0% found this document useful (0 votes)
187 views202 pages

BCA NEP Syllabus 2022 2026

The document outlines the Bachelors of Computer Applications (BCA) curriculum for JSS Science and Technology University from 2022 to 2026, detailing the courses offered across six semesters. Each semester includes discipline core, elective, language, skill enhancement, and value-based courses, along with their corresponding credits, teaching hours, and assessment marks. The total credits and marks for each semester are also summarized, providing a comprehensive view of the program structure.

Uploaded by

Shwetha Shwetha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
187 views202 pages

BCA NEP Syllabus 2022 2026

The document outlines the Bachelors of Computer Applications (BCA) curriculum for JSS Science and Technology University from 2022 to 2026, detailing the courses offered across six semesters. Each semester includes discipline core, elective, language, skill enhancement, and value-based courses, along with their corresponding credits, teaching hours, and assessment marks. The total credits and marks for each semester are also summarized, providing a comprehensive view of the program structure.

Uploaded by

Shwetha Shwetha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 202

JSS Mahavidyapeetha

JSS SCIENCE AND TECHNOLOGY UNIVERSITY


Mysuru – 570 006

Department of Computer Applications

Bachelors of Computer Applications (Basic/Honors)


Scheme 2022-2026
Scheme of Teaching and Examination
First Semester BCA

Credits Marks
Exam
SL. Course Subject Teaching Contact
Course Title Duration
No. Category Code Department L T P Total Hours CIE SEE Total (Hrs)

Discipline Core-1
1. BCA110 Programming Language CA 3 0 0 3.0 3 50 50 100 3
(DSC-1)
Discipline Core-2
2. BCA120 Mathematics - I Mathematics 3 0 0 3.0 3 50 50 100 3
(DSC-2)
Discipline Core-3
3. BCA130 Operating System CA 3 0 0 3.0 3 50 50 100 3
(DSC-3)
Open Elective-1 Problem Solving
4. BCA140 CA 3 0 0 3.0 3 50 50 100 3
(OE-1) Techniques
Language – 1
5. BCA150 Kannada –I Kannada 3 1 0 3.0 3 50 50 100 3
(L-1)
Language - 2
6. BCA160 English – I English 3 1 0 3.0 3 50 50 100 3
(L-2)
Skill Enhancement Computer Concepts
7. BCA170 CA 2 0 0 2.0 2 50 50 50 1.5
Courses (SEC-1) &Tools

Value based Courses Fundamentals of


8. BCA180 CA 1 0 2 2.0 2 50 50 50 1.5
(VB-1) Emotional Intelligence
Discipline Core-1 Programming Language
9. BCA11L CA 0 0 1 1.0 2 50 -- 50 --
(DSC-1) Laboratory
Skill Enhancement Computer Concepts
10. BCA17L CA 0 0 1 1.0 2 50 -- 50 --
Courses (SEC-1) &Tools Laboratory

Total 21 2 4 24 26 500 400 800 -


Scheme of Teaching and Examination
Second Semester BCA

SL. Course Subject Course Title Teaching Credits Contact Marks Exam
No. Category Code Department Hours Duration
L T P Total CIE SEE Total (Hrs)
Object Oriented
Discipline Core-4
1. BCA210 Programming with CA 3 0 0 3.0 3 50 50 100 3
(DSC - 4)
C++
Discipline Core -5
2. BCA220 Data Structures CA 3 0 0 3.0 3 50 50 100 3
(DSC - 5)
Open Elective-2 E-Commerce
3. BCA230 CA 3 0 0 3.0 3 50 50 100 3
(OE-2) Applications
Discipline Elective -1
4. BCA24X Discipline Elective -1 CA 3 0 0 3.0 3 50 50 100 3
(DSE - 1)
Language – 3
5. BCA250 Kannada –II Kannada 3 1 0 3.0 3 50 50 100 3
(L-3)
Language – 4
6. BCA260 English – II English 3 1 0 3.0 3 50 50 100 3
(L-4)
Ability Enhancement
Environmental
7. Compulsory Courses BCA270 Environmental 3 0 0 3.0 3 50 50 100 3
Studies
(AECC-1)
Skill Enhancement Personal
8. BCA280 CA 1 0 2 2.0 2 50 50 50 1.5
Courses (SEC-2) Effectiveness
Object Oriented
Discipline Core-4
9. BCA21L Programming with CA 0 0 1 1.0 2 50 -- 50 --
(DSC - 4)
C++ Laboratory
Total 22 2 3 24 25 450 400 800 -

Discipline Elective - 1
BCA241 Business Systems
BCA242 Enterprise Resource Planning
Scheme of Teaching and Examination
Third Semester BCA

SL. Course Credits Marks


No. Category Exam
Subject Teaching Contact
Course Title Duration
Code Department Hours
L T P Total CIE SEE Total (Hrs)

Discipline Core-6
1. BCA310 Mathematics – II Mathematics 3 0 0 3.0 3 50 50 100 3
(DSC-6)
Discipline Core-7
2. BCA320 Java Programming CA 3 0 0 3.0 3 50 50 100 3
(DSC-7)
Open Elective-3
3. BCA330 E-Governance CA 3 0 0 3.0 3 50 50 100 3
(OE-3)

Discipline Elective-2
4. BCA34X Discipline Elective -2 CA 3 0 0 3.0 3 50 50 100 3
(DSE-2)
Language-5
5. BCA350 Kannada –III Kannada 3 1 0 3.0 3 50 50 100 3
(L-5)
Language-6
6. BCA360 English – III English 3 1 0 3.0 3 50 50 100 3
(L-6)
Ability Enhancement
7. Compulsory Courses-2 BCA370 Constitution of India Law 2 0 0 2.0 2 50 50 50 1.5
(AECC-2)
Skill Enhancement Courses Artificial
8. BCA380 CA 1 0 0 1.0 1 50 50 50 1.5
(SEC-2) Intelligence
Discipline Core-7 Java Programming
9. BCA32L CA 0 0 1 1.0 2 50 -- 50 --
(DSC-7) Laboratory
Skill Enhancement Courses Artificial
10. BCA38L CA 0 0 1 1.0 2 50 -- 50 --
(SEC-2) Intelligence Laboratory
Total 21 2 2 23 25 500 400 800 -

Discipline Elective - 2
BCA341 Data Communications and Networking
BCA342 Human Computer Interface
Scheme of Teaching and Examination
Fourth Semester BCA

Credits Contact Marks Exam


SL. Subject Teaching Hours Duration
Course Course Title
No. Code Department (Hrs)
Category L T P Total CIE SEE Total

Discipline Core-8 Analysis and Design


1. BCA410 CA 3 0 0 3.0 3 50 50 100 3
(DSC-8) of Algorithms
Discipline Core-9 Database
2. BCA420 CA 3 0 0 3.0 3 50 50 100 3
(DSC-9) Management System
Open Elective-4
3. BCA430 Internet of Things CA 3 0 0 3.0 4 50 50 100 3
(OE-4)
Discipline Elective-3
4. BCA44X Discipline Elective-3 CA 3 0 0 3.0 4 50 50 100 3
(DSE-3)
Language-7
5. BCA450 Kannada –IV Kannada 3 1 0 3.0 3 50 50 100 3
(L-7)
Language-8
6. BCA460 English – IV English 3 1 0 3.0 3 50 50 100 3
(L-8)
Skill Enhancement
7. BCA470 CyberSecurity CA 1 0 0 1.0 1 50 50 50 1.5
Courses-3 (SEC-3)
Value Based-3
8. BCA480 Leadership Skills CA 2 0 0 2.0 4 50 50 50 1.5
(VB-3)
Database
Discipline Core-9
9. BCA42L Management System CA 0 0 1 1.0 2 50 -- 50 --
(DSC-9)
Laboratory
Skill Enhancement CyberSecurity
10. BCA47L CA 0 0 1 1.0 2 50 -- 50 --
Courses-3 (SEC-3) Laboratory
Total 21 2 2 23 29 500 400 800

Discipline Elective - 3
BCA441 Network Security
BCA442 Management Information System
Scheme of Teaching and Examination
Fifth Semester BCA

Credits Marks Exam


SL. Subject Teaching Contact
Course Course Title Duration
No. Code Department L T P Total Hours CIE SEE Total
Category (Hrs)
Web
Discipline Core-10
1. BCA510 Programming CA 3 0 0 3.0 3 50 50 100 3
(DSC-10)
Discipline Core-11
2. BCA520 Python Programming CA 3 0 0 3.0 3 50 50 100 3
(DSC-11)
Discipline Core-12
3. BCA530 Software Engineering CA 3 0 0 3.0 3 50 50 100 3
(DSC-12)
Discipline Elective-4
4. BCA54X Discipline Elective - 4 CA 3 0 0 3.0 3 50 50 100 3
(DSE-4)
Vocational-1 Multimedia Tools &
5. BCA550 CA 3 0 0 3.0 3 50 50 100 3
(Voc-1) Applications
* Project
Application
6. Skill Enhancement BCA56P CA 2 0 2 3.0 3 50 50 100 3
Development
Courses-4 (SEC-4)
Value Based-4 Ethics and
7. BCA570 CA 0 1 2 2.0 3 50 50 50 1.5
(VB-4) Self-Awareness
Web
Discipline Core-10
8. BCA51L Programming CA 0 0 1 1.0 2 50 -- 50 --
(DSC-10)
Laboratory
Discipline Core-11 Python Programming
9. BCA52L CA 0 0 1 1.0 2 50 -- 50 --
(DSC-11) Laboratory

Total 17 1 6 22 25 450 350 750 -

Discipline Elective - 4
BCA541 Cloud Computing
BCA542 Software Architecture
Scheme of Teaching and Examination
Sixth Semester BCA

Exam
Credits Marks Duration
SL. Course Subject Teaching Contact
Course Title (Hrs)
No. Category Code Department Hours
L T P Total CIE SEE Total

Discipline Core-13 Data Warehouse


1. BCA610 CA 3 0 0 3.0 3 50 50 100 3
(DSC-13) and Mining
Discipline Core-14
2. BCA620 Big Data Analytics CA 3 0 0 3.0 3 50 50 100 3
(DSC-14)
Discipline Core-15 Computer Vision and
3. BCA630 CA 3 0 0 3.0 3 50 50 100 3
(DSC-15) Pattern Recognition
Discipline Elective-5
4. BCA64X Discipline Elective-5 CA 3 0 0 3.0 3 50 50 100 3
(DSE-5)
Vocational Course-2 Android Application
5. BCA650 CA 3 0 0 3.0 3 50 50 100 3
(Voc-2) Development

Skill Enhancement Professional


6. BCA660 CA 3 0 0 3.0 3 50 50 100 3
Courses-5 (SEC-5) Communication
Discipline Core-13 Data Warehouse
7. BCA61L CA 0 0 1 1.0 2 50 -- 50 --
(DSC-13) and Mining Laboratory
Discipline Core-14 Big Data Analytics
8. BCA62L CA 0 0 1 1.0 2 50 -- 50 --
(DSC-14) Laboratory

Total 18 0 2 20 22 400 300 700 -

Discipline Elective - 5
BCA641 .NET Technologies
BCA642 Software Testing
Scheme of Teaching and Examination
Seventh Semester BCA

Exam
Credits Marks
SL. Course Subject Teaching Contact Duration (Hrs)
Course Title
No. Category Code Department Hours
L T P Total CIE SEE Total

Discipline Core-16 Agile Software


1. BCA710 CA 3 0 0 3.0 3 50 50 100 3
(DSC-16) Engineering
Discipline Core-17 Mathematics for
2. BCA720 CA 3 0 0 3.0 3 50 50 100 3
(DSC-17) Machine Learning
Discipline Core-18 Data
3. BCA730 CA 3 0 0 3.0 3 50 50 100 3
(DSC-18) Visualization
Discipline Elective-6
4. BCA74X Discipline Elective-6 CA 3 0 0 3.0 3 50 50 100 3
(DSE-6)
Vocational Course-3
5. BCA750 Digital Marketing CA 3 0 0 3.0 3 50 50 100 3
(Voc-3)
Skill Enhancement Research
6. BCA760 CA 3 0 0 3.0 3 50 50 100 3
Courses (DSE-7) Methodology
Discipline Core-16 Agile Software
7. BCA71L CA 0 0 1 1.0 2 50 -- 50 --
(DSC-16) Engineering Laboratory
Discipline Core-17 Mathematics for Machine
8. BCA72L CA 0 0 1 1.0 2 50 -- 50 --
(DSC-17) Learning Laboratory

Total 18 0 2 20 22 400 300 700 -

Discipline Elective - 6
BCA741 Image Processing
BCA742 Advanced DBMS
Scheme of Teaching and Examination
EighthSemesters BCA

Exam
SL. Course Subject Teaching Credits Contact Marks Duration
Course Title (Hrs)
No. Category Code Department Hours
L T P Total CIE SEE Total

Discipline Core-19 Intelligent


1. BCA810 CA 3 0 0 3.0 3 50 50 100 3
(DSC-19) Algorithms

Discipline Core-20 Software Project


2. BCA820 CA 3 0 0 3.0 3 50 50 100 3
(DSC-20) Management
Discipline Elective-
3. BCA83X Discipline Elective-7 CA 3 0 0 3.0 3 50 50 100 3
7(DSE-7)

Vocational -4
4. BCA840 Innovation Studies CA 3 1 0 3.0 3 50 50 100 3
(Voc-4)

Discipline Elective-8 Project


5. BCA85P CA 0 0 6 6.0 6 100 150 250 3
(DSE-8) (Application/ Research)
Discipline Core-19 Intelligent
6. BCA81L CA 0 0 1 1.0 2 50 -- 50 --
(DSC-19) Algorithms Laboratory
Discipline Core-20 Software Project
7. BCA82L CA 0 0 1 1.0 2 50 -- 50 --
(DSC-20) Management Laboratory

Total 12 1 8 20 22 400 350 750 -

Discipline Elective - 7
BCA831 Soft Computing
BCA832 NoSQL
Credit Pattern for BCA Course

Semester Credits
1 24
2 24
I Year 48
3 23
4 23
II Year 94
5 22
6 20
III Year 136
7 20
8 20
IV Year 176
I Semester
JSS Science and Technology University, Mysuru

Department of Computer Applications


I Semester Bachelor of Computer Applications [BCA]
Course Category Code: DSC-1 Course Category Name: Discipline Core-1
Course Code: BCA110 Course Title: Programming
Language
Total Credits: 03 Credit Structure (L:T:P): 3:0:0
Total Hours: 40 Max. Marks: 100

Course Outcomes:

CO 1: Gain fundamental knowledge on basic programming aspects and storage


classes.
CO 2: Understand the basic terminologies used in computer programming, write,
compile and debug programs in C language.
CO 3: Use different data types in a computer program.
CO 4: Design programs involving decision structures, loops and functions.
CO 5: Understand and use the dynamics of memory by the use of pointers.

Unit:1: Introduction to Programming Concepts 08 Hours

Software, Classification of Software, Modular Programming, Structured Programming,


Algorithms and Flowcharts with examples. Overview of C Language: History of C, Character
set, C tokens, Identifiers, Keywords, Data types, Variables, Constants, Symbolic Constants,
Operators in C, Hierarchy of Operators, Expressions, Type Conversions and Library
Functions.

Unit:2: Managing Input and Output Operation 08 Hours

Formatted and Unformatted I/O Functions, Decision making, branching and looping: Decision
Making Statements - if Statement, if–else statement, nesting of if-else statements, else–if
ladder, switch statement, operator, Looping - while, do-while, for loop, Nested loop, break,
continue, and goto statements. Functions: Function Definition, prototyping, types of
functions, passing arguments to functions, Nested Functions, Recursive functions.

Unit:3:Arrays 08 Hours

Declaring and Initializing, One Dimensional Arrays, Two Dimensional Arrays, Multi
Dimensional Arrays - Passing arrays to functions. Strings: Declaring and Initializing strings,
Operations on strings, Arrays of strings, passing strings to functions. Storage Classes -
Automatic, External, Static and Register Variables.

Unit:4:Structures 08 Hours

Structures-Declaring and Initializing, Nested structure, Array of Structure, Passing Structures


to functions, Unions, typedef, enum, Bit fields. Pointers – Declarations, Pointer arithmetic,
Pointers and functions, Call by value, Call by reference, Pointers and Arrays, Arrays of
Pointers, Pointers and Structures. Meaning of static and dynamic memory allocation,
Memory allocation functions.
Unit:5:Files 08 Hours

Files - File modes, File functions, and File operations, Text and Binary files, Command Line
arguments. C Preprocessor directives, Macros – Definition, types of Macros, Creating and
implementing user defined header files.
Text Books:

1. Programming in ANSI C, Third Edition, E.Balaguruswamy. 6th Edition (2013)


2. The C Programming Language, Brian W Kernighan, Dennis M Ritchie, PHI, 2 nd Edition.

Reference Books:

1. Let us C, 4th Edition, Yashwanthkanetkar.


2. Programming with C, Byron Gottfried, Tata McGraw-Hill edition.

Additional Learning Resources:

1. http://www.worldbestlearningcenter.com/index_files/c_tutorial_lesson.htm
2.http://www.cluster2.hostgator.co.in/files/writeable/uploads/hostgator99706/file/letusc-
yashwantkanetkar.pdf
JSS Science and Technology University, Mysuru

Department of Computer Applications


I Semester Bachelor of Computer Applications [BCA]
Course Category
Course Category Code: DSC-2 Discipline Core-2
Name:
Course Code: BCA120 Course Title: Mathematics-1
Credit Structure
Total Credits: 03 3:0:0
(L:T:P):
Total Hours: 40 Max Marks: 100

Course Outcomes:

CO1: Handle matrix computations that come up in linear algebra like accurate / approximate
solutions of systems of linear equations, eigenvalues, eigenvectors, inverses, etc
CO2: Ability to identify the partial derivatives and solve the problem, to find the total
derivative
and solve the Jacobian problems using partial derivatives.
CO3: Understand polar curves and use these concepts to find different parameters
CO4: Ability to derive the reduction formula for some trigonometric functions and solve
problems
CO5: Understand the graphs and able to to solve the problems using the graphs.

Unit:1: 08 Hours

Elementary row and column operations, equivalent matrices, invariance of rank under
elementary operations, determination of rank of a matrix by reducing it to the echelon form.
Homogeneous and non-Homogeneous systems of ‘m’ linear equations in ‘n’ unknowns,
criterion for uniqueness of solutions. Eigen values and Eigen vectors of a square matrix,
standard properties, reduction of matrix to diagonal form, Cayley-Hamilton theorem (without
proof), and applications.

Unit:2: 08 Hours

Partial derivatives–Homogeneous functions – Euler’s theorem, total derivatives,


Differentiation of implicit functions and composite functions, Jacobians

Unit:3: 08 Hours

Polar Coordinates- angle between the radius vector and the tangent, angle between polar
curves, length of perpendicular from pole to the tangent, orthogonality of curves & pedal
equations.

Unit:4: 08 Hours

Reduction formulae for Sinnx, Cosnx, SinmxCosnx. Leibnitz’s rule for differentiation under
the integral sign.

Unit:5: 08 Hours

Introduction to Graph Theory: Definitions and Examples, Sub graphs, Complements, and
Graph Isomorphism, Vertex Degree, Euler Trails and Circuits , Trees: Definitions, Properties,
and Examples, Routed Trees, Trees and Sorting, Weighted Trees and Prefix Codes.

Text Books:

B. S. Grewal, “Higher Engineering Mathematics”, 43rd edition, Khanna Publications, 2015.


1. A Textbook of B Sc Mathematics, Volume 1 & 2, G K Ranganath

Reference Books:

1. Erwin Kreyzig, “Advanced Engineering Mathematics”, 10 th edition, Wiley Publications,


2016.
2. Ramana .B.V, “Higher Engineering Mathematics”, 11th edition, Tata-McGraw Hill. 2010

Additional Learning Resources:


NPTEL ,MOCCUS ,etc
JSS Science and Technology University, Mysuru

Department of Computer Applications


I Semester Bachelor of Computer Applications [BCA]
Course Category Code: DSC-3 Course Category Discipline Core-3
Course Code: BCA130 Course Title: Operating System
Total Credits: 03 (L:T:P): 3:0:0

Total Hours: 40 Max Marks: 100

Course Outcomes:
CO1: Understand the basic concepts of Operating System, its functions and services.
CO2: Compare the various algorithms and performance of various algorithms used for
management of Memory, CPU scheduling.
CO3: Apply various concept related with Deadlock to solve problems.
CO4: Understand the concepts of memory management.
CO5: Understand the concepts of virtual memory management.

Unit: 1: 07 Hours

Introduction: Computer System Organization – Computer System Architecture – Operating


System Structure – Operating System Operations.

Unit:2: 08 Hours
System Structure: Operating System Services – System Calls – Types of Systems Calls –
System Programs

Unit:3: 07 Hours
Process Concept: Process Scheduling – Operations on Processes – Inter process
Communication – Communications in Client Server Systems

Unit:4: 08 Hours
Process Scheduling: Concepts – Scheduling Criteria – Scheduling Algorithms Synchronization:
The critical section problem – Peterson’s Solution

Unit:5: 10 Hours
Deadlocks: Characterization - Methods for handling deadlocks - Deadlock prevention –
Deadlock Avoidance – Deadlock Detection - Recovery from deadlock. Memory Management:
Swapping – Contiguous Memory Allocation, Paging, Segmentation.

Text Books:

1. Operating System Concepts by - Silberschatz, Galvin, Gagne, John-Wiley (2002).


2. Andrew S. Tanenbaum, “Modern Operating Systems”, PHI, Fourth edition.
Reference Books:

1. Operating system principles by Brinch Hansen. P., PHI.


2. Operating systems by Milan Milenkovic., McGraw Hill.
3. Logical design of operating systems by Show .A., PHI.

Additional Learning Resources:

1. https://www.tutorialspoint.com/operating_system/os_linux
2. https://www.cs.uic.edu/~jbell/CourseNotes/OperatingSystems
JSS Science and Technology University, Mysuru

Department of Computer Applications


I Semester Bachelor of Computer Applications [BCA]
Course Category
OE-1 Course Category Open Elective-1
Code:
Problem Solving
Course Code: BCA140 Course Title:
Techniques
Total Credits: 03 (L:T:P): 3:0:0

Total Hours: 36 Max Marks: 100

Course Outcomes:
CO1:Understand basics of computer based problem solving
CO2: Able to understand basics of algorithms
CO3:Able to analyze the problem and provide a technique to solve it.
CO4:Understand Factoring and Array techniques.
CO5: Understand the basic merging and sorting techniques

Unit: 1:Introduction to computer problem-solving 07 Hours

Introduction, The Problem-solving Aspect, Top-down Design, Implementation of Algorithms,


Program Verification, The Efficiency of Algorithms, The Analysis of Algorithms.

Unit:2:Fundamental algorithms 07 Hours

Exchanging the Values of Two Variables, Algorithm: Counting, Summation of a Set of


Numbers, Factorial Computation, Sine Function Computation, Generation of the Fibonacci
sequence, Reversing the Digits of a number, Base Conversion, Character to Number
Conversion.
Unit: 3:Factoring methods 09 Hours

Introduction, Algorithms: Finding the Square Root of a Number, The Smallest Divisor of an
Integer ,The Greatest Common Divisor of Two Integers ,Generating Prime Numbers,
Computing the Prime Factors of an Integer ,Generation of Pseudo-random Numbers
,Raising a Number to a Large Power , Computing the nth Fibonacci Number
Unit:4: Array Techniques 08 Hours
Introduction, Array Order Reversal, Array Counting or Histograrnming, Finding the Maximum
Number in a Set, Removal of Duplicates from an ordered array,Finding the kth Smallest
Element, Longest Monotone Subsequence

Unit:5:Merging, Sorting and Searching 09 Hours


Introduction, The Two-way Merge, Sorting by Selection , Sorting by Exchange, Sorting by
Insertion, Sorting by Diminishing Increment, Sorting by Partitioning , Binary Search ,Hash
Searching.
Text Books:

1. How to Solve it by Computer–R G Dromey, PHI

Reference Books:

1. Introduction to Algorithms, 3rd Edition (The MIT Press) 3rd Edition by Thomas H.
Cormen.

Additional Learning Resources:

1. https://ryanstutorials.net/problem-solving-skills/
2. https://www.tutorialspoint.com/creative_problem_solving/index.htm
3. https://www.codementor.io/community/topic/problem-solving-skills
JSS Science and Technology University, Mysuru

Department of Computer Applications

I Semester Bachelor of Computer Applications [BCA]


Course Category Code: L-1 Course Category Name: Languages-1
Couse Code: BCA150 Course Title: Kananda-1
Total Credits: 03 Credit Structure (L:T:P): 2:2:0
Total Hours: 36 Max. Marks: 100

Course Outcomes:

CO1: zÉñÁ©üªÀiÁ£À ¨sÁμÁ©üªÀiÁ£À, ¸ÀA§AzsÀUÀ¼À ªÀĺÀvÀézÀ CjªÀÅ.


CO2: ¸ÁªÀiÁfPÀ §zÀÄQ£À Cj«£ÉÆnÖUÉ ¸Àé¸ÀÜöå ¸ÀªÀiÁdzÀ aAvÀ£ÉUÉ MgÉ ºÀZÀÄѪÀÅzÀÄ.
CO3: ¸ÁA¸ÀÌøwPÀ ªÉÊ«zsÀåvÉAiÀÄ ¥ÀjZÀAiÀÄ
CO4: ¸ÀAªÀºÀ£À P˱À®åzÀ ¨É¼ÀªÀtÂUÉ
CO5: ²μÀÖ¨sÁμÉAiÀÄ ªÁåPÀgÀt eÁÕ£À

Unit:1: PÁªÀå : 07 Hours

1. PÁjºÉUÀÎqÉAiÀÄ ªÀÄUÀ¼ÀÄ - ©.JA.²æÃ 7


2. PÀ£ÀßqÀ ¥ÀzÀUÉÆ¼ï - f.¦.gÁdgÀvÀßA
3. ªÀiÁªÀ£À ªÀÄ£ÉAiÀİè - PÉ.J¸ï. £ÀgÀ¹AºÀ¸Áé«Ä
4. UÀÄ©â - ZÉ£Àß«ÃgÀ PÀt«
5. £À£Àß ºÀtvÉ - f.J¸ï.²ªÀgÀÄzÀæ¥Àà

Unit:2: ¸ÀtÚ PÀxÉUÀ¼ÀÄ : 07 Hours

1. zsÀ£ÀéAvÀj aQvÉì - PÀĪÉA¥ÀÄ 7


2. C¯ÉPÁìAqÀgÀ£À UÀÄgÀÄzÀQëuÉ - ªÀiÁ¹Û ªÉAPÀmÉñÀ CAiÀÄåAUÁgï
3. ¨Éqï £ÀA§gï K¼ÀÄ - wæªÉÃtÂ
4. UÁA¢ü - ¨É¸ÀUÀgÀºÀ½î gÁªÀÄtÚ
5. ¤ÃgÀÄ - §¸ÀªÀgÁdÄ PÀÄPÀÌgÀºÀ½î
Unit:3: ¥ÀæªÁ¸À PÀxÀ£À : “£Á£ÀÆ CªÉÄÃjPÁUÉ ºÉÆÃVzÉÝ”- PÀÈμÁÚ£ÀAzÀ PÁªÀÄvï 07 Hours

Unit:4: ¨sÁμÁP˱À®å : 08 Hours

¸ÀºÀd ¨sÁμÁ §¼ÀPÉ, £ÀÄrUÀlÄÖUÀ¼ÀÄ, UÁzÉUÀ¼ÀÄ, ¥Àæ§AzsÀ gÀZÀ£É, D±ÀÄ ¨sÁμÀt, ¸ÀAzÀ±Àð£À, ZÀZÉð, ¨sÁμÀtPÀ¯É,
¨sÁó μÁ C£ÀĪÁzÀ, ZÀ®£ÀavÀæ «ªÀıÉð.
Unit:4: ªÁåPÀgÀt: 07 Hours

1. ªÁPÀå-¥ÀzÀ-ªÀtð 7
2. ¥ÀæPÀÈw-¥ÀævÀåAiÀÄ
3. ¥ÀzÀUÀ¼À §UÉUÀ¼ÀÄ
4. ªÀtðªÀiÁ¯É
5. PÀ£ÀßqÀ ¸ÀA¢üUÀ¼ÀÄ
6. £ÁªÀÄ¥ÀzÀzÀ §UÉUÀ¼ÀÄ
Text books:

1. ªÉÄʸÀÆgÀÄ «±Àé«zÁ央AiÀÄzÀ ºÉƸÀUÀ£ÀßqÀ ¸Á»vÀå ¸ÀA¥ÀÄl


2. ¥ÀæªÁ¸À PÀxÀ£À-“£Á£ÀÆ CªÉÄÃjPÁUÉ ºÉÆÃVzÉÝ”-PÀÈμÁÚ£ÀAzÀ PÁªÀÄvï
3. “PÀ£ÀßqÀ ªÀÄzsÀåªÀÄ ªÁåPÀgÀt”-wÃ.£ÀA.²æÃ.
Reference Books:

1. PÀ£ÀßqÀ ¸Á»vÀå ZÀjvÉæ-gÀA.²æÃ.ªÀÄÄUÀ½


2. vÁAwæPÀ PÀ£ÀßqÀ-¥Á°mÉQßPï r¥ÉÆèªÀÄ PÉÆÃ¹ð£À 3 ªÀÄvÀÄÛ 4£Éà ¸É«Ä¸ÀÖgï ¥ÀoÀå¥ÀĸÀÛPÀ
3. EAf¤AiÀÄjAUï “PÀ£ÀßqÀ ªÀÄ£À¸ÀÄ” ¥ÀoÀå ¥ÀĸÀÛPÀ.

Additional Learning Resources:

• PÀ£ÀßqÀ ¸Á»vÀåPÉÌ ¸ÀA§A¢ü¹zÀ ¥ÀĸÀÛPÀ¼ÀÄ


• ¸ÀªÀÄÆºÀ ªÀiÁzsÀåªÀÄUÀ¼ÀÄ
• ¤AiÉÆÃfvÀ PÁAiÀÄðPÀæªÀÄUÀ½UÉ ¸ÀA§A¢ü¹zÀAvÉ ¸ÀܼÀUÀ¼À ¨sÉÃn
Tutorial Details:

Unit:1: PÁªÀå : 1 * PÀ«vÉUÀ¼À£ÀÄß ©r¹, ¨sÁªÀ CxÀð w½AiÀÄĪÀAvÉ N¢¸ÀĪÀÅzÀÄ.


• PÀ«vÉUÀ¼À°ègÀĪÀ «±ÉÃμÀ ¥ÀzÀ, £ÀÄrUÀlÄÖ, UÁzÉ - EªÀÅUÀ¼À£ÀÄß UÀÄgÀÄw¹ ¸ÀéAvÀ ªÁPÀåUÀ¼À°è §¼À¸À®Ä
¸ÀÆa¸ÀĪÀÅzÀÄ.
• PÀ«vÉUÀ¼À ªÀ¸ÀÄÛ, D±ÀAiÀÄUÀ¼À£ÀÄß ¥Àæ¸ÀÄÛvÀPÉÌ C£Àé¬Ä¹ «ZÁgÀ ªÀÄAqÀ£É ,PÀ«vÉ gÀZÀ£É ªÀiÁr¸ÀĪÀÅzÀÄ.
• PÀ«vÉUÀ½UÉ gÁUÀ ¸ÀAAiÉÆÃf¹ ºÁqÀ®Ä GvÉÛÃf¸ÀĪÀÅzÀÄ. §ºÀĪÀiÁzsÀåªÀÄUÀ¼À£ÀÄß §¼À¹PÉÆ¼ÀÄîªÀÅzÀÄ.
• PÀ«vÉUÀ¼À ªÀ¸ÀÄÛ ªÀÄvÀÄÛ D±ÀAiÀÄUÀ¼À£ÀÄß ¸ÀÈd£ÁvÀäPÀªÁV ZÀlĪÀnPÉUÀ¼À£ÀÄß «zÁåyðUÀ¼À UÀÄA¥ÀÄUÀ¼À£ÁßV
«AUÀr¹ £ÀqɸÀĪÀÅzÀÄ.

Unit:2: ¸ÀtÚ PÀxÉUÀ¼ÀÄ: * UÀzÀå ¨sÁUÀ¼À£ÀÄß ¨sÁªÀ CxÀð w½AiÀÄĪÀAvÉ N¢¸ÀĪÀÅzÀÄ.


• UÀzÀå ¨sÁUÀUÀ¼À°ègÀĪÀ «±ÉÃμÀ ¥ÀzÀ, £ÀÄrUÀlÄÖ, UÁzÉ - EªÀÅUÀ¼À£ÀÄß UÀÄgÀÄw¹ ¸ÀéAvÀ ªÁPÀåUÀ¼À°è §¼À¸À®Ä
¸ÀÆa¸ÀĪÀÅzÀÄ.
• UÀzÀå ¨sÁUÀUÀ¼À ªÀ¸ÀÄÛ, D±ÀAiÀÄUÀ¼À£ÀÄß ¥Àæ¸ÀÄÛvÀPÉÌ C£Àé¬Ä¹ «ZÁgÀ ªÀÄAqÀ£É, UÀÄA¥ÀÄ ZÀZÉð K¥Àðr¸ÀĪÀÅzÀÄ.
• UÀzÀå ¨sÁUÀUÀ¼À ªÀ¸ÀÄÛ ªÀÄvÀÄÛ D±ÀAiÀÄUÀ¼À£ÀÄß ¸ÀÈd£ÁvÀäPÀªÁV PÀxÁgÀZÀ£É, ¸Áé£ÀĨsÀªÀ PÀxÀ£À, avÀæPÀ¯É, ªÀÄtÂÚ£À
ªÀiÁzÀj, bÁAiÀiÁavÀæ EvÁå¢ ¥ÀæPÀn¸ÀĪÀAvÉ ¸ÀÆa¸ÀĪÀÅzÀÄ.
• ZÀlĪÀnPÉUÀ¼À£ÀÄß «zÁåyðUÀ¼À UÀÄA¥ÀÄUÀ¼À£ÁßV «AUÀr¹ £ÀqɸÀĪÀÅzÀÄ.
• «zÁåyðUÀ¼ÀÄ ¥ÀoÁåzsÁjvÀ ZÀlĪÀnPÉUÀ½UÉ ¸ÀA§A¢ü¹zÀ zÁR¯ÉUÀ¼À£ÀÄß ¸ÀAUÀ滹qÀĪÀAvÉ ¸ÀÆa¸ÀĪÀÅzÀÄ

Unit:3: ¥ÀæªÁ¸À PÀxÀ£À: * ¥ÀæªÁ¸À PÀxÀ£ÀzÀ DAiÀÄÝ ¨sÁUÀUÀ¼À£ÀÄß N¢¸ÀĪÀÅzÀÄ.


• ¨sÁμÁ ªÉʲμÀÖöå UÀÄgÀÄw¸ÀĪÀÅzÀÄ.
• ¥ÀæªÁ¸À PÀxÀ£ÀzÀ D±ÀAiÀĪÀ£ÀÄß ¥Àæ¸ÀÄÛvÀPÉÌ C£Àé¬Ä¹ £ÉÆÃqÀĪÀÅzÀÄ.
• «ZÁgÀ ªÀÄAqÀ£É, UÀÄA¥ÀÄ ZÀZÉð £ÀqɸÀĪÀÅzÀÄ.
• ¥ÀæªÁ¸À PÀxÀ£ÀzÀ £ÁAiÀÄPÀgÀ §zÀÄPÀÄ, ¸Á»wåPÀ ¸ÁzsÀ£É PÀÄjvÀ ªÀiÁ»w ¸ÀAUÀ滸À®Ä ¸ÀÆa¸ÀĪÀÅzÀÄ.
• ¥ÁæzÉòPÀ ¨sÁμÁ ¥Àæ¨sÉÃzÀ £ÀÄrUÀlÄÖ, UÁzÉ EvÁå¢ ¨sÁμÁ ªÉʲμÀÖöåUÀ¼À£ÀÄß UÀÄgÀÄw¸ÀĪÀÅzÀÄ.
• «zÁåyðUÀ¼ÀÄ N¢zÀ E¤ßvÀgÀ ¥ÀæªÁ¸À PÀxÀ£ÀUÀ¼À PÀÄjvÀÄ C©ü¥ÁæAiÀÄ ªÀÄAqÀ£ÉUÉ CªÀPÁ±À
PÀ°à¸ÀĪÀÅzÀÄ.

Unit:4: ¨sÁμÁP˱À®å WÀlPÀ - * ªÀiÁw£À P˱À® ¨É¼É¸ÀĪÀÅzÀÄ.


• ¤gÀÆ¥ÀuÉ, ¨sÁμÀt, ¸ÀA¨sÁμÀuÉ, ZÀZÉð - ¸ÀAªÁzÀ, ¸ÀAzÀ±Àð£ÀUÀ¼À°è CxÀðUÀ滹 ¤gÀÆ¥ÀuÉ, ¨sÁμÀt ºÁUÀÆ
¸ÀA¨sÁμÀuÉ ªÀiÁr¸ÀĪÀÅzÀÄ.
• avÀæ «ªÀıÉð, UÁzÉUÀ¼ÀÄ, ¥Àæ§AzsÀ gÀZÀ£ÉUÀ¼À ªÀiÁr¸ÀĪÀ ªÀÄÆ®PÀ ªÀiÁvÀÄ ªÀÄvÀÄÛ §gÀºÀzÀ ªÀåvÁå¸À
w½¸ÀĪÀÅzÀÄ.
• ¸ÀÈd£À²Ã® ªÀiÁvÀÄUÁjPÉAiÀÄ ªÀÄÆ®PÀ zÉÆÃμÀUÀ¼ÀÄ ªÀÄvÀÄÛ ¤ªÁgÀuÁ G¥ÁAiÀÄUÀ¼À£ÀÄß PÀAqÀÄPÉÆ¼ÀÄîªÀÅzÀÄ.
• PÉüÀÄ«PÉ P˱À® ªÀĺÀvÀé, ®PÀëtUÀ¼ÀÄ, «zsÀUÀ¼ÀÄ, ¸ÀÈd£À²Ã® PÉüÀÄ«PÉ, zÉÆÃμÀUÀ¼ÀÄ ªÀÄvÀÄÛ ¤ªÁgÀuÁ
G¥ÁAiÀÄUÀ¼À£ÀÄß w½¸ÀĪÀÅzÀÄ.
• NzÀĪÀ P˱À® ºÁUÀÆ PÀ°AiÀÄĪÀ D¸ÀQÛ ªÀÄÆr¸ÀĪÀÅzÀÄ.
• §gÀªÀtÂUÉ P˱À® ªÀĺÀvÀé, ®PÀëtUÀ¼ÀÄ, «zsÀUÀ¼ÀÄ, ¸ÀÈd£À²Ã® §gÀªÀtÂUÉ, PÀ£ÀßqÀ §gÀªÀtÂÂUÉAiÀÄ zÉÆÃμÀUÀ¼ÀÄ
ªÀÄvÀÄÛ ¤ªÁgÀuÁ G¥ÁAiÀÄUÀ¼ÀÄ. §gÀªÀtÂUÉ GvÀÛªÀÄ ¥Àr¸ÀĪÀ «zsÁ£ÀUÀ¼À£ÀÄß w½¸ÀĪÀÅzÀÄ.

Unit:5: ªÁåPÀgÀt:
• ²μÀÖ¨sÁμÉAiÀÄ ªÁåPÀgÀt eÁÕ£ÀªÀ£ÀÄß ¨É¼É¸ÀĪÀÅzÀÄ.
• ¨sÁμÁ §¼ÀPÉAiÀÄ ªÉÊ«zsÀåvÉAiÀÄ£ÀÄß w½¸ÀĪÀÅzÀÄ.
• §gÀªÀtÂUÉAiÀÄ P˱À®åªÀ£ÀÄß ¨É¼É¸ÀĪÀÅzÀÄ.
• PÀæªÀħzÀÞªÁV N¢¸ÀĪÀÅzÀÄ
• PÁªÀåUÀ¼À ¨sÁUÀUÀ¼À£ÀÄß ¤Ãr C°ègÀĪÀ ªÁåPÀgÀuÁA±ÀUÀ¼À£ÀÄß UÀÄgÀÄw¸À®Ä w½¸ÀĪÀÅzÀÄ
• ¸ÀA¢ü ªÀÄvÀÄÛ ¸ÀªÀiÁ¸À ¥ÀzÀUÀ¼À £ÀqÀĪÀt ªÀåvÁå¸ÀUÀ¼À£ÀÄß ¥ÀnÖ ªÀiÁr¸ÀĪÀÅzÀÄ
• PÀ£ÀßqÀ ªÁåPÀgÀtPÁgÀgÀ §zÀÄPÀÄ-§gÀºÀ PÀÄjvÀÄ «ZÁgÀ UÉÆÃ¶× K¥Àðr¸ÀĪÀÅzÀÄ.
• ¥ÀzÀ§AzsÀUÀ¼ÀÄ, ªÁPÀåUÀ¼À£ÀÄß gÀa¸À®Ä ªÀÄvÀÄÛ ©r¸À®Ä ¸ÀÆa¸ÀĪÀÅzÀÄ.
• ªÁåPÀgÀtzÀ ¸ÀjgÀÆ¥ÀªÀ£ÀÄß w½¸ÀĪÀ ZÀlĪÀnPÉUÀ¼À£ÀÄß £ÀqɸÀĪÀÅzÀÄ
JSS Science and Technology University, Mysuru

Department of Computer Applications


I Semester Bachelor of Computer Applications [BCA]
Course Category Code: L-2 Course Category Name: Languages-2
Couse Code: BCA160 Course Title: English Language 2
Total Credits: 03 Credit Structure (L:T:P): 3:1:0
Total Hours: 36 Max. Marks: 100
Course Outcomes:

Upon successful completion of this course, students will be able to

CO 1: Understanding of the Grammar & Vocabulary.


CO 2: Understanding of the Functional English
CO 3: Understanding of the Poetry.
CO 4: Understanding of the Prose-Short stories.

Unit:1: 07 hours

Grammar & Vocabulary:


1. Parts of speech: Noun, Pronoun, Adjective, Verb, Adverb, Preposition, Conjunction and
Interjection.
2. Articles
3. Verbs in relation to Tenses
4. Usage of Prepositions, Adjectives
5. Reading Comprehension of unseen passages, reading tracts.

Unit:2: 07 hours

Functional English:
1. Vocabulary Usage: Homonyms, homographs, homophones, prefixes, suffixes
2. Paragraph writing, Essay writing
3 Expansion of ideas, proverbs
4. Words often confused
5. Group discussion, extempore speech, debates

Unit:3: 06 hours

Poetry:
1. Where the mind is without fear- Rabindranath Tagore
2. I wandered lonely as a cloud- William Wordsworth
3. The Darling Thrush by Thomas Hardy.

Unit:4: 10 hours
Prose-Short stories:
1. With the photographer- Stephen Leacock
2: A snake in the grass- R.K.Narayan
3. The Clay mother-in-law. A South Indian Folktale (collected by A.K. Ramanujan)
Unit:5: Sonnets 06 hours

1. When in Disgrace by William Shakespeare.


2. When I Have Fears by None Keats.
3. How do I Love Thee by Elizabeth Barrett Browning

Text Books:

1. With the photographer- Stephen Leacock


2: A snake in the grass- R.K.Narayan
3. The Clay mother-in-law. A South Indian Folktale (collected by A.K. Ramanujan)

Reference Books:

1. English Grammar and Composition – Wren and Martin.


2. Contemporary English Grammar – Jayanthi Dakshina Murthy.
JSS Science and Technology University, Mysuru

Department of Computer Applications


I Semester Bachelor of Computer Applications [BCA]
Course Category
Course Category Code: SEC-1 Skill based-1
Title:
Computer Concepts
Course Code: BCA170 Course Title:
&Tools
Credit Structure
Total Credits: 02 2:0:0
(L:T:P):
Total Hours: 26 Max. Marks: 50

Course Outcomes:

CO1: Analyze the computer basics, processes and devices used with computers
CO2: Discern operations of computers and importance of hardware components
CO3: Apply the concept of Problem solving and steps involved for algorithm development
CO4: Getting used to business communications tools
CO5: Knowing usage of internet applications

Unit:1 Introduction to Computers 8 Hours

History of development of Computers Computer as multipurpose tool -Overview of the


Computer system — looking inside the machine - Software brings machine to life - shapes of
Computer today .Processing Data : Transforming data into information - How a Computer
processes data - factors affecting processing speed - CPU's used in personal Computers.
Interacting with Computer :The Keyboard - the mouse - other input devices - The monitor -
Printers - Sound systems

Unit:2: Connecting I/O devices 7 Hours


Connecting I/O devices to the Computer. Storing information in a Computer: Types of storage
devices - Magnetic storage devices, Optical Storage devices, measuring device performance.

Unit:3: Operating System and the user interface 7 Hours

What is an Operating System - the use interface - running programs - managing files -
managing hardware - Enhancing the operating system with utility Software - typical operating
systems in use

Unit:4: Introduction to Business Communication Tools 7 Hours


Introduction to Business Communication Tools [MS-Word: Introduction, Starting MS-Word,
MS-Word Screen and its Components, Elementary Working with MS-Word.MS-Excel:
Introduction, Starting MS-Excel, Basics of Spreadsheet, MS-Excel Screen and Its
Components, Elementary Working with MS-Excel.MS-PowerPoint: Introduction, Starting MS-
PowerPoint, Basics of PowerPoint, MS-PowerPoint Screen and Its Components, Elementary
Working with MS PowerPoint Applications in windows (Paint, Notepad, WordPad, Calculator).
Unit:5: Internet and Internet application 7 Hours
Introduction, Internet evolution Working of Internet, Use of Internet Overview of World Wide
Web (Web Server and Client) Introduction to Search engine and Searching the Web
Downloading files Introduction to Web Browsers Working with E-mail (creation and use of the
same).Introduction To Web page Design Introduction to Web design, Types of Web Pages
Web design Pyramid Building
web sites Web development process model.

Text Books:
1. Computer Fundamentals - P K Sinha,BPB
2. Computers Today - Suresh K Basandra, Galgotia. Maureen Sprankle, Problem solving
and Programming Concepts, Pearson Education, New Delhi.
3. Anupamjain ,NavneetMehra : Computer Fundamentals MS-Office, Vitasta Publishers pvt
ltd, 2015.
4. RizwanAhmed : Internet and its applications, Margham Publications , 2015.
Reference Books:
1. Introduction to Computers - N Subramanian,TMH
2. Understanding Computers - R Rajagopalan. TMH
3. Computers Today - Donald Sanders, MGH

Additional Learning Resources:


1. https://www.tutorialspoint.com/
2. http://nptel.ac.in/

Laboratory Details:
Introductory session : Demonstration of computer and its peripherals
1. Using Ms-Word with suitable examples, write the steps and execute the following with
respect to table handling
a. Creating a table (At least 4 Columns and 6 Rows).
b. Entering appropriate data into the table.
c. Sort the table.
d. Apply the formulas on table numeric values.
2. Using Ms-Word, write the steps and execute for creating “Mail Merge” document for
“FORM LETTERS”.
3. Using Ms-Excel spread sheet, with suitable example, write steps and create worksheet
called “Employee” and calculate the following using formulas
a. Enter Employee Code, Name and Basic Salary.
b. Calculate DA (20% of Basic Salary).
c. Calculate HRA (10% of Basic Salary).
d. Calculate CCA (8.5% of Basic Salary).
e. Calculate Total Salary (Basic Salary + DA + HRA + CCA)
f. Calculate Deductions (10% of Total Salary).
g. Calculate Net Salary (Total Salary – Deductions).
4..Using Ms-Excel spread sheet write the steps and execute the following:

Roll Stud Marks1 Marks2 Mark3 Total Percentage Result


No Name

a. Create appropriate records


b. Calculate total and marks using formula.
c. Update result column using IF function. (Result: Distinction, First Class,
Second Class, Pass, Fail).
5. Using Ms-Access with suitable examples write steps and execute the following.
a. Create STUDENT database table.
b. Create appropriate records.
c. Add two more records to the table.
d. Delete 2nd record to the table.
e. View the records.
6. Using Ms-PowerPoint with suitable examples write steps and execute the following:
a. Create presentation slides with Titles, Sub Titles and Charts choosing different
slide layouts.
b. Use Design templates for background.
c. Format the slide design.
7.Using Ms-PowerPoint with suitable examples write steps and execute the following:
a. Create presentation table slides using an organization chart.
b. Use different views such as slide view, slide sorter view and slide show view.
JSS Science and Technology University, Mysuru

Department of Computer Applications


I Semester Bachelor of Computer Applications [BCA]
Course Category Code: VB-1 Course Category Value Based-1
Fundamental of Emotional
Course Code: BCA180 Course Title:
Intelligence
Total Credits: 02 (L:T:P): 1:0:2

Total Hours: 52 Max Marks: 50

Course Outcomes:
CO1: Understand the basics of Emotional Intelligence & Behaviour
CO2: Understand Building blocks of Emotional Intelligence
CO3: Understand the impact and aspects of Emotional Intelligence

Unit:1: 10 Hours

Introduction to Emotional Intelligence: What is EI, EQ & IQ Historical Roots of Multiple


Intelligences & EI, Power of Emotions, The Emotional Brain & Amigdala Hijack, Physiology of
Emotions, and Application of Physiology of Emotions.

Measuring Emotional Intelligence & Behavioral EQ: Initial Self-Assessment on EI


Elements (Internal), 360 degree Assessment Map, EI Behavioral Test (External), Behavioral
EQ , Measuring Behavior EQ, DISC Test, Role Play on DISC Behavior Identification books.

Unit:2: 8 Hours

Building Blocks of Emotional Intelligence : Ability Based Model (Mayer & Salovey) ,
Perception ,Employment , Comprehension, Management, Trait Model of Self-Efficacy (K.V.
Petrides) Mixed Model (Daniel Goleman) Personal Competence (Self Awareness, Self-
Management & Motivation) Social Competence (Empathy & Social Skills) Empathy
Understanding Empathy Importance of Empathy Application of Self-Efficacy of EI.

Unit: 3: 8 Hours

Aspects and Impacts of fundamental elements of Emotional Intelligence: Seven


Elements defined in Behavioral terms: Self Awareness Emotional Resilience Motivation
Interpersonal Sensitivity Influence Intuitiveness Conscientiousness Five Elements defined
in Competence terms: Self Awareness Self-Management Self-Motivation Empathy Social
Skills Application of Impact of fundamental elements of EI in our daily life Everyday Behavior
Education Workplace Case Study Discussion with Role Plays.

Text Books:

1. Working with Emotional Intelligence: Bloomsbury Publication Daniel Goleman


(1998).
2. Games People Play: The Basic Handbook of TA: Eric Berne (1964)
Reference Books:

1. The Language of Emotional Intelligence: The Five Essential Tools for Building
Powerful and Effective Relationships: Jeanne Segal 45 15 (2008).
2. The Brain and Emotional Intelligence: New Insights :Daniel Goleman HBR's 10
Must Reads on Emotional Intelligence (2015)
Additional Learning Resources: 26 Hours

1. http://www.amazon.com/Emotional-Intelligence-2-0-Travis
Bradberry/dp/0974320625/ref=sr_1_4?s=books&ie=UTF8&qid=1328548324&sr=1-4.
2. http://www.amazon.com/EQ-Difference-Powerful-Emotional-
Intelligence/dp/0814408443/ref=cm_lmf_tit_6.
3. http://www.amazon.com/Language-Emotional-Intelligence-Essential-
Relationships/dp/0071544550/ref=cm_lmf_tit_24.
4. http://www.amazon.com/Building-Emotional-Intelligence-Techniques-
Cultivate/dp/1591797896/ref=sr_1_9?s=books&ie=UTF8&qid=1328548324&sr=1-9.

Laboratory Details:
Emotional intelligence activities and exercises are attempts to build, develop, and maintain
one’s emotional intelligence, often called EI or EQ for Emotional Quotient.
1. 7 Emotional Intelligence Activities:

 The ability to recognize own emotions


 The ability to relate to others’ emotions
 The ability to actively listen to others
 The ability to actively participate in interpersonal communication and understand the
nonverbal cues of behaviour
 The ability to control one’s thoughts and feelings
 The ability to effectively manage emotions and express them in a socially acceptable
way
 The ability to receive criticisms positively and benefit from them
 The power to forgive, forget, and move on rationally

2. Exercises for Developing and Improving EI


 Emotional Intelligence Assessment for Leaders.
 Temperament Analysis
 Be the Fog (Regulate Your Emotions)

3. 6 EQ Worksheets
 Giving Feedback: Improving Your Self-Awareness.

 Self-Awareness Activity

 Social Awareness Activity

 Relationship Management Activity

 Self-Management Activity
 Name Game
4. Tips for Enhancing Your Own Emotional Intelligence
5. 5 Online Courses for EI.
JSS Science and Technology University, Mysuru

Department of Computer Applications


I Semester Bachelor of Computer Applications [BCA]
Course Category Code: DSC-1 Course Category Name: Discipline Core-1
Programming Language
Course Code: BCA11L Course Title:
Laboratory
Total Credits: 01 Credit Structure (L:T:P): 0:0:2
Total Hours: 32 Max. Marks: 50

Course Outcomes:

CO 1: Gain fundamental knowledge on basic programming aspects and storage


classes.
CO 2: Understand the basic terminologies used in computer programming, write,
compile and debug programs in C language.
CO 3: Use different data types in a computer program.
CO 4: Design programs involving decision structures, loops and functions.
CO 5: Understand and use the dynamics of memory by the use of pointers.

List of Experiments:

1. C program to accept radius and to find area of a circle.


2. C program to check whether the given number is odd or even.
3. C program to exchange values of two variable using a temporary variable.
4. C program to print ASCII code for the given character.
5. C program for given two numbers to perform arithmetic operations using switch
statement.
6. C program to find biggest of three number using nested if statement.
7. C program to find biggest of three number using ladder if statement or else if
statement.
8. C program to find sum of the S=1+2+3+…………+n series by indirect method using
looping statement
9. C program to find sum of the S=2+4+6+………….+n series by indirect method using
looping statement
10. C program to generate prime numbers using for loop
11. C program to check whether the given number is prime or not.
12. C program to convert binary number to decimal number.
13. C program to find the roots of the quadratic equation using else if statement.
14. C program to find the reverse of the given number. Also sum & count the number of
digits and check whether the given number is palindrome or not palindrome.
15. C program to find largest and smallest of n numbers
16. C program to search given number using linear search technique
17. C program to accept two square matrix of square order. To find sum of two matrix
18. C program to print difference or subtraction of two matrices.
19. C program to accept two matrices of order m*n and p*q. to find product of two matrix
using function
20. C program to check whether given number is Fibonacci or not.
21. C program to check whether the given number is factorial or not
22. C program to accept m*n matrix. To find trace and norm of square matrix. to print
principle diagonal elements
23. C program to accept m*n matrix to find sum of upper diagonal and lower diagonal
elements.
24. C program to find factorial of a number using recursive function
25. C program to find NCR and NPR using function.

26. C program to display transpose of given m*n matrix using function


27. C program to swap two numbers using function and pointers
28. C program to accept an employee information and display the same using structure
29. C program to create simple marks card assuming appropriate condition
30. C program to read and write information of an employee using a file.

Text Books:

1. Programming in ANSI C, Third Edition, E.Balaguruswamy. 6th Edition (2013)


2. The C Programming Language, Brian W Kernighan, Dennis M Ritchie, PHI, 2 nd Edition.

Reference Books:

1. Let us C, 4th Edition, Yashwanthkanetkar.


2. Programming with C, Byron Gottfried, Tata McGraw-Hill edition.

Additional Learning Resources:

1. http://www.worldbestlearningcenter.com/index_files/c_tutorial_lesson.htm
2.http://www.cluster2.hostgator.co.in/files/writeable/uploads/hostgator99706/file/letusc-
yashwantkanetkar.pdf
JSS Science and Technology University, Mysuru

Department of Computer Applications


I Semester Bachelor of Computer Applications [BCA]
Course Category Code: SEC-1 Course Category Title: Skill based-1
Computer Concepts
Course Code: BCA17L Course Title:
&Tools Laboratory
Total Credits: 01 (L:T:P): 0:0:2

Total Hours: 32 Max. Marks: 50

Course Outcomes:

CO1: Analyze the computer basics, processes and devices used with computers
CO2: Discern operations of computers and importance of hardware components
CO3: Apply the concept of Problem solving and steps involved for algorithm development
CO4: Getting used to business communications tools
CO5: Knowing usage of internet applications

Introductory session : Demonstration of computer and its peripherals


1. Using Ms-Word with suitable examples, write the steps and execute the following with
respect to table handling
a. Creating a table (At least 4 Columns and 6 Rows).
b. Entering appropriate data into the table.
c. Sort the table.
d. Apply the formulas on table numeric values.
2. Using Ms-Word, write the steps and execute for creating “Mail Merge” document for
“FORM LETTERS”.
3. Using Ms-Excel spread sheet, with suitable example, write steps and create worksheet
called “Employee” and calculate the following using formulas
a. Enter Employee Code, Name and Basic Salary.
b. Calculate DA (20% of Basic Salary).
c. Calculate HRA (10% of Basic Salary).
d. Calculate CCA (8.5% of Basic Salary).
e. Calculate Total Salary (Basic Salary + DA + HRA + CCA)
f. Calculate Deductions (10% of Total Salary).
g. Calculate Net Salary (Total Salary – Deductions).
4..Using Ms-Excel spread sheet write the steps and execute the following:

Roll Stud Marks1 Marks2 Mark3 Total Percentage Result


No Name

a. Create appropriate records


b. Calculate total and marks using formula.
c. Update result column using IF function. (Result: Distinction, First Class,
Second Class, Pass, Fail).
5. Using Ms-Access with suitable examples write steps and execute the following.
a. Create STUDENT database table.
b. Create appropriate records.
c. Add two more records to the table.
d. Delete 2nd record to the table.
e. View the records.
6. Using Ms-PowerPoint with suitable examples write steps and execute the following:
a. Create presentation slides with Titles, Sub Titles and Charts choosing
different slide layouts.
b. Use Design templates for background.
c. Format the slide design.
7.Using Ms-PowerPoint with suitable examples write steps and execute the following:
a. Create presentation table slides using an organization chart.
b. Use different views such as slide view, slide sorter view and slide show
view.
Text Books:
1. Computer Fundamentals - P K Sinha,BPB
2. Computers Today - Suresh K Basandra, Galgotia. Maureen Sprankle, Problem
solving and Programming Concepts, Pearson Education, New Delhi.
3. Anupamjain ,NavneetMehra : Computer Fundamentals MS-Office, Vitasta Publishers
pvt ltd, 2015.
4. RizwanAhmed : Internet and its applications, Margham Publications , 2015.

Reference Books:
1. Introduction to Computers - N Subramanian,TMH
2. Understanding Computers - R Rajagopalan. TMH
3. Computers Today - Donald Sanders, MGH

Additional Learning Resources:


1. https://www.tutorialspoint.com/
2. http://nptel.ac.in/
II Semester
JSS Science and Technology University, Mysuru

Department of Computer Applications


II Semester Bachelor of Computer Applications [BCA]
Course Category Code: DSC-4 Course Category Discipline Core-4
Object oriented Programming
Course Code: BCA210 Course Title:
with C++
Total Credits: 03 (L:T:P): 3:0:0

Total Hours: 40 Max Marks: 100

Course Outcomes:
CO1: Understand the features of C++ supporting object oriented programming
CO2: Understand the relative merits of C++ as an object oriented programming language
CO3: Understand how to produce object-oriented software using C++
CO4: Understand how to apply the major object-oriented concepts to implement object
oriented Programs in C++, encapsulation, inheritance and polymorphism.

Unit: 1: 08 Hours

Introduction: Concepts of Object-oriented programming, Structure of C++ program.


Fundamentals: Tokens, Keywords, Identifiers and constants, Basic Data Types, User-defined
data types, Derived data Types, Symbolic constants, Type compatibility, Declaration of
variables, Dynamic initialization of variables, Reference variables, Operators in C++, Scope
resolution operator, Member dereferencing operators, Memory management operators,
Manipulators, Type cast operator, Expressions and their types, Special assignment
expressions, Implicit conversions, Operator overloading, Operator precedence, Control
structures.

Unit:2: 08 Hours

Functions: The main function, Function prototyping, Call by Reference, Return by Reference,
Inline functions, Default arguments, const arguments, Function overloading, Friend function.

Unit: 3: 08 Hours

Classes and Objects: Specifying a Class, Defining member functions, Making an Outside
function Inline, Nesting of member functions, Private member functions, Arrays within a Class,
Static data members, Static member functions, Arrays of Objects, Objects as function
arguments, friendly functions, Returning Objects, const member functions, Pointers to
members.

Unit:4: 08 Hours
Constructors and Destructors: Constructors, Parameterized constructors, Multiple
constructors in a class, Constructors with default arguments, Dynamic initialization of objects,
Dynamic constructor, Constructing Two-dimensional arrays, Destructors.
Operator Overloading and Type Conversions: Defining operator overloading, Overloading
unary operators, Overloading Binary operators, Rules for overloading operators, Type
conversions.

Unit:5: 08 Hours
Inheritance and Polymorphism: Programming concepts and types. Console I/O Operations:
C++ streams, C++ stream classes, Unformatted I/O operations, Formatted I/O operations,
managing output with manipulators.

Text Books:

1. Object Oriented Programming with C++ - E. Balagurusamy

Reference Books:

1. OOPS and C++ by Robert Lafore.


2. C++ by Stephen Prata.
3. Teach yourself C++ by Al Stevens.
4. C++ Primer by Stanley B Lippman

Additional Learning Resources:

1. www.tutorialspoint.com
2. www.geeksforgeeks.org
3. www.Javatpoint.com
4. www.begineersbook.com
JSS Science and Technology University, Mysuru

Department of Computer Applications


II Semester Bachelor of Computer Applications [BCA]
Course Category Code: DSC-5 Course Category Name: Discipline Core-5
Course Code: BCA220 Course Title: Data Structures
Total Credits: 03 Credit Structure (L:T:P): 2:1:0
Total Hours: 36 Max. Marks: 100
Course Outcomes:
Upon successful completion of this course, students will be able to,
CO1: Defined data types including structures and unions and solve the problems.
CO2: Understand pointers and to allocate memory using dynamic memory management
function.
CO3: Understand about writing algorithms and step by step approach in solving problems with
the help of fundamental data structures.
CO4: Introduce the concept of data structures through ADT including List, Stack, and Queues.
CO5: Implement non-linear data structures using trees.
Unit:1: Introduction to Data Structures & Stack 8 Hours

Definition, Applications, Classification of data structures: primitive and non-primitive,


Operations on data structures Definition, Array Implementation of stack and operations on
stack, Applications of stacks, Infix, prefix and postfix notations, Conversion of an arithmetic
expression from Infix to postfix.

Unit:2: Structure and Pointer 8 Hours

Structure definition, giving values to members, structure initialization, Understanding pointers,


accessing the address of variables, Declaring and initializing pointers, accessing a variable
through its Pointer. Dynamic memory allocation: Meaning of static and dynamic memory
allocation. Memory allocation functions: malloc(), calloc(), free() and realloc().

Unit:3: Queue and Recursion 8 Hours

Definition, Types of queue: Linear queue, circular queue, double ended queue, priority queue,
Array Implementations of queue and operations on all types of queues. Definition, Recursion
in C – Fibonacci, GCD.

Unit:4: Linked list 8 Hours

Definition, components of linked list, Representation of linked list, Advantages and


disadvantages of linked list, Types of linked list: singly linked list, doubly linked list, and
Circular list, operations on all types of linked lists: Creation, insertion, deletion, search and
display.

Unit:5: Non Linear Data Structures Tree 8 Hours

Definition: Tree, Binary tree, complete binary tree, Binary search tree, Tree terminology: root,
Node, Degree of a node, ancestors of a node, Binary tree, Array representation of tree,
Creation of Binary tree.

Text Books:

1. An Introduction to Data Structures with Applications 2nd edition - J.P.Trembly and


Sorenson, McGraw Hill 2001.

2. Data structures using C & C++ by YedidyahLangsun, Moshe J Augenstein, Teneinbaum


published by Prentice Hall of India Ltd.

Reference Books

1. Algorithms + Data Structures = Programs by Niklaus Wirth Prentice Hall 1976.


2. Data structures and algorithms by Aho, A.V.,Hopcroft and Ullman,J.E., Addison Wesley,
1980.
3. Fundamentals of data structures by Horowitze,E and Sahni,S., Galgotia bookstore.

Additional Learning Resources:

1.http://www.tutorialspoint.com/Data-Structures-in-C-Online-Training/classid=13
2. http://nptel.ac.in/datastructures_c

Tutorial Details: 12 Hours

 Implementation of Stack and its operations


 Infix to postfix expression conversion
 Implementation of Queue and its operations
 Demonstration of Recursion for Fibonacci series and GCD problems.
 Implementation of different types of Linked lists and its operations.
 Demonstration of Binary Search Tree concept.

Laboratory Details: Not Applicable
JSS Science and Technology University, Mysuru

Department of Computer Applications


II Semester Bachelor of Computer Applications [BCA]
Course Category Code: OE-2 Course Category Open Elective-2
Course Code: BCA230 Course Title: E-Commerce Applications
Total Credits: 03 (L:T:P): 3:0:0

Total Hours: 40 Max Marks: 100

Course Outcomes:
CO1: Understand the basics of E-Commerce and its technicalities
CO2: Understand the importance of E-Commerce for consumers
CO3: Understand the details of Electronic data interchange
CO4: Understand the security aspects in E-Commerce
CO5: Know the issues with E-Commerce
Unit: 1:E-commerce and its Technological Aspects 08 Hours

Overview of developments in Information Technology and Defining E-Commerce: The scope of


E commerce, Electronic Market, Electronic Data Interchange, Internet Commerce, Benefits and
limitations of E-Commerce, Produce a generic framework for E-Commerce, Architectural
framework of Electronic Commerce, Web based E Commerce Architecture..

Unit:2: Consumer Oriented E Commerce 08 Hours

E-Retailing: Traditional retailing and e retailing, Benefits of e retailing, Key success factors,
Models of e-retailing, Features of e retailing. E services: Categories of e-services, Web-
enabled services, and matchmaking services, Information-selling on the web, e entertainment,
Auctions and other specialized services. Business to Business Electronic Commerce

Unit: 3: Electronic Data Interchange 08 Hours

Benefits of EDI, EDI technology, EDI standards, EDI communications, EDI Implementation,
EDI Agreements, EDI Security. Electronic Payment Systems, Need of Electronic Payment
System: Study and examine the use of Electronic Payment system and the protocols used,
Study Electronic Fund Transfer and secure electronic transaction protocol for credit card
payment. Digital economy: Identify the methods of payments on the net – Electronic Cash,
cheques and credit cards on the Internet.

Unit:4: Security in E Commerce 08 Hours


Understanding Ethical, Social and Political issues in E-Commerce: A model for Organizing the
issues, Basic Ethical Concepts, Analyzing Ethical Dilemmas, Candidate Ethical principles
Privacy and Information Rights: Information collected at E-Commerce Websites, The Concept
of Privacy, Legal protections Intellectual Property Rights: Types of Intellectual Property
protection, Governance.
Unit:5: Issues in E Commerce 08 Hours
Understanding Ethical, Social and Political issues in E-Commerce: A model for Organizing the
issues, Basic Ethical Concepts, Analyzing Ethical Dilemmas, Candidate Ethical principles
Privacy and Information Rights: Information collected at E-Commerce Websites, The Concept
of Privacy, Legal protections Intellectual Property Rights: Types of Intellectual Property
protection, Governance.

Text Books:

1. Elias. M. Awad, " Electronic Commerce", Prentice-Hall of India Pvt Ltd.


2. RaviKalakota, Andrew B. Whinston, "Electronic Commerce-A Manager's guide", Addison-
Wesley

Reference Books:

1. Efraim Turban, Jae Lee, David King, H.Michael Chung, “Electronic Commerce–A
ManagerialPerspective", Addison-Wesley.
2. Elias M Award, “Electronic Commerce from Vision to Fulfilment”, 3rd Edition, PHI,
3. Judy Strauss, Adel El-Ansary, Raymond Frost, “E-Marketing”, 3RDEdition, Pearson
Education.
Additional Learning Resources:

1. https://www.tutorialspoint.com/e_commerce/index.htm
2. https://blog.templatetoaster.com/what-is-ecommerce/
3. https://www.wisdomjobs.com/e-university/e-commerce-concepts-tutorial-7/
introduction-to-e-commerce-11845.html
S Science and Technology University, Mysuru

Department of Computer Applications


II Semester Bachelor of Computer Applications [BCA]
Course Category Code: DSE-1 Course Category Name: Discipline Elective-1
Course Code: BCA241 Course Title: Business Systems
Total Credits: 03 Credit Structure (L:T:P): 3:0:0
Total Hours: 40 Max. Marks: 100

Course Outcomes:

Upon successful completion of this course, students will have the ability to,
CO1: Understand the concepts of business, and information system for business.
CO2: Adopt of Information Technology in business for effective management of activities.
CO3: Develop Business and Corresponding IT strategies.
CO4: Design appropriate Business / IT solutions as per the business requirement
CO5: Understand the concepts of functional business systems

Unit:1 8 Hours

Information Systems in Business: The Fundamental Roles of IS in Business, Trends in


Information Systems, The Role of e-Business in Business, Types of Information Systems -
Operations Support Systems, Management Support Systems, Other Classifications of
Information Systems.

Unit:2 8 Hours

Information Technology in Business: Managerial Challenges of Information Technology,


Components of Information Systems, Information System Resources, Information System
Activities, Recognizing Information Systems.

Unit:3: 8 Hours

Developing Business/IT Strategiess: Planning Fundamentals, Organizational Planning- The


Scenario Approach, SWOT Analysis, Business Models and Planning, Business/IT
Architecture Planning, Identifying Business/IT Strategies, Business Application Planning,
Change Management.

Unit:4: 8 Hours

Designing Business/IT Solutions: Introduction, Cross-Functional Enterprise Applications,


Enterprise Application Integration, Transaction Processing Systems, Enterprise Collaboration
Systems.

Unit:5: 8 Hours

Functional business systems : IT in business, Marketing systems, Manufacturing systems,


Human resource systems, Accounting systems, Financial management systems.
Text Books:

1. Management Information Systems, James A O’Brien, Greorge M Marakas, RemeshBehl,


Tenth Edition, McGraw Hill Publications

Reference Books:

1. Management Information Systems By Waman S Jawadekar, 4 th Edition, McGraw Hill


Publications

Additional Learning Resources:

1. https://freevideolectures.com/course/2687/management-information-system
2. https://www.tutorialspoint.com/management_information_system/index.htm
JSS Science and Technology University, Mysuru

Department of Computer Applications


II Semester Bachelor Computer Applications [BCA]
Course Category Code: DSE-1 Course Category Name: Discipline Elective-1
Enterprise Resource
Course Code: BCA242 Course Title:
Planning
Total Credits: 03 Credit Structure (L:T:P): 3:0:0
Total Hours: 40 Max. Marks: 100

Course Outcomes:
Upon successful completion of this course, students will have the ability to,
CO1: Understand the concept of ERP and benefits.
CO2: Understand the related technologies of ERP.
CO3: Understand the ERP implementation concepts.
CO4: Understand the different business models required of ERP
CO5: Understand the importance and future developments of ERP.

Unit:1 6 Hours

Introduction To ERP Overview, Benefits of ERP, ERP and Related Technologies.

Unit:2 8 Hours

ERP Implementation: Implementation of Life Cycle, Implementation Methodology, Hidden


Costs, Organizing Implementation, Vendors, Consultants and Users, Contracts, Project
Management and Monitoring

Unit:3 9Hours

Business Modules: Business Modules in an ERP Package, Finance, Manufacturing, Human


Resource, Plant Maintenance, Materials Management, Quality Management, Sales
and Distribution

Unit:4: 9 Hours

ERP Market: ERP Market Place, SAP AG, People Soft, Baan Company, JD Edwards
World Solutions Company, Oracle Corporation, QAD , System Software Associates.

Unit:5: 8 Hours

ERP–Present And Future : Turbo Charge the ERP System, EIA, ERP and E–Commerce,
ERP and Internet, Future Directions in ERP

Text Books:
1. Alexis Leon, “ERP Demystified”, Tata McGraw Hill, 1999.
2. Joseph A. Brady, Ellen F. Monk, Bret J. Wangner, “Concepts in Enterprise Resource
Planning”, Thomson Learning, 2001

Reference Books:

2. Vinod Kumar Garg and N.K .Venkata Krishnan, “Enterprise Resource Planning concepts
and Planning”, Prentice Hall, 1998.
3. Jose Antonio Fernandz, “ The SAP R /3 Hand book”, Tata McGraw Hill

Additional Learning Resources:

1. www.scribesoft.com/ebook-the_business_case_for_integrating_erp
2. www.deltek.co.uk /erp
JSS Science and Technology University, Mysuru

Department of Computer Applications

II Semester Bachelor of Computer Applications [BCA]

Course Category Code: L-3 Course Category Name: Languages-2

Couse Code: BCA250 Course Title: Kannada-2

Total Credits: 03 Credit Structure (L:T:P): 3:1:0

Total Hours: 36 Max. Marks: 100

Course Outcomes: -
1. ªÉÊAiÀÄQÛPÀ ªÀÄvÀÄÛ ¸ÁªÀiÁfPÀ ªÀiË®åUÀ¼À CjªÀÅ.
2. ¸ÀA¸ÁÌgÀªÀAvÀ fêÀ£À ¦æÃwAiÀÄ w½ªÀÅ.
3. ¸ÀAªÀºÀ£À P˱À®åzÀ ªÀÈ¢Þ
4. ²µÀÖ ¨sÁµÉAiÀÄ ªÁåPÀgÀt eÁÕ£À
5. ¥ÀzÀå gÀZÀ£Á PÀæªÀÄzÀ°è bÀAzÀ¹ì£À §¼ÀPÉAiÀÄ CjªÀÅ.

Unit:1: PÁªÀå ¨sÁUÀ : 07 Hours


1. ªÀZÀ£ÀUÀ¼ÀÄ: §¸ÀªÀtÚ, C®èªÀÄ¥Àæ¨sÀÄ, CPÀ̪ÀĺÁzÉë
2. ¸ÀªÀðdÕ£À wæ¥À¢UÀ¼ÀÄ
3. r«f CªÀgÀ ªÀÄAPÀÄwªÀÄä£À PÀUÀÎ

Unit:2: £ÁlPÀ: vÁ½ÃPÀmÉÆÖÃPÀÆÌ°Ã£ÉÃ? - n.¦. PÉʯÁ¸ÀA 08 Hours

Unit:3: ¨sÁµÁP˱À®å: 07 Hours


1. ¸ÀAªÀºÀ£À ªÀiÁzsÀåªÀÄ-O¥ÀZÁjPÀ ªÀÄvÀÄÛ C£Ë¥ÀZÁjPÀ C©üªÀåQÛ,
2. ¥ÀvÀæ ªÀåªÀºÁgÀ-¸ÀégÀÆ¥À, ®PÀët ªÀÄvÀÄÛ «zsÀUÀ¼ÀÄ: ªÀiÁzÀj ¥ÀvÀæUÀ¼ÀÄ: DqÀ½vÀ/¸ÀPÁðj ¥ÀvÀæUÀ¼ÀÄ
¥ÀvÀæUÀ¼ÀÄ ,SÁ¸ÀV/ªÉÊAiÀÄQÛPÀ ¥ÀvÀæUÀ¼ÀÄ, ªÁtÂdå ªÀåªÀºÁgÀ ¥ÀvÀæUÀ¼ÀÄ EvÁå¢, ¸ÀAPÉëÃ¥À ¯ÉÃR£À,
¤gÀÆ¥ÀuÉ, ¨sÁµÁ C£ÀĪÁzÀ.

Unit:4: ªÁåPÀgÀt: 07 Hours


°AUÀ, ªÀZÀ£À, «¨sÀQÛ, QæAiÀiÁ¥ÀzÀ, ¸ÀªÀiÁ¸ÀUÀ¼ÀÄ, CªÀåAiÀÄUÀ¼ÀÄ

Unit:5: bÀAzÀ¸ÀÄì: 07 Hours


bÀAzÀ¹ì£À UÀÄt ¸ÀégÀÆ¥À, ¥ÀæªÀÄÄR CA±ÀUÀ¼ÀÄ: ¥ÁzÀ, ªÀiÁvÉæ, UÀt, ¥Áæ¸À, AiÀÄw,
ªÀtðUÀt-ªÀiÁvÁæUÀt-CA±ÀUÀtUÀ¼ÀÄ.

Text Books:
1. ªÉÄʸÀÆgÀÄ «±Àé«zÁ央AiÀÄzÀ PÀ£ÀßqÀ ¥ÀoÀå¥ÀĸÀÛPÀUÀ¼ÀÄ
2. £ÁlPÀ- vÁ½ÃPÀmÉÆÖÃPÀÆÌ°Ã£ÉÃ?-n.¦. PÉʯÁ¸ÀA
3. ªÀZÀ£ÀUÀ¼À ¥ÀĸÀÛPÀUÀ¼ÀÄ
4. ªÀÄAPÀÄwªÀÄä£À PÀUÀÎ -r«f
5. bÀAzÀ¸ÀÄì
6. ªÁåPÀgÀt

Reference Books:
¸ÀàzsÁðvÀäPÀ ¥ÀjÃPÉëUÀ¼À ¥ÀĸÀÛPÀUÀ¼ÀÄ

Additional Learning Resources:


 PÀ£ÀßqÀ ¸Á»vÀåPÉÌ ¸ÀA§A¢ü¹zÀ ¥ÀĸÀÛPÀ¼ÀÄ
 ¸ÀªÀÄÆºÀ ªÀiÁzsÀåªÀÄUÀ¼ÀÄ
 ¤AiÉÆÃfvÀ PÁAiÀÄðPÀæªÀÄUÀ½UÉ ¸ÀA§A¢ü¹zÀAvÉ ¸ÀܼÀUÀ¼À ¨sÉÃn

Tutorial Details:
Unit:1: PÁªÀå : * ¥ÀzÀå/ªÀZÀ£ÀUÀ¼À£ÀÄß ©r¹, ¨sÁªÀ CxÀð w½AiÀÄĪÀAvÉ N¢¸ÀĪÀÅzÀÄ.
* ¥ÀzÀå/ªÀZÀ£ÀUÀ¼À°ègÀĪÀ «±ÉõÀ ¥ÀzÀ, £ÀÄrUÀlÄÖ, UÁzÉ , G¥ÀªÉÄUÀ¼À£ÀÄß UÀÄgÀÄw¹ ¸ÀéAvÀ
ªÁPÀåUÀ¼À°è §¼À¸À®Ä ¸ÀÆa¸ÀĪÀÅzÀÄ.
 ¥ÀzÀå/ªÀZÀ£ÀUÀ¼À ªÀ¸ÀÄÛ, D±ÀAiÀÄUÀ¼À£ÀÄß ¥Àæ¸ÀÄÛvÀPÉÌ C£Àé¬Ä¹ «ZÁgÀ ªÀÄAqÀ£É , ¥ÀzÀå/ªÀZÀ£ÀUÀ¼À
gÀZÀ£É ªÀiÁr¸ÀĪÀÅzÀÄ.
 ¥ÀzÀå/ªÀZÀ£ÀUÀ½UÉ gÁUÀ ¸ÀAAiÉÆÃf¹ ºÁqÀ®Ä GvÉÛÃf¸ÀĪÀÅzÀÄ. §ºÀĪÀiÁzsÀåªÀÄUÀ¼À£ÀÄß
§¼À¹PÉÆ¼ÀÄîªÀÅzÀÄ.
 ¥ÀzÀå/ªÀZÀ£ÀUÀ¼À ªÀ¸ÀÄÛ ªÀÄvÀÄÛ D±ÀAiÀÄUÀ¼À£ÀÄß ¸ÀÈd£ÁvÀäPÀªÁV ZÀlĪÀnPÉUÀ¼À£ÀÄß «zÁåyðUÀ¼À
UÀÄA¥ÀÄUÀ¼À£ÁßV «AUÀr¹ £ÀqɸÀĪÀÅzÀÄ.

Unit:2: £ÁlPÀ: * £ÁlPÀzÀ DAiÀÄÝ ¨sÁUÀªÀ£ÀÄß zsÀé¤ Kj½vÀUÀ¼ÉÆA¢UÉ N¢¸ÀĪÀÅzÀÄ.

 ¨sÁµÁ ªÉʲµÀÖöåªÀ£ÀÄß UÀÄgÀÄw¸ÀĪÀÅzÀÄ.


 £ÁlPÀzÀ D±ÀAiÀĪÀ£ÀÄß ¥Àæ¸ÀÄÛvÀPÉÌ C£Àé¬Ä¹ - «ZÁgÀ ªÀÄAqÀ£É, UÀÄA¥ÀÄZÀZÉð.
 ¥ÀoÀåªÀ£ÀÄß gÀAUÀgÀÆ¥ÀPÉÌ vÀgÀĪÀ ¸ÁzsÀåvÉUÀ¼À PÀÄjvÀÄ ZÀZÉð.
 £ÁlPÀzÀ ¸ÀA«zsÁ£À, vÀAvÀæ PÀÄjvÀ «±ÉèõÀuÉ.
 £ÁlPÀzÀ ¨sÁUÀUÀ¼À£ÀÄß ªÀÄvÀÄÛ ¥ÁvÀæUÀ¼À£ÀÄß C©ü£À¬Ä¸ÀĪÀAvÉ «zÁåyðUÀ¼À£ÀÄß GvÉÛÃf¸ÀĪÀÅzÀÄ.
 £ÁlPÀPÁgÀgÀ §zÀÄPÀÄ, ¸Á»vÀåPÀ ¸ÁzsÀ£É PÀÄjvÀ ªÀiÁ»w ¸ÀAUÀ滸ÀĪÀÅzÀÄ.
 £ÁlPÀzÀ ªÀ¸ÀÄÛ ªÀÄvÀÄÛ D±ÀAiÀĪÀ£ÀÄß ¸ÀÈd£ÁvÀäPÀªÁV ªÀÄgÀÄ gÀƦ¸À®Ä (PÀ«vÉ gÀZÀ£É, ¥ÀæºÀ¸À£À,
¸Áé£ÀĨsÀªÀ PÀxÀ£À, avÀæPÀ¯É, bÁAiÀiÁavÀæ EvÁå¢) ¸ÀÆa¸ÀĪÀÅzÀÄ.
 EzÀPÉÌ ¸ÀA§A¢ü¹zÀ «rAiÉÆÃ ¥ÀæzÀ±Àð£À.

Unit:3: ¨sÁµÁP˱À®å: * ªÀiÁw£À P˱À®å ¨É¼É¹PÉÆ¼ÀÄîªÀÅzÀÄ.


 ¸ÀÈd£À²Ã® ªÀiÁvÀÄUÁjPÉAiÀÄ ªÀÄÆ®PÀ zÉÆÃµÀUÀ¼ÀÄ ªÀÄvÀÄÛ ¤ªÁgÀuÁ G¥ÁAiÀÄUÀ¼À£ÀÄß
PÀAqÀÄPÉÆ¼ÀÄîªÀÅzÀÄ.
 §gÉAiÀÄĪÀ, NzÀĪÀ , UÀ滸ÀĪÀ, CxÉÊð¸ÀĪÀ, ªÀiÁvÀ£ÁqÀĪÀ P˱À® ºÁUÀÆ PÀ°AiÀÄĪÀ D¸ÀQÛ
ªÀÄÆr¸ÀĪÀ ªÀÄÆ®PÀ C©üªÀåQÛ ±ÀQÛAiÀÄ£ÀÄß GvÀÛªÀÄ ªÀÄlÖzÀ°è ¨É¼É¸ÀĪÀÅzÀÄ.
 ««zsÀ ¥ÀvÀæUÀ¼À ªÀiÁzÀjUÀ¼À£ÀÄß ¥ÀjZÀ¬Ä¸ÀĪÀÅzÀÄ
 PÁ®à¤PÀ ªÀgÀ¢UÀ¼À£ÀÄß gÀa¸À®Ä GvÉÛÃf¸ÀĪÀÅzÀÄ.
 ««zsÀ ªÀ¸ÀÄÛ, ¸ÀAUÀwUÀ½UÉ eÁ»gÁvÀÄ ¥ÀjPÀ®à£É gÀa¸À®Ä ¸ÀÆa¸ÀĪÀÅzÀÄ
 ªÀiÁzÀj `NzÀÄUÀgÀ ¥ÀvÀæ’UÀ¼À£ÀÄß §gÉAiÀÄ®Ä ¸ÀÆa¸ÀĪÀÅzÀÄ
 «zÁåyðAiÀÄ ¸À髪ÀgÀªÀżÀî C¨sÀåxÀð£À ¥ÀvÀæ gÀa¸À®Ä ¸ÀÆa¸ÀĪÀÅzÀÄ.

Unit:4: ªÁåPÀgÀt: * ²µÀÖ¨sÁµÉAiÀÄ ªÁåPÀgÀt eÁÕ£ÀªÀ£ÀÄß ¨É¼É¸ÀĪÀÅzÀÄ.


 ¨sÁµÁ §¼ÀPÉAiÀÄ ªÉÊ«zsÀåvÉAiÀÄ£ÀÄß w½¸ÀĪÀÅzÀÄ.
 §gÀªÀtÂUÉAiÀÄ P˱À®åªÀ£ÀÄß ¨É¼É¸ÀĪÀÅzÀÄ.
 PÀæªÀħzÀÞªÁV N¢¸ÀĪÀÅzÀÄ
 PÁªÀåUÀ¼À ¨sÁUÀUÀ¼À£ÀÄß ¤Ãr C°ègÀĪÀ ªÁåPÀgÀuÁA±ÀUÀ¼À£ÀÄß UÀÄgÀÄw¸À®Ä w½¸ÀĪÀÅzÀÄ
 °AUÀ, ªÀZÀ£À, «¨sÀQÛ, QæAiÀiÁ¥ÀzÀ, ¸ÀªÀiÁ¸À CªÀåAiÀÄUÀ¼À £ÀqÀÄ«£À ªÀåvÁå¸ÀUÀ¼À£ÀÄß ¥ÀnÖ
ªÀiÁr¸ÀĪÀÅzÀÄ.
 PÀ£ÀßqÀ ªÁåPÀgÀtPÁgÀgÀ §zÀÄPÀÄ-§gÀºÀ PÀÄjvÀÄ «ZÁgÀ UÉÆÃ¶× K¥Àðr¸ÀĪÀÅzÀÄ.
 ¥ÀzÀ§AzsÀUÀ¼ÀÄ, ªÁPÀåUÀ¼À£ÀÄß gÀa¸À®Ä ªÀÄvÀÄÛ ©r¸À®Ä ¸ÀÆa¸ÀĪÀÅzÀÄ.
 ªÁåPÀgÀtzÀ ¸ÀégÀÆ¥ÀªÀ£ÀÄß w½¸ÀĪÀ ZÀlĪÀnPÉUÀ¼À£ÀÄß £ÀqɸÀĪÀÅzÀÄ.

Unit:5: bÀAzÀ¸ÀÄì: * ¥ÀzÀå gÀZÀ£Á PÀæªÀÄzÀ°è bÀAzÀ¹ì£À §¼ÀPÉAiÀÄ CjªÀÅ.


 ºÀ¼ÀUÀ£ÀßqÀ ¥ÀzÀåUÀ½UÉ ¥Àæ¸ÁÛgÀ ºÁQ bÀAzÉÆÃ ¥ÀæPÁgÀªÀ£ÀÄß UÀÄgÀÄw¸ÀĪÀÅzÀÄ.
 ¥ÀzÀåUÀ¼À£ÀÄß ©r¹ N¢¸ÀĪÀÅzÀÄ.
 vÁ¼À ®AiÀÄ UÀwUÀ¼À£ÀÄß C£ÀĸÀj¹ PÀ«vÉUÀ¼À£ÀÄß gÁUÀ§zÀÞªÁV ºÁqÀĪÀAvÉ
¥ÉæÃgÉæ¸ÀĪÀÅzÀÄ.
 bÀAzÀ¹ì£À C£ÀéAiÀÄ ¥ÀzÀå gÀZÀ£É ªÀiÁr¸ÀĪÀÅzÀÄ.
JSS Science and Technology University, Mysuru
Department of Computer Applications
II Semester Bachelor of Computer Applications [BCA]
Course Category Code: L-4 Course Category Name: Languages-4
Couse Code: BCA260 Course Title: English Language II
Total Credits: 03 Credit Structure (L:T:P): 3:1:0
Total Hours: 36 Max. Marks: 100

Course Outcomes:
Upon successful completion of this course, students will be able to,

CO 1: Understanding of the Grammar & Vocabulary.


CO 2: Understanding of the Functional English.
CO 3: Understanding of the Poetry.
CO 4: Understanding of the Prose- Novel.
CO 5: Understanding of the Prose- Drama

Unit:1: 7 hours

Grammar & Vocabulary:

1. Kinds of sentences, Direct-indirect speech.


2. Change of Voice: Active and Passive
3. Modals and their usage.
4. Subject-verb agreement.
5.Reading Comprehension : Unseen passage and poetry

Unit:2: 6 hours

Functional English:

1. Précis writing
2. Report writing: Newspaper, journal
3. Letter writing: Personal/Formal letters
4. Usage of phrasal verbs, collocations, idioms & phrases 5. Presentation: preparation of materials
and presentation, e.g., posters, charts

Unit:3: 5 hours

Poetry:

1. Obituary-A.K.Ramanujan
2. The road not taken-Robert Frost
3. Because I could not stop for death – Emily Dickinson

Unit:4: 9 hours

Prose-Novel

1. Swami and Friends- a novel by R K Narayan.


Unit:5: 9 hours

Prose : Play

1. Yayati- a play by Girish Karnad.

Text Books:

1. Yayati by Girish Karnad.


2. Swamy and Friends by R K Narayan.
Reference Books:

1. English Grammar and Composition – Wren and Martin.


2. Contemporary English Grammar – Jayanthi Dakshina Murthy.
JSS Science and Technology University, Mysuru

Department of Computer Applications


II Semester Bachelor of Computer Applications [BCA]
Ability Enhancement
Course Category Code: AECC-1 Course Category Compulsory
Courses-1
Course Code: BCA270 Course Title: Environmental Studies
Total Credits: 03 Credit Structure(L:T:P): 3:0:0

Total Hours: 36 Max Marks: 100

Course Outcomes:

CO1: Understand the principles of ecology and environmental issues that apply to air, land, and
water issues on a global scale.
CO2: Develop critical thinking and/or observation skills, and apply them to the analysis of a
problem or question related to the environment.
CO3: Demonstrate ecology knowledge of a complex relationship between biotic and abiotic
components.
CO4: Apply their ecological knowledge to illustrate and graph a problem and describe the
realities that managers face when dealing with complex issues.

Unit:1 07 Hours

Introduction: Environment – Components of Environment Ecosystem: Types & Structure of


Ecosystem, Balanced ecosystem Human Activities – Food, Shelter, And Economic & Social
Security. Impacts of Agriculture & Housing Impacts of Industry, Mining & Transportation
Environmental Impact Assessment, Sustainable Development.

Unit:2 06 Hours

Natural Resources, Water resources – Availability & Quality aspects, Water borne diseases &
water induced diseases, Fluoride problem in drinking water Mineral resources, Forest Wealth
Material Cycles – Carbon Cycle, Nitrogen Cycle & Sulphur Cycle.

Unit:3 06 Hours

Energy – Different types of energy, Conventional sources & Non-Conventional sources of


energy Solar energy, Hydro electric energy, Wind Energy, Nuclear energy, Biomass & Biogas
Fossil Fuels, Hydrogen as an alternative energy.

Unit:4 09 Hours

Air Pollution & Automobile Pollution: Definition, Effects – Global Warming, Acid rain & Ozone
layer depletion, controlling measures. Solid Waste Management, E – Waste Management
&Biomedical Waste Management - Sources, Characteristics & Disposal methods.
UNIT:5 08 Hours

Introduction to GIS & Remote sensing, Applications of GIS & Remote Sensing in Environmental
Engineering Practices. Environmental Acts & Regulations, Role of government, Legal aspects,
Role of Nongovernmental Organizations (NGOs), Environmental Education & Women
Education

Text Books:

1. Benny Joseph (2005), “Environmental Studies”, Tata McGraw – Hill Publishing Company
Limited.
2. R.J.Ranjit Daniels and JagadishKrishnaswamy, (2009), “Environmental Studies”, Wiley India
Private Ltd., New Delhi.
3. R Rajagopalan, “Environmental Studies – From Crisis to Cure”, Oxford University Press,
2005,
4. Aloka Debi, “Environmental Science and Engineering”, Universities Press (India) Pvt. Ltd.
2012

Reference Books:

1. Raman Sivakumar, “Principals of Environmental Science and Engineering”, Second Edition,


Cengage learning Singapore, 2005
2. P. Meenakshi, “Elements of Environmental Science and Engineering”, Prentice Hall of India
Private Limited, New Delhi, 2006
3. S.M. Prakash, “Environmental Studies”, Elite Publishers Mangalore, 2007
4. ErachBharucha, “Text Book of Environmental Studies”, for UGC, University press, 2005
JSS Science and Technology University, Mysuru

Department of Computer Applications


II Semester Bachelor of Computer Applications [BCA]
Course Category Code: VB-2 Course Category Value Based-2
Course Code: BCA280 Course Title: Personal Effectiveness
Total Credits: 02 Credit Structure (L:T:P): 1:0:2
Total Hours: 26 Max Marks: 50

Course Outcomes:
CO1: Understand the strengths and weaknesses as individual, as a member of a group /
organization using personality typing.
CO2: Develop self-awareness and to understand the concepts of Neuro-lingistic programming
(NLP).
CO3: Equip with skill and competence to apply positive psychology principles in a range of
environments to increase individual and collective well-being

Unit:1: Learning and Time Management 9 Hours

Introduction, learning shock, overcoming barriers to learning, how do I learn? How do we


learn? Learning styles and orientations, metaphors for learning, learning from experience:
informal and self-directed learning. Introduction, what is time management? , preparation for
change, the consequences, the good habits of time management, time management
scenarios.
Unit:2: Creativity, Ideas Generation, group dynamics and team working 9 Hours

Introduction, blocks in creative thinking, cycles and funnels of creativity, developing a whole
brain approach to creativity, creative techniques: 1, 2, 3 & 4.Team working: Introduction,
features of successful team, group development, meetings, team roles.

Unit:3: Assertiveness and Negotiation skills 8 Hours

Introduction, status work, rights of work, challenging situations, tricky feelings and emotions,
cultural differences. Negotiation skills: Introduction, principles of negotiation, negotiating
approaches, negotiation strategy and tactics, the negotiation process.
Text Books:

1. Diana Winstantley : Personal Effectiveness , 1st Edition, Excel books, 20015.


2. Douglas Miller: Brilliant Personal Effectiveness, Pearson Business, 2015.

Reference Books:

1. Alexander Murdock; Carol N. Scutt : Personal Effectiveness , 3rd Edition , Routledge


Publishers , 2003.
Additional Learning Resources:

1. http://dspace.bhos.edu.az/xmlui/bitstream/handle/123456789/885/the-art-of-personal-
effectiveness.pdf?sequence=1.
2. https://www.slideshare.net/e1033930/personal-effectiveness-presentation.
3. https://learning.oreilly.com/library/view/brilliant-personal-effectiveness/9781292077567/

Laboratory Details:
Activity -1: 15 active learning activities to energize the Students in classroom.

1. Think – Pair – Repair.


2. Improve games.
3. Brain writing.
4. Jigsaw.
5. Concept Mapping.
6. The one Minute Paper.
7. Real- Time Reactions.
8. Chain Notes.
9. Idea Line Up.
10. Mystery Quotations.
11. Idea Speed Dating.
12. Peer Review.
13. QueScussion.
14. Sketch noting.
15. Empathy Mapping.
(Any three-Four of the above mentioned activity-1 Types will be conducted based on
students Interests).
Activity-2 : Time Management Activities (Activities included: Sleep ,Class, Labs, Meals
,Spiritual Activities, Grocery Shopping, Jobs, TV ,Volunteer work, Travel Time, Cleaning,
Other Exercise, Recreation, Socializing, Personal Hygiene, Laundry and Clubs).
TIME USE LOG

Start Time End Time Time Used Activity Type Changes if Any

Activity -3: Group Discussion and Team Work Activities will be conducted like: Poster Making
event, Group Discussion by giving a same topics through debates, Treasure Hunt event and
so on…
Activity-4 : Quiz’s, Role Pay , Stand Up comedy, Try Non-Verbal’s, Dumb Charades, and So
on. Any 2 Activities will be conducted based on students interests.
JSS Science and Technology University, Mysuru

Department of Computer Applications


II Semester Bachelor of Computer Applications [BCA]
Course Category Code: DSC-4 Course Category Discipline Core-4
Object oriented
Course Code: BCA21L Course Title: Programming with C++
Laboratory
Total Credits: 01 Credit Structure (L:T:P): 0:0:2
Total Hours: 28 Max Marks: 50

Course Outcomes:
CO1: Understand the features of C++ supporting object oriented programming
CO2: Understand the relative merits of C++ as an object oriented programming language
CO3: Understand how to produce object-oriented software using C++
CO4: Understand how to apply the major object-oriented concepts to implement object
oriented Programs in C++, encapsulation, inheritance and polymorphism.

List of Experiments:
PART-A
1. Write a C++ program to calculate the average of three numbers.
2. Write a C++ program to find the biggest of three numbers.
1. Write a C++ program to find minimum and maximum of two numbers using functions.
2. Write a C++ program to check the given number is palindrome or not
3. Write a C++ program to sum of all even and odd numbers.
4. Write a C++ program to perform arithmetic operations using classes and objects.
5. Write a C++ program to define a student class with user name, to name, total, average
for “n” students.
6. Write a C++ program to illustrate the use of static member function.
7. Write a C++ program to find the mean value using friend function.
8. Write a C++ program to implement multiple inheritances.
9. Write a C++ program to illustrate pointers to objects.
10. Write a C++ program to read a string with get line function.
11. Write a C++ program to display string with write () function.
PART-B
16. Write a C++ program to accept two times (hh:mm:ss) to find subtraction of two times.
17. Write a C++ program to implement processing shopping list using a class with arrays
as data members.
18. Write a C++ program to implement banking scheme.
19. Write a C++ program to show the use of over loaded constructor.
20. Write a C++ program to construct variables at run time using dynamic initialization.
21. Write a C++ program to find the largest value among the set of parameters using
overloaded function.
22. Write a C++ program to add two complex number using operator overloading.
23. Write a C++ program to demonstrate single inheritance.
24. Write a C++ program to implement multilevel inheritance.
25. Write a C++ program to illustrate the use of array of pointer to objects.
26. Write a C++ program to implement reading and writing class objects using files.

Text Books:

1. Object Oriented Programming with C++ - E. Balagurusamy

Reference Books:

1. OOPS and C++ by Robert Lafore.


2. C++ by Stephen Prata.
3. Teach yourself C++ by Al Stevens.
4. C++ Primer by Stanley B Lippman

Additional Learning Resources:

1. www.tutorialspoint.com
2. www.geeksforgeeks.org
3. www.Javatpoint.com
4. www.begineersbook.com
III Semester
JSS Science and Technology University, Mysuru
Department of Computer Applications
III Semester Bachelor of Computer Applications [BCA]
Course Category Code: DSC-6 Course Category Name: Discipline Core-6
Course Code: BCA310 Course Title: Mathematics-II
Total Credits: 3 Credit Structure (L:T:P): 3:0:0
Total Hours: 40 Max. Marks: 100

Course Outcomes:

Upon successful completion of this course, students will be able to,

CO1:To interpret large data, analyze and arrive at intelligent conclusions.


CO2:Recognize and analyze elementary probability models.
CO3:Identify discrete probability density situations and analyse them. Understand the
conceptsofexpectation, variance.
CO4:Identify continuous probability density situations and analyse them. Understand the
Conceptofexpectation, variance.
CO5:Understand and use concepts of stochastic processes, probability vectors, markov
Chainsand transition probabilities.

Unit:1:Introduction tolines 8 Hours

Introduction, Definitions, Curve Fitting, equation of Straight line, parabola and exponential,
correlation and regression, formula for correlation coefficient, regression lines.

Unit:2: Probability Distribution 8 Hours

Basic terminology, Definition of probability, Probability and set notations, Addition law of
probability, independent events, conditional probability, multiplication law of probability,
Baye’s theorem.

Unit:3: Discrete Probability 8 Hours

Discrete Probability distribution: expectation, Variance, Binomial distribution, Poisson


distribution

Unit:4:Continuous Probability 8 Hours


Continuous Probability distribution: expectation, Variance, Normal distribution and
Exponential distribution.

Unit:5:Stochastic processes 8 Hours

Definition of probability vector; stochastic matrix and regular stochastic matrix; fixed point
and fixed probability vector; Markov chain definition; transition probabilities and its matrix;
higher transition probabilities; stationary distribution of regular Markov chains; irreducible
Markov chain; absorbing state of a Markov chain
Text Books:
1. SchaumSeries ,Problems in Probability and Statistics 2009.
2. Sheldon Ross ,Introductory Statistics, 2nd Edition 2006.

Reference Books:

1. Richard A,Johnson –Miller & Freund’s Probability and Statistics for Engineers 8 th edition
2011.
2. SantSharan Mishra-Computer Oriented Numerical and Statistical Methods 2013.

Additional Learning Resources:

1. https://nptel.ac.in/courses/117103067
2. https://www.geeksforgeeks.org/mathematics-probability/
JSS Science and Technology University, Mysuru
Department of Computer Applications
III Semester Bachelor of Computer Applications [BCA]
Course Category Code: DSC-7 Course Category Name: Discipline Core-7
Course Code: BCA320 Course Title: Java Programming
Total Credits: 3 Credit Structure (L:T:P): 3:0:0
Total Hours: 40 Max. Marks: 100

Course Outcomes:
Upon successful completion of this course, students will be able to,

CO1:Demonstrate and implement programs on structure and components of a Java


Language.
CO2:Understand classes, objects, members of a class and use packages and interfaces
appropriately.
CO3: Demonstrate multithread, synchronization and exception handling concepts
CO4: Use the concept of string, event handling, simple data structures like arrays and
members of classes of Java API in application development
CO5:Design and develop Java based UI and Networking applications using applets, swing
componentsand networking concepts.

TOPICS COVERED:
Unit:1: Java Basics 8 Hours

History of Java, Java buzzwords, data types, variables, scope and life time of variables,
arrays, operators, expressions, control statements, type conversion and casting, simple java
program, concepts of classes, objects, constructors, methods, access control, this keyword,
garbage collection, overloading methods and constructors, parameter passing, recursion,
nested and inner classes, exploring string class.

Unit:2 : OOP concepts in Java, Packages and Interfaces 8 Hours

Hierarchical abstractions, Base class object, subclass, subtype, substitutability, forms of


inheritance- specialization, specification, construction, extension, limitation, combination,
benefits of inheritance, costs of inheritance. Member access rules, super uses, using final
with inheritance, polymorphism- method overriding, abstract classes, the Object class.
Defining, Creating and Accessing a Package, Understanding CLASSPATH, importing
packages, differences between classes and interfaces, defining an interface, implementing
interface, applying interfaces, variables in interface and extending interfaces. Exploring
java.io.

Unit:3: Exception handling & Multi Threading 8 Hours

Concepts of exception handling, benefits of exception handling, Termination or presumptive


models, exception hierarchy, usage of try, catch, throw, throws and finally, built in
exceptions, creating own exception sub classes. String handling, Exploring java.util.
Differences between multi threading and multitasking, thread life cycle, creating threads,
thread priorities, synchronizing threads; inter thread communication, thread groups, daemon
threads. Enumerations, auto boxing, annotations, generics.

Unit:4: String Handling 8 Hours

The string constructors, string length, special string operations, character extraction, string
comparison, searching strings, data conversion using valueOf(), changing the case of
characters within a string, additional string methods, string buffer, string builder, primitive
type wrappers.

Unit:5: The Collection Framework 8 Hours

Collections overview, generics fundamentally change the collections, the collection


interfaces, the collection classes, accessing collection via an iterator, storing user-defined
classes in collections, the random access interface, working with maps, comparators,
arrays.

Text Books:

1. Herbert Schildt. Java - The Complete Reference, 7thEdition. Oracle Press, McGraw Hill
Education (India) Edition- 2014.
Reference Books:
1. Cay S. Horstmann, Gary Cornell. Core Java, Core Java Volume-1 – Fundamentals, 9th
Edition, Pearson Education, 2014.
2. Timothy Budd, “Understanding Object-oriented programming with Java”, Updated
Edition, Pearson Education, 2000.

Additional Learning Resources:

1. http://www.oracle.com/technetwork/java/index-jsp-135888.html
2. http://www.javaworld.com/article/2074929/core-java
3. http://www.javaworld.com/
4. http://www.learnjavaonline.org/
JSS Science and Technology University, Mysuru
Department of Computer Applications
III Semester Bachelor of Computer Applications [BCA]
Course Category Code: OE-3 Course Category Name: Open Elective-3
Course Code: BCA330 Course Title: E-Governance
Total Credits: 3 Credit Structure (L:T:P): 3:0:0
Total Hours: 40 Max. Marks: 100

Course Outcomes:
Upon successful completion of this course, students will be able to,

CO1: To develop knowledge of e-governance and e-government


CO2: To know different e-governance models and infrastructure development
CO3: To implement security and use data warehousing and mining in e-governance
CO4: Understand the benefits and reasons for the introduction of e-governance at the local
level
CO5: Realize the issues and challenges of e-governance

Unit:1:Understanding eGovernment 8 Hours

Understanding eGovernment as Information Systems, Understanding eGovernment


Management Activities,Managingegovernment: The Centralized Approach to eGovernment
Systems Responsibilities, The Decentralized Approach to eGovernment, Systems
Responsibilities, Resolving the Contradictions via a Hybrid, Approach to
eGovernment.eGovernment Strategy: An Overview ofeGovernment Strategic Planning, The
Steps of eGovernment Strategic Planning, Problems and Ways Forward for eGovernment
Planning Activities.

Unit:2: Managing Public Data 8 Hours

Problems with Public Data Quality, Hard Solutions to Public Data Quality Problems, Soft
Solutions to Public Data Quality Problems, Hybrid Approaches to Public Data Quality
Activities.Core Management Issues for eGovernment : Position, People, Pelf, Projects,
Politics.Emerging Management Issues for eGovernment : Performance, Policies on Public
Data, Policies on Other Issues Activities.

Unit: 3: Implementing eGovernment: 8 Hours

eGovernment System Lifecycle and Project Assessment, The System Lifecycle, Project
Assessment Activities.Analysis of Current Reality: Methods of Analysis, Recording
Techniques Activities.Design of the New eGovernment System: Setting Objectives,
Information Design, Technology Design, Process Design.

Unit:4:eGovernmentRisk Assessment and Mitigation 8 Hours

Human Systems Design, Evaluating Proposals and Alternative Designs


Activities.,RiskAssessment Through Gap Analysis, Risk Mitigation Through Gap Prevention
or Reduction, Change Management: Addressing the Gap of Stakeholder Objectives and
Values.

Unit:5:eGovernment System Construction, Implementations and Beyond:


8 Hours

Procurement for eGovernment systems, Final constructions of the eGovernment Systems,


Introduction to the eGovernment systems, Post-Implementation Tasks, eGovernment
Monitoring, Evaluation and Maintenance Activities.
Developing eGovernment Hybrids: Uniting the ‘E’ and the ‘Government’ of eGovernment
through Hybrids, Implications of Hybridization for eGovernment Activities.

Text Books:

1. Richard Heeks, Implementing and managing e-Government, Sage Publications, 2006.


2. C.S. R Prabhu, e-Governance: Concepts and Case studies, Prentice hall of India Pvt. Ltd.
2008.

Reference Books:

1. J. Satyanarayana, e-Government, prentice hall of India Pvt. Ltd, 2004


2. Backus, Michiel, e-Governance in Developing Countries, IICD Research Brief, No. 1,2007

Additional Learning Resources:

1.http://hdl.handle.net/123456789/25880
2.http://www.netsuite.com/portal/resource/articlesl
JSS Science and Technology University, Mysuru
Department of Computer Applications
III Semester Bachelor of Computer Applications [BCA]
Course Category Code: DSE-2 Course Category Name: Discipline Elective-2
Data Communications
Course Code: BCA341 Course Title:
and Networking
Total Credits: 3 Credit Structure(L:T:P): 3:0:0
Total Hours: 40 Max. Marks: 100

Course Outcomes:
Upon successful completion of this course, students will be able to,

CO1: Understand data communication concepts and design of Network models.


CO2: Understand data transmission in the form of electromagnetic signals across a
transmission
medium.
CO3: Understand the Mechanisms for detecting and correcting errors.
CO4: Explore few client-server application programs
CO5: Understand the Concepts of Data compression and Multimedia.
Unit:1: Data Communications Concepts and Network Models 9 Hours

Data Communications: Components, Data Representation, Data Flow, Networks; Network


Criteria, Physical Structures, Network Types: LAN, WAN, Switching, Network Models
Protocol Layering: Principles of Protocol Layering, Logical Connections, TCP/IP Protocol
Suite: Layered Architecture, Layers in the TCP/IP Protocol Suite, Multiplexing and De-
multiplexing, The OSI Model; OSI versus TCP/IP. Data Transmission: Parallel Transmission,
Serial Transmission, Bit Rate, Receiving Data Bits. Modes of data transmission:
Asynchronous Transmission, Synchronous Transmission.

Unit:2: Digital and Analog Signals 8 Hours

Data and Signals: Analog and Digital data, Analog and Digital signals, Periodic and Non-
Periodic signals. Periodic Analog Signals: Sine Wave, Phase, Wavelength, Time and
Frequency Domains, Composite Signals, Bandwidth. Digital Signals: Bit rate, Bit length,
Digital signal as a composite Analog signal. Transmission Impairment: Attenuation,
Distortion, Noise. Performance: Bandwidth, Throughput, Latency (delay), Bandwidth Delay
Product, Jitter.

Unit:3: Error Detection and Correction 8 Hours

Introduction: Types of Errors, Redundancy, Detection versus Correction, Error Detection.


Cyclic Codes: Cyclic Redundancy Check, Cyclic Code Analysis, Advantages of Cyclic
Codes, Checksum: Concept, Other Approaches to the Checksum.
Unit: 4: Standard Client-Server Protocols 8 Hours

World Wide Web and HTTP: World Wide Web, HyperText Transfer Protocol FTP: Two
Connections, Control Connection, Data Connection, Security for FTP. Electronic Mail:
Architecture, TELNET: Local versus Remote Logging. Secure Shell(SSH): Components,
Applications. Domain Name System (DNS): Name Space, DNS in the Internet, Resolution,
Caching.

Unit:5: Data Compression and Multimedia 7 Hours

Compression: Lossless Compression: Run length coding, Huffman, Shannon-Fano, Lossy


Compression: Delta modulation, adaptive DPCM. Multimedia Data: Text, Image, Video,
Audio.

Text Books:

1. B. A. Forouzan, Data Communications and Networking, 5th Edition, McGraw Hill


Education (India) Private Limited, 2013.
2. William Stallings, Data and Computer Communications, 10th Edition, Pearson, 2013.

Reference Books:

1. Data Communications and Computer Networks, Prakash C Gupta, 2 nd Edition, PHI,


Eastern economy edition, 2014.
2 Andrew S. Tanenbaum, Computer Networks, Fourth Edition, PHI, 2008.
3 Fred Halsall, Data Communications, Computer Networks and Open Systems, 4th
Edition, Pearson Education, 2005.
4 Larry L. Peterson and Bruce S. David: Computer Networks – A Systems Approach, 5th
Edition, Elsevier, 2011.

Additional Learning Resources:

1. https://www.tutorialspoint.com/computer_networks/index.asp
2. https://onlinecourses.swayam2.ac.in/cec22_cs05/preview
3. www.nptel.ac.in/courses
4. http://freevideolectures.com/Course/2276/Computer-Networks
JSS Science and Technology University, Mysuru

Department of Computer Applications


III Semester Bachelor of Computer Applications [BCA]
Course Category Course Category
DSE-2 Discipline Elective-2
Code: Name:
Human Computer
Couse Code: BCA342 Course Title:
Interface
Credit Structure
Total Credits: 3 (3:0:0)
(L:T:P):
Max.
Total Hours: 40 100
Marks:
Course Outcomes:
Upon successful completion of this course, students will be able to:

CO1: Understand Foundations of Human Computer Interaction.


CO2: Analyse effective HCI design.
CO3: To become familiar with the design technologies.
CO4: Understand and Analyse the User experience and its importance.
CO5: Explore the insight of HCI In future.

Unit:1: Foundations of HCI and Specific Guidelines 8 Hours


Introduction to human computer interface, it is important principles of human computer interface.
Guideline categories, examples of human computer interface guidelines, visual layout (General
HCI Design) Information structuring and navigation, taking user Input, users with Disability, mobile
device. Icons for Apple IOS and Fonts for windows XP (vendor),” Earcon” Design for Aural
Interface (Modality), Cell phones (or Making Calls) in Automobiles-commerce (Applications).
Unit:2: HIC Design 8 Hours
The Overall design process, interface selection options, Hardware Platforms, Software Interface
components, wire-framing, naïve design example: No Sheets 1.0, Requirement analysis, user
analysis, Making a scenario and task modeling, Interface selection and consolidation.

Unit:3: User Interface Design 8 Hours


Understanding the UI layer and its execution framework, input and output at the low-level,
Processing the input and generating output, events, UI objects, and event handlers, event driven
program structure output.
Unit:4: User Experience and Importance of User Experience 8 Hours
what is user experience?, defining user experience, misconceptions of ux design, ux is not ui, ux is
not usability, ux is not just part of a process, ux is not only about the user ux is not the
responsibility of someone else, the core disciplines of user experience user research, content
strategy, information architecture, interaction design, visual design usability evaluation, the
importance of user experience, ux from the business perspective the various states of ux maturity
vi, the lower levels of ux maturity, the medium levels of ux maturity, the higher levels of ux
maturity, the costs due to lack of a user-cantered design process, a real-world example, user
experience is no longer an optional extra the roi of ux design, a scenario for calculating roi, ux is
everyone’s responsibility.

Unit:5: Future of HCI and Case Studies 8 Hours


Non-WIMP/Natural/Multimodal Interfaces, Language Understanding, Gestures, Image Recognition
and Understanding, Multimodal Interaction, Mobile and Handheld Interaction, High-End Cloud
Service and Multimodal Client Interaction, Natural/Immersive/Experiential Interaction, Mixed and
Augmented Reality.
Case studies:
1. Modern Hotel
a. A modern hotel has installed a sandwich making robot to supply room service
sandwiches at any hour of the day. The hotel also has an automated delivery system
that will take the completed sandwich to a specified room. You have been asked to
program a software agent interface that guests can phone to order sandwiches.
b. A modern hotel has installed a sandwich making robot to supply room service
sandwiches at any hour of the day. The hotel also has an automated delivery system
that will take the completed sandwich to a specified room. You have been asked to
program a software agent interface that guests can phone to order sandwiches.
c. Write a short scenario describing how a guest would order a sandwich using your
interface.
d. Provide a hierarchical task description of the sandwich ordering process. Note
particularly where there might be choice points or alternative methods. Also explain your
criteria for the level of decomposition used.
e. Use a state diagram to describe the dialogue between the system and the user. Note
any additional issues this raises about the system that need to be resolved in the design.
2. Video conferences and communication Eye contact in recorded video.
3. Design Focus: Designing a car courtesy light
Different car courtesy lights operate in different ways, but typically they turn on when you
unlock or open the door and then off again after a short time or when you start the car.
The design will typically bean ad hoc afair based on previous cars, but for more complex
sensor-based interactions a more systematic approach is needed. This case study is not
based on the design of any real car, but instead shows how a more principled approach to
the design of sensor-based interaction could take place.
Text Books:
1. Gerard Jounghyun Kim, Human Computer Interaction Fundamentals and Practice, 2015.
2. Westley Knight, UX for Developers: How to Integrate User-Centered Design Principles into Your
Day-to-Day Development Work,2019.

Reference Books:
1. Gerard Jounghyun Kim, Human Computer Interaction, CRC Press, 2015
2. Bill Scott and Theresa Neil, Designing Web Interfaces, 1st Edition, O’Reilly Media Inc., 2009.
Additional web resources:
1. https://arl.human.cornell.edu/879Readings/Interaction%20Design%20%20Beyond%20Human-
Computer%20Interaction.pdf
2. https://www.geeksforgeeks.org/human-computer-interaction-through-the-ages/
3. http://prof.mau.ac.ir/images/Uploaded_files/Jenny%20Preece,%20Helen%20Sharp,%20Yvonn
e%20Rogers-Interaction%20Design_%20Beyond%20Human-Computer%20Interaction
Wiley%20(2015)[369707].PDF
4. https://www.youtube.com/watch?v=WW1g3UT2zww&list=PLLssT5z_DsK_nusHL_Mjt87THSTl
grsyJ.
JSS Science and Technology University, Mysuru

Department of Computer Applications


III Semester Bachelor of Computer Applications [BCA]
Course Category Code: L-5 Course Category Name: Language-5
Course Code: BCA350 Course Title: Kannada-III
Total Credits: 3 Credit Structure (L:T:P): 3:0:0
Total Hours: 40 Max. Marks: 100
Course Outcomes:
Upon successful completion of this course, students will be able to:
CO1: ¸ÉÆÃzÀgÀ ¦æÃw, vÁåUÀ, £ÁAiÀÄPÀvÀéPÉÌ EgÀ¨ÉÃPÁzÀ ªÀiË®åUÀ¼ÀÄ ºÁUÀÆ zsÀªÀiÁðzsÀªÀÄðUÀ¼À CjªÀÅ

CO2: ªÀÈzÀÞgÀ DgÁzsÀ£É-ªÀiÁrzÀÄÝuÉÆÚà ªÀĺÁgÁAiÀÄ JA§ ¤Ãw ¸ÀAUÀvÀ

CO3: ¸ÁzsÀPÀjUÉ ¸Á¢ü¸ÀĪÀ bÀ®«gÀ¨ÉÃPÉA§ w½ªÀÅ.

CO4: ²µÀÖ ¨sÁµÉAiÀÄ ªÁåPÀgÀt eÁÕ£À.

CO5: ¥ÀzÀå gÀZÀ£Á PÀæªÀÄzÀ°è bÀAzÀ¹ì£À §¼ÀPÉAiÀÄ CjªÀÅ.

Unit:1: PÁªÀå ¨sÁUÀ : 8 hours


1. zsÀªÀÄðAiÀÄÄzÀÞ-gÀvÁßPÀgÀªÀtÂð
2. J°èAiÀÄ ªÀÄÈw §AzÀÄzÉ¯É ¤£ÀUÉ ¸ÀÄPÀĪÀiÁgÁ-µÀqÀPÀëj.

Unit:2: UÀzÀåPÀÈw: 8 hours


ªÀqÁÙgÁzsÀ£É-²ªÀPÉÆÃmÁåZÁAiÀÄð -¸ÀÄPÀĪÀiÁgÀ¸Áé«ÄAiÀÄ PÀxÉ

Unit:3: £ÁlPÀ: 8 hours


KPÀ®ªÀå- ¹zÀÞ°AUÀAiÀÄå

Unit:4: ªÁåPÀgÀt: 8 hours


C£ÀåzÉñÀå ±À§ÞUÀ¼ÀÄ
vÀvÀìªÀÄ-vÀzÀãªÀ
PÀvÀÈð-PÀªÀÄð-QæAiÀiÁ¥ÀzÀUÀ¼ÀÄ
CPÀªÀÄðPÀ-¸ÀPÀªÀÄðPÀ QæAiÀiÁ¥ÀzÀUÀ¼ÀÄ
PÀvÀðj-PÀªÀÄðt ¥ÀæAiÉÆÃUÀUÀ¼ÀÄ

Unit:5: bÀAzÀ¸ÀÄì: 8 hours


wæ¥À¢
SÁåvÀPÀuÁðlPÀUÀ¼ÀÄ
PÀAzÀ

Text Books:
1. ªÉÄʸÀÆgÀÄ «±Àé«zÁ央AiÀÄzÀ PÀ£ÀßqÀ ¥ÀoÀå¥ÀĸÀÛPÀUÀ¼ÀÄ
2. ¨sÀgÀvÉñÀ ªÉʨsÀªÀ-gÀvÁßPÀgÀªÀtÂð
3. µÀqÀPÀëjAiÀÄ ¥ÀĸÀÛPÀUÀ¼ÀÄ
4. ªÀqÁÙgÁzsÀ£É-²ªÀPÉÆÃmÁåZÁAiÀÄð
5. £ÁlPÀ: KPÀ®ªÀå- ¹zÀÞ°AUÀAiÀÄå
6. bÀAzÀ¸ÀÄì
7. PÀ£ÀßqÀ ªÀÄzsÀåªÀÄ ªÁåPÀgÀt-wÃ.£ÀA. ²æÃPÀAoÀAiÀÄå

Reference Books:
1¸ÀàzsÁðvÀäPÀ ¥ÀjÃPÉëUÀ¼À ¥ÀĸÀÛPÀUÀ¼ÀÄ

Additional Learning Resources:


1,PÀ£ÀßqÀ ¸Á»vÀåPÉÌ ¸ÀA§A¢ü¹zÀ ¥ÀĸÀÛPÀUÀ¼ÀÄ
2.¸ÀªÀÄÆºÀ ªÀiÁzsÀåªÀÄUÀ¼ÀÄ
3.¤AiÉÆÃfvÀ PÁAiÀÄðPÀæªÀÄUÀ½UÉ ¸ÀA§A¢ü¹zÀAvÉ ¸ÀܼÀUÀ¼À ¨sÉÃn

Tutorial Details:
Unit:1: PÁªÀå : * ¥ÀzÀåUÀ¼À£ÀÄß ©r¹, ¨sÁªÀ CxÀð w½AiÀÄĪÀAvÉ N¢¸ÀĪÀÅzÀÄ.
* ¥ÀzÀåUÀ¼À°ègÀĪÀ «±ÉõÀ ¥ÀzÀ, £ÀÄrUÀlÄÖ, UÁzÉ , G¥ÀªÉÄUÀ¼À£ÀÄß UÀÄgÀÄw¹ ¸ÀéAvÀ
ªÁPÀåUÀ¼À°è §¼À¸À®Ä ¸ÀÆa¸ÀĪÀÅzÀÄ.
• ¥ÀzÀåUÀ¼À ªÀ¸ÀÄÛ, D±ÀAiÀÄUÀ¼À£ÀÄß ¥Àæ¸ÀÄÛvÀPÉÌ C£Àé¬Ä¹ «ZÁgÀ ªÀÄAqÀ£É , ¥ÀzÀåUÀ¼À gÀZÀ£É
ªÀiÁr¸ÀĪÀÅzÀÄ.
• ¥ÀzÀåUÀ½UÉ gÁUÀ ¸ÀAAiÉÆÃf¹ ºÁqÀ®Ä GvÉÛÃf¸ÀĪÀÅzÀÄ. §ºÀĪÀiÁzsÀåªÀÄUÀ¼À£ÀÄß
§¼À¹PÉÆ¼ÀÄîªÀÅzÀÄ.
• ¥ÀzÀåUÀ¼À ªÀ¸ÀÄÛ ªÀÄvÀÄÛ D±ÀAiÀÄUÀ¼À£ÀÄß ¸ÀÈd£ÁvÀäPÀªÁV ZÀlĪÀnPÉUÀ¼À£ÀÄß «zÁåyðUÀ¼À
UÀÄA¥ÀÄUÀ¼À£ÁßV «AUÀr¹ £ÀqɸÀĪÀÅzÀÄ.

Unit:2: UÀzÀåPÀÈw: * UÀzÀåzÀ DAiÀÄÝ ¨sÁUÀªÀ£ÀÄß zsÀé¤ Kj½vÀUÀ¼ÉÆA¢UÉ N¢¸ÀĪÀÅzÀÄ.


• ¨sÁµÁ ªÉʲµÀÖöåªÀ£ÀÄß UÀÄgÀÄw¸ÀĪÀÅzÀÄ.
• UÀzÀåzÀ D±ÀAiÀĪÀ£ÀÄß ¥Àæ¸ÀÄÛvÀPÉÌ C£Àé¬Ä¹ - «ZÁgÀ ªÀÄAqÀ£É, UÀÄA¥ÀÄZÀZÉð.
• ¥ÀoÀåªÀ£ÀÄß gÀAUÀgÀÆ¥ÀPÉÌ vÀgÀĪÀ ¸ÁzsÀåvÉUÀ¼À PÀÄjvÀÄ ZÀZÉð.
• PÀvÉAiÀÄ ¸ÀA«zsÁ£À, vÀAvÀæ PÀÄjvÀ «±ÉèõÀuÉ.
• UÀzÀåzÀ ¨sÁUÀUÀ¼À£ÀÄß ªÀÄvÀÄÛ ¥ÁvÀæUÀ¼À£ÀÄß C©ü£À¬Ä¸ÀĪÀAvÉ «zÁåyðUÀ¼À£ÀÄß GvÉÛÃf¸ÀĪÀÅzÀÄ.
• §gÀºÀUÁgÀgÀ §zÀÄPÀÄ, ¸Á»vÀåPÀ ¸ÁzsÀ£É PÀÄjvÀ ªÀiÁ»w ¸ÀAUÀ滸ÀĪÀÅzÀÄ.
• UÀzÀåzÀ ªÀ¸ÀÄÛ ªÀÄvÀÄÛ D±ÀAiÀĪÀ£ÀÄß ¸ÀÈd£ÁvÀäPÀªÁV ªÀÄgÀÄ gÀƦ¸À®Ä (PÀ«vÉ gÀZÀ£É, ¥ÀæºÀ¸À£À,
¸Áé£ÀĨsÀªÀ PÀxÀ£À, avÀæPÀ¯É, bÁAiÀiÁavÀæ EvÁå¢) ¸ÀÆa¸ÀĪÀÅzÀÄ.
• EzÀPÉÌ ¸ÀA§A¢ü¹zÀ «rAiÉÆÃ ¥ÀæzÀ±Àð£À.

Unit:3: : £ÁlPÀ: £ÁlPÀzÀ DAiÀÄÝ ¨sÁUÀªÀ£ÀÄß zsÀé¤ Kj½vÀUÀ¼ÉÆA¢UÉ N¢¸ÀĪÀÅzÀÄ.


• ¨sÁµÁ ªÉʲµÀÖöåªÀ£ÀÄß UÀÄgÀÄw¸ÀĪÀÅzÀÄ.
• £ÁlPÀzÀ D±ÀAiÀĪÀ£ÀÄß ¥Àæ¸ÀÄÛvÀPÉÌ C£Àé¬Ä¹ - «ZÁgÀ ªÀÄAqÀ£É, UÀÄA¥ÀÄZÀZÉð.
• ¥ÀoÀåªÀ£ÀÄß gÀAUÀgÀÆ¥ÀPÉÌ vÀgÀĪÀ ¸ÁzsÀåvÉUÀ¼À PÀÄjvÀÄ ZÀZÉð.
• £ÁlPÀzÀ ¸ÀA«zsÁ£À, vÀAvÀæ PÀÄjvÀ «±ÉèõÀuÉ.
• £ÁlPÀzÀ ¨sÁUÀUÀ¼À£ÀÄß ªÀÄvÀÄÛ ¥ÁvÀæUÀ¼À£ÀÄß C©ü£À¬Ä¸ÀĪÀAvÉ «zÁåyðUÀ¼À£ÀÄß GvÉÛÃf¸ÀĪÀÅzÀÄ.
• £ÁlPÀPÁgÀgÀ §zÀÄPÀÄ, ¸Á»vÀåPÀ ¸ÁzsÀ£É PÀÄjvÀ ªÀiÁ»w ¸ÀAUÀ滸ÀĪÀÅzÀÄ.
• £ÁlPÀzÀ ªÀ¸ÀÄÛ ªÀÄvÀÄÛ D±ÀAiÀĪÀ£ÀÄß ¸ÀÈd£ÁvÀäPÀªÁV ªÀÄgÀÄ gÀƦ¸À®Ä (PÀ«vÉ gÀZÀ£É,
¥ÀæºÀ¸À£À, ¸Áé£ÀĨsÀªÀ PÀxÀ£À, avÀæPÀ¯É, bÁAiÀiÁavÀæ EvÁå¢) ¸ÀÆa¸ÀĪÀÅzÀÄ.
• EzÀPÉÌ ¸ÀA§A¢ü¹zÀ «rAiÉÆÃ ¥ÀæzÀ±Àð£À.

Unit:4: ªÁåPÀgÀt: * ²µÀÖ¨sÁµÉAiÀÄ ªÁåPÀgÀt eÁÕ£ÀªÀ£ÀÄß ¨É¼É¸ÀĪÀÅzÀÄ.


• ¨sÁµÁ §¼ÀPÉAiÀÄ ªÉÊ«zsÀåvÉAiÀÄ£ÀÄß w½¸ÀĪÀÅzÀÄ.
• §gÀªÀtÂUÉAiÀÄ P˱À®åªÀ£ÀÄß ¨É¼É¸ÀĪÀÅzÀÄ.
• PÀæªÀħzÀÞªÁV N¢¸ÀĪÀÅzÀÄ
• PÁªÀåUÀ¼À ¨sÁUÀUÀ¼À£ÀÄß ¤Ãr C°ègÀĪÀ ªÁåPÀgÀuÁA±ÀUÀ¼À£ÀÄß UÀÄgÀÄw¸À®Ä w½¸ÀĪÀÅzÀÄ
• °AUÀ, ªÀZÀ£À, «¨sÀQÛ, QæAiÀiÁ¥ÀzÀ, ¸ÀªÀiÁ¸À CªÀåAiÀÄUÀ¼À £ÀqÀÄ«£À ªÀåvÁå¸ÀUÀ¼À£ÀÄß
¥ÀnÖ ªÀiÁr¸ÀĪÀÅzÀÄ.
• PÀ£ÀßqÀ ªÁåPÀgÀtPÁgÀgÀ §zÀÄPÀÄ-§gÀºÀ PÀÄjvÀÄ «ZÁgÀ UÉÆÃ¶× K¥Àðr¸ÀĪÀÅzÀÄ.
• ¥ÀzÀ§AzsÀUÀ¼ÀÄ, ªÁPÀåUÀ¼À£ÀÄß gÀa¸À®Ä ªÀÄvÀÄÛ ©r¸À®Ä ¸ÀÆa¸ÀĪÀÅzÀÄ.
• ªÁåPÀgÀtzÀ ¸ÀégÀÆ¥ÀªÀ£ÀÄß w½¸ÀĪÀ ZÀlĪÀnPÉUÀ¼À£ÀÄß £ÀqɸÀĪÀÅzÀÄ.

Unit:5: bÀAzÀ¸ÀÄì: * ¥ÀzÀå gÀZÀ£Á PÀæªÀÄzÀ°è bÀAzÀ¹ì£À §¼ÀPÉAiÀÄ CjªÀÅ.


• ºÀ¼ÀUÀ£ÀßqÀ ¥ÀzÀåUÀ½UÉ ¥Àæ¸ÁÛgÀ ºÁQ bÀAzÉÆÃ ¥ÀæPÁgÀªÀ£ÀÄß UÀÄgÀÄw¸ÀĪÀÅzÀÄ.
• ¥ÀzÀåUÀ¼À£ÀÄß ©r¹ N¢¸ÀĪÀÅzÀÄ.
• vÁ¼À ®AiÀÄ UÀwUÀ¼À£ÀÄß C£ÀĸÀj¹ PÀ«vÉUÀ¼À£ÀÄß gÁUÀ§zÀÞªÁV ºÁqÀĪÀAvÉ ¥ÉæÃgÉæ¸ÀĪÀÅzÀÄ.
• bÀAzÀ¹ì£À C£ÀéAiÀÄ ¥ÀzÀå gÀZÀ£É ªÀiÁr¸ÀĪÀÅzÀÄ.
JSS Science and Technology University, Mysuru
Department of Computer Applications
III Semester Bachelor of Computer Applications [BCA]
Course Category
Course Category Code: L-6 Name:
Language-6
Couse Code: BCA360 Course Title: English-III
Credit Structure
Total Credits: 3 (L:T:P):
3:1:0
Total Hours: 40 Max. Marks: 100
Course Outcomes:
Upon successful completion of this course, students will be able to,
CO1:Understanding of Grammar and Vocabulary
CO2:.Understanding of Grammar and Vocabulary
CO3:Understanding of Poetry
CO4: Understanding of Prose
CO5:Understanding of Essay

Unit:1:LANGUAGE COMPONENTS - I 8 Hours


Degrees of Comparisons
Framingquestions(with WH and yes/no questions)
Prepositions (of time place and position)
Readingcomprehension

Unit:2: LANGUAGE COMPONENTS – II 8 Hours


Identification of adjectives
Identification of adverbs
Construction of sentences with each given words
Job application letter with CV

Unit:3: POETRY 8 Hours


Polonius advice to his son - William Shakespeare
Partition - W. A. Auden
Barter – Sara Teasdale

Unit:4: PROSE 8 Hours


The Romance of a busy broker – O Henry.
Water: the elixir of life – C. V. Raman.

Unit:5: NOVELLAS 8 Hours


The Overcoat – Nikolai Gogol
The Man That Corrupted Hadleyburg – Mark Twain
Text Books:
1. Collections of poetry by William Shakespeare, W.A. Auden, William Wordsworth
2. Collections of prose by O. Henry, C.V. Raman.
Reference Books:
1. English Grammar and Composition Wren and martin.
2. Contemporary English Grammar by J D Murty.

Tutorial details:
Unit: 1 LANGUAGE COMPONENTS-I
In this unit, students will be taught to:
 participate actively in learning of language components.
 use Three degrees of comparison.
 frame questions knowing the difference between WH and YES/NO questions.
 use suitable preposition on time, place and position.
 acknowledge the unseen passage and answer the questions.
Unit: 2 LANGUAGE COMPONENTS–II
In this unit students will be taught to:
 identify different types of adjectives.
 identify different types of adverbs.
 learn the format of the job application letter and produce it with their own resume.
 write job application letters.
Unit: 3 POETRY
In this unit students will be taught to:
 Read the poems with Intonation.
 Analyse the background and settings of the poems.
 Identify the new words and find out their meanings.
 Use new words in their own sentences.
 Analyse the poem with their own beef after understanding the core part of the poems.
Unit: 4 PROSE
In this unit students will be taught to:
 Read the prose and understand the style of writing.
 Identify meaning of new words and use them in their own sentences.
 Discuss the content of the prose comparing it to the present situation.
 Comprehend the questions with respect to prescribed piece of literature.
Unit: 5 NOVELLAS
In this unit students will be taught to:
 Read the novel as and understand the different genre of literature.
 Identify the meaning of new words and use them in their own sentences.
 Analyse content of the novellas with their own views.
 Comprehend questions with respect to prescribe piece of literature.
 Exhibit their talents of writing in any piece of literature.
JSS Science and Technology University, Mysuru

Department of Computer Applications


III Semester Bachelor of Computer Applications [BCA]
Ability Enhancement
Course Category Code: AECC-2 Course Category Name:
Compulsory Couses-2
Course Code: BCA370 Course Title: Constitution of India
Total Credits: 2 Credit Structure (L:T:P): 2:0:0
Total Hours: 26 Max. Marks: 50

Course Outcomes:
Upon successful completion of this course, students will be able to,

CO1:To realise thesignificance of constitution of India to students from all walks of life and
help them to understand the basic concepts of Indian constitution.
CO2:To identify the importance of fundamental rights as well as fundamental duties.
CO3:To understand the functioning of Union, State and Local Governments in Indian federal
system.
CO4:To learn procedure and effects of emergency, composition and activities of election
commission and amendment procedure.
Unit:1 8 Hours
Meaning of the term ―Constitution-Its importance-making of the Indian Constitution salient
features of the constitution. Preamble of the Indian constitution comparative analysis of
Indian constitution with referenced to USA and UK constitution.

Unit:2 8 Hours
Fundamental rights and its limitations. Fundamental Rights - Their content and significance-
Special, rights created in the constitution for Dalits, Backwards, Women, Children and the
Religious and Linguistic Minorities. Directive Principles of state policy Fundamental duties.

Unit: 3 8 Hours
Union executive, union legislature, union judiciary Role and Position of President and Prime
Minister-Adult Franchise System-Election CommissionState legislature, executive, judiciary
Amendment procedures Local bodies Enforcing rights through writs: Certiorari, Mandamus,
Quo Warranto and Habeas Corpus-public interest Litigation emergency provisions

Text Books:

1. V.N. Shukla – Constitution of India


2. M.P. Jain – Indian Constitutional Law.

Reference Books:

1. F.C. Strong – Federalism


2. V.D. Mahajan – Modern Government
3. D.D. Basu – Shorter Indian Constitutional Law
4. Dr. Subhash C. Kashyap – The Framing of India’s Constitution
5. H.M. Seervai – Constituion of India

Additional Learning Resources:

1. https://www.ijlsi.com/15-separation-of-powers-a-comparative-study-under-india-uk-
and-usa-constitution/
2. https://www.insightsonindia.com/polity/indian-constitution/salient-features-of-indian-
constitution/
3. https://www.clearias.com/constitution-of-india/
JSS Science and Technology University, Mysuru

Department of Computer Applications


III Semester Bachelor of Computer Applications [BCA]
Skill Enhancement
Course Category Code: SEC-2 Course Category Name:
Courses-2
Couse Code: BCA380 Course Title: Artificial Intelligence
Total Credits: 1 Credit Structure (L: T:P): 1:0:0
Total Hours: 16 Max. Marks: 50
Course Outcomes:

Upon successful completion of this course, students will be able to:


CO1: Explore fundamental of artificial intelligence.
CO2: Understand the notion of Learning types and environments.

Unit:1: Introduction to Artificial Intelligence 8 Hours


What is artificial intelligence, defining artificial intelligence, Application of AI, history of artificial
intelligence, machine learning, Difference between Conventional programming and Machine
Learning, how is machine learning related to AI, Data, what is Data? Define it, Terminology and
Related Concepts, Deep Learning and Neural Networks, Artificial Neural Network, Deep
Learning, what machine learning can and cannot do, Jobs in AI.

Unit:2: Classification and Clustering 8 Hours


Introduction to Learning what is learning, types of learning, what is classification in Artificial
Intelligence / Machine Learning (AI/ML), Types of Classification Algorithm, Evaluation metrics,
introduction to clustering, introduction to clustering, clustering workflow, k-means clustering, why
unsupervised clustering, Dimensionality Reduction, AI values

Text Books:
1. Patterson Dan W Introduction to Artificial Intelligence and Expert Systems 1st Edition 2015
2.Artificial Intelligence: Study Material, of IBM
Reference Books:
1. Dheeraj Mehrotra, AI Basics for School Students: As per the CBSE Inspire Module for Artificial
Intelligence – 24 December 2019
2. Chris Sebastian, Machine Learning for Beginners: Absolute Beginners Guide, Learn Machine
Learning and Artificial Intelligence from Scratch (Python, Machine Learning Book 2) 2019.

Additional web resources:


1. https://www.geeksforgeeks.org/artificial-intelligence-an-introduction/
2. https://www.geeksforgeeks.org/machine-learning/
3. https://youtu.be/ukzFI9rgwfU?t=4
4. https://youtu.be/JMUxmLyrhSk
JSS Science and Technology University, Mysuru

Department of Computer Applications


III Semester Bachelor of Computer Applications [BCA]
Course Category Code: DSC-7 Course Category Name: Discipline Core-7
Java Programming
Course Code: BCA32L Course Title:
Laboratory
Total Credits: 1 Credit Structure (L:T:P): 0:0:1
Total Hours: 32 Max. Marks: 50

Course Outcomes:
Upon successful completion of this course, students will be able to,
CO 1: Understand and implement programs on structure and components of a Java
language
CO 2: Understand classes, objects, members of a class and use packages and
interfaces appropriately.
CO 3: Demonstrate for Java program for multithread, synchronization and exception
handling concepts.
CO 4: Use the concept of string, event handling, simple data structures like arrays and
members of classes of Java API in application development
CO 5: Design and develop Java based UI and Networking applications using applets,
swing components and networking concepts.

LIST OF PROGRAMS TO BE COVERED

1. Write a program to display Hello world


2. Write a program to ODD and EVEN numbers
3. Write a program to find factorial of number
4. Write a program to find the sum of the digits of a given number
5. Write a program to swap two numbers without using a temporary variable
6. Write a program accepts a name and display the name with greeting message using
Class.
7. Write a program to generate a salary for an employee using class, object, constructors,
methods and access control. Different parameters to be considered are Emp_No,
Emp_Name, Age, Basic, DA, HRA, CA, PT, IT.
8. Write a program to generate a sales report for a sales executive using class, object,
constructors, methods and access control. Different parameters to be considered are
Emp_No, Emp_Name, Sales_Q1, Sales_Q2, Sales_Q3, Sales_Q4.
9. Write a JAVA Program to demonstrate Constructor Overloading and Method
Overloading.
10. Write a JAVA Program to implement Inner class and demonstrate its Access protection.
11. Write a program in Java for String handling which performs the following:
a. Checks the capacity of StringBuffer objects.
b. Reverses the contents of a string given on console and converts the resultant
string in upper case.
c. Reads a string from console and appends it to the resultant string of ii.
12. Write a JAVA Program to demonstrate Inheritance.
13. Simple Program on Java for the implementation of Multiple inheritance using
a. interfaces to calculate the area of a rectangle and triangle.
14. Write a JAVA program which has
a. A Class called Account that creates account with 500Rs minimum balance, a
deposit() method to deposit amount, a withdraw() method to withdraw amount
and also throws LessBalanceException if an account holder tries to withdraw
money which makes the balance become less than 500Rs.
b. A Class called LessBalanceException which returns the statement that says
withdraw amount ( Rs) is not valid.
c. A Class which creates 2 accounts, both account deposit money and one
account tries to withdraw more money which generates a
LessBalanceException take appropriate action for the same.
15. Write a JAVA program using Synchronized Threads, which demonstrates Producer
Consumer concept.
16. Write a JAVA program to implement a Queue using user defined Exception Handling
(also make use of throw, throws.).
17. Complete the following:
a. Create a package named shape.
b. Create some classes in the package representing some common shapes like
Square,
c. Triangle and Circle. Import and compile these classes in other program.
18. Write a JAVA Program
a. Create an enumeration Day of Week with seven values SUNDAY through
SATURDAY. Add a method is Workday( ) to the DayofWeek class that returns
true if the value on which it is called is MONDAY through FRIDAY. For example,
the call DayOfWeek.SUNDAY.isWorkDay ( ) returns false.
19. Write a JAVA program which uses Datagram Socket for Client Server Communication.
20. Write a JAVA applet program, which handles keyboard event.
21. Write a JAVA Swing program, to design a form.

Text Books:

1. Herbert Schildt. Java - The Complete Reference, 7thEdition. Oracle Press, McGraw Hill
Education (India) Edition- 2014.

Reference Books

1. Cay S. Horstmann, Gary Cornell. Core Java, Core Java Volume-1 – Fundamentals, 9th
edition, Pearson Education, 2014.
2. Timothy Budd, “Understanding Object-oriented programming with Java”, Updated
Edition, Pearson Education, 2000.
Additional Learning Resources:

1. http://www.learnjavaonline.org/
2. https://www.codecademy.com/learn/learn-java
3. http://www.tutorialspoint.com/java/
4. http://www.java-examples.com/
JSS Science and Technology University, Mysuru

Department of Computer Applications


III Semester Bachelor of Computer Applications [BCA]

Course Category Code: Course Category Name:


Skill Enhancement
SEC-2
Courses-2
Artificial Intelligence
Couse Code: BCA38L Course Title:
Laboratory
Total Credits: 01 Credit Structure (L:T:P): 0:0:1
Total Hours: 16 Max. Marks: 50
Course Outcomes:
Upon successful completion of this course, students will be able to:

CO1: Gain the Fundamental knowledge on theory of Artificial intelligence


CO2: Explore the Learning Types and Learning Environment.

List of Experiments:
CASE STUDY ON:
1. Artificial intelligence in

a) Games.

b) Education

c) cinematography.

d) Health-Sectors.

e) Wildlife Conservation.

f) Agriculture

g) Explore the usage of inference tools in AI

2. A credit card company typically receives hundreds of applications for a new credit card. It
contains information regarding several different attributes such as, annual salary, outstanding
debt, age etc. The problem is to categorize applications into those who have good credit, bad
credit or somewhere in the middle. Categorization of the application is nothing but a
classification problem.

3. You may want to own a dog but which kind of dog? This is the beginning of a classification
problem. Dogs can be classified in a number of different ways. For example, they can be
classified by breed (examples include beagles, hounds, Pug and countless others). they can
also be classified by their role in the lives of their masters and the work they do (examples
include a dog might be a family pet, a working dog, a show dog, or a hunting dog). In many
cases, dogs are defined both by their breed and their role. Based on different classification
criteria, you decide eventually which one you want to own.

4. A common example of classification comes with detecting spam emails. To write a program to
filter out spam emails, a computer programmer can train a machine learning algorithm with a
set of spam-like emails labeled as “spam” and regular emails labeled as “not-spam”. The idea
is to make an algorithm that can learn characteristics of spam emails from this training set so
that it can filter out spam emails when it encounters new emails.

5. Assume there are 100 images, 30 of them depict a cat, the rest do not. A machine learning
model predicts the occurrence of a cat in 25 of 30 cat images. It also predicts absence of a
cat in 50 of the 70 no cat images. In this case, what are the true positive, false positive, true
negative and false negative?

6. Confusion Matrix Example 1: Do you still remember the shepherd boy story? “A shepherd boy
used to take his herd of sheep across the fields to the lawns near the forest. One day he felt
very bored. He wanted to have fun. So, he cried aloud "Wolf, Wolf. The wolf is carrying away
a lamb". Farmers working in the fields came running and asked, "Where is the wolf?". The boy
laughed and replied "It was just for fun. Now get going all of you". The boy played the trick for
quite a number of times in the next few days. After some days, as the boy was perched on a
tree, singing a song, there came a wolf. The boy cried loudly "Wolf, Wolf, the wolf is carrying a
lamb away." There was no one to the rescue. The boy shouted "Help! Wolf! Help!" Still no one
came to his help. The villagers thought that the boy was playing mischief again. The wolf
carried a lamb away”.

7. Consider a health prediction case, where one wants to diagnose cancer. Imagine that
detecting cancer will trigger further analysis (the patient will not be immediately treated)
whereas if you don't detect cancer, the patient is sent home without further prognosis. This
case is thus asymmetric, since you definitely would like to avoid sending home a sick patient
(False Negative). You can however make the patient wait a little more by asking him/her to
take more tests even if the initial results show them negative for cancer (False Positive). As in
this situation, you would prefer a False Positive over a False Negative.

8. Imagine a patient taking an HIV test. The impacts of a false positive on the patient would at
first be heart breaking; to have to deal with the trauma of facing this news and telling your
family and friends. But on further examination, the doctors will find out that person in question
does not have the virus. Again, this would not be a particularly pleasant experience. But not
having HIV is ultimately a good thing. On the other hand, a false negative would mean that
the patient has HIV but the test shows a negative result. The implications of this are terrifying,
the patient would be missing out on crucial treatment and runs the risk of spreading. Without
much doubt, the false negative here is the bigger problem. Both for the person and for
society.

9. Let us see how this algorithm works using the well-known Iris flower data set -
(https://archive.ics.uci.edu/ml/datasets/iris). This dataset contains four measurements of three
different Iris flowers. The measurements are - Sepal length, Sepal width, Petal length, and
Petal width. The three types of Iris are Setosa, Versicolour, and Virginica as shown below in
the same order.

10. After watching the video “The Ethical Robot” what are the two ethical questions that strike
you? Write them down.

11. With the video “How to build a moral robot” as your baseline, please write down the moral
and ethical values you would like incorporate in your robot? The video is only a guide, let it
not limit your imagination and creativity.

12. Form a group of 5 students and watch the video “Humans need not apply” as a group. Please
watch the video more than once. At the end, submit a paper as a group on your learnings
from the video.
13. Suppose a CCTV camera were to spot your face in a crowd outside a sports stadium. In the
police data center somewhere in the city/ country, an artificial neural network analyzes images
from the CCTV footage frame by-frame. A floating cloud in the sky causes a shadow on your
face and neural network (by mistake) finds your face similar to the face of a wanted criminal. If
the police were to call you aside for questioning and tell you they had reason to detain you,
how would you defend yourself? Was it your fault that your shadowed face has resemblance
by few degrees with a person in the police record?

14. This happened in the USA in 2018. An AI system was being used to allocate care to nearly
200 million patients in the US. It was discovered later that AI system was offering a lower
standard of care to the black patients. Across the board, black people were assigned lower
risk scores than white people. This in turn meant that black patients were less likely to be able
to access the necessary standard of care. The problem stemmed from the fact that the AI
algorithm was allocating risk values using the predicted cost of healthcare. Because black
patients were often less able to pay or were perceived as less able to pay for the higher
standard of care, the AI essentially learned that they were not entitled to such a standard of
treatment. Though the system was fixed / improved after being discovered but the big
question is – whose problem was this? The AI system developers or the US black people data
(which was true to an extent)?

15. Make a list of 10 biases which you observe in your home, classroom or in your society. You
don’t need to get all 10 biases in one go. You can start with one and keep adding as you
observe more.

Text Books:
1. Leelavathi. M, Manoj Kumar, Senthil Kumar, Artificial Intelligence for Beginners, English.
2. Patterson Dan W Introduction to Artificial Intelligence and Expert Systems 1st Edition 2015
3.Artificial Intelligence: Study Material, of IBM.
Reference Books:
1. Dheeraj Mehrotra, Ai Basics for School Students: As per the CBSE Inspire Module for Artificial
Intelligence – 24 December 2019
2. Chris Sebastian, Machine Learning for Beginners: Absolute Beginners Guide, Learn Machine
Learning and Artificial Intelligence from Scratch (Python, Machine Learning Book 2) 2019.

Additional web resources:


1. https://www.geeksforgeeks.org/artificial-intelligence-an-introduction/
2. https://www.geeksforgeeks.org/machine-learning/
3. https://youtu.be/ukzFI9rgwfU?t=4
4. https://youtu.be/JMUxmLyrhSk
IV Semester
JSS Science and Technology University, Mysuru

Department of Computer Applications


IV Semester Bachelor of Computer Applications [BCA]
Course Category Code: DSC-8 Course Category Name: Discipline Core-8
Analysis and Design of
Course Code: BCA410 Course Title:
Algorithms
Total Credits: 3 Credit Structure (L:T:P): 3:0:0
Total Hours: 40 Max. Marks: 100
Course Outcomes:
Upon successful completion of this course, students will be able to:

CO1: Understanding the concepts of time and space complexity, worst case, average case
and best-case complexities and the big-O notation.
CO2: Understanding the range of behaviors of algorithms and the notion of tractable and
intractable problems.
CO3: Knowing and understanding a wide range of searching and sorting algorithms
CO4: Developing efficient algorithms for simple computational tasks and computing
complexity measures of algorithms, including recursive algorithms using
recurrence relations.
CO5: Developing algorithms to solve optimization problems and analyzing the limitations of
algorithms
Unit:1: Introduction and the Fundamentals of Algorithmic Problem Solving 7 Hours

Introduction, Fundamentals of Algorithmic Problem Solving, Important Problem Types,


Fundamental Data Structures: Linear Data Structures, Graphs, Trees, Sets and Dictionaries
.
Unit:2: Fundamentals of the Analysis of Algorithm Efficiency 9 Hours

Analysis Framework, Asymptotic Notations and Basic Efficiency Classes, Mathematical


Analysis of Nonrecursive Algorithms, Mathematical Analysis of Recursive Algorithms,
Example: Fibonacci Numbers, Empirical Analysis of Algorithms, Algorithm Visualization.

Unit:3: Brute Force and Exhaustive Search 8 Hours

Selection Sort and Bubble Sort, Sequential Search and Brute-Force String Matching,
Exhaustive Search: Depth-First Search and Breadth-First Search.

Unit:4: Decrease-and-Conquer and Divide-and-Conquer 9 Hours

Mergesort, Quicksort, Binary Search, Binary Tree Traversals and Related Properties,
Insertion Sort, Decrease-by-a-Constant-Factor Algorithms: Binary Search, Fake-Coin
Problem.

Unit:5: Transform-and-Conquer and Space and Time Trade-Offs 7 Hours

Presorting, Balanced Search Trees: AVL Trees, 2-3 Trees, Heaps and Heapsort, Input
Enhancement in String Matching: Horspool’s Algorithm, Boyer-Moore Algorithm, Hashing :
Open Hashing, Closed Hashing.
Text Books:
1. Anany Levitin: Introduction to the Design and Analysis of Algorithms, 3rd Edition, Pearson
Education, 2012.

Reference Books:
1. Coremen T.H., Leiserson C.E., and Rivest R.L.: Introduction to Algorithms, PHI, 1998.
2. Horowitz E., Sahani S., Rajasekharan S.: Computer Algorithms, Galgotia Publications,
2001.
3. Harsh Bhasin: Algorithms: Design and Analysis, Oxford University press, 2015.

Additional Learning Resources:


1. https://www.tutorialspoint.com/data_structures_algorithms/index.htm
2. https://nptel.ac.in/courses/106101060
JSS Science and Technology University, Mysuru

Department of Computer Applications


IV Semester Bachelor of Computer Applications [BCA]
Course Category Code: DSC-9 Course Category Name: Discipline Core-9
Database Management
Course Code: BCA420 Course Title:
System
Total Credits: 3 Credit Structure (L:T:P): 3:0:0
Total Hours: 40 Max. Marks: 100
Course Outcomes:

Upon successful completion of this course, students will be able to:


CO1: Analyze the concepts of data models and modelling notations, understanding the need of
database, developing a database.
CO2: Relate and design the entity relationship models, diagrams.
CO3: Solve algebraic expressions/operations on relational database and mapping.
CO4: Use of SQL, design the queries to handle all the basic and advanced operations on DBMS,
need and models of normalizing the databases.
CO5: Design of applications which handles the operations involved in RDBMS.

Unit:1: Introduction to Database Management 8 Hours


Introduction, what is a Database? Characteristics of Databases Data Governance and Importance
of Databases, History of Database Software, File Systems vs. Database Systems, What is a
DBMS, uses of a Database Systems, Advantages of using an Enterprise Database, Concerns
when using an Enterprise Database, Three-Level DBMS Architecture and Data Abstraction, Data
Independence, DBMS System Architecture, Database Administrator, Designing an Enterprise
Database System, Future of Databases-Web Databases, Choosing a DBMS.

Unit:2: Entity-Relationship Data Model 8 Hours


Introduction, Benefits of Data Modeling, Types of Models, Phases of Database Modeling the
Entity-Relationship Model, Generalization, Specialization and Aggregation, Extended Entity
Relationship Model the Database Design Process Strengths of the E-R Model Weakness of the E-
R Model A Case Study of Building an E-R Model, Evaluating Data Model Quality.

Unit:3: Relational Model and Relational Algebra 8 Hours


Introduction, Data Structure, Mapping the E-R Model to the Relational Model, Data Manipulation,
Data Integrity, Advantages of the Relational Model, Rules for Fully Relational Systems, Earlier
Database Models-Hierarchical and Network Models.

Unit:4: Introduction to SQL 9 Hours


Overview of the SQL Query Overview of the SQL Query Language, SQL Data Definition, Basic
Structure of SQL Queries, Additional Basic Operations, Set Operations, Null Values, Aggregate
Functions, Nested Subqueries, Modification of the Database. Intermediate SQL: Join Expressions,
Views, Transactions, Integrity Constraints, SQL Data Types and Schemas, Authorization.
Advanced SQL: Accessing SQL From a Programming Language, Functions and Procedures,
Triggers, Recursive Queries, Advanced Aggregation Features, OLAP.

Unit:5: Advanced SQL and Normalization 7 Hours


Formal Relational Query Languages: The Relational Algebra, Relational Algebra Queries, The
Tuple Relational Calculus, The Domain Relational Calculus. Normalization: Introduction,
Possible Undesirable Properties of Relations and Schema Refinement, Functional
Dependencies, Normalization- 1NF, 2 NF and 3 NF, Worked Examples.

Text Books:
1. G K Guptha: Database Management Systems, Mc Grawhill Publications, 2018.

Reference Books
1. A.Silberschatz, Henry.F.Korth and S.Sudharshan: Database System Concepts, 6th Edition, Mc
Grawhill Publications, 2019.
2. Ramez Elmasri, Shamkant.B.Navathe: Fundamentals of Database Systems, 6th Edition,
Pearson Education, 2011.
3. Raghu Ramakrishnan and J Gehrke: Database Management Systems, 3rd Edition, Mc Grawhill
Publications, 2007.
4. C.J.Date , AKannan and S.Swamynathan: An Introduction to Database System, 8th Edition,
Pearson Education, 2006.
5. Elmasri and Navathe : Database Systems: Models, Languages, Design and Application
Programming, Pearson Publications, 2011.

Additional Learning Resources:


1. https://www.tutorialspoint.com/sql/sql-rdbms-concepts.htm
2. http://www.svecw.edu.in/Docs%5CITIIBTechIISemLecDBMS.pdf
JSS Science and Technology University, Mysuru
Department of Computer Applications
IV Semester Bachelor of Computer Applications [BCA]
Course Category Code: OE-4 Course Category Name: Open Elective-4
Course Code: BCA430 Course Title: Internet of Things
Total Credits: 3 Credit Structure (L:T:P): 3:0:0
Total Hours: 40 Max. Marks: 100

Course Outcomes:

Upon successful completion of this course, students will be able to,

CO1: Interpret the impact and challenges posed by IoT networks leading to new
architectural Models.
CO2: Compare and contrast the deployment of smart objects and the technologies to
connect Them to network.
CO3: Appraise the role of IoT protocols for efficient network communication.
CO4: Elaborate the need for Data Analytics.
CO5: Exploring the IOT physical devices like Raspberry Pi & its configuration.

Unit:1: Introduction to IOT 8 Hours


What is IoT, Genesis of IoT, IoT and Digitization, IoT Impact, Convergence of IT and IoT,
IoT Challenges, IoT Network Architecture and Design, Drivers Behind New Network
Architectures, Comparing IoT Architectures, A Simplified IoT Architecture, The Core IoT
Functional Stack, IoT Data Management and Compute Stack.

Unit:2: Engineering IOT Networks 8 Hours


Smart Objects: The “Things” in IoT, Sensors, Actuators, and Smart Objects, Sensor
Networks, Connecting Smart Objects, Communications Criteria.

Unit:3: IP as the IOT Network Layer 8 Hours


IP as the IoT Network Layer, The Business Case for IP, the need for Optimization,
Optimizing IP for IoT, Profiles and Compliances, Application Protocols for IoT, The
Transport Layer, IoT Application Transport Methods.

Unit:4: Data & Analytics for IOT 8 Hours


Data and Analytics for IoT, An Introduction to Data Analytics for IoT, Machine Learning, Big
Data Analytics Tools and Technology, Edge Streaming Analytics, Network Analytics.

Unit:5: IOT Physical Devices and Endpoints 8 Hours


IoT Physical Devices and Endpoints – Raspberry Pi: Introduction to Raspberry Pi, Exploring
the Raspberry Pi Board:Operating Systems on Raspberry Pi, Operating Systems Setup on
Raspberry Pi, Raspberry Pi commands ,Programming Raspberry Pi with Python.
Text Books:

1. David Hanes, Gonzalo Salgueiro, Patrick Grossetete, Robert Barton, Jerome Henry ”IoT
Fundamentals: Networking Technologies, Protocols, and Use Cases for the Internet of
Things”.1st Edition published by Pearson Education, 2022.
2. Srinivasa K G, Siddesh G.M, Hanumantha Raju R- “Internet of Things”- Cengage
Learning 2017.
Reference Books

1. Vijay Madisetti and Arshdeep Bahga –Internet of Things (A-Hands-on-Approach) -1st


edition
VPT, 2014.
2. Raj Kamal Internet of Things: Architecture and Design Principles- 1st Edition, MCGraw Hill
Education 2017.
3. Cuno Pfister Getting Started with the Internet of Things-O Reilly Media, 2011
4. Jan Holler, Vlasios Tsiatsis, Catherine Mulligan, Stefan Aves and, Stamatis Karnouskos,
David
Boyle -From Machine-to-Machine to the Internet of Things: Introduction to a New Age of
Intelligence -1st edition, Academic Press 2014.

Additional Learning Resources:

1.https://nptel.ac.in/courses/106/105/106105195/
2. https://nptel.ac.in/courses/106/105/106105166/
JSS Science and Technology University, Mysuru

Department of Computer Applications


IV Semester Bachelor of Computer Applications [BCA]
Course Category Code: DSE-3 Course Category Name: Discipline Elective-3
Course Code: BCA441 Course Title: Network Security
Total Credits: 3 Credit Structure (L:T:P): 3:0:0
Total Hours: 40 Max. Marks: 100

Course Outcomes:

Upon successful completion of this course, students will be able to,

CO1: Develop Concept of Security needed in Communication of data through computers


and networks along with Various Possible Attacks
CO2: Understand network security concepts and study different Web security mechanisms.
CO3: Understand Transport security concepts and study different wireless network security
Mechanisms.
CO4: Understand E-mail security concepts and study different E-mail security mechanisms.
CO5:Understand internet security concepts and study different system security mechanisms.

Unit:1: Introduction 8 Hours

Introduction, Need of security, security approaches, principles of security, types of attack,


Cryptography: plain text and cipher text, encryption and decryption, steganography.

Unit:2: Web Security 8 Hours

Network access control, Authentication protocol, Web security considerations, transport


layer security, HTTPS, Secure shell(SSH), wireless security, mobile device security

Unit:3: Transport security, Wireless network security 8 Hours

Transport layer security, HTTPS, Secure shell(SSH): Transport layer protocol, User
Authentication protocol, Connection protocol, wireless security, Mobile device security, IEEE
802.11 Wireless LAN Security, IP Security.

Unit:4: E-mail Security 8 Hours

Internet mail architecture, E-mail formats, E-mail threats and e-mail security, S/MIME 627,
DNS based authentication.

Unit:5: System security 8 Hours


Malicious Software, types of malicious software, Intruders, intrusion detection, password
management, Firewalls: need of firewalls, firewall characteristics, types of firewall.

Text Books:

1. Behrouz A. Forouzan, “Cryptography and Network Security, 5 Th edition”, Tata McGraw-


Hill Publishing, 2016.
Reference Books:

1. William Stalling, “Cryptography & Network Security”, 7th edition, PHI, 2018.
2. Atul Kahate, “Cryptography & Network Security” 2nd edition, McGraw Hill, 2016.

Additional Learning Resources:

1. https://nptel.ac.in/courses/106105031/ Cryptography and network security.


2. https://ocw.mit.edu/ courses/electricalengineering-andcomputer-science/6- 857-network-
andcomputer-securityspring2014/index.html
3. https://ocw.mit.edu/ courses/electricalengineering-andcomputer-science/6- 857-network-
andcomputer-securityspring2014/index.html”
JSS Science and Technology University, Mysuru

Department of Computer Applications


IV Semester Bachelor of Computer Applications [BCA]
Course Category Code: DSC-3 Course Category Name: Discipline Elective-3
Management
Course Code: BCA442 Course Title:
Information System
Total Credits: 3 Credit Structure (L:T:P): 3:0:0
Total Hours: 40 Max. Marks: 100

Course Outcomes:

Upon successful completion of this course, students will be able to,

CO1: Able to understand the concepts of system, system components and development
Techniques with case studies.
CO2: Design and develop Information system for business environment by understanding
the need and criticality of type of information and integrate information system into
business Requirement using management techniques.
CO3: Apply the different strategies for the management of business to formulate business
Process.
CO4: Analyze the need for business process re-engineering, and the process of making.
CO5: Understand the concepts and functionalities of enterprise systems like ERP, SCM and
DSS.

TOPICS COVERED:
Unit:1: Management Information System in a digital firm 8 Hours

Management Information System(MIS), MIS: Definition, Role of the management information


system ,Impact of the management information system ,MIS and the user ,Management as a
control system ,MIS:A support to the management ,Management effectiveness and MIS
Organization on a system ,MIS:Organisation effectiveness ,MIS for a digital firm.
E-Business Enterprise: A Digital Firm
Introduction to E-business enterprise: A digital firm, Organisation of business in digital
Firm, E-Business, E-Commerce, E-Communication, E-Collaboration, Real time enterprise,
What are the technology options for becoming a real time enterprise

Unit:2: Strategic Management of Business Performance, Creating a Model of


Organisation Excellence 8 Hours

Essentiality of strategic planning, Tools of planning, Balance score card, Score card and
Dash board, Strategic Management of business performance, What is strategy? Three
Approaches to development of strategy, Class and types of Strategy, EFQM Model: A
prescription for achieving organisation excellence.
Information Security: Threats and Management
Information security: Threats and vulnerability, Controlling security threat and vulnerability,
Managing security threat in E-business, Disaster Management, Application systems security
management, information security management, Measures of information security, network
security, cyber security.
Unit :3: Information Technology: Impact on Society 8 Hours

Introduction, Impact of IT on privacy, Ethics, Technical solutions for privacy protection,


Intellectual property, copyright and patents, Impact of information technology on the
workplace, Information system quality and impact, impact on quality of life.

Decision-Making
Decision-making concepts, Decision-making process, Decision Analysis by analytical
modelling, Behavioural concepts in decision making, Organisational decision making, MIS
and decision making.

Unit:4: Information,Knowledge,Business Intelligence 8 Hours

Information Concepts, Information: A quality product, classification of the information,


Methods of data and information collection, value of the information, General model of a
human as an information processor, Summary of information concepts and their
implications, Knowledge and knowledge management systems, Business Intelligence, MIS,
and the information and knowledge.
System Engineering: Analysis and Design
System concepts, system control, Types of system, Handling system complexity, classes of
systems, general model of MIS, The need for system analysis, System analysis of the
existing system, system analysis of a new requirement, system development model,
structured system analysis and design(SSAD), object oriented analysis(OOA), system
development through OOT:A use case model, OOSAD development life cycle.

Unit:5: Development Process of MIS 8 Hours

Development of long range plans of the MIS, Ascertaining the class of information,
Determining the information requirement, Development and Implementation of the MIS,
Management of information quality in the MIS, Organisation for development of MIS, MIS:
Development process model.
Strategic Design of MIS
Strategic Management of the business, why strategic design of MIS?, Balance score card,
score card and dash board, strategic design of MIS, development process steps for strategic
design(SD) of MIS, Illustrating SD of MIS for big Bazaar, Strategic management of business
and SD of MIS, Business strategy determination, Business strategy implementation.

Text Books:

1. Waman S Jhawadekar: Management Information System, 3rd Edition, Tata McGraw Hill.
2. James A O’Brien and George M Marakas: Management Information System, 7th Edition,
Tata McGraw Hill, 2006
3. Turban, Rainer, and Potter, Introduction to E-Commerce, 2nd edition, 2003
4. H. M. Deitel, P. J. Deitel and T. R. Nieto, E-Business and E-Commerce: How to
Program, Prentice hall, 2001

Reference Books

1. Ralph M Stair and George W Reynolds: Principles of Information Systems, 7th Edition,
Thomson, 2010.
2. Steven Alter: Information Systems - The Foundation of E-Business, 4th Edition, Pearson
Education, 2001.
3. Elizabeth Chang: E-Commerce Fundamentals and Applications, Wile India Edition.
Additional Learning Resources:

1. ncbi.nlm.nih.gov
2. http://www.netsuite.com/portal/resource/articlesl
JSS Science and Technology University, Mysuru

Department of Computer Applications


IV Semester Bachelor of Computer Applications [BCA]
Course Category Code: L-7 Course Category Name: Language-7
Course Code: BCA450 Course Title: Kannada-IV
Total Credits: 3 Credit Structure (L:T:P): 3:0:0
Total Hours: 40 Max. Marks: 100
Course Outcomes:
Upon successful completion of this course, students will be able to:

CO1: ªÉÊAiÀÄQÛPÀ, ¸ÁªÀiÁfPÀ, eÁ£À¥ÀzÀ ¯ÉÆÃPÀzÀ »£É߯ÉAiÀİè fêÀ£À ªÀiË®åUÀ¼À CjªÀÅ.

CO2: £ÁqÀÄ-£ÀÄr, ¸ÀA¸ÀÌøw ºÁUÀÆ ¸ÀA¸ÁÌgÀªÀAvÀ fêÀ£À ¦æÃwAiÀÄ w½ªÀÅ.

CO3: ªÀåQÛ vÀ¤ßAzÀ vÁ£Éà J®èªÀ£ÀÆß UÀ½¹PÉÆ¼Àî¨ÉÃPÉA§ CjªÀÅ.

CO4: ²µÀÖ ¨sÁµÉAiÀÄ ªÁåPÀgÀt eÁÕ£À

CO5: ¥ÀzÀå gÀZÀ£Á PÀæªÀÄzÀ°è bÀAzÀ¹ì£À §¼ÀPÉAiÀÄ CjªÀÅ.

Unit:1: PÁªÀå ¨sÁUÀ : 8 hours


1. C©üªÀiÁ£ÀzsÀ£ÀA ¸ÀÄAiÉÆÃzsÀ£ÀA-¥ÀA¥À
2. d£À¥ÀzÀ ªÀÄÄPÀÛPÀUÀ¼ÀÄ

Unit:2: «ZÁgÀ ¸Á»vÀå: 8 hours


1. £ÀªÀÄä ¸ÀA¸ÀÌøwAiÀÄ ºÉªÉÄä ¸Á®zÉ-²ªÀgÁªÀÄPÁgÀAvÀ
2. PÀ£ÁðlPÀ ¸ÀA¸ÀÌøwAiÀÄ MAzÀÄ avÀæ-gÀºÀªÀÄvï vÀjÃPÉgÉ
.

Unit:3: QgÀÄ PÁzÀA§j: 8 hours


¥ÉæÃªÀÄ©üPÀëÄ-¥Àæ¨sÀıÀAPÀgï

Unit:4: ªÁåPÀgÀt: 8 hours


«±ÉõÀtUÀ¼ÀÄ: 1. £ÁªÀÄ«±ÉõÀtUÀ¼ÀÄ
2. QæAiÀiÁ«±ÉõÀtUÀ¼ÀÄ
C£ÀéAiÀÄPÀæªÀÄ-CzsÁåºÁgÀ-¢égÀÄQ-eÉÆÃqÀÄ£ÀÄr-¯ÉÃR£À aºÉßUÀ¼ÀÄ
ªÁPÀå¨sÉÃzÀUÀ¼ÀÄ: 1. ¸ÁªÀiÁ£Àå-¸ÀAAiÉÆÃfvÀ-«Ä±ÀæªÁPÀåUÀ¼ÀÄ
2. ªÁPÀå¥ÀjvÀð£À
3. ªÁPÀ嫨sÀd£É

Unit:5: bÀAzÀ¸ÀÄì: 8 hours


gÀUÀ¼É
µÀlà¢
¸ÁAUÀvÀå

Text Books:
1. ªÉÄʸÀÆgÀÄ «±Àé«zÁ央AiÀÄzÀ PÀ£ÀßqÀ ¥ÀoÀå¥ÀĸÀÛPÀUÀ¼ÀÄ
2. QgÀÄ PÁzÀA§j: ¥ÉæÃªÀÄ©üPÀëÄ-¥Àæ¨sÀıÀAPÀgï
3. ªÀZÀ£ÀUÀ¼À ¥ÀĸÀÛPÀUÀ¼ÀÄ
4. ¥ÀA¥À ¨sÁgÀvÀ
5. ²ªÀgÁªÀÄPÁgÀAvÀgÀ ¥ÀĸÀÛPÀUÀ¼ÀÄ
6. bÀAzÀ¸ÀÄì
7. PÀ£ÀßqÀ ªÀÄzsÀåªÀÄ ªÁåPÀgÀt-wÃ.£ÀA.²æÃPÀAoÀAiÀÄå

Reference Books:
¸ÀàzsÁðvÀäPÀ ¥ÀjÃPÉëUÀ¼À ¥ÀĸÀÛPÀUÀ¼ÀÄ

Additional Learning Resources:


PÀ£ÀßqÀ ¸Á»vÀåPÉÌ ¸ÀA§A¢ü¹zÀ ¥ÀĸÀÛPÀUÀ¼ÀÄ
¸ÀªÀÄÆºÀ ªÀiÁzsÀåªÀÄUÀ¼ÀÄ
¤AiÉÆÃfvÀ PÁAiÀÄðPÀæªÀÄUÀ½UÉ ¸ÀA§A¢ü¹zÀAvÉ ¸ÀܼÀUÀ¼À ¨sÉÃn

Tutorial Details:
Unit:1: PÁªÀå : * ¥ÀzÀå/ªÀÄÄPÀÛPÀUÀ¼À£ÀÄß ©r¹, ¨sÁªÀ CxÀð w½AiÀÄĪÀAvÉ N¢¸ÀĪÀÅzÀÄ.
* ¥ÀzÀå/ªÀÄÄPÀÛPÀUÀ¼À°ègÀĪÀ «±ÉõÀ ¥ÀzÀ, £ÀÄrUÀlÄÖ, UÁzÉ , G¥ÀªÉÄUÀ¼À£ÀÄß UÀÄgÀÄw¹ ¸ÀéAvÀ
ªÁPÀåUÀ¼À°è §¼À¸À®Ä ¸ÀÆa¸ÀĪÀÅzÀÄ.
• ¥ÀzÀå/ªÀÄÄPÀÛPÀUÀ¼À ªÀ¸ÀÄÛ, D±ÀAiÀÄUÀ¼À£ÀÄß ¥Àæ¸ÀÄÛvÀPÉÌ C£Àé¬Ä¹ «ZÁgÀ ªÀÄAqÀ£É ,
¥ÀzÀå/ªÀÄÄPÀÛPÀUÀ¼À gÀZÀ£É ªÀiÁr¸ÀĪÀÅzÀÄ.
• ¥ÀzÀå/ªÀÄÄPÀÛPÀUÀ½UÉ gÁUÀ ¸ÀAAiÉÆÃf¹ ºÁqÀ®Ä GvÉÛÃf¸ÀĪÀÅzÀÄ. §ºÀĪÀiÁzsÀåªÀÄUÀ¼À£ÀÄß
§¼À¹PÉÆ¼ÀÄîªÀÅzÀÄ.
• ¥ÀzÀå/ªÀÄÄPÀÛPÀUÀ¼À ªÀ¸ÀÄÛ ªÀÄvÀÄÛ D±ÀAiÀÄUÀ¼À£ÀÄß ¸ÀÈd£ÁvÀäPÀªÁV ZÀlĪÀnPÉUÀ¼À£ÀÄß «zÁåyðUÀ¼À
UÀÄA¥ÀÄUÀ¼À£ÁßV «AUÀr¹ £ÀqɸÀĪÀÅzÀÄ.
Unit:2: «ZÁgÀ ¸Á»vÀå: «ZÁgÀ ¸Á»vÀåzÀ DAiÀÄÝ ¨sÁUÀªÀ£ÀÄß vÀ¦à®èzÀAvÉ N¢¸ÀĪÀÅzÀÄ.

• ¨sÁµÁ ªÉʲµÀÖöåªÀ£ÀÄß UÀÄgÀÄw¸ÀĪÀÅzÀÄ.


• «ZÁgÀ ¸Á»vÀåzÀ D±ÀAiÀĪÀ£ÀÄß ¥Àæ¸ÀÄÛvÀPÉÌ C£Àé¬Ä¹ - «ZÁgÀ ªÀÄAqÀ£É, UÀÄA¥ÀÄZÀZÉð.
• EzÀPÉÌ ¸ÀA§A¢ü¹zÀ «rAiÉÆÃ ¥ÀæzÀ±Àð£À.
• ¨sÁµÁ ªÉʲµÀÖöåªÀ£ÀÄß UÀÄgÀÄw¸ÀĪÀÅzÀÄ.
• «ZÁgÀ ¸Á»vÀåzÀ D±ÀAiÀĪÀ£ÀÄß ¥Àæ¸ÀÄÛvÀPÉÌ C£Àé¬Ä¹ - «ZÁgÀ ªÀÄAqÀ£É, UÀÄA¥ÀÄZÀZÉð.
• §gÀºÀUÁgÀgÀ §zÀÄPÀÄ, ¸Á»vÀåPÀ ¸ÁzsÀ£É PÀÄjvÀ ªÀiÁ»w ¸ÀAUÀ滸ÀĪÀÅzÀÄ.
• «ZÁgÀ ¸Á»vÀåzÀ ªÀ¸ÀÄÛ ªÀÄvÀÄÛ D±ÀAiÀĪÀ£ÀÄß ¸ÀÈd£ÁvÀäPÀªÁV ªÀÄgÀÄ gÀƦ¸À®Ä (PÀ«vÉ gÀZÀ£É,
¥ÀæºÀ¸À£À, ¸Áé£ÀĨsÀªÀ PÀxÀ£À, avÀæPÀ¯É, bÁAiÀiÁavÀæ EvÁå¢) ¸ÀÆa¸ÀĪÀÅzÀÄ.
• EzÀPÉÌ ¸ÀA§A¢ü¹zÀ «rAiÉÆÃ ¥ÀæzÀ±Àð£À.

Unit:3: : QgÀÄ PÁzÀA§j: PÁzÀA§jAiÀÄ DAiÀÄÝ ¨sÁUÀªÀ£ÀÄß zsÀé¤ Kj½vÀUÀ¼ÉÆA¢UÉ N¢¸ÀĪÀÅzÀÄ.


• ¨sÁµÁ ªÉʲµÀÖöåªÀ£ÀÄß UÀÄgÀÄw¸ÀĪÀÅzÀÄ.
• PÁzÀA§jAiÀÄ D±ÀAiÀĪÀ£ÀÄß ¥Àæ¸ÀÄÛvÀPÉÌ C£Àé¬Ä¹ - «ZÁgÀ ªÀÄAqÀ£É, UÀÄA¥ÀÄZÀZÉð.
• PÁzÀA§jAiÀÄ£ÀÄß gÀAUÀgÀÆ¥ÀPÉÌ vÀgÀĪÀ ¸ÁzsÀåvÉUÀ¼À PÀÄjvÀÄ ZÀZÉð.
• PÁzÀA§jAiÀÄ ¸ÀA«zsÁ£À, vÀAvÀæ PÀÄjvÀ «±ÉèõÀuÉ.
• PÁzÀA§jAiÀÄ ¨sÁUÀUÀ¼À£ÀÄß ªÀÄvÀÄÛ ¥ÁvÀæUÀ¼À£ÀÄß C©ü£À¬Ä¸ÀĪÀAvÉ «zÁåyðUÀ¼À£ÀÄß
GvÉÛÃf¸ÀĪÀÅzÀÄ.
• PÁzÀA§jPÁgÀgÀ §zÀÄPÀÄ, ¸Á»vÀåPÀ ¸ÁzsÀ£É PÀÄjvÀ ªÀiÁ»w ¸ÀAUÀ滸ÀĪÀÅzÀÄ.
• £ÁlPÀzÀ ªÀ¸ÀÄÛ ªÀÄvÀÄÛ D±ÀAiÀĪÀ£ÀÄß ¸ÀÈd£ÁvÀäPÀªÁV ªÀÄgÀÄ gÀƦ¸À®Ä (PÀ«vÉ gÀZÀ£É,
¥ÀæºÀ¸À£À, ¸Áé£ÀĨsÀªÀ PÀxÀ£À, avÀæPÀ¯É, bÁAiÀiÁavÀæ EvÁå¢) ¸ÀÆa¸ÀĪÀÅzÀÄ.
• EzÀPÉÌ ¸ÀA§A¢ü¹zÀ «rAiÉÆÃ ¥ÀæzÀ±Àð£À.

Unit:4: ªÁåPÀgÀt: * ²µÀÖ¨sÁµÉAiÀÄ ªÁåPÀgÀt eÁÕ£ÀªÀ£ÀÄß ¨É¼É¸ÀĪÀÅzÀÄ.


• ¨sÁµÁ §¼ÀPÉAiÀÄ ªÉÊ«zsÀåvÉAiÀÄ£ÀÄß w½¸ÀĪÀÅzÀÄ.
• §gÀªÀtÂUÉAiÀÄ P˱À®åªÀ£ÀÄß ¨É¼É¸ÀĪÀÅzÀÄ.
• PÀæªÀħzÀÞªÁV N¢¸ÀĪÀÅzÀÄ
• PÁªÀåUÀ¼À ¨sÁUÀUÀ¼À£ÀÄß ¤Ãr C°ègÀĪÀ ªÁåPÀgÀuÁA±ÀUÀ¼À£ÀÄß UÀÄgÀÄw¸À®Ä w½¸ÀĪÀÅzÀÄ
• °AUÀ, ªÀZÀ£À, «¨sÀQÛ, QæAiÀiÁ¥ÀzÀ, ¸ÀªÀiÁ¸À CªÀåAiÀÄUÀ¼À £ÀqÀÄ«£À ªÀåvÁå¸ÀUÀ¼À£ÀÄß
¥ÀnÖ ªÀiÁr¸ÀĪÀÅzÀÄ.
• PÀ£ÀßqÀ ªÁåPÀgÀtPÁgÀgÀ §zÀÄPÀÄ-§gÀºÀ PÀÄjvÀÄ «ZÁgÀ UÉÆÃ¶× K¥Àðr¸ÀĪÀÅzÀÄ.
• ¥ÀzÀ§AzsÀUÀ¼ÀÄ, ªÁPÀåUÀ¼À£ÀÄß gÀa¸À®Ä ªÀÄvÀÄÛ ©r¸À®Ä ¸ÀÆa¸ÀĪÀÅzÀÄ.
• ªÁåPÀgÀtzÀ ¸ÀégÀÆ¥ÀªÀ£ÀÄß w½¸ÀĪÀ ZÀlĪÀnPÉUÀ¼À£ÀÄß £ÀqɸÀĪÀÅzÀÄ.
Unit:5: bÀAzÀ¸ÀÄì: * ¥ÀzÀå gÀZÀ£Á PÀæªÀÄzÀ°è bÀAzÀ¹ì£À §¼ÀPÉAiÀÄ CjªÀÅ.
• ºÀ¼ÀUÀ£ÀßqÀ ¥ÀzÀåUÀ½UÉ ¥Àæ¸ÁÛgÀ ºÁQ bÀAzÉÆÃ ¥ÀæPÁgÀªÀ£ÀÄß UÀÄgÀÄw¸ÀĪÀÅzÀÄ.
• ¥ÀzÀåUÀ¼À£ÀÄß ©r¹ N¢¸ÀĪÀÅzÀÄ.
• vÁ¼À ®AiÀÄ UÀwUÀ¼À£ÀÄß C£ÀĸÀj¹ PÀ«vÉUÀ¼À£ÀÄß gÁUÀ§zÀÞªÁV ºÁqÀĪÀAvÉ ¥ÉæÃgÉæ¸ÀĪÀÅzÀÄ.
• bÀAzÀ¹ì£À C£ÀéAiÀÄ ¥ÀzÀå gÀZÀ£É ªÀiÁr¸ÀĪÀÅzÀÄ.
JSS Science and Technology University, Mysuru
Department of Computer Applications
IV Semester Bachelor of Computer Applications [BCA]
Course Category Code: L-8 Course Category Name: Language-8
Course Code: BCA460 Course Title: English – IV
Total Credits: 3 Credit Structure (L:T:P): 3:1:0
Total Hours: 40 Max. Marks: 100
Course Outcomes:
Upon successful completion of this course, students will be able to,
CO1: understanding of Grammar and Vocabulary.
CO2: understanding of Grammar and Vocabulary
CO3: understanding of Poetry
CO4: understanding of Prose
CO5: understanding of short stories

Unit:1: LANGUAGE COMPONENTS-I 8 Hours


Types of sentences according to structure.
Transformation of sentences.
Transformation from too to so that.

Unit:2: LANGUAGE COMPONENTS-II 8 Hours


Transformation of sentences:
assertive to interrogative;
assertive to negative;
assertive to imperative;
assertive to exclamatory

Unit:3: POETRY 8 Hours


Ulysses – Alfred Lord Tennyson
If – Rudyard Kipling
Lycidas – John Milton

Unit:4: PROSE 8 Hours


The Necklace – Guy de Maupassant
Grief – Anton Chekov

Unit:5: SHORT STORIES 8 Hours


Gimpel the Fool – Isaac Bashevis Singer
The Blue Light – Vaikom Muhammad Basheer

Text Books:
1. Original textbooks of prescribed Poems, Prose’ and Short Stories

Reference Books:
1. English Grammar and Composition Wren and martin.
2. Contemporary English Grammar by J D Murty.
Tutorial details:
Unit: 1 LANGUAGE COMPONENTS - I
In this unit, students will be taught to:
 Understand types of sentences according to its structure.
 Identify and construct sentences based on structure.
 Transform sentences from simple to complex, complex to compound, compound to
simple and vice versa.
 Transform sentences from ‘too to' form to ‘so that’ forms.
Unit: 2 LANGUAGE COMPONENTS - II
In this unit, students will be taught to:
 Understand types of sentences according to its usage.
 Identify the types of sentences is based on its usage.
 Transform sentences from assertive to interrogative, assertive to imperative,
assertive to negative, assertive to exclamatory and vice versa.
Unit: 3 POETRIES
In this unit students will be taught to:
 Read the poems with Intonation.
 Analyse the background and settings of the poems.
 Identify the new words and find out their meanings.
 Use new words in their own sentences.
 Analyse the poem with their own beef after understanding the core part of the poems.

Unit: 4 PROSE
In this unit students will be taught to:
 Read the prose and understand the style of writing.
 Identify meaning of new words and use them in their own sentences.
 Discuss the content of the prose comparing it to the present situation.
 Comprehend the questions with respect to prescribed piece of literature.
Unit: 5 SHORT STORIES
In this unit students will be taught to:
 Read the short story and understand the different genre of literature.
 Identify the meaning of new words and use them in their own sentences.
 Analyse content of the story with their own views.
 Comprehend questions with respect to prescribe piece of literature.
 Exhibit their talents of writing in any piece of literature.
JSS Science and Technology University, Mysuru

Department of Computer Applications


IV Semester Bachelor of Computer Applications [BCA]
Course Category Course Category Skill Enhancement
SEC-3
Code: Name: Courses-3
Course Code: BCA470 Course Title: Cyber Security
Credit Structure
Total Credits: 1 1:0:0
(L:T:P):
Total Hours: 16 Max. Marks: 50

Course Outcomes:
Upon successful completion of this course, students will be able to,
CO1: Understand the broad set of technical, social & political aspects of Cyber Security.
CO2: Appreciate the vulnerabilities and threats posed by criminals, terrorist and nation states
to national infrastructure.
CO3: Understand the nature of secure software development, operating systems and data
base Design.

Unit:1: Introduction 5 Hours

Introduction: Computer Security, Threats, Harm, Vulnerabilities, Controls. Toolbox:


Authentication, Access Control, Authentication, Access Control.

Unit:2: Malicious code, Web and E-Mail attacks 5 Hours

Malicious Code—Malware, Countermeasures, The Web—User Side, Browser Attacks, Web


Attacks Targeting Users, Obtaining User or Website Data, Email Attacks.

Unit:3: Threads to Network Communication 6 Hours

Networks: Network Concepts, Threats to Network Communications, Wireless Network


Security, Denial of Service, Distributed Denial-of-Service Strategic Defences: Security
Countermeasures, Cryptography in Network Security, Firewalls, Intrusion Detection and
Prevention Systems.

Text Books:

1. Pfleeger, C.P., “Security in Computing, 5th Edition”, Prentice Hall, Copyright 2015
Reference Books

1. Gaurav gupta and Garima gupta, “Cyber Unsafe: A Handbook for Preventing Computer
Frauds and Cyber Crimes, First Edition”, Vilvan publications, 2021.
2. Schneier, Bruce. “Applied Cryptography, Second Edition”, John Wiley & Sons, 1996.
Additional Learning Resources:

1. https://digitalguardian.com/blog/what-cyber-security
2. https://www.forcepoint.com/cyber-edu/cybersecurity
3. https://www.youtube.com/watch?v=inWWhr5tnEA
JSS Science and Technology University, Mysuru

Department of Computer Applications


IV Semester Bachelor of Computer Applications [BCA]
Course Category Code: VB-3 Course Category Name: Value Based-3
Course Code: BCA480 Course Title: Leadership Skills
Total Credits: 2 Credit Structure (L:T:P): 2:0:0
Total Hours: 26 Max. Marks: 50

Course Outcomes:

Upon successful completion of this course, students will be able to,

CO1: Understand the concept of leadership, types and theories


CO2: Understand the meaning of leadership and conceive the leadership potential in
Themselves.
CO3: Enhance their knowledge, skills and understanding on leadership.

Unit:1:Individualas leaders, leadership ethics and Traits: 8 Hours

Defining leadership, Leadership skills, managerial leadership roles, levels of analysis of


leadership theory, leadership theory paradigm. Personality traits and leadership, The big
five traits of effective leaders, The personality profile of effective leaders, Leadership
attitudes, Ethical Leadership.
Leadership motivation and behaviour:
Leadership behaviour and styles, University of Michigan and Ohio studies, Leadership grid,
Leadership and motivation, Content and process theories, Reinforcement theory.

Unit:2: Contingency leadership and Team Leadership 8 Hours

Contingency leadership theories and models, Leadership continuum theory, Normative


leadership theory, Leadership substitute theory.
Team Leadership: The use of teams in organizations, Types of teams, Decision making in
teams, Leadership skills for effective team meetings, Ginnet‘s team effectiveness
leadership model, virtual and self-managed teams, the changing role of leadership in self-
managed teams.

Unit:3: Leadership in Organizations 10 Hours

Transformation and charismatic leadership: Charismatic leadership, Transformation


leadership, charismatic and transformation leadership, stewardship and servant
leadership.
Leadership of Ethics, Diversity and Culture: What is Organization Culture, Ethics
leadership, Diversity leadership.
Change Management and Strategic Leadership: Globalization and Environment
Sustainability, Strategic Management Framework, Leading Change.
The Learning Organization and Crisis Leadership: Crisis Leadership, The Learning
Organization and Knowledge Management.
Text Books:
1. Effective Leadership-Achua/ Lussier/, 5th Edition, South-Western, 2013.
2. Leadership-Enhancing the Lessons of experience, Hughes, Ginnet, Curphy, 5th edition,
Tata McGraw Hill, 2006.
Reference Books
1. Leadership-Research findings, Practice, and skills, Andrew J Durbrin, 4th edition, , 2007
2. Leadership in Organizations, Gary Yukl, Pearson Education, 6th Edition , 2008
3. The Leadership Experience, Richard L Daft, Cengage Learning, 2 nd Edition, 2002
4. Dynamics of leadership, Craig Watson, Jaico Publication, 2007
5. The art of leadership, George Manning and Kent, Mc-Graw Hill Education, 2nd
edition,.2004

Additional Learning Resources


1. http://www.netsuite.com/portal/resource/articlesl
2. https://www.managementstudyguide.com/enterprise-resource-planning-1-articles.html
JSS Science and Technology University, Mysuru

Department of Computer Applications


IV Semester Bachelor of Computer Applications [BCA]
Course Category Code: DSC-9 Course Category Name: Discipline Core-9
Database
Course Code: BCA42L Course Title: Management System
Laboratory
Total Credits: 1 Credit Structure (L:T:P): 0:0:1
Total Hours: 32 Max. Marks: 50

Course Outcomes:

Upon successful completion of this course, students will be able to:

CO1: Analyse the concepts of data models and modelling notations, understanding the
need of database, developing a database.
CO2: Relate and Design the Entity Relationship models, diagrams.
CO3: Solve algebraic expressions/ operations on relational database and mapping.
CO4: Use of SQL, design the queries to handle all the basic and advanced operations on
DBMS, need and modes of normalising the databases.
CO5: Design of applications which handles the operations involved in RDBMS.

LIST OF PROGRAMS TO BE COVERED:

Case Studies:
1. Learn different types of DBMS languages
 Data Definition Language (DDL)

 Data Manipulation Language (DML)

 Data Control Language (DCL)

 Transaction Control Language (TCL)


2. Exercises to be carried out using the following SQL commands on the database:
 Basic Query
 SELECT, FROM, WHERE.
 Nested Query
 INSERT, UPDATE, DELETE, BETWEEN.
 Complex Query
 HAVING, WITH, VIEW, GROUP BY, ORDER BY.
 Co-related Nested Query
 ANY, ALL, EXISTS, NOT EXIST.
List of Experiments:
1. Consider the following relations:
Student (snum: integer, sname: string, major: string, level: string, age:
integer)
Class (name: string, meets at: string, room: string, d: integer)
Enrolled (snum: integer, cname: string)
Faculty (fid: integer, fname: string, deptid: integer)
The meaning of these relations is straightforward; for example, Enrolled has one
record per student-class pair such that the student is enrolled in the class. Level
is a two-character code with 4 different values (example: Junior: JR etc

Write the following queries in SQL. No duplicates should be printed in any of the answers.
 Find the names of all Juniors (level = JR) who are enrolled in a class taught
by Prof. XYZ
 Find the names of all classes that either meet in room R128 or have five or
more Students enrolled.
 Find the names of all students who are enrolled in two classes that meet at
the same time.
 Find the names of faculty members who teach in every room in which
some class is taught.
 Find the names of faculty members for whom the combined enrollment of
the courses that they teach is less than five.

2. The following relations to keep track of airline flight information:


Flights (no: integer, from: string, to: string, distance: integer, Departs: time,
arrives: time, price:real.
Aircraft (aid: integer, aname: string, cruisingrange: integer)
Certified (eid: integer, aid: integer)
Employees (eid: integer, ename: string, salary: integer)

Note that the Employees relation describes pilots and other kinds of employees as well;
certified for some aircraft, and only pilots are certified to fly.
Write each of the following queries in SQL.

 Find the names of aircraft such that all pilots certified


 Find the names of aircraft such that all pilots certified to operate have
salaries more than Rs.80, 000.
 For each pilot who is certified for more than three aircrafts, find the e-id and
the maximum cruising range of the aircraft for which she or he is certified
 Find the names of pilots whose salary is less than the price of the cheapest
route from Bengaluru to Frankfurt.
 For all aircraft with cruising range over 1000 Kms, find the name of the
aircraft and the average salary of all pilots certified for this aircraft.
 Find the names of pilots certified for some Boeing aircraft.
 Find the aids of all aircraft that can be used on routes from Bengaluru to
New Delhi.

3. Consider the following database of student enrollment in courses & books adopted
for each course.
STUDENT (regno: string, name: string, major: string,
bdate:date)
COURSE (course #:int, cname:string, dept:string)
ENROLL ( regno:string, course#:int, sem:int, marks:int)
BOOK _ ADOPTION (course# :int, sem:int, book-ISBN:int)
TEXT (book-ISBN:int, book-title:string, publisher:string,
author:string)

 Create the above tables by properly specifying the primary keys and the
foreign keys.
 Enter at least five tuples for each relation.
 Demonstrate how you add a new text book to the database and make this
book be adopted by some Department.
 Produce a list of text books (include Course #, Book-ISBN, Book-title) in
the alphabetical order for Courses offered by the ‘CS’ department that use
more than two books.
 List any department that has all its adopted books published by a specific
publisher.
Generate suitable reports.
 Create suitable front end for querying and displaying the
results.

4. The following tables are maintained by a book dealer.


AUTHOR (author-id:int, name:string, city:string, country:string)
PUBLISHER (publisher-id:int, name:string, city:string,
country:string)
CATALOG (book-id:int, title:string, author-id:int, publisher-id:int,
category-id:int, year:int, price:int)
CATEGORY (category-id:int, description:string)
ORDER-DETAILS (order-no:int,book-id:int, quantity:int)

 Create the above tables by properly specifying the primary keys and the
foreign keys.
 Enter at least five tuples for each relation.
 Give the details of the authors who have 2 or more books in the catalog
and the price of the books is greater than the average price of the books in
the catalog and the year of publication is after 2000.
 Find the author of the book which has maximum sales.
 Demonstrate how you increase the price of books published by a specific
publisher by 10%.
 Generate suitable reports.
 Create suitable front end for querying and displaying the results.
5. Consider the following database for a banking enterprise

BRANCH(branch-name:string, branch-city:string, assets:real)


ACCOUNT(accno:int, branch-name:string, balance:real)
DEPOSITOR(customer-name:string, accno:int)
CUSTOMER(customer-name:string, customer-street:string, customer-
city:s
LOAN(loan-number:int, branch-name:string, amount:real)
BORROWER(customer-name:string, loan-number:int)
 Create the above tables by properly specifying the primary keys and the
foreign keys
 Enter at least five tuples for each relation
 Find all the customers who have at least two accounts at the
Main branch.
 Find all the customers who have an account at all the branches located in a
specific city.
 Demonstrate how you delete all account tuples at every branch located in a
specific city.
 Generate suitable reports also suitable front end for querying and
displaying the results.

Text Books:
1. G K Guptha: Database Management Systems, Mc Grawhill Publications, 2018.

Reference Books
1. A.Silberschatz, Henry.F.Korth and S.Sudharshan: Database System Concepts, 6th
Edition, Mc Grawhill Publications, 2019.
2. Ramez Elmasri, Shamkant.B.Navathe: Fundamentals of Database Systems, 6th Edition,
Pearson Education, 2011.

Additional Learning Resources:


1. www.tutorialspoint.com/sql/sql-rdbms-concepts.html
2. https://blog.devart.com/how-to-write-complex-queries-in-sql-server.html
3. https://www.dofactory.com/sql/subquery
JSS Science and Technology University, Mysuru

Department of Computer Applications


IV Semester Bachelor of Computer Applications [BCA]
Skill Enhancement
Course Category Code: SEC-3 Course Category Name:
Courses-3
Cyber Security
Course Code: BCA47L Course Title:
Laboratory
Total Credits: 1 Credit Structure(L:T:P): 1:0:0
Total Hours: 32 Max. Marks: 50

Course Outcomes:

Upon successful completion of this course, students will be able to,

CO1: Ability to understand the broad set of technical, social & political aspects of Cyber
Security.
CO2: Appreciate the vulnerabilities and threats posed by criminals, terrorist and nation states
to national infrastructure.
CO3: Understand the nature of secure software development, operating systems and data
base Design.

List of Experiments:
CASE STUDY ON:
1. Describe a situation in which you have experienced harm as a consequence of a
failure of computer security. Was the failure malicious or not? Did the attack target
you specifically or was it general and you were the unfortunate victim?

2. Describe an example (other than the ones mentioned in this chapter) of data whose
confidentiality has a short timeliness, say, a day or less. Describe an example of data
whose confidentiality has a timeliness of more than a year.

3. Do you currently use any computer security control measures? If so, what? Against
what attacks are you trying to protect?

4. Suggest an efficient scheme for maintaining a per-user protection scheme. That is,
the system maintains one directory per user, and that directory lists all the objects to
which the user is allowed access. Your design should address the needs of a system
with 1000 users, of whom no more than 20 are active at any time. Each user has an
average of 200 permitted objects; there are 50,000 total objects in the system.

5. In a typical office, biometric authentication might be used to control access to


employees and registered visitors only. We know the system will have some false
negatives, some employees falsely denied access, so we need a human override,
someone who can examine the employee and allow access in spite of the failed
authentication. Thus, we need a human guard at the door to handle problems, as well
as the authentication device; without biometrics we would have had just the guard.
Consequently, we have the same number of personnel with or without biometrics,
plus we have the added cost to acquire and maintain the biometrics system. Explain
the security advantage in this situation that justifies the extra expense.
6. Calculate the timing of password-guessing attacks:
If passwords are three uppercase alphabetic characters long, how much time would it
take to determine a particular password, assuming that testing an individual password
requires 5 seconds? How much time if testing requires 0.001 seconds?

7. List three reasons people might be reluctant to use biometrics for authentication. Can
you think of ways to counter those objections?

8. List three authentication questions (but not the answers) your credit card company
could ask to authenticate you over the phone. Your questions should be ones to
which an imposter could not readily obtain the answers. How difficult would it be for
you to provide the correct answer (for example, you would have to look something up
or you would have to do a quick arithmetical calculation)?

9. If you forget your password for a website and you click [Forgot my password],
sometimes the company sends you a new password by email but sometimes it sends
you your old password by email. Compare these two cases in terms of vulnerability of
the website owner.

10. Suggest a source of some very long unpredictable numbers. Your source must be
something that both the sender and receiver can readily access but that is not obvious
to outsiders and not transmitted directly from sender to receiver.

11. Telecommunications network providers and users are concerned about the single
point of failure in “the last mile,” which is the single cable from the network provider’s
last switching station to the customer’s premises. How can a customer protect against
that single point of failure? Comment on whether your approach presents a good cost-
benefit trade-off.

12. Suppose you have a high-capacity network connection coming into your home and
you also have a wireless network access point. Also suppose you do not use the full
capacity of your network connection. List three reasons you might still want to prevent
an outsider from obtaining free network access by intruding into your wireless
network.

13. How can a website distinguish between lack of capacity and a denial-of-service
attack? For example, websites often experience a tremendous increase in volume of
traffic right after an advertisement displaying the site’s URL is shown on television
during the broadcast of a popular sporting event. That spike in usage is the result of
normal access that happens to occur at the same time. How can a site determine
when high traffic is reasonable?

14. For large applications, some websites use load balancers to distribute traffic evenly
among several equivalent servers. For example, a search engine might have a
massive database of content and URLs, and several front-end processors that
formulate queries to the database manager and format results to display to an
inquiring client. A load balancer would assign each incoming client request to the least
busy front-end processor. What is a security advantage of using a load balancer?

15. The FTP protocol is relatively easy to proxy; the firewall decides, for example,
whether an outsider should be able to access a particular directory in the file system
and issues a corresponding command to the inside file manager or responds
negatively to the outsider. Other protocols are not feasible to proxy. List three
protocols that it would be prohibitively difficult or impossible to proxy. Explain your
answer.

Text Books:
1.Pfleeger, C.P., Security in Computing, 5th Edition, Prentice Hall, Copyright 2010.

Reference Books

2.Gaurav gupta and Garima gupta, “Cyber Unsafe: A Handbook for Preventing Computer
Frauds and Cyber Crimes, First Edition”, Vilvan publications, 2021.
3.Schneier, Bruce. Applied Cryptography, Second Edition, John Wiley & Sons, 1996.

Additional Learning Resources:

1. https://digitalguardian.com/blog/what-cyber-security
2. https://www.forcepoint.com/cyber-edu/cybersecurity
3. https://www.youtube.com/watch?v=inWWhr5tnEA
V Semester
JSS Science and Technology University, Mysuru
Department of Computer Applications
V Semester Bachelor of Computer Applications [BCA]
Course Category Code: DSC-10 Course Category Name: Discipline Core-10
Course Code: BCA510 Course Title: Web Programming
Total Credits: 3 Credit Structure (L:T:P): 3:0:0
Total Hours: 40 Max. Marks: 100
Course Outcomes:
Upon successful completion of this course, students will be able to,

CO1: Understand the basic concepts of HTML and exploring Hyperlinks, Lists and Images.
CO2: Demonstrate practical skills, workflows and methods used to create websites using
Style sheets.
CO3: Exploring JavaScript’s and its basic Functions and Operations.
CO4: Understanding Objects and Dynamic HTML Concepts like Validation, Exception
Handling, and Cookies etc.
CO5: Understanding the basic concepts of PHP and building a Web application using PHP.

Unit:1: Introduction to HTML 8 Hours

Introduction: HTML, XML, and the World Wide Web. Hypertext Mark-up Language: Basic
HTML, The Document Body, Text, Hyperlinks, Adding more formatting, Lists, Using colour
and images, Images.

Unit:2: More about HTML and Style sheets 8 Hours

More HTML: Tables, Multimedia Objects, Frames, Forms-Toward Interactivity, The HTML
Document Head in detail, XHTML-An Evolutionary Mark-up. Cascading Style sheets:
Introduction, Using Styles, Defining your own Styles, Properties and Values in Styles, Style
sheets, Formatting Blocks of Information, Layers.

Unit:3: JavaScript 8 Hours

Introduction to JavaScript: What is Dynamic HTML, JavaScript, JavaScript-The Basics,


Variables, String Manipulation, Mathematical Functions, Statements, Operators, Arrays, and
Functions

Unit:4: Objects and Dynamic HTML 8 Hours

Objects in JavaScript: Data and Objects in JavaScript, Regular Expressions, Exception


Handling, Built-in Objects, Cookies, Events. Dynamic HTML With JavaScript: Data
Validation, opening a New Window, Messages and Confirmations, The Status Bar, Writing to
A Different Frame, Rollover Buttons, Moving Images.

Unit:5: PHP 8 Hours

An Introducing to PHP: PHP, Introducing PHP, Including PHP in a page, Data Types,
Program control, Arrays, User-Defined Functions, Built-in Functions, Regular Expression,
Using Files. Building Web Applications With PHP: Using Databases, Handling XML.

Text Books:
1. Chris Bates: Web Programming Building Internet Applications, 3rd Edition, Wiley
India, 2015
Reference Books
1. Christopher Murphy, Richardclark, OliStudholme, Divys Manian, Beginning HTML5
and CSS3, Apress Publication,2012.
2. Matt Doyle, Beginning PHP 5.3,Wiley Publisher,2010.
Additional Learning Resources:
1. www.w3schols.com
2. www.afterhoursprograming.com
JSS Science and Technology University, Mysuru
Department of Computer Applications
V Semester Bachelor of Computer Applications [BCA]
Course Category Code: DSC-11 Course Category Name: Discipline Core-11
Course Code: BCA520 Course Title: Python Programming
Total Credits: 3 Credit Structure (L:T:P): 3:0:0
Total Hours: 40 Max. Marks: 100
Course Outcomes:

Upon successful completion of this course, students will be able to,

CO1: Understand and comprehend the basics of python programming.


CO2: Apply knowledge in real time applications.
CO3: Understands about files and its applications.
CO4: Apply object-oriented programming concepts.
CO5: To develop dynamic interactive Python applications using functions.

Unit:1: Introduction to Python 8 Hours

Python Basics: Interactive Execution, Comments, Types, Names, Operators, Functions,


Print statement, Indexing, Models and Dot Notation, Bitwise Operator, Encodings, Creating
Python Programs, A temperature conversion program, statements, assignment, conditionals
, Nesting if statements and elif, single statements, Testing conditional statements, while
loops, testing while loops, For loops, Defining functions, Functions as building blocks,
Testing functions, Name Scopes, writing a function that calls itself, recursive functions, Using
global names inside of function, raising exceptions, functions or values, a few words about
Nothing.

Unit:2: Strings, Lists and Tuples 8 Hours

Finding average and standard Deviation, fixed size lists or arrays, Append works by side
effect, List and loops, Assignment and references, Identity and equality, Sorted list, Example
sorted list of names and ages, Tuples, Tuples and String Formatting, String functions, an
example palindrome testing, an example date conversion, Encryption, Triple Quoted Strings,
Raw Strings, An Escape Characters, Dictionaries, Example Counting Elements, Combining
Two Dictionaries with Update, Making Copies, Zip List Initialization, Loops, Example a
Concordance, Persistent Variable, Example a Telephone Database.

Unit:3: Files 8 Hours

Opening a file for write removes old values, rewriting word count program, Operating system
commands, files and for statements, recovering from exceptions, standard input and output,
persistence and pickle, example- file sort, reading from a url.

Unit:4 Classes 8 Hours

Classes, constructors, respect class boundaries, calling methods from inside other methods,
exception within methods, Objects are references, printing, inheritance, The is-a test,
Inheritance and Software Reuse, Overriding, classes, types and test, class variables,
Multiple Inheritance, Classes as dynamic records.

Unit 5: Functional programming 8 Hours

The Functional programming paradigm, mapping, filtering, and reduction, lambda functions,
list comprehensions, Example – Computing an intersection, insertion sort, quick sort, simple
reductions, computing variance of list, combining functional and object-oriented
programming, iterating over multiple lists.

Text Books:

1. Timothy A. Budd: Exploring Python, Tata McGraw-Hill, 2011.

Reference Books

1. Ascher, Lutz: Learning Python, 4th Edition, O'Reilly, 2009.


2. Wesley J Chun: Core Python Applications Programming, Pearson Education, 3rdEdition,
2013.
3.Paul Gries, Jennifer Campbell, Jason Montojo , Practical Programming: An introduction to
Computer Science Using Python, second edition, Pragmatic Bookshelf.
4. Allen Downey , Jeffrey Elkner , Learning with Python: How to Think Like a Computer
Scientist Paperback –, 2015

Additional Learning Resources:

1.http://docs.python.org/tutorial/
2.http://zetcode.com/tutorials/pythontutorial/
3.http://www.sthurlow.com/python/ http://www.tutorialspoint.com/python/
JSS Science and Technology University, Mysuru
Department of Computer Applications
V Semester Bachelor of Computer Applications [BCA]
Course Category Code: DSC-12 Course Category Name: Discipline Core-12
Course Code: BCA530 Course Title: Software Engineering
Credit Structure
Total Credits: 3.0 3:0:0
(L:T:P):
Total Hours: 40 Max. Marks: 100
Course Outcomes:

Upon successful completion of this course, students will be able to,

CO1: Ability to analyse software development with different models


CO2: Ability to translate end-user requirements into system and software requirements,
CO3: Ability to model the system with the different modelling techniques.
CO4: Ability to apply software engineering principles and techniques.
CO5: Ability to Understand to verification and validation including testing.

Unit:1: Introduction to Software Engineering 08 Hours

Professional software development, Software engineering ethics with case studies, Software
process- Software process models: The waterfall model, Incremental development,
Integration and configuration, Process activities- Software specification, Software design and
implementation, Software validation, Software evolution, Coping with change, Prototyping,
Incremental delivery, Process improvement. Agile methods, plan-Driven and agile-
development, Case studies.

Unit:2: System Requirements engineering 08 Hours

Introduction to requirements engineering, Functional and non-functional requirements,


Requirements engineering processes-spiral model, Requirements elicitation, Requirements
elicitation techniques, Stories and scenarios, Requirements specification, Requirements
validation, Requirements change.

Unit:3: System Modelling 08 Hours

Introduction to modelling, Context models, Interaction models: use-case, sequence diagram,


Structural models: Class diagram, generalization, aggregation, Behavioral models, Model-
driven architecture.

Unit:4: Design and implementation 08 Hours

Introduction to Architectural design, Architectural Design decisions, architectural views,


architectural patterns, Application architectures. Design and Implementation: object-oriented
design using the UML, Design patterns, Implementation issues, open source development.
Software
Unit:5: Testing 08 Hours
Introduction, Software testing basics Concepts: software quality, role of testing, verification
and validation, Failure, error and defects , objectives of testing, what is a test case?, testing
activities, test levels, test plan, test scenarios, types of testing-White-box testing, black-box
testing, unit testing, integration testing, acceptance testing, system testing, Five views of
software quality

Text Books:

1. Ian Sommerville “Software Engineering”, Tenth Edition, 2022


2. Software testing and quality assurance- Theory and practice,Kshirasagar Naik and
Priyadarshi Tripathy-Wiley,2019
3. Foundations of Software Testing by Adithya.P.Mathur-Second Edition.2013

Reference Books
1. Roger S.Pressman and Bruce R. Maxim,, Software engineering- A practitioner’s
Approach, McGraw-Hill, Eight edition,2015
2. Pankaj Jalote- An Integrated Approach to Software Engineering, Springer Verlag, Third
edition, 2019
3. Rajib Mall, “Fundamentals of Software Engineering”, PHI 2018, 5th Edition,2018
Additional Learning Resources:

1. http://software-engineering-book.com/videos/software-engineering/
2. http://softwaretestingfundamental.com
3. https://www.coursera.org/learn/systems‐engineering
JSS Science and Technology University, Mysuru
Department of Computer Applications
V Semester Bachelor of Computer Applications [BCA]
Course Category Code: DSE-4 Course Category Name: Discipline Elective-4
Course Code: BCA541 Course Title: Cloud Computing
Total Credits: 03 Credit Structure (L:T:P): 3:0:0

Total Hours: 40 Max. Marks: 100

Course Outcomes:

Upon successful completion of this course, the student will be able to:

CO 1: Understand the cloud types, models, characteristics, obstacles of Cloud Computing.

CO 2: Understand the cloud architectures, and use of service models by application types.
CO 3: Work on any real cloud service considering all the cloud services.
CO 4: Know importance the service management and security of cloud.
CO 5: Connect to the cloud, with various computing paradigms and cloud computing.

UNIT :1- Defining Cloud Computing, Assessing the Value Proposition. 8 Hours

Defining Cloud Computing, Cloud types: The NIST model, The Cloud Cube Model, Deployment
models, Service models, Examining the Characteristics of Cloud Computing: paradigm shift,
benefits of cloud computing, disadvantages of cloud computing, Assessing the role of open
standards.
Assessing the Value Proposition: Measuring the Cloud’s Value: Early adopters and new
application, the laws of cloudonomics, Cloud computing obstacles, Behavioural factors relating
to cloud adoption, Measuring cloud computing costs. Avoiding Capital Expenditures: Right-
sizing. Computing the total cost of ownership, specifying service level agreements, Defining
licensing models.

UNIT:2 - Understanding Cloud Architecture, Services and Applications by type. 8 Hours

Exploring the Cloud Computing Stack: composability, Infrastructure, Platforms, Virtual


appliances, communication protocols, applications. Connecting to the cloud: The Jolicloud
Netbook OS, Chromium OS: The browser as an Operating System.
Understanding Service and Application by Type: Defining Infrastructure as a service (IaaS),
IaaS Workloads, Pods, aggregation, and silos. Defining Platform as a Service (PaaS), Defining
Software as a Service (SaaS): SaaS Characteristics, Open SaaS and SOA, Salesforce.com
and CRM SaaS. Defining Identity as a Service (IDaaS): What is an identity? Network identity
service classes, Identity system codes of conduct, IDaaS interoperability: User authentication,
Authorization markup languages and Defining Compliance as a Service (CaaS).

UNIT:3 – Understanding Abstraction and Virtualization 8 Hours


Understanding Abstraction and Virtualization: Using Virtualization technologies, Load Balancing
and Virtualization: Advanced load Balancing, the google cloud. Understanding Hypervisors:
Virtual Machine types, VMware vSphere. Understanding Machine Imaging, Porting
Applications: The Simple Cloud API, AppZero Virtual Application Appliance

UNIT:4 – Exploring Platform as a Service, Managing the Cloud, Understanding the Cloud
Security. 8 Hours
Exploring Platform as a Service: Defining Services: Salesforce.com versus Force.com: SaaS
versus PaaS, Using PaaS Application Frameworks: Drupal, Eccentex AppBase 3.0, Long
Jump, Squarespace, Wave Maker, Wolf Frameworks.
Managing the Clouds: Administrating the Clouds: Management responsibilities, Lifecycle
management, Cloud Management Products, Emerging Cloud Management Standards: DMTF
cloud Management standards, Cloud Commons and SMI.
Understanding Cloud Security: Securing the cloud: The security boundary, Security service
Boundary, Securing data: Brokered cloud storage access, Storage location and tenancy,
Encryption, Auditing, and compliance - briefing.

UNIT: 5 - Moving Applications to the Cloud, working with Cloud-Based Storage 8 Hours
Moving Application to the Cloud: Application in the Cloud: Functionality Mapping, Application
attributes, Cloud service attributes, System abstraction, Cloud bursting, Applications and cloud
APIs.
Working with cloud-based storage: Measuring the digital universe: Cloud storage in the digital
universe, Cloud Storage definition, Provisioning Cloud Storage: Unmanaged cloud storage,
managed cloud storage, creating cloud storage systems, Virtual storage containers. Exploring
Cloud Backup Solutions: Backup Types, Cloud Backup features, Cloud attached backup.

Text Books:
1.Barrie Sosinsky “Cloud Computing Bible” Published by Wiley, 2018.

Reference Books:
1. Cloud Computing Principles and Paradigms by Rajkumar Buyya.
2. Cloud Computing Theory and Practice by Dan C.Marinescu.

Additional Learning Resources:


1. www.scoopworld.in
2. www.cloudschool.com
3. www.techno-pulse.com
JSS Science and Technology University, Mysuru
Department of Computer Applications
V Semester Bachelor of Computer Applications [BCA]
Course Category Code: DSE-4 Course Category Name: Discipline Elective-4
Course Code: BCA542 Course Title: Software Architecture
Total Credits: 3 Credit Structure (L:T:P): 3:0:0
Total Hours: 40 Max. Marks: 100
Course Outcomes:

Upon successful completion of this course, students will be able to,

CO1: Understanding the basic concepts of software architecture.


CO2: Understanding the Role and process of Software architecture.
CO3: Understanding the Process of development of software architecture.
CO4: Analyzing and Evaluating the Architectural concepts.
CO5: Understanding the concept of Standards.

Unit:1: Architectural Fundamentals 8 Hours

Software Architecture Concepts: Software Architecture, Architectural Elements,


Stakeholders, Architectural Descriptions, Relationships between the core concepts.
Viewpoints and Views: Architectural Views, View Points, Relationship between the core
concepts, The benefits of using viewpoints and views, View point pitfalls, Our viewpoint
catalog.

Unit:2: The Role and Process of Software architecture 8 Hours

The role of software architect: The architecture definition process, The role of the architect,
Interrelationships between the core concepts, Architectural specializations, The
organizational context, The architect skills, The architect responsibilities. The Architecture
definition process: Guiding Principles, Process outcomes, The Process Context, Supporting
Activities, Architecture definition activities, Process exit criteria, Architecture definition in the
software development lifecycle.

Unit:3: Identifying,engaging stakeholders and Producing Architectural models 8Hours

Identifying and engaging stakeholders: Selection of Stakeholders, Classes of Stakeholders,


Examples, Proxy Stakeholders, Stakeholder groups, Stakeholder Responsibilities.
Producing Architectural models: Why models are important, Types of models, Modelling
Languages, Guidelines for Creating Effective Models.

Unit:4: Creating the architectural description and Evaluating the Architecture 8 Hours

Properties of an Effective Architectural Description, The ISO Standard, Content of the


Architectural Description, Presenting the Architectural Description. Evaluating The
Architecture: Why Evaluate the Architecture? Evaluation Technique, Scenario-Based
Evaluation Methods, Evaluation during the software lifecycle, Validating the architecture of
an existing system, Recording the results of evaluation, Choosing an evaluation approach.
Unit 5: Standards for Software architecture 8 Hours

Standards: What are Standards, Why use standards, Drawback of standards, When to
adopt, Specific Standards, Conceptual standards, Notational standards, SysML, Standard
Tools, Telelogic System /architect, Process Standards, Rational Unified Process, Model-
Driven Architecture.

Text Books:

1. Richard N Taylor, Nenad Medvidovic, Eric M.Dashofy Software Architecture


foundations, theory and practice,2014
2. Nick Rozanski, Eoin Woods: Software Systems Architecture.2013

Reference Books:

1. Len Bass, Paul Clements, Rick Kazman: Software Architecture in Practice, 4th
Edition, Pearson Education, 2021.

Additional Learning Resources:

1. http://www.sei.cmu.edu/architecture/
2. http://handbookofsoftwarearchitecture.com/
3. https://leanpub.com/software-architecture-for-developers/read
JSS Science and Technology University, Mysuru
Department of Computer Applications
V Semester Bachelor of Computer Applications [BCA]
Course Category Code: Voc-1 Course Category Name: Vocational-1

Course Code: BCA550 Course Title: Multimedia Tools &


Applications
Total Credits: 3.0 Credit Structure (L:T:P): 3:0:0
Total Hours: 40 Max. Marks: 100
Course Outcomes:

Upon successful completion of this course, students will be able to,

CO1: Apply the knowledge of the basic fundamentals components of Multimedia


CO2: Understand the representations of different multimedia data and different data formats.
CO3: Apply different compression principles, compression techniques and compression standards.
CO4: Use appropriate tools for editing, processing and rendering image, video, sound and
animation.
CO5: Ability to learn Flash animation tool with different techniques.

Unit:1: Introduction to Multimedia 08 Hours

What is multimedia: Definitions – CD-ROM and the Multimedia highway- where to use multimedia-
Introduction to Making Multimedia: The stages of a project- what you need- Multimedia skills and
Training: The terms – Macintosh and windows production platforms: Macintosh Versus PC – The
Macintosh and Windows Computers- Hardware Peripherals: connection- Memory and storage
Devices – Input Devices- Output Hardware- Communication Devices.

Unit:2: Multimedia tools 08 Hours

Basic Tools: Text Editing and Word Processing Tools – OCR Software- Painting and Drawing Tools
– 3-D Modelling and Animation Tools – Image – Editing Tools – Sound Editing Tools – Animation,
Video and Digital Movies Tools – Helpful Accessories – Making Instant Multimedia : Linking
Multimedia Object – Office suites- Word Processors – spread sheets – Databases- presentation
Tools. Multimedia Authoring Tools : Types of Authoring Tools – card and page Based Authoring
Tools- Icon – Based Authorized Tools – Time Based Authoring Tools – Object – Oriented Authoring
Tools – Cross – Platform Authoring Notes.

Unit:3: Text 08 Hours

Text: The Power of Meaning – About Fonts and Faces –Using Text in Multimedia – Computers and
Text – Font Editing and Design Tools – Hypermedia and Hypertext- Sound: The Power of Sound –
Multimedia System Sounds- MIDI Versus Digital Audio – Digital Audio – Making MIDI Audio – Audio
file formats – Working with sound on the Macintosh – Notation Interchange File Format (NIFF) –
Adding Sound to your multimedia project – Towards professional sound – The Red Books standard
production tips.

Unit:4: Images and video 08 Hours

Images: Making Still Images – color- Image File formats. Animation: The Power of motion –
Principles of Animation - Making Animation That Work – Video : Using video – How video works –
Broadcast Video Standards – Integrating Computers and Television – shooting and Editing Video –
Video Tips – Recording Formats – Digital video.

Unit:5: Introduction to Animation and Flash 08 Hours

Meaning of animation, Types of animation, Principles of animation, Color theory, Basic Art,
Advanced Art: Character creation, Perspective drawing, Background creation.
Introduction to flash cs5: New feature in flash cs5, launching flash on the computer, creating a new
flash file, exploring flash cs5 interfaces, working with workspace.
Drawing Tools: Exploring drawing mode in flash, working with drawing tools in flash, using colors in
flash, adding filters.
Working with objects and text: Selecting objects in flash, moving an object, copying an object,
deleting an object, editing objects, transforming objects, working with text in flash, editing text field.

Text Books:

1. Principals of Multimedia by Ranjan Parkeh- Second Edition-Tata McGraw Hill


Publications,2013
2. Tay Vaughan - Multimedia: Making it work – Ninth Edition – Tata McGraw Hill Edition,2014
3. Adobe Flash professional CS5 Bible by Todd Perkins published by Willey-2010

Reference Books

1. John F koegel Buford – Multimedia Systems – Addison Wesley – First Indian Reprint.2015
2. Adobe flash CS5 in Simple Steps by Kogent Solution Inc, Published by Dreamtech
Press,2013

Additional Learning Resources:


1. https://users.dimi.uniud.it/~antonio.dangelo/MMS/materials/Fundamentals_of_Multimedia.pd
f
2. https://thevirtualinstructor.com/adobeflashlessons.html
3. https://www.mhhe.com/parekh/multimedia2
JSS Science and Technology University, Mysuru
Department of Computer Applications
V Semester Bachelor of Computer Applications [BCA]
*Project
Course Category Code: SEC-4 Course Category Name: Skill Enhancement
Courses-4
Application
Course Code: BCA56P Course Title:
Development
Total Credits: 3.0 Credit Structure (L:T:P): 2:0:2
Total Hours: 40 Max. Marks: 100
Course Outcomes:
Upon Successful completion of the Application development, students are able to:
1. Apply the knowledge acquired within and beyond the curriculum.
2. Formulate and investigate a problem which is of current trend.
3. Apply Software Engineering methodologies by following Software Development Life
Cycle (SDLC).
4. Communicate, interpret, design, and implement efficiently.
5. Document and present the processes involved in project implementation.

1. Introduction
Department of Computer Applications aims to impart value based technical education with
right blend of computation skills, analyzing, designing and managing projects. The Project
work constitutes a major component in most of the professional programmers. The project
work not only aims at the partial fulfilment of the BCA requirements, but also provides a
mechanism to demonstrate the student’s skills, abilities and specialization of interest. As
the program covers a wide range of theoretical and practical subjects related to computer
applications, it is an opportunity for a student to showcase the combined practical
implementation of all the courses covered in the earlier 5 semesters effectively and
efficiently. The project work should compulsorily include the software development life
cycle, documentation, and demonstration of the same within the stipulated period of
18weeks.

2. Aim
The main aim of the project is to make students aware of the process of project
implementation using their domain knowledge and to provide computer-based
solutions/applications for the industry, academic & research oriented real time problems.

3. Objective
The objective of the project is in such way that it helps the student in developing the ability
to apply theoretical knowledge and practical tools/techniques.

4. Outcome
At the end of implementation of project, student is capable of,
 Understanding and applying Systems Development Life Cycle (SDLC).
 Identifying systems requirements.
 Applying different data gathering and analyzing techniques.
 Performing and evaluating feasibility studies like cost-benefit analysis, technical
feasibility, time feasibility and operational feasibility for the project.
 Designing and developing of system architectures and data flow diagrams.
 Evaluating methods of process description to include structured, decision tables and
decision trees.
 Creating and evaluating such alternative graphical tools as systems flow charts and
state transition diagrams.
 Decide the software requirement specifications and hardware requirement
specifications.
 Plan the systems design phase of the SDLC.
 Distinguish between logical and physical design requirements.
 Designing and evaluating system inputs and outputs.
 Estimate storage requirements.
 Explain the various file update processes based on the standard file organizations.
 Construct and evaluate Entity-Relationship (ER) diagrams for RDBMS related projects.
 Perform normalization for the un-normalized tables for RDBMS related projects.

5. Project Selection Process


Student can implement projects in two streams.
Application Stream
These projects aim at developing an application for attaining a specific or group of tasks in
respective domains. The student has to understand the applicability of the project
thoroughly and should develop application based on the required features and
functionalities. The following are some important application domains. These projects
could be done in college or industry. Student can take up any one the following application
domains, but not limited to these:

 Database, Data mining and Data warehousing applications


 Networking applications [Mobile, SAN, Security, MANet etc…]
 Business / Enterprise applications [Supply Chain, ERP, CRM etc…]
 Web based applications
 Multimedia applications
 Software Engineering applications
 Grid and Cloud computing applications
 Parallel and distributed computing applications
 E-learning and e-commerce applications
 Gaming applications
 Hardware driver applications
 Mobile applications
 Healthcare applications
 Banking and Finance applications
 Insurance applications

Research Stream
The problem formulation should made it clear to everyone, students should aim to address
whom and where it is relevant. Chosen areas can be any of the following or any area of
research.
 Public health, Epidemiology & Health Services
 Bio medical.
 Clinical sciences and health practice.
 Neurosciences & Behavioural sciences.
 Cloud services
 Big data
 Data science
 Image processing
 Internet(IOT)
 Any engineering topics where software plays vital role.
One of the most important early steps in a research projects is the literature survey. A
literature survey is done to identify related research done already and to set the current
research work within a conceptual and theoretical context.

6. Problem Formulation
Students should follow the following steps (Respective guides to encourage students to follow
these steps while formulating the problem for the project).
 Tailoring the idea to the targeted topic of the work programme.
 Describe the objectives and applications of the project – setting the specific objectives
of the topic.
 Set up the project implementation phases and structure of the project – what activities
you need to achieve the objectives and what expertise/knowledge is needed.
 Describe the end results (project outputs) and the impact of the project outcome.
 Highlight the added value, the innovative element of your project.
 Chosen project concept should address the main questions: WHY? WHAT? HOW?
WHO? WHERE?

o Statement of Problem: the “Why?”


Summary of the original problem statement.
Background: Brief description of company and their business relevance or
importance of problem. Background information to educate the reader previous
related work by others—literature review with credible sources patent search
on related problem.
o Objectives: the “What?”
In the Objectives section, student should translate the customer’s quantitative and
qualitative needs into clear, objective design specifications. Define the scope of
work and clearly state the project objectives.
o Technical Approach: the “How?”
Although you may not know all the details of the problem solution, you should
know a first design on how you will solve the problem, and you should have some
design concepts.
o Intended users: Who?
This should address who is the user of the system/beneficiary of the work.

o Environment: Where?
This should address area of domain, your application or work will be useful.
7. Evaluation Process
The project duration is 18 weeks; 16 weeks for development and 2 weeks for preparation
of the project report. Students needs to maintain the project dairy, consult their internal
guide and update the status of the work and get it reviewed every week. Students are be
required to provide their project implementation details, methodology and results to the
department. Otherwise students will forfeit the claim for having done the project work.

Evaluation process has following steps.

1) Project Screening and Finalization


Student activity: Submission synopsis and finalization.

2) Evaluation of system study and analysis and project design phase


Student activity: Submission of system requirement specification and design
document
3) Evaluation of coding, testing and implementation and final report submission
Student activity: Submission of draft final project report

Project screening
Student projects will be screened based on following points
a) Relevance to current technology
b) Gauging whether project work involves 16 week man hours of work.
c) Place of execution: Industry/Research organization/College
d) Project relevance to Computer Science and Applications
e) Understanding of the project work by the student
Finalization of Synopsis
 Finalization of Synopsis is done based on the previous stage of evaluation
 Based on recommendation of the panel comprising of all the staff members of the
department.
 Verifying whether suggestions of the previous evaluation incorporated or not.
Evaluation of system study and requirement analysis
Evaluation criteria in this step as follows.
a) Whether student understood the problem in depth.
b) Whether scope and objective of the project defined properly.
c) Whether student studied and understands the system thoroughly/completely.
d) Whether functional requirements and non functional requirements defined properly.
Evaluation of project design
In this level evaluated for
a) Architectural Design
b) Detailed Design
c) Database Design
d) External Interface Design
e) Algorithm Design
Evaluation of coding, testing and implementation
Evaluation of coding, testing and implementation criteria as follows.
a) Pseudo code
b) Test case generation
c) Actual Testing
d) Users Manual
e) Implementation strategy
f) Draft report submission
g) Checking whether the implementation has meet requirements specified in SRS
document or not.
h) Demo of the final working model of the system.
JSS Science and Technology University, Mysuru

Department of Computer Applications


V Semester Bachelor of Computer Applications [BCA]
Course Category Code: VB-4 Course Category Name: Value Based -4

Course Code: BCA570 Course Title: Ethics and Self-


Awareness
Total Credits: 2 Credit Structure (L:T:P): 0:1:2
Total Hours: 26 Max. Marks: 50

Course Outcomes:
Upon successful completion of this course, students will be able to,

CO1: Acquire the importance of ethics in professional life.


CO2:. Practice and support ethics as IT users and adopting a method of computing that delivers
secure, private, and reliable experience.
CO3: Ability to analyze and handle the situation individually And Understanding Strengths and
Weakness of individuals.

Unit:1: What are Ethics: 8 Hours

Definition of ethics, Importance of Integrity, The Difference Between Morals, Ethics, and Laws,
Ethics in the Business World-Corporate Social Responsibility, Improving Corporate Ethics,
Creating an Ethical Work Environment, develop a Problem Statement, Identify Alternatives,
Evaluate and Choose an Alternative, Implement the Decision, Evaluate the Results and Ethics in
Information Technology (IT).

Unit:2: Ethics for IT workers and its users 9 Hours

IT Professional, the ethics behaviour of IT professionals, Professional Codes of Ethics,


Professional Organizations, Certification, Government Licensing, IT Professional Malpractice, IT
users: Common ethical issues for IT users, Supporting the ethical practices of IT users, IT
security incidents: A major Concern- Types of Exploits, Types of Perpetrators, Implementing
Trustworthy Computing: Risk Assessment, establishing a Security Policy, Educating Employees
and Contract Workers, Prevention, Detection, Response.

Unit:3: What Self-Awareness Really Is 9 Hours

How to Cultivate It, Two types of self-awareness-Internal self-awareness, External self-


awareness, The four self-awareness archetypes, Emotional Agility-Two case studies-Fish on a
line, getting unhooked-Recognize your patterns, label your thoughts and emotions, Accept them,
Act on your values. Why you should Make Time for Self-Reflection: Even if You Hate Doing It,
You, By the Numbers-The tools, The analysis, The physical self, The thinking self, The emotional
self, The future, Find the Coaching in Criticism.

Text Books:
1. George Reynolds: Ethics in Information Technology, CENAGE Learning, 2014
2. Emotional Intelligence, Self-Awareness, HBR EMOTIONAL INTELLIGENCE SERIES.

Reference Books
1. Introduction to Engineering Ethics Mike W. Martin, Roland Scherzinger,2009
2. Computer ethics 3rd edition by Deborah g Johnson,2001
Additional Learning Resources:

1. https://wikinav.creaform3d.com/gourmet/smoke/sql.php?title=computer-ethics-deborah-g-
johnson-third-edition-pdf&asin=a36006b6fd693856646ac4dae49dd9dd
2. https://cdn-cms.f-static.com/uploads/1259807/normal_5d6094f3de006.pdf
JSS Science and Technology University, Mysuru
Department of Computer Applications
V Semester Bachelor of Computer Applications [BCA]
Course Category Code: (DSC-10) Course Category Name: Discipline Core-10
Web Programming
Course Code: BCA51L Course Title:
Laboratory
Total Credits: 01 Credit Structure (L:T:P): 0:0:1
Total Hours: 32 Max. Marks: 50
Course Outcomes:
Upon successful completion of this course, students will be able to,

CO1: Understand the basic concepts of HTML and exploring Hyperlinks, Lists and Images.
CO2: Demonstrate practical skills, workflows and methods used to create websites using
Style sheets.
CO3: Exploring JavaScript’s and its basic Functions and Operations.
CO4: Understanding Objects and Dynamic HTML Concepts like Validation, Exception Handling,
Cookies etc.
CO5: Understanding the basic concepts of PHP and building a Web applications using PHP.

List of Experiments:

HTML
1. Develop a program to create links to other HTML documents or web resources.
2. Develop a program to insert images into the HTML document.
3. Develop a program to create ordered, unordered, definition, nested list.
4. Program on creating an image –map-An image with clickable regions.

JAVASCRIPT

1. Write a JavaScript program to


A. Find the square root
B. Calculate the area of triangle
C. Swap two variables
D. Solve quadratic equation
E. To check if a number is positive, negative or zero
F. Check if a number is odd or even
G. Check Prime number
H. Factorial of a number
2. Write a simple JavaScript that adds some numbers together, concatenates a couple of
strings, and then shows the result in an alert () dialog and on the page.
3. Create a Web page uses prompt () dialogs to ask a user for their name, age and shoe
size. Display the information they enter on the page formatted as a small table.
4. Write a Web page which prompts the user for six items of input, stores this in an array
and display it using join(). Display the data in sorted order. Use splice () to add some
more elements into the array and display the result.
5. Write a JavaScript program to create a registration form which includes following fields.
User id, password, name, address, country, email, sex, phone number, language, about,
zip code, submit.

PHP
1. Write a PHP program to print factorial of a number.
2. Write a PHP program to print Fibonacci series.
3. Write a PHP program to swap two numbers with and without using third variable.
4. Write a PHP program to print star triangle.
5. Develop a program in PHP and JavaScript that demonstrates insert, update and delete
operation.
6. Construct PHP documents by using string, arrays, methods and also database access
through PHP.
7. Create a HTML form for login and registration page using PHP and MySQL to store and
retrieve the login credentials.
8. Create a student form with following details USN, Student name, six subject marks, total,
average and display the same.
9. Create an employee form with following details. Salary of an employee given his basic
pay, HRA=10% of basic pay, TA=5% of his basic pay and IT=2.5% of his basic pay.
Text Books:

1. Chris Bates: Web Programming Building Internet Applications, 3rd Edition, Wiley India,
2007

Reference Books:

1. Matt Doyle, Beginning PHP 5.3,Wiley Publisher,2010.


2. Robert W. Sebesta Programming the World Wide Web, Fourth Edition, 2013.

Additional Learning Resources:

1. http://php.net/manual/
2. www.w3schols.com
JSS Science and Technology University, Mysuru
Department of Computer Applications
V Semester Bachelor of Computer Applications [BCA]
Course Category Code: DSC-11 Course Category Name: Discipline Core-11
Python Programming
Course Code: BCA52L Course Title:
Laboratory
Total Credits: 1 Credit Structure (L:T:P): 0:0:1
Total Hours: 32 Max. Marks: 50
Course Outcomes:
Upon successful completion of this course, students will be able to,

CO1: Understand and comprehend the basics of python programming.


CO2: Apply knowledge in real time applications.
CO3: To develop dynamic interactive Python applications.

1. Python program to check Armstrong number.


2. Python program to display powers of 2 using anonymous function.
3. Write a Python program to print alphabet pattern ’Z’.
4. Write a Python program to get the number of occurrences of a specified element in an
array.
5. Python Program to add two matrices.
6. Python program to transpose a matrix.
7. Python program to multiply two matrices.
8. Write a Python function that takes a list and returns a new list with unique elements of
the first list.
9. Write a Python program to replace dictionary values with their sum
10. Python program to count occurrence of an elements in a list.
11. Python program to count number of vowels in a string.
12. Write three Python statements. The first should read a number from the user that
represents a temperature in Fahrenheit, placing the value into a variable named f. The
second statement should convert the value into Celsius, placing the result into a variable
named c. The third statement should print the values of f and s with a descriptive
notation.
13. Write a series of Python statements that will read a number from the user that
represents the radius of a circle. Then use a print statement to show the circles
diameter, circumference and area. You can import the math module and use the
constant math.pi to represent the constant π.
14. Write a program that will accept as input a series of names and salaries. Using the
name “End” to mark the end if the sequence of values. After the values have been
entered, print the average salary, and the names and salaries of those individuals with
the highest and lowest salary.
15. A year is a leap year if it is divisible by 4, unless it is divisible by 100 and not by 400.
Write a program that reads an integer value, and prints “leap year” or “not leap year”.
16. write a function that takes an integer value and returns the hexadecimal equivalent
expressed as a string.
17. Write a program that will read a list of names and ages, then prints the list sorted by
ages.
18. write a program that reads lines of text from the input until a line with the single word
‘quit’ is entered. After each line is read it is split into individual words, and a frequency
count is kept of each word. Once the terminating line is found the frequency of each
word is reported.
19. Write a program that will prompt the user for a file name, read all the lines from the file
into a list, sort the list, then print the lines in sorted order.
20. Write a program that asks the user for a file name, then prints the number of characters,
words and lines in the file.
21. Write a program that catenates the contents of several files into one file. Prompt the
user for the names of the source file, and the name of the destination file.
22. Create a class Rectangle. The constructor for this class should take two numeric
arguments, which are the width and height. Add methods to compute the area and
perimeter of the rectangle, as well as methods that simply return the height and width.
Add a method isSquare that returns a Boolean value if the rectangle is a square.
23. Let a be the list of values produced by range(1, 11). Using the function map and a
lambda argument, write an expression that will produce each of the following a. A list of
squares of the values b. A list of cubes of the values c. A list where each element is
larger by one than the corresponding element in the original list.
24. Write a function that takes a list and a function as arguments, and using a list
comprehension returns a list containing the positions of the elements in the list for which
the function returns true. Write a function that takes a list and a function as arguments,
and using a list comprehension returns a list containing the positions of the elements in
the list for which the function returns true.
25. Using a combination of filter and the built-in function len, write a function that will take a
list and a function as two arguments, and return a count of the number of elements of
the list for which the function returns true.

Text Books:
1. Timothy A. Budd: Exploring Python, Tata McGraw-Hill, 2011.

Reference Books

1. Ascher, Lutz: Learning Python, 4th Edition, O’Reilly, 2009.


2. Wesley J Chun: Core Python Applications Programming, Pearson Education, 3rdEdition,
2013.
3.Paul Gries, Jennifer Campbell, Jason Montojo , Practical Programming: An introduction to
Computer Science Using Python, second edition, Pragmatic Bookshelf.
4. Allen Downey , Jeffrey Elkner , Learning with Python: How to Think Like a Computer
Scientist Paperback –, 2015

Additional Learning Resources:


1.http://docs.python.org/tutorial/
2.http://zetcode.com/tutorials/pythontutorial/
3.http://www.sthurlow.com/python/ http://www.tutorialspoint.com/python/
VI Semester
JSS Science and Technology University, Mysuru
Department of Computer Applications
VI Semester Bachelor of Computer Applications [BCA]

Course Category Code: DSC-13 Course Category Name: Discipline Core-13


Data Warehouse
Course Code: BCA610 Course Title:
and Mining
Total Credits: 03 Credit Structure (L:T:P): 3:0:0

Total Hours: 40 Max. Marks: 100

Course Outcomes:

Upon successful completion of this course, the student will be able to:

CO 1: Understand the fundamental processes, concepts and techniques of data mining and
warehousing.
CO 2: Develop an appreciation for the inherent complexity of the data-mining and
warehousing tasks
CO 3: Analyze the Advance programming skills relevant to the data-mining and
warehousing task.
CO 4: Demonstrate the contemporary data-mining and warehousing systems.
CO 5: Analyze the strategies and methodologies related to the design and construction of
efficient data mining systems
UNIT:1 – Data Warehouse 8 Hours

Data Warehouse basic concept, Data Warehouse Modeling: Data Cube and OLAP, Data
Warehouse design and usage, Data warehouse implementation, Data Generalization by
Attribute-oriented Introduction. Data Cube Technology: Data Cube computation: Preliminary
concepts, Data Cube computation Methods.

UNIT 2 – Introduction to Data Mining 8 Hours

Introduction: Data Mining, Different kinds of data used for mining, Technologies used,
applications of Data Mining, issues in Data Mining, Data objects and attributes type, Basic
statistical description of data, Data Visualization.

UNIT 3 –Data Processing and Frequent Pattern Mining 8 Hours

Data Processing: an overview, Data cleaning, Data Integration, Data Reduction, Data
Transformation and Data Discretization. Basic concepts of Frequent Itemset, Frequent Itemset
Mining methods and Pattern Evaluation Methods.

UNIT 4– Advanced pattern mining and classification 8 Hours

Pattern Mining: A road map, Pattern Mining in Multilevel, Multidimensional Space, and
Classification: Basic Concepts, Decision tree Introduction, Bayes Classification method.
UNIT 5–Clustering and Data Mining Trends and Applications 8 Hours

Clustering Analysis, Partitioning Methods, Hierarchical Methods, other methodologies of data


mining, data mining applications, data mining and society.

Text Books:
1.Jiawei Han, MichelineKamber, “Data Mining Concepts and Techniques”, Morgan Kauf Mann
Publishers.2017
2.Arun.K.Poojari, “Warehousing and Mining”, PHI 2019

Reference Books:
1. Liu. B, “Web Data Mining, Exploring Hyperlinks, Contents and Usage Data”, Springer, 2018.

Additional Learning Resources:

1. web.cse.ohio-state.edu/~srini/674/part1.ppt.

2. www.cse.iitb.ac.in/~dbms/Data/Talks/datamining-intro-IEP.
JSS Science and Technology University, Mysuru

Department of Computer Applications


VI Semester Bachelor of Computer Applications [BCA]
Course Category Code: DSC-14 Course Category Name: Discipline Core-14
Course Code: BCA620 Course Title: Big Data Analytics
Total Credits: 3 Credit Structure (L:T:P): 3:0:0
Total Hours: 40 Max. Marks: 100
Course Outcomes:

Upon successful completion of this course, students will be able to,

CO1: Understanding Bid data Analytics.


CO2: Acquire clear understanding of Hadoop.
CO3: Acquire clear understanding of Mapreduce and HBase.
CO4: Manage Big Data and analyse Data Warehouse.
CO5: Apply tools and techniques to analyse Big Data.

Unit:1:Getting an overview of Big 8 Hours


What is big data? Structuring Big Data, Types of Data, Elements of Big Data, Big Data Analytics,
Future of Big Data, Use of Big Data in Social Networking, Use of Big Data in Preventing
Fraudulent Activities, Preventing Fraud using Big Data Analytics, Use of Big Data in Retail
Industry, Use of RFID data in Retail.

Unit:2:Introducing Technologies for Handling Big Data 8 Hours


Distributed and Parallel Computing for Big Data, Introducing Hadoop, HDFS and MapReduce,
Cloud Computing and Big Data, Features of Cloud Computing, Cloud Deployment Models, Cloud
Delivery Models, Cloud Services for Big Data, Cloud Providers in Big Data Market, Hadoop
Ecosystem, Hadoop distributed file system, HDFS architecture, MapReduce, Hadoop YARN,
Introducing HBase, Combining HBase and HDFS, REST and Thrift, Data Integrity in HDFS,
Features of HDFS.

Unit:3: Understanding MapReduce Fundamentals and HBase 8 Hours


The MapReduce Framework, Exploring the features of Mapreduce, Working of Mapreduce,
Exploring Map and Reduce functions, Techniques to Optimise MapReduce jobs,
Hardware/Network topology, Synchronization, File system, Uses of MapReduce, Role of HBase
in Big Data processing, Characteristics of Hbase, Installation of Hbase.

Unit:4: Storing Data in Database and Data Warehouses 8 Hours


RDBMS and Big Data. CAP Theorem, Issues with Relational Model, Non-Relational Database,
Issues with Non-relational model, Polyglot persistence, Integrating Big Data with Traditional Data
Warehouses, Big Data Analytics and Data Warehouse, Changing Deployment Models in Big
Data Era, recollecting concept of MapReduce Framework, developing simple MapReduce
Application, Building the application, Executing the Application.
Unit:5: Understanding Analytics and Big Data 8 Hours
Comparing Reporting and Analysis, Types of Analysis, Points to consider during Analysis,
Developing an Analytic Team, Understanding Text Analytics, Analytical Approaches, Ensemble
Methods, Text Data Analysis, History of Analytical Tools, Data Visualization Tools, Introduction to
popular analytical tools.
Text Books:

1.Big Data, Black Book by DT Editorial Services 2016 Edition.

Reference Books
1. Paul Zikopoulos, Chris Eaton, Understanding Big Data: Analytics for Enterprise Class Hadoop
and Streaming Data: Analytics for Enterprise Class Hadoop and Streaming Data,McGraw Hill
Professional, 2012.
2. Glenn J. Myatt, Wayne P. Johnson, Making Sense of Data I :A practical guide to Exploratory
data analysis and data mining, second Edition, 2014,
3. Chuck Lam, “Hadoop in Action”, Dreamtech Press 2011 Edition.

Additional Learning Resources:

1. https://www.tutorialspoint.com/big_data_tutorials.html .
2. https://www.lynda.com/Big-Data-training-tutorials/2061-0.html .
3. https://www.tutorialspoint.com/hadoop/hadoop_big_data_overview.html .
4. https://bigdatauniversity.com
JSS Science and Technology University, Mysuru

Department of Computer Applications

VI Semester Bachelor of Computer Applications [BCA]

Course Category Code: DSC-15 Course Category Name: Discipline Core-15


Computer Vision and
Course Code: BCA630 Course Title:
Pattern Recognition
Total Credits: 3 Credit Structure(L:T:P): 3:0:0
Total Hours: 40 Max. Marks: 100
Course Outcomes:
Upon successful completion of this course, students will be able to:
CO1:Explore fundamental notion of theory of computer vision.
CO2:Analyse the image representation, quality, and color spaces.
CO3: Formulate the problems on Probability theory and explore the data distribution.

CO4:UnderstandData, Data types, and Patterns


Unit:1: Introduction to Computer Vision 8 hours
Motivation, why is computer vision difficult? Image representation and image analysis tasks,
Image formation: Geometric primitives and transformations, photometric image formation, the
digital camera.

Unit:2: Introduction to Image representation 8 hours


Image representations, a few concepts Image digitization, sampling, quantization,digital image
properties, metric and topological properties of digital images, histograms,entropy visual
perception of the image, image quality, noise in images, colorimages, physics of color, color
perceived by humans colorspaces, Paletteimages, color constancy.cameras: An overview,
photosensitive sensors, A monochromatic camera, Acolor camera.
Unit:3: Probability and Data Analytics 8 hours
Introduction, Sample Space, Events, counting sample points, probability of an event, additive
rules, conditional probability, independence and the product rule, Features and Patterns, Domain
of a Variable, Types of Features, Nominal data, Ordinal data, Interval-valued variables, Ratio
variables, Proximity measures, Fractional norms, Are metrics essential? Similarity and
Dissimilarity.
Unit:4: Introduction to Pattern Recognition 8 hours
what is Pattern Recognition, Data Sets for Pattern Recognition, Different Paradigms for Pattern
Recognition, Applications of Pattern Recognition, Feature Extraction, Feature Selection, Types of
Feature Selection, Importance of Feature Selection.
Unit:5: Learning Models 8 hours
Nearest Neighbour Algorithm, Variant of NN Algorithm, K-Nearest Neighbour (KNN)Algorithm
Introduction to Decision Tree, Decision Tree for Pattern Classification, Construction of Decision
Trees, Bayes Theorem, Minimum Error Rate Classifier, estimation of Probabilities, Comparison
with the NNC, Navies Bayes Classifier. Introduction to Support Vector Machines Classifier.
Introduction to unsupervised learning why clustering Important, Hierarchical Algorithms, Divisive
Clustering, Agglomerative Clustering, Partitional Clustering, K-means Algorithm.

Text Books:

1. Image Processing, Analysis, and Machine Vision Fourth Edition Milan Sonkathe University of
Iowa, Iowa City Vaclav Hlavac Czech Technical University, 4th Edition 2017
2. Pattern Recognition An Algorithm Approach NarasimhaMurty, V. Susheela Devi.

Reference Books:
1. Richard Szeliski, Computer Vision: Algorithms and Applications, Springer, 2018.
2. Pattern Classification, 2edition Paperback – 1 January 2007by Richard Duda, Peter Hart, (1
January 2019)

Additional web resources:


1. https://www.geeksforgeeks.org/computer-vision-introduction/
2. https://www.geeksforgeeks.org/pattern-recognition-introduction/
3. https://www.youtube.com/watch?v=g0YqPJPHx2w
4. https://www.youtube.com/watch?v=8cZljrSaEw&list=PLpOGQvPCDQzsWvT_bqmexrJ359
RTQQuMO
JSS Science and Technology University, Mysuru
Department of Computer Applications
VII Semester Bachelor of Computer Applications [BCA]

Course Category Code: DSE-5 Course Category Name: Discipline Elective-6


Course Code: BCA641 Course Title: .Net Technologies
Total Credits: 3 Credit Structure (L:T:P): 3:0:0
Total Hours: 40 Max. Marks: 100

Course Outcomes:

Upon successful completion of this course, students will be able to,

CO1: Understand and analyze the components of .Net framework.


CO2: Design and develop console-based applications.
CO3: Understand, design, and develop the components of ASP.net.
CO4: Practice basic database application using ADO.Net technology.
CO5: Understand and design the session object in ASP.NET.

Unit: 1: Introduction to. NET Framework 8 hours

Introducing VB.NET: New Object-Oriented Capabilities- Inheritance- Parameterized


Constructors- Overriding- Overloading- Shared Members- Events- Exception Handling-.NET
Framework Class Hierarchy-The System Namespace. File I/O: Using the System.IO Hierarchy-
Streaming text in and out of Text Files-Object Serialization and De serialization.

Unit: 2: Event-driven programming and post back: 8 hours

What is an event? What is event-driven programming, ASP.NET events, Events in html, server
control events in ASP.Net, event-driven programming and postback. Objects in ASP.NET:
Namespaces, The page class, ASP.NET core objects. ASP.NET Web Forms Structure: The
ASP.NET Page Structure Options, ASP.NET 4.5 Page Directives, ASP.NET Page Events,
Dealing with Post backs.

Unit: 3: ASP.NET Server Controls and Client-Side Scripts: 8 hours

ASP.NET Server Controls, HTML Server Controls, Identifying ASP.NET Server Controls.
ASP.NET Web Server Controls: An Overview of Web Server Controls: The Label Server
Control, The Literal Server Control, The TextBox Server Control, The Button Server Control,
The DropDownList Server Control, The RadioButton Server Control, AdRotator Server Control.
Validation Server Controls: Understanding Validation, Client-Side versus Server-Side
Validation, ASP.NET Validation Server Controls.
Unit: 4: Data Binding: 8 hours
Data Source Controls: SqlData Source Control, Access Data Source Control, Xml Data Source
Control. Data-Bound Controls. Working With Services: Communication between Disparate
Systems, Building a Simple XML Web Service, Consuming a Simple XML Web Service,
Overloading Web Methods, Caching Web Service Responses, Using SOAP Headers.

Unit: 5 State Management: 8 Hours


Your Session State Choices, Understanding the Session Object in ASP.NET: Sessions and the
Event Model, configuring Session State Management, In-Process Session State, Out-Process
Session State, Cookie less session State. Application Object, Cookies. ASP.NET MVC:
Defining Model-View-Controller, MVC on the Web Today, Model-View-Controller and ASP.NET,
Understanding the Routes and URLs, Controllers, Views.
Text Books:
1. Chris Ullman, John Kauffman, Beginning ASP.NET1.1with VB.NET, Wrox
Publication, 2003.
2. Matthew MacDonald Professional ASP.NET 4.5 in c# and VB , Wrox Publication
2012.

Reference Books
1. Beginning ASP.NET 1.0 with C# Published by Wiley Publishing, Inc 2012.
2. .NET Framework Essentials, 3rd Edition by Thuan L. Thai, Hoang Lam, O'Reilly
Media, Inc 2003.

Additional Learning Resources:

1. https://dotnet.microsoft.com/en-us/learn/dotnet/what-is-dotnet-framework
2. https://dotnet.microsoft.com/en-us/apps/aspnet
3. https://www.tutorialspoint.com/asp.net/asp.net_data_binding.htm
JSS Science and Technology University, Mysuru

Department of Computer Applications


VI Semester Bachelor of Computer Applications [BCA]
Course Category Code: DSE-5 Course Category Name: Discipline Elective-5
Course Code: BCA642 Course Title: Software Testing
Total Credits: 3 Credit Structure (L:T:P): 3:0:0
Total Hours: 40 Max. Marks: 100
Course Outcomes:
Upon successful completion of this course, students will be able to,

CO1: Understanding the fundamentals of Software Testing.


CO2: Understanding and analysing the concept of Software Verification, Validation and defect
management.
CO3: Understanding the forms of testing and acceptance testing concepts.
CO4: Analyzing the special tests and tools.
CO5: Understanding the test plans and analysing the test cases.

Unit:1: Fundamentals of Software Testing 8 Hours


Introduction, Definition of Testing, Approaches to Testing, Essentials of software testing, Features
of testing process, Principles of software testing, Salient features of good testing, Test policy, Test
Strategy or Test approach, Test planning, Testing process and number of defects found in testing,
Test team efficiency, Mutation testing, Challenges in testing.

Unit:2: Software Verification, Validation and Defect Management 8 Hours


Introduction, Verification, Verification work bench, methods of verification, Types of review on the
basis of Stage/Phase, Examples of entities involves in verification, Reviews in testing lifecycle,
Coverage in verification, Concerns of verification, Validation, Validation work bench, Levels of
Validation, Coverage in validation, Acceptance testing. Introduction: Defect classification, Defect
management process (approach), Defect lifecycle, Defect Template, Defect Management Process
(Fixing and Root Cause of Defect), Estimate Expected Impact of a Defect.

Unit:3: Levels of testing and acceptance testing 8 Hours


Introduction, Proposal Testing, Requirement Testing, design Testing, Code Reviews, Unit Testing,
Module Testing, Integration Testing, Big Bang Testing, Sandwich Testing, Critical Path First,
Subsystem Testing, System Testing, Testing Stages. Acceptance testing: Introduction,
Acceptance Testing Criteria, Importance of Acceptance Criteria, Some famous acceptance
criteria, Acceptance testing during each phase of software development, What does software
acceptance enable, Customer responsibilities in acceptance testing, fits for acceptance testing,
Define acceptance criteria, Criticality of requirements, Factors affecting criticality of the
requirements, Developing acceptance test plan, Software acceptance plan, User responsibilities in
acceptance test plan.
Unit:4: Special Tests and tools 8 Hours
Introduction, Complexity Testing, Graphical User Interface Testing, Compatibility Testing, Security
Testing, Performance Testing, Volume Testing and Stress Testing, Recovery Testing, Installation
Testing, Requirement Testing, Regression Testing, Error Handling Testing, Manual Support
Testing, Intersystem Testing, Control Testing, Smoke Testing, Sanity Testing, Adhoc Testing,
Parallel Testing, Execution Testing, Operations Testing, Training Testing, Rapid Testing.Testing
Tools: Introduction, Features of Test Tools, Guidelines for Selecting a Tool, Tools and skills of
Testers, Static Testing Tools, Dynamic Testing Tools, Advantages of Using Tools, Disadvantages
of Using Tools.

Unit:5: Test Planning 8 Hours


Introduction, Test Policy, Test Strategy, Test Planning, Test Plan, Quality Plan and Test Plan,
Guidelines for Developing Test Plan, Test Estimation, Test Standards, Building Test Data and
Test cases, Test Scenario, Test Cases, Essential Activities in Testing, Test Scripts, Test Log
Document, Test File, Building Test Data, Generation of Test Data, Tools Used to Build Test Data.
Text Books:

1. M G Limaye, Software Testing-principles, Techniques and Tools, McGraw Hill Education,


2018

Reference Books

1. SrinivasanDesikan, Gopalaswamy Ramesh: Software Testing Principles and Practices,


2016
2. KshirasagaraNaik, PriyadarshiTripathy: Software Testing and Quality Assurance, Wiley
India 2012

Additional Learning Resources:

1. https://www.ibm.com/topics/software-testing
2. https://www.softwaretestingmaterial.com
JSS Science and Technology University, Mysuru
Department of Computer Applications
VI Semester Bachelor of Computer Applications [BCA]
Course Category Code: Voc-2 Course Category Name: Vocational Course-2
Android Application
Course Code: BCA650 Course Title:
development
Total Credits: 3 Credit Structure (L:T:P): 3:0:0
Total Hours: 40 Max. Marks: 100
Course Outcomes:
Upon successful completion of this course, students will be able to,

CO1:Understand the Mobile Application architecture


CO2:Analyze the requirements for developing a mobile application
CO3:Ability to design layouts, UI components and data persistence for mobile applications
CO4:Ability tounderstand the complexity and design applications with data persistence.
CO5:Ability to implement mobile applications as per the requirement using Android SDK

Unit:1: Android: Introduction, Activities, Fragments, Intents 9 Hours

Getting started with Android:What Is Android? Android Versions, Features of Android,


Architecture of Android, Android Devices in the Market, The Android Market, Obtaining the
Required Tools, Android Studio, Android SDK, Creating Android Virtual Devices (AVDs), The
Android Developer Community, Launching Your First Android Application. Understanding
Activities: Applying Styles and Themes to an Activity, Hiding the Activity Title, Displaying a Dialog
Window, Displaying a Progress Dialog, Linking Activities Using Intents: Returning Results from
an Intent, Passing Data Using an Intent Object, Fragments: Adding Fragments Dynamically, Life
Cycle of a Fragment, Interactions Between Fragments, Understanding the Intent Object, Using
Intent Filters, Displaying Notifications

Unit:2: Android UI Design 9 Hours

Understanding the Components of a Screen: Views and ViewGroups, FrameLayout,


LinearLayout (Horizontal) and LinearLayout (Vertical), TableLayout, RelativeLayout,
FrameLayout, ScrollView. Adapting to Display Orientation: Anchoring Views. Managing Changes
to Screen Orientation: Persisting State Information During Changes in Configuration, Detecting
Orientation Changes, Controlling the Orientation of the Activity. Utilizing the Action Bar: Adding
Action Items to the Action Bar. Creating the User Interface Programmatically, Listening for UI
Notifications. Using Basic Views: TextView View, Button, ImageButton, EditText, CheckBox,
ToggleButton,RadioButton, and RadioGroup Views, ProgressBar View, AutoCompleteTextView
View, Using Picker Views: TimePicker View, DatePicker View. Using List Views to Display Long
Lists: ListView View, Using the Spinner View. Understanding Specialized Fragments: Using a
ListFragment, Using a DialogFragment, Using a PreferenceFragment.

Unit:3: Displaying Pictures & Menus with Views, Data Persistence 9 Hours

Using Image Views to Display Pictures: ImageView View, ImageSwitcher, GridView. Using
Menus with Views: Creating the Helper Methods, Options Menu, Context Menu, Using WebView,
WebView. Saving and Loading User Preferences: Accessing Preferences Using an Activity,
Programmatically Retrieving and Modifying the Preferences Values. Persisting Data to Files:
Saving to Internal Storage, Saving to External Storage (SD Card), Choosing the Best Storage
Option. Creating and Using Databases: Creating the DBAdapter Helper Class, Using the
Database Programmatically. Sharing Data in Android. Using a Content Provider: Predefined
Query String Constants, Projections, Filtering, Sorting. Creating Your Own Content Providers,
Using the Content Provider.

Unit:4: Messaging and Location-Based Services 9 Hours

SMS Messaging: Sending SMS Messages Programmatically, Sending SMS Messages Using
Intent, Receiving SMS Messages, Caveats and Warnings, Sending Email. Displaying Maps:
Creating the Project, Obtaining the Maps API Key, Displaying the Map, Displaying the Zoom
Control, Changing Views, Navigating to a Specific Location, Getting the Location That Was
Touched, Geocoding and Reverse Geocoding, Getting Location Data, Monitoring a Location.

Unit 05: Integration with other Applications 4 Hours


Instagram integration, LinkedIn integration

Text Books:
1. J. F. DiMarzio. Beginning Android® Programming with Android Studio, 4th Edition, Wrox
Publications, 2017.

Reference Books

1. Neil Smyth. iOS 12 App Development Essentials – First Edition, Payload Media, Inc. 2018
2. Ian F. Darwin. Android Cookbook - Problems and Solutions for Android developers. 2nd
Edition, O’Reilly Publications, 2017.

Additional Learning Resources:


1. http://developer.android.com/develop/index.html .
2. https://www.w3adda.com/android-tutorial
3. https://developer.apple.com/library/archive/referencelibrary/GettingStarted/Develo
piOSAppsSwift/
JSS Science and Technology University, Mysuru
Department of Computer Applications
VI Semester Bachelor of Computer Applications [BCA]
Skill Enhancement
Course Category Code: SEC-5 Course Category Name:
Courses 5
Professional
Course Code: BCA660 Course Title:
Communication
Total Credits: 3 Credit Structure (L:T:P): 3:0:0
Total Hours: 40 Max. Marks: 100
Course Outcomes:
Upon successful completion of this course, students will be able to,
CO1: Understand the basic concepts of communication and modes.
CO2: understand the technical communication and its process.
CO3: Enhance the qualities of technical communication and remove barriers.
CO4: Adopt of Modern technology in professional field.
CO5: Apply Group discussion strategies.

Unit:1:Basics of Communication 8 Hours


Introduction, Characteristics of language, Communicative skills-LSRW, Effective communication,
Modes of Communication- Formal and informal, oral and written, internal and external, Importance
of Technical Communication.

Unit:2:Technical Communication 8 Hours


Introduction, Process of Communication, Language as a Tool, Levels of Communication- extra
personal communication, interpersonal communication, interpersonal communication, Flow of
communication-vertical, horizontal and diagonal communication.

Unit:3: Communication Networks 8 Hours


Formal network models, informal network models, visual Aids in technical communication- Tables,
graphs, charts, drawings and diagrams, photographs and maps, Definition of Noise, Classification
of Barriers-interpersonal barriers, interpersonal barriers, organizational barriers.

Unit:4: Modern Communication 7 Hours


Introduction, Technology based communication tools-telephone and voicemail, computers,
internet, conferencing, instant messaging, email, facsimile machines, positive impact of
technology -enabled communication, selection of appropriate Technology, effectiveness in
technology-based communication.

Unit:5:Group Discussion 9 Hours


Introduction, Group Discussion types, Organizational Group discussion, Group discussion as part
of selection process- characteristics, evaluation and analysis, Meetings-purposes, preparation,
procedure-conducting effective meetings, conferences-significance, planning and preparation,
procedure.
Text Books:
1. Technical Communication, Principles and Practice,Meenakshi Raman,Sangeeta Sharma, 2 nd
edition, published in India by oxford university press ,2012

Reference Books

1.Effective Technical Communication, 2e,M ASHRAF RIZVI

Additional Learning Resources:

1. https://www.thoughtco.com/professional-communication-1691542
2. https://hrdevelopmentinfo.com/top-professional-communication/
3.https://www.subhartidde.com/slms/Professional%20Communication%20(MCA-%20101).pdf
JSS Science and Technology University, Mysuru

Department of Computer Applications


VI Semester Bachelor of Computer Applications [BCA]

Course Category Code: DSC-13 Course Category Name: Discipline Core-13

Course Code: BCA61L Course Title: Data Warehouse and


Mining Laboratory
Total Credits: 01 Credit Structure (L:T:P): 0:0:1

Total Hours: 32 Max. Marks: 50


Course Outcomes:

Upon successful completion of this course, the student will be able to:

CO 1: Understand the fundamental processes, concepts and techniques of data mining and
warehousing.
CO 2: Develop an appreciation for the inherent complexity of the data-mining and
warehousing tasks
CO 3: Analyze the Advance programming skills relevant to the data-mining and
warehousing task.
CO 4: Demonstrate the contemporary data-mining and warehousing systems.
CO 5: Analyze the strategies and methodologies related to the design and construction of
efficient data mining systems

1. To explore Data Warehouse implementation by performing OLAP queries using different


schemas.
2. To explore R tool by conducting programs on Data with R, Graphics with R, Statistical
analysis with R, Programming with R in practice.
(List of Algorithms to be implemented Using R tool )
3. Demonstration of Association rule process on transaction dataset for sales prediction using
Apriori Algorithm.
4. Demonstration of frequent pattern mining on binary datasets for partition algorithm.
5. Demonstration of classification rule process on time series dataset using Decision
tree algorithm for the prediction of result.
6. Demonstration of classification rule process on different continuous data using Bayes
Theorem.
7. Demonstration of clustering rule process on datasets using simple k-Means
algorithms.
Note: Above experiments needs to implement using R studio.

Text Books:
1.Jiawei Han, Micheline Kamber, “Data Mining Concepts and Techniques”, Morgan Kauf Mann
Publishers.2017
2.Arun.K.Poojari, “Warehousing and Mining”, PHI 2019

Reference Books:
1. Liu. B, “Web Data Mining, Exploring Hyperlinks, Contents and Usage Data”, Springer, 2018.
Additional Learning Resources:
1. web.cse.ohio-state.edu/~srini/674/part1.ppt.
2. www.cse.iitb.ac.in/~dbms/Data/Talks/datamining-intro-IEP.
JSS Science and Technology University, Mysuru
Department of Computer Applications
VI Semester Bachelor of Computer Applications [BCA]
Course Category Code: DSC-14 Course Category Name: Discipline Core-14
Big Data Analytics
Course Code: BCA62L Course Title:
Laboratory
Total Credits: 1 Credit Structure (L:T:P): 0:0:1
Total Hours: 32 Max. Marks: 50
Course Outcomes:

Upon successful completion of this course, students will be able to,


CO1:Analyse several key technologies used in manipulating, storing, and analysing big data.
CO2:Acquire clear understanding ofHadoop.
CO3:Apply tools and techniques to analyse Big Data.

1. Downloading and installing Hadoop; Understanding different Hadoop modes. Start-up


scripts, Configuration files.
2. Hadoop Implementation of file management tasks, such as Adding files and directories,
retrieving files, and Deleting files.
3. Implement of Matrix Multiplication with Hadoop Map Reduce.
4. Run a basic Word Count Map Reduce program to understand Map Reduce Paradigm.
5. Implementation of K-means clustering using Map Reduce.

Text Books:
1. Big Data, Black Book by DT Editorial Services 2016 Edition.

Reference Books

1. Paul Zikopoulos, Chris Eaton, Understanding Big Data: Analytics for Enterprise Class Hadoop
and Streaming Data: Analytics for Enterprise Class Hadoop and Streaming Data, McGraw Hill
Professional, 2012.
2. Glenn J. Myatt, Wayne P. Johnson, Making Sense of Data I :A practical guide to Exploratory
data analysis and data mining, second Edition, 2014
3. Chuck Lam, “Hadoop in Action”, Dreamtech Press 2011 Edition

Additional Learning Resources:

1. https://www.tutorialspoint.com/big_data_tutorials.html .
2. https://www.lynda.com/Big-Data-training-tutorials/2061-0.html .
3. https://www.tutorialspoint.com/hadoop/hadoop_big_data_overview.html .
4. https://bigdatauniversity.com.
VII Semester
JSS Science and Technology University, Mysuru
Department of Computer Applications
VII Semester Bachelor of Computer Applications [BCA]
Course Category Code: DSC-16 Course Category Name: Discipline Core-16
Course Code: BCA710 Course Title: Agile Software Engineering
Total Credits: 3 Credit Structure (L:T:P): 3:0:0
Total Hours: 40 Max. Marks: 100
Course Outcomes:
Upon successful completion of this course, students will be able to:

CO1: Realize Agile management concepts.


CO2: Implement different methods of Agile.
CO3: Realize impact of Agile Process.
CO4: Explore Agile product development.
CO5: Explore quality assurance, test driven development in Agile.

Unit:1 Theories for Agile Management 8 Hours

Agile Software Development – Traditional Model vs. Agile Model - Classification of Agile Methods –
Agile Manifesto and Principles – Agile Project Management – Agile Team Interactions – Ethics in
Agile Teams - Agility in Design, Testing – Agile Documentations – Agile Drivers, Capabilities and
Values.

Unit:2 Lean Production 8 Hours

SCRUM, Crystal, Feature Driven Development- Adaptive Software Development - Extreme


Programming: Method Overview – Lifecycle – Work Products, Roles and Practices.

Unit:3 Agile Information System 8 Hours

Agile Decision Making - Early Schools of KM – Institutional Knowledge Evolution Cycle –


Development, Acquisition, Refinement, Distribution, Deployment, Leveraging – KM in Software
Engineering – Managing Software Knowledge – Challenges of Migrating to Agile Methodologies –
Agile Knowledge Sharing – Role of Story-Cards – Story-Card Maturity Model (SMM).

Unit:4 Impact of Agile Processes 8 Hours

Impact of Agile Processes in RE–Current Agile Practices – Variance – Overview of RE Using Agile –
Managing Unstable Requirements – Requirements Elicitation – Agile Requirements Abstraction Model
– Requirements Management in Agile Environment, Agile Requirements Prioritization – Agile
Requirements Modeling and Generation – Concurrency in Agile Requirements Generation.

Unit:5 Agile Product Development 8 hours

Agile Metrics – Feature Driven Development (FDD) – Financial and Production Metrics in FDD – Agile
Approach to Quality Assurance - Test Driven Development – Agile Approach in Global Software
Development.
Text Books:
1. David J. Anderson and Eli Schragenheim, ―Agile Management for Software
Engineering: Applying the Theory of Constraints for Business Results‖, Prentice Hall, 2003.
2. Hazza and Dubinsky, ―Agile Software Engineering, Series: Undergraduate Topics in
Computer Science‖, Springer, 2009.

Reference Books

1. Craig Larman, ―Agile and Iterative Development: A Managers Guide‖, Addison-Wesley,


2004.
2. Kevin C. Desouza, ―Agile Information Systems: Conceptualization, Construction, and
Management‖, Butterworth-Heinemann, 2007.

Additional Learning Resources:


1. https://www.infoworld.com/article/3237508/what-is-agile-methodology-modern-software-
development-explained.html
2. https://www.guru99.com/agile-scrum-extreme-testing.html
JSS Science and Technology University, Mysuru
Department of Computer Applications
VII Semester Bachelor of Computer Applications [BCA]
Course Category Code: DSC-17 Course Category Name: Discipline Core-17
Mathematics for
Course Code: BCA720 Course Title:
Machine Learning
Total Credits: 3 Credit Structure (L:T:P): 3:0:0
Total Hours: 40 Max. Marks: 100
Course Outcomes:

Upon successful completion of this course, students will be able to:

CO1: Enhance the basic understanding of Application of Mathematics in Machine Learning


models.
CO2: Impart design thinking capability to build Machine Learning systems.
CO3: Develop design skills of models for Machine Learning problems.
CO4: Utilise dimensionality reduction techniques.
CO5: Design and implement machine learning solutions to classification problems.

Unit:1: Introduction to Linear Algebra and Matrix Decomposition 8 Hours

Systems of Linear Equations, Matrices, Solving Systems of Linear Equations, Vector Spaces, Linear
Independence, Basis and Rank, Norms, Inner Products, Lengths and Distances, Angles and
Orthogonality, Determinant and Trace, Eigen values and Eigenvectors.

Unit:2: Insight of Machine Learning 8 Hours

Overview of Machine Learning, Examples of Machine Learning Applications, Types of Learning,


Linear Associations, Classification, Regression, Unsupervised Learning, Reinforcement Learning.

Unit:3: When models meet Data and Linear regression analysis 8 Hours

Data, Models and Learning, Empirical Risk Minimization, Parameter Estimation, Probabilistic
Modelling and Interference, Directed Graphical Models, Overview of Linear regression, Problem
Formulation, Parameter Estimation.

Unit:4: Dimensionality Reduction and Density Estimation 8 Hours

Introduction to Dimensionality Reduction, Problem Setting, Maximum Variance Perspective,


Projection Perspective, Eigenvector Computation and Low-Rank Approximations, Principal
Component Analysis and Linear discriminate analysis.
Unit:5: Classification 8 Hours

Separating Hyper planes, Primal Support Vector Machine, Dual Support Vector Machine, Kernels,
Decision Tree.
Text Books:
1. Mathematics for Machine Learning Book by A. Aldo Faisal, Cheng Soon Ong, and Marc
Peter Deisenroth-April 2020.
2. Machine Learning Mathematics Study Deep Learning Through Data Science. 2021 Edition by
Samuel Hack, Samuel Hack.

Reference Books:
1. Machine Learning: An Applied Mathematics Introduction Paperback – 20 May 2019 by
Paul Wilmott.
2. Introduction to Linear Algebra, 3rd Edition Textbook by Gilbert Strang

Additional web resources:

1. https://www.youtube.com/watch?v=1VSZtNYMntM
2. https://course.ccs.neu.edu/ds4420sp20/readings/mml-book.pdf
JSS Science and Technology University, Mysuru
Department of Computer Applications
VII Semester Bachelor of Computer Applications [BCA]

Course Category Code: DSC-18 Course Category Name: Discipline Core-18

Course Code: BCA730 Course Title: Data Visualization

Total Credits: 3 Credit Structure (L: T:P): 3:0:0

Total Hours: 40 Max. Marks: 100


Course Outcomes:
Upon successful completion of this course, students will be able to:
CO1: Create effective visualizations.
CO2: Understand and use various plot types.
CO3: Explore and work with different plotting libraries.
CO4: Exhibit the awareness of the importance and limitation of the exploratory data analysis
paradigm.
CO5: Implement exemplary applications related to Network Programming and Web Service.

Unit:1: The Importance of Data Visualization and Data Exploration 8 Hours

Introduction: Data Visualization, Importance of Data Visualization, Data Wrangling, Tools and
Libraries for Visualization Overview of Statistics: Measures of Central Tendency, Measures of
Dispersion, Correlation, Types of Data, Summary Statistics NumPy: NumPy Operations - Indexing,
Slicing, Splitting, Iterating, Filtering, Sorting, Combining, and Reshaping Pandas: Advantages of
pandas over NumPy, Disadvantages of pandas, Pandas operation - Indexing, Slicing, Iterating,
Filtering, Sorting and Reshaping using Pandas

Unit:2: Plots 8 Hours

Comparison Plots: Line Chart, Bar Chart and Radar Chart; Relation Plots: Scatter Plot, Bubble Plot,
Correlogram and Heatmap; Composition Plots: Pie Chart, Stacked Bar Chart, Stacked Area Chart,
Venn Diagram; Distribution Plots: Histogram, Density Plot, Box Plot, Violin Plot; Geo Plots: Dot Map,
Choropleth Map, Connection Map; What Makes a Good Visualization? A Deep Dive into Matplotlib
Introduction, Overview of Plots in Matplotlib, Pyplot Basics: Creating Figures, Closing Figures, Format
Strings, Plotting, Plotting Using pandas DataFrames, Displaying Figures, Saving Figures; Basic Text
and Legend Functions: Labels, Titles, Text, Annotations, Legends; Basic Plots: Bar Chart, Pie Chart,
Stacked Bar Chart, Stacked Area Chart, Histogram, Box Plot, Scatter Plot, Bubble Plot; Layouts:
Subplots, Tight Layout, Radar Charts, GridSpec; Images: Basic Image Operations, Writing
Mathematical Expressions.
Unit:3: Simplify Visualization using Seaborn 8 Hours

Introduction, Advantages of Seaborn Controlling Figure Aesthetics: Seaborn Figure Styles, Removing
Axes Spines, Contexts; Color Palettes: Categorical Color Palettes, Sequential Color Palettes,
Diverging Color Palettes; Interesting Plots in Seaborn: Bar Plots, Kernel Density Estimation, Plotting
Bivariate Distributions, Visualizing Pairwise Relationships, Violin Plots.

Unit:4: Plotting Geospatial Data 8 Hours

Introduction, Geoplotlib, The Design Principles of Geoplotlib, Geospatial Visualizations, Tile Providers,
Custom Layers. Introduction to Folium Visualizing Data: Building a Google map from geocoded data,
Visualizing networks and interconnection and Visualizing mail data Making Things Interactive with
Bokeh Introduction, Bokeh, Concepts of Bokeh, Interfaces in Bokeh, Output, Bokeh Server,
Presentation, Integrating, Adding Widgets.

Unit:5: Networked Program and Using Web Services 8 Hours

Networked Programs HyperText Transfer Protocol – HTTP, The World’s Simplest Web Browser,
Retrieving an image over HTTP, Retrieving web pages with urllib, Parsing HTML and scraping the
web, Parsing HTML using regular expressions, Parsing HTML using BeautifulSoup, Reading binary
files using urllib Using Web Services extensible Markup Language – XML, Parsing XML, Looping
through nodes, JavaScript Object Notation – JSON, Parsing JSON.

Text Books:

1. Data Visualization workshop, Tim Grobmann and Mario Dobler, Packt Publishing, 1’st Edition,
2020.
2. Python for Everybody: Exploring Data Using Python 3, Charles R. Severance, Create Space
Independent Publishing Platform, 1’st Edition, 2016.

Reference Books
1. “Data Visualization”: A Successful Design Process, Kirk, Andy, Packt Publishing Ltd,2012.
2. Think Python: How to Think Like a Computer Scientist, Allen B. Downey, Green Tea Press,
2nd Edition, 2015.
3. Interactive Data visualization for the Web, Murray, Scott, O’Reilly Media, Inc., 2013 4.
Visualizing Data: Exploring and Explaining Data with The Processing Environment, Fry, Ben,
O’Reilly Media, Inc., 2007.

Additional Learning Resources:

1. https://studentsblog100.blogspot.com/2018/08/cp5009-data-visualization-technique.
2. https://tutorialspoint.com/business_writing_skills/data_visualization.
JSS Science and Technology University, Mysuru

Department of Computer Applications


VI Semester Bachelor of Computer Applications [BCA]
Course Category Code: DSE-6 Course Category Name: Discipline Elective - 5
Course Code: BCA741 Course Title: Image Processing
Total Credits: 3 Credit Structure (L:T:P): 3:0:0
Total Hours: 40 Max. Marks: 100
Course Outcomes:
Upon successful completion of this course, students will be able to,

CO1: Understand the concept of Digital image and different steps involved in image processing
CO2: Ability to understand the fundamental concepts of the digital image
CO3: Analyzing the concept basic intensity transformation functions and spatial filtering
CO4: Understand the concept of image segmentation and morphological process
CO5: Understanding the basic concepts of representation and description

Unit:1: Introduction 8 Hours


Introduction – Origin, Steps in Digital Image Processing, examples of fields that use image
processing, gamma ray imaging-ray imaging, imaging in the- ultraviolet band, visible and infrared
bands, microwave band, radio band,Fundamental steps in digital image processing, Components of
an image processing system.

Unit:2: Digital Image Fundamentals 8 Hours


Some basic relationships between pixels- neighbors of a pixel, adjacency, connectivity, regions, and
boundaries, distance measures, a simple image formation model, basic concepts in image sampling
and quantization, image interpolation.

Unit:3: Intensity Transformations and Spatial Filtering 8 Hours


Background, some basic intensity transformation functions, histogram processing, fundamentals of
spatial filtering, smoothing (lowpass) spatial filters, sharpening (high pass) spatial filters.

Unit:4: Morphological Image Processing and Image Segmentation 8 Hours


Erosion and Dilation, Opening and Closing, fundamentals of image segmentation, Point, Line, and
Edge Detection, Thresholding, segmentation by region growing and by region splitting and merging.

Unit:5: Representation and Description 8 Hours


Representation-Boundary (Border) Following, Chain Codes, Polygonal Approximations Using
Minimum-Perimeter Polygons,Boundary Segments,Skeletons,Boundary Descriptors-Some Simple
Descriptors,Shape Numbers, Regional Descriptors- Some Simple Descriptors, Topological
Descriptors, Texture.
Text Books:

1. Rafael C. Gonzales, Richard E. Woods, “Digital Image Processing”, Third and Fourth Edition,
Pearson Education, 2008 and 2018.

Reference Books

1. Rafael C. Gonzalez, Richard E. Woods, Steven L. Eddins, “Digital Image Processing Using
MATLAB”, Third Edition Tata McGraw Hill Pvt. Ltd., 2011.
2. Anil Jain K. “Fundamentals of Digital Image Processing”, PHI Learning Pvt. Ltd., 2011.

Additional Learning Resources:

1. https://www.tutorialspoint.com/dip/applications_and_usage.htm
2. https://www.geeksforgeeks.org/digital-image-processing-basics
3. https://www.sciencedirect.com/topics/engineering/image-processing
4. https://www.javatpoint.com/digital-image-processing-tutorial
JSS Science and Technology University, Mysuru
Department of Computer Applications
VII Semester Bachelor of Computer Applications [BCA]
Course Category Code: DSE-6 Course Category Name: Discipline Elective-6
Course Code: BCA742 Course Title: Advanced DBMS
Total Credits: 3 Credit Structure (L:T:P): 3:0:0
Total Hours: 40 Max. Marks: 100
Course Outcomes:
Upon successful completion of this course, students will be able to,
CO1: Select the appropriate high-performance database to design using Relational design and
apply normalization for the given application.
CO2: Design and analyse the real-world data using Transaction Management and
Concurrency Techniques.
CO3: Appraise the architectures for parallel and distributed databases.
CO4: Design, implement the relational database and check for data security and recovery
to present various views of the selected database.
CO5: Choose real world database for better performance by considering enhanced
models for interoperability

Unit:1: Review of Relational Data Model and Normalization 10 Hours

Relational Data Model and Relational Database Constraints: Relational model concepts; Relational
model constraints and relational database schemas; Update operations, transactions and dealing with
constraint violations. The Enhanced Entity–Relationship (EER) Model: Subclasses, Super classes,
and Inheritance, Specialization and Generalization, Constraints and Characteristics of Specialization
and Generalization Hierarchies, Modelling of UNION Types Using Categories, Mapping EER to
Relational Mapping.
Introduction, Possible Undesirable Properties of Relations and Schema Refinement, Functional
Dependencies, Single-Valued Normalization, Desirable Properties of Decompositions, Multivalued
Dependencies, Denormalization, Inclusion Dependency.

Unit:2: Transaction Management and Concurrency 8 Hours

Introduction, the concept of transaction, examples of concurrency anomalies, schedules, Schedules


and recoverability, serializability, hierarchy of serializable schedules, concurrency control and
enforcing serializability, deadlocks, lock granularity, multiple granularity and intention locking, non-
locking techniques – time stamping control and optimistic control, transaction support in SQL,
Evaluation of concurrency control mechanism.

Unit:3: Parallel and Distributed Databases 8 Hours

Architectures for parallel databases; Parallel query evaluation; Parallelizing individual operations;
Parallel query optimizations; Distributed Database Concepts: Data Fragmentation, Replication, and
Allocation Techniques for Distributed Database Design. Overview of Concurrency Control and
Recovery in Distributed Databases, Overview of Transaction Management in Distributed Databases,
Query Processing and Optimization in Distributed Databases, Types of Distributed Database
Systems, Distributed Database Architectures, Distributed Catalogue Management. Introduction to
NOSQL Systems, The CAP Theorem.

Unit:4: Database Backup and Recovery 8 Hours

Introduction, database system failure, database backup, recovery from a failure, the concept of a log,
recovery and buffer management, log-based transaction recovery techniques, types of recovery
techniques, log-based immediate update recovery technique, log-based differed update recovery
technique, system checkpoints, implementing a log-based recovery system-ARIES, summary,
shadow page schemes, evaluation of recovery technique’s, recovering from a media failure.

Unit:5: Object Relational Databases and Enhanced Data Models 6 Hours

Some Advanced Applications: Active database concepts and triggers; Temporal, Spatial, and
Deductive Databases – Basic concepts. More Recent Applications: Mobile databases; Multimedia
databases; Geographical Information Systems; Genome data management. The ODMG Object Model
and the Object Definition Language ODL, Object Database Conceptual Design, The Object Query
Language OQL, Overview of the C++ Language Binding in the ODMG Standard. Comparing RDBMS,
OODBMS and ORDBMS.

Text Books:

1. Elmasri and Navathe: Fundamentals of Database Systems, Pearson Education, 7 th Edition,


2018.
2. G.K.Guptha: Database Management Systems, Mc Grawhill Publications, 2018.

Reference Books

1. Abraham Silberschatz, Henry F. Korth, S. Sudarshan: Database System Concepts, 7 th Edition,


McGraw Hill, 2017.
2. Raghu Ramakrishnan and Johannes Gehrke: Database Management Systems, 3rd Edition,
McGraw-Hill, 2018.
3. C,J,Date, Akannan,S.Swamynathan: An Introduction to database system , 8th Edition, 2017.

Additional Learning Resources:

1. https://vpmpce.wordpress.com/adbms-3340701/.
2. https://mcqmate.com/topic/955/advanced-database-management-systems-set-3/.
3. https://www.slideshare.net/jass12345/adbms.
JSS Science and Technology University, Mysuru

Department of Computer Applications

VII Semester Bachelor of Computer Applications [BCA]

Course Category Code: VOC-3 Course Category Name: Vocational Course-3

Course Code: BCA750 Course Title: Digital Marketing

Total Credits: 3 Credit Structure (L:T:P): 3:0:0

Total Hours: 40 Max. Marks: 100

Course Outcomes:

Upon successful completion of this course, students will be able to,

CO1: Explain the role & importance of digital marketing in a rapidly changing business landscape.
CO2:Use Search Engine Marketing and Identification of an appropriate media based for
advertising.
CO3:Understanding the role of Social Media Marketing indigital landscape and Use of Various
platforms.
CO4: Analyze the role ofSocial Media Marketing specific to platforms like Twitter, Instagram,
Snapchat & Mobile Marketing.
CO5: Identify the importance of Search Engines in Digital Marketing Ecosystem and Usage of
Analytics in digital space.

UNIT 1 - Introduction to Digital Marketing 8 Hours

Concept of Digital Marketing: Origin, Traditional versus Digital Marketing; Digital Marketing Strategy:
The P-OE-M Framework, Digital Landscape; Digital advertising Market in India; Skills required in Digital
Marketing, Digital Marketing Plan.
Display Advertising: Concept of Display Advertising, Types of Display Ads, Buying Models, Display
plan.

Unit:2:Search Engine Advertising 9 Hours

Display Advertising: Targeting, What makes a good Ad? Programmatic Digital Advertising, Analytics
Tools.
Search Engine Advertising: Why Pay for Search Advertisements, Understanding Ad Placement,
Understanding Ad Ranks.
Unit:3: Social Media Marketing: 8 Hours

Social Media Marketing: Introduction to Social Media Platforms, Penetration & Characteristics; Building
a successful social media marketing strategy.
Facebook Marketing: Facebook for Business, Facebook Insights.
LinkedIn Marketing:LinkedIn Strategy, LinkedIn Analytics.
Unit:4:Social Media Marketing(continue) 8 Hours

Twitter Marketing: How is twitter different? , Building Content Strategy, Twitter usage, Twitter
Analytics.
Instagram and Snapchat: Instagram, Snapchat.
Mobile Marketing: Mobile Advertising, Mobile Marketing Features, Campaign Development
Process,Trackingof Mobile Campaigns - Mobile Analytics. .

Unit:5 Search Engine Optimization: 7 Hours

Search Engine Optimization: Search Engines: How Search Engines Work, Concept of SEO, SEO
Phases, On Page Optimization, Off Page Optimization, SEO Tactics.
Web Analytics: Data collection, Multichannel Attribution, Types of Tracking Codes, Universal
Analytics.

Text Books:
1. Seema Gupta, “Digital Marketing”, Published by Mc-Graw Hill Education(India) Pvt. Ltd ,

1st Edition, 2018

Reference Books:

1. Puneet Singh Bhatia, “Fundamentals of Digital Marketing”, Publishedby Pearson,


2nd Edition, 2019
2. Prof. Nitin C. Kamat and Mr. Chinmay Nitin Kamat, “Digital Social Media Marketing”, Himalaya
Publishing House Pvt. Ltd, 1st Edition, 2015

Additional Learning Resources:


1. https://iide.co/blog/digital-marketing-course
2. https://www.imarticus.org/Digital-Marketing
JSS Science and Technology University, Mysuru
Department of Computer Applications

VII Semester Bachelor of Computer Applications [BCA]

Course Category Code: DSE-7 Course Category Name: Skill Enhancement Courses
Course Code: BCA760 Course Title: Research Methodology
Total Credits: 3 Credit Structure (L:T:P): 3:0:0
Total Hours: 40 Max. Marks: 100

Course Outcomes:
Upon completion of this course students are able to,
CO 1: Understand the basics of research methodology and its importance in research.
CO 2: Define research problem and design the research process.
CO 3: Learn to design the sample for the research and understand different sampling
techniques.
CO 4: Understand the usage of different data collection techniques and perform hypothesis
analysis for the same.
CO 5: Interpret, analyze and document the findings of the research or work.
UNIT:1 – Introduction to Research Methodology 8 Hours

Introduction, Meaning of research, Objectives of research, Motivation in research, Types of research


with real time examples, Research approaches, Significance of research, research methods v/s
methodology, research and scientific methods, Importance of know how research is done, research
process, criteria for good research, Problems, Problems encountered by researchers in INDIA,
Developing a research plan.

UNIT:2 – Defining Research problem and Research Design 8 Hours

What is research problem, Selecting the research problem, Necessity of defining the problem,
technique involved in defining the problem, an illustration, Importance of literature review in defining
a problem, survey of literature, primary and secondary sources? Research Design: Meaning of
research design, Need for research design, features of good design, importance concepts relating to
research design, different research designs, basic principles of experimental designs.

UNIT:3 – Sampling design 8 Hours

Introduction, Sample design, Steps in sample design, characteristics of a good sample design, Types
of sample designs – Non-probability sampling, Probability Sampling and Complex random sampling
designs. Measurement & Scaling techniques: Classification of measurement scales, Sources of error
in measurement, Techniques of developing measurement tools, Goodness of measurement scales:
Qualities, Scaling-classification, Scaling techniques, Data collection and collection of primary data.
UNIT:4 - Methods of Data Collection and Testing of Hypothesis 8 Hours

Collection of Primary Data, Observation Method, Interview Method, Collection of Data through
Questionnaires, Collection of Data through Schedules, Difference between Questionnaires and
Schedules, Some Other Methods of Data Collection, Collection of Secondary Data Selection of
Appropriate Method for Data Collection, Case Study Method. What is a Hypothesis? Characteristics
of hypothesis, Basic concepts concerning testing of hypothesis, Procedure for hypothesis testing –
flow diagram, Data analysis with statistical packages.

UNIT:5 - Interpretation, Report Writing and IPR 8 Hours

Meaning of Interpretation, Why Interpretation?, Technique of Interpretation, Precaution in


Interpretation, Significance of Report Writing, Different Steps in Writing Report, Layout of the
Research Report, Types of Reports, Oral Presentation, Mechanics of Writing a Research Report,
Precautions for Writing Research Reports. IPR- Intellectual Property Rights, Types , IPR Protections,
Importance of IPR, Summary on – Patents, Copyrights, Trademarks, Industrial Designs,
Geographical Indicators and Integrated Circuits, WIPO – Procedure, Applications.

Text Books:
1. Ranjith kumar, Research Methodology: a step-by-step guide for beginners, 3 rd Edition, Sage
publications Ltd. 2018
Reference Books:
1. C. R. Kothari and Gaurav Garg, Research Methodology: Methods & Techniques, 3 rd Edition,
New age international publications, 2018.

Additional Learning Resources:

1. https://explorable.com/research-methodology.
2. https://www.sophia.org/tutorials/research-methods--9.
3. http://edutechwiki.unige.ch/en/Methodology_tutorial.
JSS Science and Technology University, Mysuru

Department of Computer Applications


VII Semester Bachelor of Computer Applications [BCA]

Course Category Code: DSC-16 Course Category Name: Discipline Core-16


Agile Software
Course Code: BCA71L Course Title:
Engineering Laboratory
Total Credits: 1 Credit Structure (L:T:P): 0:0:1
Total Hours: 32 Max. Marks: 50
Course Outcomes:

Upon successful completion of this course, students will be able to,

CO1: Explore agile software development processes: how to plan and execute the same.
CO2: Implementation of social aspects on software development success.
CO3: Develop and Design the techniques and tools for improving team collaboration and software
quality.

LIST OF EXPERIMENTS TO BE COVERED:

1. Write a report of agile methodology for a self driving cars by considering following challenges:
a) Road Conditions
b) Weather Conditions
c) Traffic Conditions
d) Accident liability
e) Radar Interface

2. Write a report of agile methodology for Inventory Management System by considering


following challenges:
a) Inconsistent tracking
b) Inaccurate data
c) Changing demand
d) Supply chain complexity
e) Insufficient order management
f) Increasing competition

3. Write a report of agile methodology for Production of Medicine by considering following


challenges:
a) Reduced demand for prescription medicine
b) Growing competition from generic pharmaceutical
c) Pharmaceutical fraud
d) Rising Consumer expectation and difficulties managing brad health
e) Data breaches and other cyber security threats
f) Supply chain disruption

4. Write a report of agile methodology for Smart watch by considering following challenges:
a) Migration from gadget like design to style conscious design
b) Lack of manufacture on use case and functionality
c) Distribution channel confusion
d) Consumer ambivalence to current smart watch pricing
e) Battery life

5. Write a report of agile methodology for Messaging App by considering following challenges:
a) Authorization
b) Importing Contacts
c) File Sharing
d) Instant Messaging
e) Tracking Location
f) Encryption

Additional features
a)In app voice-video calls
b) Channels
c) self destructing messages
d) Availability across multiple platform
e)Cloud synchronization

6. Write a report of agile methodology for Online Voting by considering following challenges:
a) Security
b) Voter Verification and Privacy
c) Election Verifiability
d) Legal Frameworks
e) Trust and Transparency
f) Investment

7. Write a report of agile methodology for Online service provider app by considering following
challenges:
a) Capitalization of Data
b) Customers’ Exploding Expectations
c) Agility Challenge
d) Personalization Approach
e) Being Consistent
f) Facing Competition
g) Data Security
h) Technology Partnerships
i) Customer Retention
j) Relevant Leads

8. Write a report of agile methodology for E-Commerce app by considering following challenges:
a) Table of Contents hide
b) Lack of Technical Skills to Develop a Web Store
c) Making a Customer Friendly Payment & Checkout Process
d) Creating a Single Account for Online and Offline (in-store) Payments
e) Privacy and Security
f) Order Fulfilment
g) Building Customer Loyalty
h) Handling Product Returns Efficiently and Return Policy
i) Disrupting New Markets for Business Growth
j) Omni channel Shopping Experience
k) Limitations of Online Business Models

9. Write a report of agile methodology for web application development by considering following
challenges:
a) User interface and user experience
b) Scalability
c) Performance
d) Knowledge of framework and platforms
e) Security

10. Write a report of agile methodology for Online Ticket Reservation by considering following
challenges:
a) Single Platform Multiple Booking Types
b) Slot Management: Close Bookings
c) Booking Cancellation Option for Customers
d) Price Per Booking: Time Slot Management
e) Manage Bookings via Calendar
f) Streamline Online Booking Process
g) Handle Customer Complaints

11. Write a report of agile methodology for Online Transportation by considering following
challenges:
a) Automatic order allocation
b) Vehicle capacity utilization
c) Automated Route planning and optimization + dynamic route planning
d) Real-time trip tracking
e) Transparency with the end-customer

12. Write a report of agile methodology for Transferring of Data from one media to other by
considering following challenges:
a) Security
b) File Size
c) Access Restrictions
d) Time limit
e) System compatibility
f) Lack of visibility
13. Write a report of agile methodology for developing Biometrics by considering following
challenges:
a) Security mechanism to protect information systems or other resources
b) Vulnerabilities of the biometric system itself.
c) Performance
d) Trust and Transparency
e) Authorization

14. Write a report of agile methodology for Insulin pump by considering following challenges:
a) Types of insulin
1)Rapid-acting insulin
2) Long-acting insulin
3) Regular or short-acting insulin
4) Intermediate-acting insulin
b) Characteristics of insulin
1) Onset
2) Peak time
3) Duration
c) Insulin strength

15. Write a report of agile methodology for Online bank transaction by considering following
challenges:
a) Traditional banking habits.
b) Security and fraud instances.
c) Cross-border transactions.
d) Technical issues.
e) Multi-currency and payment methods.

Text Books:
1. David J. Anderson and Eli Schragenheim, ―Agile Management for Software Engineering:
Applying the Theory of Constraints for Business Results‖, Prentice Hall, 2003.
2. Hazza and Dubinsky, ―Agile Software Engineering, Series: Undergraduate Topics in Computer
Science‖, Springer, 2009.

Reference Books
1. Craig Larman, ―Agile and Iterative Development: A Managers Guide‖, Addison-Wesley, 2004.
2. Kevin C. Desouza, ―Agile Information Systems: Conceptualization, Construction, and
Management‖, Butterworth-Heinemann, 2007.

Additional Learning Resources:


1. https://www.javatpoint.com/agile-sdlc
2. https://www.wrike.com/project-management-guide/faq/what-is-agile-methodology-in-project-
management/
JSS Science and Technology University, Mysuru

Department of Computer Applications


VII Semester Bachelor of Computer Applications [BCA]

Course Category Code: DSC-17 Course Category Name: Discipline Core-17

Mathematics for Machine


Course Code: BCA72L Course Title:
Learning Laboratory
Total Credits: 1 Credit Structure (L:T:P): 0:0:1
Total Hours: 32 Max. Marks: 50
Course Outcomes:
Upon successful completion of this course, students will be able to:
CO1: Understand application of Mathematics in Machine Learning models.
CO2: Utilise dimensionality reduction techniques.
CO3: Design and implement machine learning solutions to classification problems.

List of Experiments:

1. Program to find rank of matrices


2. Program to find Determinant.
3. Program to find Eigen values and Eigen vectors.
4. Program to perform singular value decomposition.
5. Program to perform matrix approximation.
6. Program to demonstrate linear regression using an existing dataset.
7. Program to perform dimensionality reduction.
8. Program to demonstrate dimensionality reduction:
a. Principal Component Analysis.
b. Linear Discriminant Analysis
9. Program to demonstrate working of SVM classifiers and its kernels using iris dataset.
10. Program to demonstrate working of decision tree classifier.
 Note: Using UCI Machine Learning Repository Datasets can be Accessed.

Text Books:

1. Mathematics for Machine Learning Book by A. Aldo Faisal, Cheng Soon Ong, and Marc Peter
Deisenroth-April 2020
2. Machine Learning Mathematics Study Deep Learning Through Data Science. 2021 Edition by
Samuel Hack, Samuel Hack

Reference Books:
1. Machine Learning: An Applied Mathematics Introduction Paperback – 20 May 2019 by
Paul Wilmott
2. Introduction to Linear Algebra, 3rd Edition Textbook by Gilbert Strang
Additional web resources:

1. https://www.youtube.com/watch?v=1VSZtNYMntM
2. https://course.ccs.neu.edu/ds4420sp20/readings/mml-book.pdf
VIII Semester
JSS Science and Technology University, Mysuru
Department of Computer Applications
VIII Semester Bachelor of Computer Applications [BCA]
Course Category Code: DSC-19 Course Category Name: Discipline Core-19
Course Code: BCA810 Course Title: Intelligent Algorithms
Total Credits: 3 Credit Structure (L:T:P): 3:0:0
Total Hours: 40 Max. Marks: 100
Course Outcomes:

Upon successful completion of this course, students will be able to,

CO1: Understand the importance of algorithm analysis and specific to recursive techniques.
CO2: Implement techniques to solve real time application by graph.
CO3: Design and develop algorithms to address match and searching problem.
CO4: Understand and explore the intelligent web elements using applications.
CO5: Realize creating suggestions and recommendations using applications.

Unit:1 Growth of Functions 8 Hours


Asymptotic notation, Standard notation and common functions, The substitution method for solving
recurrences, the recursion method for solving recurrences, master method for solving recurrences

Unit:2 Graph algorithm 8 Hours


Bellman - Ford Algorithm; Single source shortest paths in a DAG; The Floyd –Warshall algorithm;
Flow networks and Ford-Fulkerson method.

Unit:3 String-Matching Algorithms and Randomized Algorithms: 8 Hours


Naïve string Matching; Rabin - Karp algorithm; String matching with finite automata; Knuth-Morris-
Pratt algorithm. Monte Carlo and Las Vegas algorithms.

Unit: 4 Intelligent Web 8 Hours


Examples of intelligent web applications; Basic elements of intelligent applications; What
applications can benefit from intelligence? How can I build intelligence in my own application?;
Machine learning, data mining, and all that. Eight fallacies of intelligent applications. Searching :
Searching with Lucene; Why search beyond indexing? Improving search results based on link
analysis.

Unit:5 Creating Suggestions and Recommendations 8 Hours


An online music store: the basic concepts; How do recommendation engines work?
Recommending friends, articles, and news stories; Recommending movies on a site such as
Netflix.com.
Text Books:
1. T. H Cormen, C E Leiserson, R L Rivest and C Stein: Introduction to Algorithms, 2nd Edition,
Prentice-Hall of India, 2002.
2. Kenneth A. Berman, Jerome L. Paul: Algorithms, Cengage Learning, 2002.

3. Haralambos Marmanis and Dmitry Babenko, Algorithms of the Intelligent Web, Manning
Publications, 2009.
Reference Books
1. Sartaj Sahni, S.Rajasekharan: Fundamentals of Computer Algorithms, Ellis Horowitz,2019

Additional Learning Resources:


1. https://www.igi-global.com/dictionary/artificial-intelligent-algorithm/45836
2. https://www.geeksforgeeks.org/floyd-warshall-algorithm-dp-16/
3. https://iq.opengenus.org/list-of-advanced-data-structures/
JSS Science and Technology University, Mysuru
Department of Computer Applications
VIII Semester Bachelor of Computer Applications [BCA]
Course Category Code: DSC-20 Course Category Name: Discipline Core-20

Course Code: BCA820 Software Project


Course Title:
Management
Total Credits: 3 Credit Structure (L:T:P): 3:0:0
Total Hours: 40 Max. Marks: 100
Course Outcomes:
Upon successful completion of this course, students will be able to,
CO1: Understand software project basics.
CO2:. Analyze the requirements and formulate appropriate plan.
CO3: Design Software effort estimation by adopting different project control measures and activity
planning.
CO4: Use resource allocation and risk project management techniques appropriately.
CO5: Demonstrate Managing people and organizing teams uploading software quality
management guidelines.

Unit:1: Introduction to Software Project Management 8 Hours


Introduction, Why is software project management important? , What is a project? , Software projects
versus other types of project, Contract management and technical project management, Activities
covered by software project management , Plans, methods and methodologies , Some ways of
categorizing software projects, Stakeholders, Setting objectives , The business case, Project
success and failure, What is management? , Management control.
Step wise: An overview of project planning
Select project, Identify scope and objectives, Identify project infrastructure, Analysis project
Characteristics, Identify project products and activities, estimate efforts for each activity, Identify
activity risks, Allocate resources, Review/publicize plan, Execute plan and lower levels of
planning

Unit:2: Project evaluation and programme management 8 Hours

Introduction, A business case, Project portfolio management, Evaluation of individual projects,


Cost-benefit evaluation techniques, Risk evaluation, Programme management, Managing the
allocation of resources within programmes, Strategic programme management, Creating a
programme, Aids to programme management, Some reservations about programme
management, Benefits management.
Selection of an appropriate project approach
Introduction, Build or buy?, Choosing methodologies and technologies, Choice of process models,
Structure versus speed of delivery, The waterfall model, The spiral model, Software prototyping,
Agile methods, Managing iterative Processes, Selecting the most appropriate process model,
Conclusion.

Unit:3: Software effort estimation 8 hours


Introduction, Where are estimates done? Problems with over – and under-estimates, the basis for
software estimating, Software efforts estimation techniques, Bottom-up estimating, The top-down
approach and parametric models, Expert judgment, estimating by analogy, Albrecht function point
analysis, Function points Mark II, COSMIC full function Points, COCOMO I3: a Parametric
productivity model, Conclusion.
Activity planning
Introduction, The objectives of activity planning, When to plan, Project schedules, Projects and
activities, Sequencing and scheduling activities, Network planning models, Formulating a network
model, Adding the time dimension, The forward pass, The backward pass, identifying the critical
path, Activity float, Shortening the project duration, Identifying critical activities, Activity-on-arrow
networks.

Unit:4: Risk Management 9 Hours


Introduction, Risk, Categories of risk, A framework for dealing with risk, Risk identification, Risk
assessment, Risk planning, risk management, Evaluating risks to the schedule, Applying the
PERT technique, Monte Carlo simulation, Critical chain concepts.
Resource allocation
Introduction, The nature of resources, Identifying resources requirements, Scheduling resources,
Creating critical paths, Counting the cost, Being specific, Publishing the resources schedule, Cost
schedules, The scheduling sequence.

Unit:5: Managing people and organizing teams 7 Hours


Introduction, Understanding behavior, Organization behavior: A background, Selecting the right
person for the job, Instruction in the best methods, Motivation, Working in groups, Becoming a
team, Decision Making, Leadership, organization structures.
Software quality
Introduction, The place of software quality in project planning, The importance of software quality,
Defining software quality, Product versus process quality management, Quality management
systems, Process capability models, Techniques to help enhance software quality, Testing,
Quality plans, Conclusion

Text Books:
1. Bob Hughes and Mike Cotterell, “Software Project Management, 5th edition”, Published by
McCraw-Hill Education, 2009

Reference Books:
1. Maylor, “Project Management” , 3rd edition , Published by Pearson, 2004
2. Vibrant and Kalpesh Ashar, “Project Management and Agile Essentials” , 5 th Edition,
Published by Vibrant Publishers, 2020

Additional Learning Resources:


1. https://www.studocu.com/row/document/maseno-university/software-project-
management/ccs-401-software-project-management-notes/3249127
2. https://www.askbooks.net/2022/02/pdf-software-project-management-lecture.html
JSS Science and Technology University, Mysuru
Department of Computer Applications
VIII Semester Bachelor of Computer Applications [BCA]
Course Category Code: DSE-7 Course Category Name: Discipline Elective-7
Course Code: BCA831 Course Title: Soft Computing
Total Credits: 3 Credit Structure (L:T:P): 3:0:0
Total Hours: 40 Max. Marks: 100

Course Outcomes:
Upon successful completion of this course, students will be able to,
CO1: Learn and understand various concepts of soft computing.
CO2: Familiarize with design of various neural networks and extend to solve the classification
problems
CO3: Explore fuzzy logic and its importance in machine intelligence.
CO4: Explore fuzzy membership functions and defuzzification.
CO5: Understand the concepts of genetic programming and its applications.

Unit:1: Introduction to Soft Computing 7 Hours


Introduction, Soft Computing Constituents and Conventional Artificial Intelligence, Neuro-Fuzzy
and Soft Computing Characteristics. Neural Networks, Application Scope of Neural Networks,
Fuzzy Logic, Genetic Algorithm, Hybrid Systems, Soft Computing.

Unit:2: Artificial Neural Network 9 Hours


Fundamental Concept. Evolution of Neural Networks, Basic Models of Artificial Neural
Network, Important Terminologies of ANNs, McCulloch-Pitts Neuron, Linear Separability, Hebb
Network.
Supervised Learning Network- Introduction, Perception Networks.

Unit:3: Fuzzy Logic and Fuzzy Relations 8 Hours


Introduction to Fuzzy Logic, Classical Sets (crisp sets)-operations on classical sets, properties
of classical sets, function mapping of classical sets. Fuzzy Sets- fuzzy set operations, property
of fuzzy sets. Classical Relations and Fuzzy Relations- Introduction, Cartesian product of
relation, classical relation, fuzzy relations, Tolerance and Equivalence relations.

Unit:4: Fuzzy Membership Functions and Defuzzification 8 Hours


Membership function- introduction, features of membership function, fuzzification, methods of
membership value assignments. Defuzzification- Introduction, Lambda-Cuts for fuzzy sets and
fuzzy relations, Defuzzification Methods.

Unit:5: Fundamentals of Genetic Algorithm 8 Hours


Introduction, Biological Background, Traditional optimization and search techniques,
Genetic algorithm and search space, basic terminologies in genetic algorithm, simple GA,
general genetic algorithm, operators in genetic algorithm, constraints in genetic algorithm,
advantages and limitations of genetic algorithm, application of genetic algorithm.
Text Books:

1. S.N. Sivanandam and S.N. Deepa, “Principles of Soft Computing”, Wiley India Pvt Ltd,
2016, 3rd edition.
2. J.S.R. Jang, C.T. Sun and E. Mizutani, “Neuro-Fuzzy and Soft Computing”, PHI /
Pearson Education,2015. (chapter-1)

Reference Books

1. S.Rajashekaran and G.A.Vijayalakshmi Pai, “Neural Networks, Fuzzy Logic and


Genetic Algorithm: Synthesis & Applications Prentice-Hall of India Pvt. Ltd.,”, 2011.
2. David E. Goldberg, “Genetic Algorithm in Search Optimization and Machine Learning”
Pearson Education India, 2013.
3. Timothy J. Ross, Fuzzy Sets and Fuzzy Logic with engineering applications-Wiley India. 4th
edition 2016.
Additional Learning Resources:

1. https://sites.google.com/a/sharbani.org/www/home2/soft-computing-1
2. https://cse.iitkgp.ac.in/~dsamanta/courses/sca/index.html
3. https://www.javatpoint.com/what-is-soft-computing
4. https://nptel.ac.in/courses/106105173
JSS Science and Technology University, Mysuru
Department of Computer Applications
VIII Semester Bachelor of Computer Applications [BCA]
Course Category Code: DSE-7 Course Category Name: Discipline Elective-7
Course Code: BCA832 Course Title: NoSQL
Total Credits: 3 Credit Structure (L:T:P): 3:0:0
Total Hours: 40 Max. Marks: 100

Course Outcomes:

Upon successful completion of this course, students will be able to,


CO1: Design four types of NoSQL Databases (Document-oriented, Key-Value Pairs, and Graph).
CO2: Explore and perform curd operations on data.
CO3: Understand the detailed architecture and document-oriented NoSQL databases.
CO4: Understand and evaluate NoSQL database development tools and programming languages.
CO5: Understand the need and mode of transactions and data integrity.

Unit:1: Introduction to NoSQL 8 Hours


Definition And Introduction, Sorted Ordered Column-Oriented Stores, Key/Value Stores, Document
Databases, Graph Databases, First impression- Examining Two Simple Examples, Location
Preferences Store, Car Make And Model Database, Working With Language Bindings.

Unit:2: Interacting with NoSQL 9 Hours


Interacting with NoSQL: If NoSql Then What, Language Bindings for NoSQL Data Stores,
Performing Crud Operations, Creating Records, Accessing Data, Updating and Deleting Data.

Unit:3: NoSQL Storage Architecture 7 Hours


NoSQL Storage Architecture: Working with Column-Oriented Databases, Hbase Distributed
Storage Architecture, Document Store Internals, Understanding Key/Value Stores in Memcached
and Redis, Eventually Consistent Non-Relational Databases.

Unit:4: NoSQL Stores 8 Hours


Similarities Between Sql and Mongodb Query Features, Accessing Data from Column-Oriented
Databases Like Hbase, Querying Redis Data Stores, Changing Document Databases, Schema
Evolution in Column-Oriented Databases, Hbase Data Import and Export, Data Evolution In
Key/Value Stores.

Unit:5: Indexing and Ordering Data Sets 8 Hours


Essential Concepts Behind a Database Index, Indexing and Ordering In Mongodb, Creating and
Using Indexes In Mongodb, Indexing And Ordering In Couchdb, Indexing In Apache Cassandra.
Managing transactions and data integrity- RDBMS and ACID, Distributed ACID Systems.

Text Books:
1.Shashank Tiwari, Professional NoSQL, Wrox Press, Wiley, 2015
Reference Books
1. Pramod Sadalage and Martin Fowler, NoSQL Distilled, Addison-Wesley Professional, 2012
2. NoSQL For Dummies®, 2015 by John Wiley & Sons, Inc
3. Gaurav Vaish, Getting Started with NoSQL, Packt Publishing, 2013.

Additional Learning Resources:


1. https://www.geeksforgeeks.org/introduction-to-nosql/
2. https://www.guru99.com/nosql-tutorial.html
3. https://www.studytonight.com/mongodb/what-is-nosql
4. https://www.youtube.com/watch?v=xh4gy1lbL2k
5. https://www.youtube.com/watch?v=XFE0EgT5oQE
6. https://www.mongodb.com/nosql-explained
JSS Science and Technology University, Mysuru
Department of Computer Applications
VIII Semester Bachelor of Computer Applications [BCA]
Course Category Code: Voc-4 Course Category Name: Vocational-4
Course Code: BCA840 Course Title: Innovation Studies
Total Credits: 3 Credit Structure (L:T:P): 3:1:0
Total Hours: 40 Max. Marks: 100

Course Outcomes:
Upon successful completion of this course, students will be able to,
CO1: Define, list, label, name and describe the Innovation, drivers and types of protection in
the real world.
CO2: Comprehensively classify, compare discuss and demonstrate the need, drivers and
models of innovation with examples.
CO3: Distinguish types of innovations and illustrate applications related to past, present and
quantify future needs and describe methods of protection to innovations.
CO4: Classify, summarize, and report innovations of the past and the present and restate the
need for the future, list and express protection to innovation.
CO5: Create and develop conceptual design of products/services relevant to branch along
with case studies.

Unit:1: Introduction 12 Hours


Innovation, Comparison of Inventions and Discovery, Invention – Necessity Examples, Inventions of
the Past and Present, bicycle, sewing machine, simple machines. Camera, Spark Plugs, etc.,
Innovation – Definition, Need For Innovation, Comparison Of Innovations And Inventions, Ideation,
Examples, Innovation of Products & Services - Classification Of Innovation – Based On Category -
Product Innovation, Process Innovation, Service Innovation, Marketing Innovation, Organizational
Innovation, Based On Overall Global Needs – Technological Innovation, Social Innovation, Based
On the Degree Of Novelty - Incremental Innovations, Radical Innovations, Systemic /Systematic
Innovations, Breakthrough Innovation Advantages and Disadvantages Of Innovation.

Unit:2: Need For Innovation 8 Hours


Need for innovation - Importance of innovation- business Needs, Societal Needs, Technological,
Scientific and other needs, Drivers for Innovation- Types of drivers and their role, Importance of
drivers in innovation promotion, Innovations of the past, present and the future, Comparison using
examples of products and services, Need and Want in innovation.

Unit:3: Modelling For Innovation 8 Hours


Need for modelling, Importance of models, TEDOC – Target, Explore, Develop, Optimise and
Commercialise - model of Innovation.

Unit:4: Protection To Innovation 7 Hours


Safeguarding innovation, methods of protection, copy right, trademarks, Intellectual Property Rights
(IPR). Method of Protection, Procedure for IPR, A brief procedure for protection to innovations of a
product and/or service
Unit:5: Innovation Examples And Case Studies 5 Hours
Products/Services - Case Study and Discussions – Branch specific selected examples.
Text Books:
1. Jugaad Innovation – by Navi Radjou, Jaideep Prabhu & Simone Ahuja, Random
Business/Random House India 2012.
2. “The Houdini Solution. Put Creativity and Innovation to Work by Thinking INSIDE THE
BOX”,By Ernie Schenck, McGraw Hill, New York 2007.
3. Reverse Innovation: Create Far From Home, Win Everywhere - Vijay Govindarajan,
ChrisTrimble and Indra K. Nooyi - Harvard Business Press Books – 2015
4. The Little Black Book of Innovation: How It Works, How to Do It? - Scott D. Anthony,
Harvard Business School Press – 2013.

Reference Books
1. The Innovator’s DNA - Jeff Dyer, Hal Gregersen, Clayton M. Christensen, Harvard Business
School Press – 2013.
2. Innovation. - Growth Engine for Nation -. Nice Buzzword but Often Misunderstood. Compiled
By. Dr. Rajiv V. Dharaskar.
Additional Learning Resources:
1. https://youmatter.world/en/definition/definitions-innovation-definition-types-examples/
2. https://sprigghr.com/blog/hr-technology/7-examples-of-innovation-key-takeaways/
3. https://ideas.repec.org/s/hhs/lucirc.html

Tutorials Details:
1.Materials for Group/Individual Assignments
2. Paper Clippings – From News Papers, Magazines,
3. Articles from Work Books
4. Presented Papers of Conferences, Seminar/Symposia Articles
5. Company Brochures, Pamphlets
6. Advertisements Published in News Papers/Magazines
7. Branch’s Relevant National and International Society Information
8. Any Other Materials Available in Websites
JSS Science and Technology University, Mysuru
Department of Computer Applications
VIII Semester Bachelor of Computer Applications [BCA]

Course Category Code: DSE-8 Course Category Name: Discipline Elective-8


Project
Course Code: BCA85P Course Title:
(Application/Research)
Total Credits: 6 Credit Structure (L: T:P): 0:0:6
Total Hours: 96 Max. Marks: 250

Course Outcomes:
Upon successful completion of this course, students will be able to,

CO1: Apply the knowledge acquired within and beyond the curriculum.
CO2: Formulate and investigate a problem which is of current trend.
CO3: Apply Software Engineering methodologies by following Software Development Life
Cycle (SDLC).
CO4: Communicate, interpret, design and implement efficiently.
CO5: Document and present the processes involved in project implementation.

1. Introduction
Department of Computer Applications aims to impart value based technical education with
right blend of computation skills, analysing, designing and managing projects. The Project
work constitutes a major component in most of the professional programmers. The project
work not only aims at the partial fulfilment of the BCA requirements, but also provides a
mechanism to demonstrate the student’s skills, abilities and specialization of interest. As the
program covers a wide range of theoretical and practical subjects related to computer
applications, it is an opportunity for a student to showcase the combined practical
implementation of all the courses covered in the earlier 5 semesters effectively and
efficiently. The project work should compulsorily include the software development life
cycle, documentation and demonstration of the same within the stipulated period of
18weeks.

2. Aim
The main aim of the project is to make students aware of the process of project
implementation using their domain knowledge and to provide computer-based
solutions/applications for the industry, academic & research oriented real time problems.

3. Objective
The objective of the project is in such way that it helps the student in developing the ability
to apply theoretical knowledge and practical tools/techniques.
4. Outcome
At the end of implementation of project, student is capable of,
 Understanding and applying Systems Development Life Cycle (SDLC).
 Identifying systems requirements.
 Applying different data gathering and analyzing techniques.
 Performing and evaluating feasibility studies like cost-benefit analysis, technical
feasibility, time feasibility and operational feasibility for the project.
 Designing and developing of system architectures and data flow diagrams.
 Evaluating methods of process description to include structured, decision tables and
decision trees.
 Creating and evaluating such alternative graphical tools as systems flow charts and
state transition diagrams.
 Decide the software requirement specifications and hardware requirement
specifications.
 Plan the systems design phase of the SDLC.
 Distinguish between logical and physical design requirements.
 Designing and evaluating system inputs and outputs.
 Estimate storage requirements.
 Explain the various file update processes based on the standard file organizations.
 Construct and evaluate Entity-Relationship (ER) diagrams for RDBMS related projects.
 Perform normalization for the un-normalized tables for RDBMS related projects.

5. Project Selection Process


Student can implement projects in two streams.
Application Stream
These projects aim at developing an application for attaining a specific or group of tasks in
respective domains. The student has to understand the applicability of the project
thoroughly and should develop application based on the required features and
functionalities. The following are some important application domains. These projects could
be done in college or industry. Student can take up any one the following application
domains, but not limited to these:
 Database, Data mining and Data warehousing applications
 Networking applications [Mobile, SAN, Security, MANet etc…]
 Business / Enterprise applications [Supply Chain, ERP, CRM etc…]
 Web based applications
 Multimedia applications
 Software Engineering applications
 Grid and Cloud computing applications
 Parallel and distributed computing applications
 E-learning and e-commerce applications
 Gaming applications
 Hardware driver applications
 Mobile applications
 Healthcare applications
 Banking and Finance applications
 Insurance applications
Research Stream
The problem formulation should made it clear to everyone, students should aim to address
whom and where it is relevant. Chosen areas can be any of the following or any area of
research.
 Public health, Epidemiology & Health Services
 Bio medical.
 Clinical sciences and health practice.
 Neurosciences & Behavioural sciences.
 Cloud services.
 Big data
 Data science
 Image processing
 Internet(IOT)
 Any engineering topics where software plays vital role.

One of the most important early step in a research projects is the literature survey. A
literature survey is done to identify related research done already and to set the current
research work within a conceptual and theoretical context.

6. Problem Formulation
Students should follow the following steps (Respective guides to encourage students to follow
these steps while formulating the problem for the project).
 Tailoring the idea to the targeted topic of the work programme.
 Describe the objectives and applications of the project – setting the specific objectives of
the topic.
 Set up the project implementation phases and structure of the project – what activities you
need to achieve the objectives and what expertise/knowledge is needed.
 Describe the end results (project outputs) and the impact of the project outcome.
 Highlight the added value, the innovative element of your project.
 Chosen project concept should address the main questions: WHY? WHAT? HOW? WHO?
WHERE?

o Statement of Problem: the “Why?”


Summary of the original problem statement.
Background: Brief description of company and their business relevance or importance of
problem. Background information to educate the reader previous related work by
others—literature review with credible sources patent search on related problem.

o Objectives: the “What?”


In the Objectives section, student should translate the customer’s quantitative and
qualitative needs into clear, objective design specifications. Define the scope of work
and clearly state the project objectives.

o Technical Approach: the “How?”


Although you may not know all the details of the problem solution, you should know
a first design on how you will solve the problem, and you should have some design
concepts.
o Intended users: Who?
This should address who is the user of the system/beneficiary of the work.

o Environment: Where?
This should address area of domain; your application or work will be useful.

7. Evaluation Process
The project duration is 18 weeks; 16 weeks for development and 2 weeks for preparation of
the project report. Students needs to maintain the project dairy, consult their internal guide
and update the status of the work and get it reviewed every week. Students are be required
to provide their project implementation details, methodology and results to the department.
otherwise, students will forfeit the claim for having done the project work.
Evaluation process has following steps.

1) Project Screening and Finalization


Student activity: Submission synopsis and finalization.
2) Evaluation of system study and analysis
Student activity: Submission of system requirement specification
2) Evaluation of project design
Student activity: Submission of design document
4) Evaluation of coding, testing and implementation.
Student activity: Submission of draft final project report
5) Final report submission.
Project screening
Student projects will be screened based on following points
a) Relevance to current technology
b) Gauging whether project work involves 16-week man hours of work.
c) Place of execution: Industry/Research organization/College
d) Project relevance to Computer Science and Applications
e) Understanding of the project work by the student
Format of the Synopsis can be referred in Annexure-I
Finalization of Synopsis
a) Finalization of Synopsis is done based on the previous stage of evaluation
b) Based on recommendation of the panel comprising of all the staff members of the
department.
c) Verifying whether suggestions of the previous evaluation incorporated or not.
Format of the Synopsis can be referred in Annexure – I
Evaluation of system study and requirement analysis
Evaluation criteria in this step as follows.
a) Whether student understood the problem in depth.
b) Whether scope and objective of the project defined properly.
c) Whether student studied and understands the system thoroughly/completely.
d) Whether functional requirements and non-functional requirements defined properly.
SRS document can be referred in Annexure-II
Evaluation of project design
In this level evaluated for
a) Architectural Design
b) Detailed Design
c) Database Design
d) External Interface Design
e) Algorithm Design
Design document format as per in Annexure-III
Evaluation of coding, testing and implementation
Evaluation of coding, testing and implementation criteria as follows.
a) Pseudo code
b) Test case generation
c) Actual Testing
d) User’s Manual
e) Implementation strategy
f) Draft report submission
g) Checking whether the implementation has meet requirements specified in SRS
document or not.
h) Demo of the final working model of the system.

Final report format should be followed according Annexure-VI


Annexure I: Format of the Synopsis
Application stream

 Title of the Project.


 Problem statement.
 Objective.
 Scope of the project.
 Brief description.
 Project Category (RDBMS/OOPS/Networking/E-learning.,etc.).
 Software requirements.
 Hardware requirements
Research stream

 Title of the Project.


 Problem statement.
 Objective of the project.
 Related work done (list of literature)
 Brief description of proposed work.
 Software requirements.
Note:
Students doing internship program outside the college need to submit the following
details.
o Name and address of the company
o External guide name and designation
o Email and contact number of the external guide.
Annexure II: Format of the SRS document
Application stream
Introduction:
Scope of SRS document
Definitions, acronyms and abbreviations
Definitions, acronyms and abbreviations used.
References.
Overview.
Overall description:
Product perspective
- About your project work.
Product functions
User characteristics
- Characteristics of the intended user.
General constraints
Assumptions and Dependencies
Specific requirements:
External Requirements
(User Interface/Hardware/Software)
Functional Requirements
Non-functional requirements
Other requirements.
Architectural overview
Data flow diagrams
Design constraints

Research stream
Introduction.
Detailed literature review of related work.
Detailed analysis of the proposal work
Conclusion.
Annexure III: Format of Design Document:

Application stream

Introduction
Scope of design document
Definitions, acronyms and abbreviations
References
Overview
System Architecture
Architectural design
User interface design
Forms design
Database or file design
Reports design
Workflows and algorithms design
Detailed design of DFDs.
Activity diagrams
Use case diagrams
Sequence diagrams

Component interfaces
Component design description
Software requirements mappingCritical requiremnts
Research stream:
Introduction
Algorithms/logic used in the related work.
Algorithms/logic steps involed in the proposed method.
Conclusion
Annexure IV : Coding detail
Application and Research stream:
Introduction
Coding convention.
Pseudo code of the important algorithms of the project.
Annexure V: Testing report
Application and Research stream:
Introduction
Test process done for the project.
Test cases.
Testcase Positive Required Expected Actual Test
no scenario input output output pass/fail

Annexure VI : Report format.


TITLE PAGE
CERTFICATE by the Department
CERTIFICATE by the EXTERNAL ORGANIZATION
DECLARATION
ACKNOWLEDGEMENTS
ABSTRACT
CONTENT PAGE
LIST OF FIGURES
LIST OF TABLES
CHAPTER 1: Introduction to the Topic of the Project
Problem definition and Premises
Objectives of the Study / Project
Methodology
Organization of the Dissertation
CHAPTER 2: History of the Organization (If carried out in an organization)
CHAPTER 3: Justification for doing this project
CHAPTER 4: Requirements analysis and specifications.
Refer Annexure II
CHAPTER 5: Design
Refer Annexure III
CHAPTER 6: Implementation
Refer Annexure IV
CHAPTER 7: Testing
Refer Annexure V
CHAPTER 8: Experimental results/findings.
Conclusion
Scope for future work (If any)
Limitations of the study (If any)
References [Papers, books, thesis web references (urls)]
List of Publications (if any)
Attach hard copy of the publication.
Note:
 Page numbers from “Abstract” to “List of Tables” to be given in Roman Numerals
 Page numbers to be given in numerals from Chapter 1 to Chapter 7.
 All pages should contain a footer indication the Department of Master of Computer
Applications, SJCE, Mysuru and header indicated the title of the project and Month-Year
of submission.
Font size should be:
 16 bold for chapter no and chapter title.
 14 bold times new roman for sub headings.
 12 bold times new roman for sub-sub headings.
 12 times new roman normal for running text.
 Table numbers, figure numbers and photograph numbers should be according to
Chapter with appropriate title. Caption should contain figure no and title below the
figure. Table no and title should be above the table.
 Spacing should be 1.5 between lines and 2.0 between paragraphs.
 Cross references should be clearly indicated and proper citation should be given
Wherever references have been made.
 Project report should be hard bound in pink colour to be submitted. Make 3 Copies.
Submit one to Department, one to internal guide and one to yourself.
Marks allotment in evaluation process
The evaluation process is done in four stages.
First Evaluation: Evaluation is conducted at the time of acceptance of the project i.e., during
synopsis submission. Students needs to prepare and present the selected project before the
panel. Evaluation carries 20 marks. The main components to be evaluated are,

Sl. No Evaluation of Synopsis Panel Marks Guide Marks


1 Role of Innovation / Creativity, 2 2
Research Element, challenges in the
Problem.
2 2 2
Literature survey / Existing system
analysis.

3 Clarity about the problem 2 2


4 Attendance 2 2
5 Question and Answer 2 2
Note:
If total mark is less than 50% of the maximum mark, then after a week student need to re-
present the project before the panel for reconsideration of the project or may propose a
different project. After the panel clearance students can start the project.
Second Evaluation: Evaluation is conducted after one and half month of submission of the
synopsis. Students needs to prepare and present on the methodology, analysis and possible
outcome of the problem and design concepts in front of the panel. Evaluation carries 40 marks.
The main components to be evaluated are, understanding of the problem, system study and
analysis done.

Evaluation of SRS and Design Panel Marks Guide Marks


Sl.No
Phase
1 Analysis of the problem and 4 4
understanding and specification of
the requirements
2 Architectural design and other 4 4
related design
3 Progress of the project and work 4 4
implementation status
4 Attendance 4 4
5 Question and Answer 4 4
Final Evaluation:
Evaluation is conducted after one month of third evaluation to check coding, testing and
implementation stages. Students need to prepare draft final report with demo of the project
for the presentation.

Sl.No Evaluation of Implementation Panel Marks Guide Marks


1 Coding and implementation efficiency 4 4
2 Work completion 4 4
3 Testing efficiency 4 4
4 Attendance 4 4
5 Question and Answer 4 4
Overall marks distribution:

Total internal assessment marks Panel member Guide


100 50 50
Total marks distribution:

Project Internal Report Evaluation Report Viva Total


Assessment Evaluation Voce Marks
(Guide (50%) + Internal External Avg.
Panel (50%)) (I) (E) (Internal and
External)
Major 100 100 100 100 50 250

Mini 30 10 ---- 10 10 50

Credits distribution for the evaluation for major project.

Evaluation Steps Credits


First evaluation 1
Second evaluation 1
Final evaluation 1
Report Evaluation. {Average of
internal and external examiners} 2

Viva Voice 1
Total 06
JSS Science and Technology University, Mysuru
Department of Computer Applications
VIII Semester Bachelor of Computer Applications [BCA]
Course Category Code: DSC-19 Course Category Name: Discipline Core-19
Intelligent Algorithms
Course Code: BCA81L Course Title:
Laboratory
Total Credits: 1 Credit Structure (L:T:P): 0:0:1
Total Hours: 32 Max. Marks: 50
Course Outcomes:
Upon successful completion of this course, students will be able to,
CO1: Design and analyze various algorithmic techniques.
CO2: Implementation of algorithmic techniques to solve real time applications.
CO3: Implement various search and match algorithm addressing the real time instances.

LIST OF EXPERIMENTS TO BE COVERED

1. Find the shortest path from the source path to every vertex using Bellman-Ford Algorithm and
determine its performance for the following weighted graph.

Note: Try with varying source vertex.


2. Find the shortest path from the source path using Floyd Warshall Algorithm for the given
weighted graph.

3. Implement linear modular equation for the given input:


A ) 11x = 1 mod 23
B ) 23x + 49y = 102

4. Implement Monte Carlo algorithm for the given problem.


a) Latin Org Inc. sells an organic product made in Costa Rica. Because the time it takes to
receive and order the products, Latin Org places an order every two weeks. The number of
products ordered is the difference between the actual on-hand inventory at the end of the week
that the order is made and 100, the maximum allowed amount. It cost $50 to place and received an
order, $4 each product, and $1/week to keep the product in the store. The product sells for $12.
The historical information of on-hand inventory at the time an order is made is as showed.
4. An order is made is as showed.

On-hand Probability
inventory

15 .12
25 .25
35 .35
40 .20
42 .06
55 .02

a) Simulating 60 weeks, what is the estimated average order size (show your data or calculations)?
b) Based on the simulation, what is the average total cost of "having" the product?

b) Use the Monte Carlo Simulation to analyze the impact of risks that will affect the project.
Estimate optimistic, pessimistic and most likely durations for each activity as shown in the below
table using Monte Carlo algorithm.

5. Implement Naïve string Matching Algorithm for the given input :


a) Text="this is a test text”, pattern1="test", pattern2=”text”, pattern3=”is is a”,pattern4=”b”.
b) Text="aabaacaadaabaaba", pattern1="aaba", pattern2=”baac”, pattern3=”abab”.

6. Implement Rabin - Karp algorithm for the given input:


a) Text = "batmanandrobinarebat", pattern1= "bat", pattern2=”are”, pattern3=”red”, pattern4=”dob”
b) Text = "abesdu", pattern1 = "edu", pattern2=”abc”, pattern3=”dua”, pattern4=”esd”.

7. Develop string matching with finite automata for the given input:

8. Design and develop Knuth-Morris-Pratt algorithm for the given input:


a) Text="batmanandrobinarebat", pattern1= "bat", pattern2=”bin”, pattern3=”mana”, pattern4=”red”.
b) Text= "abcdefgh", pattern1= "def" , pattern2=”cde”, pattern3=”ghi”.

9. Use the crawler of your choice and crawl your favorite site, such as http://jakarta.apache.org/,
then use crawler to process the retrieved data, build an index for it, and search through its
pages. How do the results vary if you add PageRank to them? How about user clicks?
10. Why various websites want you to rate movies, songs, and other products by assigning one
integer value between 1 and 5 (inclusive)? Why not pick a value between 1 and 10? Or even
between 1 and 100? Wouldn’t that give you more flexibility to express the degree of your
satisfaction with the product? To take this one step further, why not rate different aspects about
a product? In the case of a movie, we could rate the plot, the performance of the actors, the
soundtrack, and the visual effects. Extend the code and identify any potential issues.

Text Books:

1. T. H Cormen, C E Leiserson, R L Rivest and C Stein: Introduction to Algorithms, 2nd Edition,


Prentice-Hall of India, 2002.
2. Kenneth A. Berman, Jerome L. Paul: Algorithms, Cengage Learning, 2002.
3. Haralambos Marmanis and Dmitry Babenko, Algorithms of the Intelligent Web, Manning
Publications, 2009

Additional Learning Resources:

1. http://nptel.ac.in/algorithms
2. https://ep.jhu.edu/courses/525770-intelligent-algorithms/
3. https://en.wikipedia.org/wiki/Monte_Carlo_method
4. https://www.programiz.com/dsa/floyd-warshall-algorithm
5. https://www.programiz.com/dsa/rabin-karp-algorithm
JSS Science and Technology University, Mysuru

Department of Computer Applications

VIII Semester Bachelor of Computer Applications [BCA]

Course Category Code: DSC-20 Course Category Name: Discipline Core-20


Software Project Management
Course Code: BCA82L Course Title: Laboratory
Total Credits: 1 Credit Structure (L:T:P): 0:0:1
Total Hours: 32 Max. Marks: 50

Course Outcomes:

CO1 : Ability to conduct experiments by applying the basics concepts of Software Project
management.

CO2 : Implementing the concepts of resources allocation and risk project management techniques
appropriately.

CO3 : Ability to conduct experiments on managing people and organizing teams.

List of Programs/Activities/Projects

LAB-1: Introduction to MS Project

Statement Purpose:
The main purpose of conducting this LAB is to give an idea about the working of MS Project.

Activity Outcomes:
Students will get familiar with HOW TO:
1. Start MS Project
2. Create a Project Plan from a template
3. Switch to a different view
4. View a report
5. Create a visual report

Activity 1: How to start MS Project (Standard Version)


Activity 2: How to create a Project Plan from a Template?
Activity 3: How to switch to a different view?
SOME OF THE IMPORTANT VIEWS IN MS PROJECT:
 Gantt Chart View
 Resource Sheet view
 Resource Usage view
 Task Usage view
 Calendar view
 Network Diagram view
Activity 4: How to view a report in the Print Preview Window?
Activity 5: How to create a visual report in MS Project?

LAB-2 & 3: Creating Tasks List


Activity Outcomes:
Students will get familiar with HOW TO:
1. Create a new project plan & its start date
2. Set working & non-working time
3. Enter properties about a project plan
4. Enter new tasks in the project, set duration for each task & to create a milestone task
5. Organizing tasks into phases
6. Link adjacent and non-adjacent tasks
7. Enter a task note
8. Enter a task hyper link
9. Check a Project plan’s duration and other statistics
10.Display project’s entire duration in Gantt Chart View

Activity 1: How to create a new project plan and set its start date?
Activity 2: How to set working & non-working time?
Activity 3: How to set properties about a Project Plan?
Activity 4: How to enter tasks, task duration & milestone in a Project?
Activity 5: How to organize tasks into phases?

LAB-3: Project Plan’s duration & other statistics

Activity 6: How to link adjacent and non-adjacent tasks?


Activity 7: How to enter task note?
Activity 8: How to enter a task hyperlink?
Activity 9: How to check Project Plan’s duration & other statistics?
Activity 10: How to display the project’s entire duration in Gantt Chart view?

LAB-4: Setting-up Resources

Activity Outcomes:
Students will get familiar with HOW TO:
1. Setup work (people and equipment) resources
2. Setup material resources
3. Setup cost resources
4. Enter work (people & material) resource pay rates
5. To make a onetime adjustment to an individual resource’s working time
6. To edit regular work week for an individual resource
7. To document resources with resource notes

Activity 1: How to setup work (People and Equipment) resources?


Activity 2: How to setup material resources?
Activity 3: How to setup cost resources?
Activity 4: How to enter work (People) resource pay rates?
Activity 5: How to make one-time adjustment to an individual resource’s working time?
Activity 6: How to edit the regular work week for an individual resource?
Activity 7: How to document resources with resource notes?

LAB-5: Assigning Resources to Tasks


Activity Outcomes:
Students will get familiar with HOW TO:
1. Assign resources to tasks
2. To control how MS Project schedules the work on a task after assigning an additional resource
3. To assign material resources to tasks
4. To assign cost resources to tasks
Activity 1: How to assign Resources to tasks?
Activity 2: How MS Project schedules the work on a task after assigning an additional resource?
Activity 3: How to assign Material Resources to tasks?
Activity 4: How to assign Cost Resources to tasks?

LAB-6: Formatting & Printing Project Plan

Activity Outcomes:
Students will get familiar with HOW TO:
1. To display the project summary tasks
2. To create a new view based on an existing view
3. To format Gantt Bars with the Gantt Chart Wizard
4. To draw a text box on a Gantt Chart
5. To format a category of text in a view
6. To format selected text in a view
7. To edit a report’s header or footer

Activity 1: How to display the project summary task / Title?


Activity 2: How to create a new view based on an existing view?
Activity 3: How to format Gantt Bars with the Gantt Chart Wizard?
Activity 4: How to draw a text box on Gantt Chart?
Activity 5: How to format a category of text in a view?
Activity 6: How to format in a view?
Activity 7: How to edit a report’s header and footer?

LAB-7: Tracking Progress on Tasks

Activity Outcomes:
Students will get familiar with HOW TO:
1. Set current values in a schedule as a baseline
2. Display the Variance table in the Task Sheet view
3. Record project progress as scheduled
4. Record a task’s completion percentage
5. Enter actual work values for tasks
6. Enter actual start and duration values for tasks

Activity 1: How to set current values in a schedule as a baseline?


Activity 2: How to display variance (difference) table in the Task Sheet view?
Activity 3: How to record project progress as scheduled (planned)?
Activity 4: How to record a Task’s completion percentage?
Activity 5: How to enter actual work values for Tasks?
Activity 6: How to enter actual start and duration values for tasks?
 dents will be asked to implement a project plan as per given specimen
 These LAB Assignment will help to judge the student’s capabilities about the use of MS
Project
LAB 10-11: Discussion and Supervision of Final Project Report

Sample Projects:
a. Software Houses Online Directory
b. Online booking system for a Travel Agency
c. Inventory System for a Super Store
d. Parcel Tracking System for a Cargo Service
e. Citizen Information System for Jeddah
f. Vehicle Information System passing through a Check point
g. Online Home Address search engine
h. Any project of your own choice

Text Books:

1. Joseph Phillips, “Project Management Professional Lab Manual”, Published by McGraw Hill,
1st Edition , 2010

References Books/PDF’s:

1. https://silo.tips/download/lab-manual-introduction-to-software-project-management-
cpis-334
2. http://csis1.bradley.edu/uskov/webpage/MS_EXAMS/CS591_MS_EXAM/Lab_01/Micr
osoft_Project_2007_Lab_Manual.pdf

Additional Learning Resources:

1. https://www.studocu.com/row/document/university-of-engineering-and-technology-
taxila/project-management/spm-lab-4-2k16-spm-lab4/8902770

You might also like