.
Plan the systems design phase of the SDLC.
Distinguish between logical and physical design requirements.
Designing and evaluating system inputs and outputs.
Estimate storage requirements.
Explain the various file update processes based on the standard file organizations.
Construct and evaluate Entity-Relationship (ER) diagrams for RDBMS related projects.
Perform normalization for the un-normalized tables for RDBMS related projects.
One of the most important early step in a research projects is the literature survey. A
literature survey is done to identify related research done already and to set the current
research work within a conceptual and theoretical context.
6. Problem Formulation
Students should follow the following steps (Respective guides to encourage students to follow
these steps while formulating the problem for the project).
Tailoring the idea to the targeted topic of the work programme.
Describe the objectives and applications of the project – setting the specific objectives of
the topic.
Set up the project implementation phases and structure of the project – what activities you
need to achieve the objectives and what expertise/knowledge is needed.
Describe the end results (project outputs) and the impact of the project outcome.
Highlight the added value, the innovative element of your project.
Chosen project concept should address the main questions: WHY? WHAT? HOW? WHO?
WHERE?
o Environment: Where?
This should address area of domain; your application or work will be useful.
7. Evaluation Process
The project duration is 18 weeks; 16 weeks for development and 2 weeks for preparation of
the project report. Students needs to maintain the project dairy, consult their internal guide
and update the status of the work and get it reviewed every week. Students are be required
to provide their project implementation details, methodology and results to the department.
otherwise, students will forfeit the claim for having done the project work.
Evaluation process has following steps.
Research stream
Introduction.
Detailed literature review of related work.
Detailed analysis of the proposal work
Conclusion.
Annexure III: Format of Design Document:
Application stream
Introduction
Scope of design document
Definitions, acronyms and abbreviations
References
Overview
System Architecture
Architectural design
User interface design
Forms design
Database or file design
Reports design
Workflows and algorithms design
Detailed design of DFDs.
Activity diagrams
Use case diagrams
Sequence diagrams
Component interfaces
Component design description
Software requirements mappingCritical requiremnts
Research stream:
Introduction
Algorithms/logic used in the related work.
Algorithms/logic steps involed in the proposed method.
Conclusion
Annexure IV : Coding detail
Application and Research stream:
Introduction
Coding convention.
Pseudo code of the important algorithms of the project.
Annexure V: Testing report
Application and Research stream:
Introduction
Test process done for the project.
Test cases.
Testcase Positive Required Expected Actual Test
no scenario input output output pass/fail
Mini 30 10 ---- 10 10 50
Viva Voice 1
Total 06
JSS Science and Technology University, Mysuru
Department of Computer Applications
VIII Semester Bachelor of Computer Applications [BCA]
Course Category Code: DSC-19 Course Category Name: Discipline Core-19
Intelligent Algorithms
Course Code: BCA81L Course Title:
Laboratory
Total Credits: 1 Credit Structure (L:T:P): 0:0:1
Total Hours: 32 Max. Marks: 50
Course Outcomes:
Upon successful completion of this course, students will be able to,
CO1: Design and analyze various algorithmic techniques.
CO2: Implementation of algorithmic techniques to solve real time applications.
CO3: Implement various search and match algorithm addressing the real time instances.
1. Find the shortest path from the source path to every vertex using Bellman-Ford Algorithm and
determine its performance for the following weighted graph.
On-hand Probability
inventory
15 .12
25 .25
35 .35
40 .20
42 .06
55 .02
a) Simulating 60 weeks, what is the estimated average order size (show your data or calculations)?
b) Based on the simulation, what is the average total cost of "having" the product?
b) Use the Monte Carlo Simulation to analyze the impact of risks that will affect the project.
Estimate optimistic, pessimistic and most likely durations for each activity as shown in the below
table using Monte Carlo algorithm.
7. Develop string matching with finite automata for the given input:
9. Use the crawler of your choice and crawl your favorite site, such as http://jakarta.apache.org/,
then use crawler to process the retrieved data, build an index for it, and search through its
pages. How do the results vary if you add PageRank to them? How about user clicks?
10. Why various websites want you to rate movies, songs, and other products by assigning one
integer value between 1 and 5 (inclusive)? Why not pick a value between 1 and 10? Or even
between 1 and 100? Wouldn’t that give you more flexibility to express the degree of your
satisfaction with the product? To take this one step further, why not rate different aspects about
a product? In the case of a movie, we could rate the plot, the performance of the actors, the
soundtrack, and the visual effects. Extend the code and identify any potential issues.
Text Books:
1. http://nptel.ac.in/algorithms
2. https://ep.jhu.edu/courses/525770-intelligent-algorithms/
3. https://en.wikipedia.org/wiki/Monte_Carlo_method
4. https://www.programiz.com/dsa/floyd-warshall-algorithm
5. https://www.programiz.com/dsa/rabin-karp-algorithm
JSS Science and Technology University, Mysuru
Course Outcomes:
CO1 : Ability to conduct experiments by applying the basics concepts of Software Project
management.
CO2 : Implementing the concepts of resources allocation and risk project management techniques
appropriately.
List of Programs/Activities/Projects
Statement Purpose:
The main purpose of conducting this LAB is to give an idea about the working of MS Project.
Activity Outcomes:
Students will get familiar with HOW TO:
1. Start MS Project
2. Create a Project Plan from a template
3. Switch to a different view
4. View a report
5. Create a visual report
Activity 1: How to create a new project plan and set its start date?
Activity 2: How to set working & non-working time?
Activity 3: How to set properties about a Project Plan?
Activity 4: How to enter tasks, task duration & milestone in a Project?
Activity 5: How to organize tasks into phases?
Activity Outcomes:
Students will get familiar with HOW TO:
1. Setup work (people and equipment) resources
2. Setup material resources
3. Setup cost resources
4. Enter work (people & material) resource pay rates
5. To make a onetime adjustment to an individual resource’s working time
6. To edit regular work week for an individual resource
7. To document resources with resource notes
Activity Outcomes:
Students will get familiar with HOW TO:
1. To display the project summary tasks
2. To create a new view based on an existing view
3. To format Gantt Bars with the Gantt Chart Wizard
4. To draw a text box on a Gantt Chart
5. To format a category of text in a view
6. To format selected text in a view
7. To edit a report’s header or footer
Activity Outcomes:
Students will get familiar with HOW TO:
1. Set current values in a schedule as a baseline
2. Display the Variance table in the Task Sheet view
3. Record project progress as scheduled
4. Record a task’s completion percentage
5. Enter actual work values for tasks
6. Enter actual start and duration values for tasks
Sample Projects:
a. Software Houses Online Directory
b. Online booking system for a Travel Agency
c. Inventory System for a Super Store
d. Parcel Tracking System for a Cargo Service
e. Citizen Information System for Jeddah
f. Vehicle Information System passing through a Check point
g. Online Home Address search engine
h. Any project of your own choice
Text Books:
1. Joseph Phillips, “Project Management Professional Lab Manual”, Published by McGraw Hill,
1st Edition , 2010
References Books/PDF’s:
1. https://silo.tips/download/lab-manual-introduction-to-software-project-management-
cpis-334
2. http://csis1.bradley.edu/uskov/webpage/MS_EXAMS/CS591_MS_EXAM/Lab_01/Micr
osoft_Project_2007_Lab_Manual.pdf
1. https://www.studocu.com/row/document/university-of-engineering-and-technology-
taxila/project-management/spm-lab-4-2k16-spm-lab4/8902770