Вы находитесь на странице: 1из 75


Department of Computer Applications

Bachelor of Computer Applications


Green Fields, Vaddeswaram,
Guntur District, A.P., INDIA.
Pincode : 522 502

Vision: To be a globally renowned university.

Mission: To impart quality higher education and to undertake research and extension with
emphasis on application and innovation that cater to the emerging societal needs through all-
round development of students of all sections enabling them to be globally competitive and
socially responsible citizens with intrinsic values.


Vision: To provide knowledge with quality technical skill in computing which are aligned

with global industry requirements.

Mission: To impart strong theoretical foundation. and to provide exposure to latest

technologies to inculcate innovative ideas which can bridge the industry-academic gap in IT

sector by abiding to social ethics.

1. Outperform in Information Technology across various specializations like Cloud
2. Gain exposure in preventive, ethical hacking and forensic security technologies.
3. Develop skills to demonstrate functional knowledge of data centres and modern
storage methods.

Program Specific Outcomes

1. An ability to use and develop cloud software, administrative features, infrastructure

services and architectural patterns; ethical hacking and forensic security technologies.

2. An ability to gain Knowledge on design and control strategy; techniques to secure

information and adapt to the fast changing world of Information Technology needs.
Program Outcomes
At the end of the Program, students will be able to:

1. Apply knowledge of mathematics, science, and engineering in IT solutions.

2. Design a system, component, or process to meet desired needs within realistic
constraints such as economic, social, health and safety and sustainability
3. Apply elements of information security to solve problems.
4. Employ cloud concepts to demonstrate cloud computing solutions
5. Communicate effectively
6. Understand professional and ethical responsibility
7. Recognize the need for engaging in lifelong learning
8. Adapt to the fast changing world of information technology needs


Mapping of POs to PEOs
Program Educational
S.No. Program Objectives (POs) Objectives (PEOs)
1 2 3
Apply knowledge of mathematics, science and Information
1 √
Design a system, component, or process to meet desired
needs within realistic constraints such as economic,
2 √
environmental, social, political, ethical, health and safety,
manufacturability, and sustainability
3 Apply elements of Information Security to solve problems √
Employ cloud concepts to demonstrate cloud computing
4 √
5 Communicate effectively √ √ √
6 Understand professional and ethical responsibility √
7 Recognize the need for engaging in Life Long learning √
Adapt to the fast changing world of information √
8 technology needs √
Program Structure
Course Code Course Title L T P S Cr CH
18UC1101 Basic English 0 0 4 0 2 4
15MT1105 Fundamentals of Mathematics 3 0 2 0 4 5
18SC1105 Logic and Reasoning 0 0 2 0 2 2
18UC0009 Ecology & Environment 2 0 0 0 2 2
Fundamentals of Information
18CA1101 4 6
5 Technology 2 0 4 0

18CA1102 Programming in C 3 0 2 6 5.5 11

18CA1103 Computer Organization 3 0 0 0 3 3
Counselling-1 0 0 1 0 0 1
8 18GN1101
Co curricular Activity-1 0 0 0 2 0.5 2
9 18GN1107
Total 13 0 13 8 23 36


Sl Course
Course Title L T P S Cr CH
No Code
18UC1202 English Proficiency 0 0 4 0 2 4
15MT1208 Computer-Oriented Statistical 3 0 2 0 4 5
18MB4055 Organization Management 3 0 0 0 3 3
18CA1204 Computer Networks 3 0 2 0 4 5
18CA1205 OOP through Java 3 0 2 4 5 9
18CA1206 Data Structures Using C 3 0 2 4 5 9
Counselling-2 0 0 1 0 0 1
7 18GN1202
Co curricular Activity-2 0 0 0 2 0.5 2
8 18GN1208
Total 15 0 13 10 23.5 38
Sl Course
Course Title L T P S Cr CH
No Code
1 18UC3206 Campus To Corporate 0 0 4 0 2 4

Universal Human Values and Professional

2 2 3
18UC0010 Ethics 1 0 2 0

Principles of Virtualization & Cloud

3 5 9
18CA2107 Technology 3 0 2 4

4 18CA2108 Operating Systems 3 0 2 0 4 5

5 18CA2109 DBMS 2 1 2 0 4 5

6 18CA2110 Web Technologies 3 0 2 4 5 9

7 18GN2103 Counselling-3 0 0 1 0 0 1

8 18GN2109 Co curricular Activity-3 0 0 0 2 0.5 2

Total 12 1 15 10 22.5 38

Sl Course Code Course Title L T P S Cr CH
1 18UC2204 Aptitude Builder – 1 0 0 4 0 2 4
2 18CA2211 Software Engineering 2 0 2 0 3 4
3 18CA2212 Fundamentals of Information Security 2 2 0 0 4 4
4 18CA2213 Ethical Hacking 2 2 2 0 5 6
5 18CA2214 Cryptography 3 1 0 0 4 4
6 18CA2215 Fundamentals of Data Centre 2 1 0 0 3 3
7 18CA2216 Fundamentals of Cloud Storage 3 2 0 0 5 5
8 18SC1106 Technical Skill – 1 (Coding) 0 0 0 6 1.5 6
9 18GN2204 Counselling-4 0 0 1 0 0 1
10 18GN2210 Co curricular Activity-4 0 0 0 2 0.5 2
Total 14 8 9 8 28 39
Sl Course Code Course Title L T P S Cr CH
1 18UC3105 Aptitude Builder – 2 0 0 4 0 2 4

2 18CA3117 Computer Forensics 2 2 2 0 5 6

3 18CA3118 Virtualization & Cloud Security 3 2 0 0 5 5

4 18CA3119 IT Governance, Risk & Information 3 2 0 0 5 5

Security Management
5 18CA3120 Server Operating System 2 2 2 0 5 6

6 18FL3054 French Language 2 0 0 0 2 2

7 18SC1207 Technical Skill – 2 (Coding) 0 0 0 8 2 8

8 18GN3105 Counselling-5 0 0 1 0 0 1

9 18GN3111 Co curricular Activity-5 0 0 0 2 0 2

10 18CA3121 * Internship 0 0 0 0 2 0

Total 12 8 9 8 28 39

Note : *Internship – taken by the students after their IV semester end exams and before V semester
registration. Duration of the internship is 6 weeks and its credits will be included in V semester.

Course Code Course Title L T P S Cr CH
Introduction to Wireless & VOIP
1 18CA3222 2 0 2 0 3 4

2 18CA3223 Introduction to Windows Azure 2 0 2 0 3 4

3 18CA3224 Big Data 4 0 0 0 4 4

4 18IE4048 PROJECT 0 0 18 0 9 18

5 18GN3206 Counselling-6 0 0 1 0 0 1

Total 8 0 23 0 19 31

Cumulative Credits 23+23.5+22.5+28+28+19 =144

Semester - I

Course Code: 18UC1101 L-T-P-S : 0-0-4-0

Pre-requisite: Nil Credits : 2

CO. No. Course Outcome Mapped BTL

CO 1 Apply the practical knowledge of using action words in 5 1
sentence construction.

CO 2 Apply and analyse the right kind of pronunciation with 5 2

regards to speech sounds and able to get different types of

CO 3 Apply the concept of fundamental principle of counting to 1 2

solve the problems on linear, circular permutations and
also for the problems on selections.

CO 4 Analyze the given conditions and finding out all the 1 2

possible arrangements in linear & circular order.

Syllabus :

Interactive Grammar:Action Words-Modifiers, Intensifiers,Connectives ---- 5 Passages- 5

Worksheets (Revision tests of Bridge Course topics) -Parsing
Sentence Skills:Tense,Voice, Case, Gender, Reported Speech, Syntax, Types of Sentences,
Syntactic Ordering
Introductiontothe Soundsof English:Basic English Sounds, Distinctive Sounds of English,
Assimilation, Contraction, Elision, Twinning,Stress, Syllables, Word- stress, Tone and
Intonation- Rising,Falling,Rise-fall and Fall-rise.

Language Laboratory Interactive:Esca talk, JAM, Ranking,Shrinking Story,Desperate

Decision, Listening for Specifics, Pronunciation Practice.

Quantitative Aptitude: Permutations and Combinations, Probability

Reasoning: Number and Letter Analogy, Odd Man out, Analytical Reasoning-I
Text books:

1. Kerry Patterson, Joseph Grenny, Ron McMillan:Crucial Conversations: Tools for

Talking When Stakes Are High.Switzler: Paperback – Animated, September 9, 2011.
2. Douglas Stone, Bruce Patton, Sheila Heen, and Roger Fisher :Difficult Conversations:
How to Have Conversations that Matter the Most .Paperback – November 2, 2010
3. R.K. Bansal, J.B. Harrison: Spoken English. Delhi: Orient Black Swan.2009.
4. Language LaboratoryTeacher Manual, KLEFU

Course Code : 15MT1105 L-T-P-S: 3-0-2-0

Pre-requisite : Nil Credits : 4

CO. No. Course Outcome Mapped BTL

CO 1 Solve problems of matrices, limits and differential equations 1 2
CO 2 Formulate differential calculus, differentiation rules and 1 2
identify a method for solving and interpreting the results.
CO 3 Formulate physical laws and relations mathematically in the 1 2
form of second/higher order differential equations and
identify a method for solving and interpreting the results.
CO 4 Verify the solution of problems through MATLAB. 1 2


Matrices : A quick review of the fundamental concepts, Rank of a Matrix, Non-Singular and
Singular matrices, Elementary Transformations, Inverse of a Non-Singular Matrix, Canonical
form, Normal form. Systems of Linear equations: Homogeneous and Non Homogeneous
Equations, Characteristic equation of a matrix. (Relevant sections of Text 1). (proof of all the
theorems are to be excluded.)

Differential Calculus : A quick review of limits of function, rules for finding limits,
extensions of limit concepts, derivative of a function, differentiation rules, chain rule, rate of
change and simple applications of the rules. Extreme values of a function Rolle’s Theorem,
Mean Value Theorem. (Sections 1.1, 1.2, 1.3, 2.1, 2.2, 2.3 , 3.1, 3.2 of Text 2)

Ordinary Differential Calculus: Introduction, Formation of ODE by elimination of

arbitrary constants & functions. Solving first order ODE by variable-separable method, linear
equation & Bernoulli’s equation for non-linear. Solving second and higher order ODE with
constant coefficient. Complimentary functions and Particular Integrals like 𝑒 𝑎𝑥 , sinax, 𝑥 𝑛 .
Solving by the method of Variation of Parameters
Partial Differential Equations: Introduction, formulation of Partial Differential Equation by
elimination of arbitrary constants and by elimination of arbitrary function. Solution of first
order equations using Lagrange’s method. (Relevant sections of Text 3)

Text Books

1. Dr. B. S. Grewal – Higher Engineering Mathematics

2. S.K . Stein – Calculus and analytic Geometry , (McGraw Hill )
3. Shanti Narayan - Matrices (S. Chand & Company)

Reference Books:

1. Zubair Khan, Shadab Ahmad Khan - Mathematics – 1 and Mathematics – II (Ane Books)
2. N.P.Bali, Dr.N.Ch.Narayana Iyengar-Engineering mathematics – L
3. Matrices, Frank Ayres JR Schaum's Outline Series, TMH Edition
4. Thomas and Finney - Calculus and analytical geometry (Addison-Wesley)

Course Code : 18SC1105 L-T-P-S: 0-0-2-0

Pre-requisite : Nil Credits : 2

Course Outcome (CO) PO BTL
Apply the fundamental principle of counting and use them to 1 3
measure the uncertainty in random experiments.
Apply Venn diagrams to find the conclusion of statements , 1 3
solve puzzles using binary logic and problems relating to cubes.
Apply the available models for Data sufficiency & 1 3
3 redundancy and interpret it , when given, in tabular and
graphical forms.
Apply the Reasoning techniques to solve problems on 1 3
arrangements, series, analogies, coding and decoding.

Permutation and Combinations: Fundamental Principle of Counting, Counting Methods,
Definition of permutation, Linear Permutations, Rank of a word, Circular Permutations,
Definition of Combinations, Problems on Combinations
Probability: Definitions of Probability, Addition and Multiplication Theorems.
Deductions: Introduction, expressing different types of statements using Venn diagrams,
Definition of complimentary pairs, Finding the conclusions using Venn diagrams for two and
more statements.
Logical Connectives: Definition of simple statement, Definition of compound statement,
Finding the implications for compound statements, Finding the negations for compound
Binary Logic: Definition of a truth-teller, Definition of a liar, Definition of an alternator,
solving problems using method of assumptions, solving analytical puzzles using binary logic.
Cubes: Basics of a cube, Finding the minimum number of cuts when the number of identical
pieces are given, Finding the maximum number of pieces when cuts are given, Problems on
painted cubes of same and different colors, Problems on cuboids, Problems on painted
cuboids, Problems on Dice.
Data Sufficiency: Different models in Data Sufficiency, Problems on Data sufficiency,
Problems on data redundancy.
Data Interpretation: Problems on tabular form, Problems on Line Graphs, Problems on Bar
Graphs, Problems on Pie Charts.
Analytical Reasoning puzzles: Problems on Linear arrangement, Problems on Circular
arrangement, Problems on Double line-up, Problems on Selections, Problems on
Number and letter series: Difference series, Product series, Squares series, Cubes series,
Alternate series, Combination series, Miscellaneous series, Place values of letters.
Number and Letter Analogies: Definition of Analogy, Problems on number analogy,
Problems on letter analogy, Problems on verbal analogy.
Odd man out: Problems on number Odd man out, Problems on letter Odd man out,
Problems on verbal Odd man out.
Coding and decoding: Coding using same set of letters, Coding using different set of
letters, Coding into a number Comparison & Elimination
Text Books
1. A modern approach to Logical reasoning, R S Agarwal, S. Chand Publications.
Reference Text Books

1. Logical Reasoning, Arun Sharma, Mc Graw Hill.

2. Analytical & Logical Reasoning, Peeyush Bhardwaj, Arihant Publications.

Course code: 18UC0009 L-T-P-S: 2-0-0-0

Pre Requisite: NIL Credits: 2

CO. No. Course Outcome Mapped BTL

Identify the importance of Environmental education and
CO 1 6 1
conservation of natural resources.
CO 2 Describe the importance of ecosystems and biodiversity. 6 1
Apply the environmental science knowledge on solid waste
CO 3 6 2
management, disaster management and EIA process.


The Multidisciplinary nature of Environmental Studies - Introduction toEnvironment,

Definition, scope, importance, Multidisciplinary nature of Environmental Studies, Need for
public awareness. Institutions and people in Environment.

Natural Resources- Renewable and Non Renewable Resources Forest resources - Benefits,
Deforestation, causes, effects and impacts, Afforestation programmes, Socio-forestry, Agro-
forestry, Vanasamrakshana programmes.

Mining and its impact on environment - mining, dams and their effects on forests and tribal

Water resources- Distribution of surface and ground water, Aquifers, floods, drought,
conflicts over water, dams, benefits and problems, Water conservation, rain water
harvesting, watershed management, Cloud seeding Mineral resources- Use, exploitation,
environmental effects.

Food resources- Changes in agricultural methodologies, comparison between old and new
methods of farming, Green Revolution, Environmental Impact Assessment of conversion of
agricultural lands, effects of modern agriculture, Drip Irrigation, fertilizer, pesticide
problems, Eutrophication, Vermicompost, water logging, Blue baby syndrome.

Energy resources - Growing energy needs, renewable and non renewable energy sources.
Land resources-. Soil erosion - Importance of soil, Types of soil erosion, Causes and effects
of soil erosion. How to control soil erosion. Role of an individual in conservation of natural

Ecosystems - Concept of an ecosystem, Structure and function of an ecosystem, Energy flow

in the ecosystem, Ecological succession, Food chains, food webs and ecological pyramids.
Types of ecosystem. Biodiversity and its Conservation- Introduction, Definition, Levels,
Values of biodiversity, India as a mega diversity nation. Hotspots of biodiversity. Threats to
biodiversity- Endangered and endemic species of India. Conservation of biodiversity-
Assessment of Biodiversity and its impact on Environment.

Environnemental Pollution- Définition, Causes, effects, control measures of Air pollution,

pollution Water, oïl pollution, Marine pollution, Noise pollution, Thermal pollution, Nuclear
hazards. Soil waste management. Electronic waste management, Biomedical waste
management - Role of an individual in prevention of pollution. Disaster management–
.Climate change, global warming, acid rain, ozone layer depletion.

Environmental Legislation and objectives of Environment Protection Act, Air (Prevention

and Control of Pollution) Act, Water (Prevention and control of Pollution) Act, Wildlife
protection Act, Forest conservation Act, Biodiversity Act, Public awareness. Environmental
Impact AssessmentProcess.

Text Books:

1. Anubha Kaushik, C.P.Kaushik, “Environmental Studies” , New Age International,

2. Benny Joseph, “Environmental Studies”, Tata McGraw-Hill companies, New Delhi,
Course Code : 18CA1101 L-T-P : 2-0-4
Pre-requisite : Nil Credits : 4

CO. No Course Outcome BTL
Understand the basic concepts and terminology of 1 1
CO 1
information technology
CO 2 Understand Data representation and need of Logic Gates 1 1
Understand different Types of Memories and operating 1 1
CO 3
Apply the functionalities available in MS Office, Latex ; 1 2
CO 4
Installing of Windows and Linux operating systems


Unit I: Introduction to computers- Overview, Computers for Individual users, Computers for
organizations, Computers in society; Components of a Computer-Hardware: Processing
Devices, Memory Devices, I/O Devices, Storage Devices, Software: System software,
Applications Software, Data & users; Introduction to Windows-Creating, saving, deleting,
and renaming a file in windows platform.

Unit II: MS-Word - Introduction to Word Processing: Identifying the components of

document window, Standard & Formatting Toolbars, Create, Open, Save documents ,Editing
Text in Documents; Viewing & Formatting Documents.

Unit III: MS-Power Point - Creating & opening presentations, slide layout, animation
schemes to slides; MS-Excel – worksheets, Cell Referencing, Functions & Formulas, Chart.

Unit IV: MS-Access - Creating & Managing Databases: Create tables, Managing Data in
Access: Forms - Creating Forms, Data entry on Form; Working with reports;

Unit V: Networks: Introduction to Networks-Overview, Types of Networks; Concepts of

Internet-Overview, Applications of Internet, ECommerce.
Text Books:

1. Peter Norton,” Introduction to Computers”, Tata McGraw-Hill, 6th Edition.

Reference books:
1. Information Technology for Management, Ramesh Behl -Tata McGraw Hill Pvt ltd.
2. Alexis Leon, Mathews Leon,” Introduction to Computers with MS-Office 2000”, Tata McGraw-
Hill, 2006

Journals to be referred:
1. Journal For IT Education
2. Indian Journal for Information Science and Technology
3. Indian Journal for Computing Technology
4. Oriental Journal of Computing Science and Technology
5. Computer User

Course Code : 18CA1102 L-T-P-S : 3-0-2-6

Pre-requisite : Nil Credits : 5

CO. No. Course Outcome Mapped BTL

CO 1 Explain different concepts of C programming, used to 1 2
create programs.
CO 2 Ability to identify different data types and control structures 1 2
CO 3 Demonstrate the working of functions, arrays and pointers 1 3
CO 4 Identify the working of different file handling methods 1 2
CO 5 Create programs using basic and advanced concepts of C 1,2 3


Overview of Programming : Introduction to computer based problem solving, Program

design and implementation issues- Flowcharts & Algorithms, Top down design & stepwise
refinement, Programming environment – Machine language, assembly language, high level
languages, Assemblers, Compilers, Interpreters

Fundamentals of C programming: Overview of C, Data Types, Constants & Variables,

Operators & Expressions, Control constructs-if then, for, while, Arrays- single &
multidimensional arrays, Functions-fundamentals – general form, function arguments, return
value, Basic I/O-formatted and Unformatted I/O, Advanced features- Type modifiers and
storage class specifiers for data types, Bit operators, ? operator, &operator, * operator, Type
casting, type conversion.

Advanced programming techniques: Control constructs- Do while, Switch statement,

break and continue, exit() function, go to and label, Scope rules- Local & global variables,
scope rules of functions, Functions-parameter passing, call by value and call by reference,
calling functions with arrays, argc and argv, recursion- basic concepts, ex-towers of Hanoi
Dynamic data structures in C: Pointers- The & and * operator, pointer expression,
assignments, arithmetic, comparison, malloc vs calloc, arrays of pointers, pointers to pointers,
initializing pointers, pointers to functions, function retuning pointers, Structures- Basics,
declaring, referencing structure elements, array of structures, passing structures to functions,
structure pointers, arrays and structures within structures, Unions – Declaration, uses,
enumerated data-types, typedef

Additional features: File Handling – The file pointer, file accessing functions, fopen,
fclose, puc, getc, fprintf, C Preprocessor- #define, #include, #undef, Conditional compilation
directives, C standard library and header files: Header files, string functions, mathematical
functions, Date and Time functions

Text Book
1. Programming in ANSI C by Balaguruswamy, 3rd Edition, 2005, Tata McGraw Hill

Reference Books:
1. Let us C by Yashwant Kanetka, 6th Edition, PBP Publication
2. The C programming Language by Richie and Kenninghan, 2004, BPB Publication

Course Code : 18CA1103 L-T-P-S : 3-0-0-0

Pre-requisite : Nil Credits : 3

CO. No. Course Outcome Mapped BTL

Understand the basic units of digital computer system and 1 1
CO 1
number system
CO 2 Understanding the basic operations of the micro operations 2 1
CO 3 Analyze the machine instructions and codes to implements 2 2
CO 4 Understanding various components of CPU and memory 2 1



Introduction to Digital computers, Hardware and software’s, Computer types, functional

units, Data representation: number systems, decimal to binary, octal and hexadecimal
conversion and vice versa, binary coded decimal numbers, hamming code for error detection,
alphanumeric codes, arithmetic operations, binary addition and subtraction,
addition/subtraction of numbers in 1’s and 2’s complement notation for binary numbers and
9’s and 10’s complement notation for decimal numbers, binary multiplication and division,
BCD arithmetic, floating point addition and subtraction.


Register Transfer Language: Register transfer, Bus and Memory transfer (three-stage bus
buffers, memory transfer), arithmetic microoperations (Binary Adder, Binary-adder-
Substractor, binary incrementer, arithmetic circuit), Logic micro-operation (list op logic
micro0operations, hardware implementation), shift micro0operations (hardware
implementation), arithmetic logic shift unit.


Instruction codes: (stored program organization, indirect address), computer registers

(common bus register), computer instructions (instruction set completeness), timing and
control, instruction cycle (fetch and decode, types of instruction, register-reference
instructions), Micro programmed control, control memory, addressing sequencing
(conditional branching, mapping of instructions, subroutine)

Memory organization and Central Processing Unit: Introduction, memory organization and
its layers, general register organization (control word, examples of micro-operations), stack
organization (register stack, memory stack, reverse polish notation, evaluation of arithmetic
expressions), instruction formats (three-address instructions, two address instructions,
one0address instructions), addressing modes, data transfer and manipulation (data transfer
instructions, data manipulation instructions, arithmetic instructions, logical and bit
manipulation instructions, shift instructions), Program control (status bit conditions,
conditional branch instructions, program interrupt, types of interrupt).

Text and reference books:

1. M.Morris Mano, “Computer System Architecture” 3rd edition, PHI.

2. V. Rajaraman, T. Radhakrishanan, “An Introduction to Digital Design”, PHI

3. J.P.Hays, “Computer Organization and Architecture”, McGraw Hill.



Course Code:18UC1202 L-T-P-S : 0-0-4-0

Pre-requisite: Nil Credits : 2

CO. No Course Outcome Mapped BTL

Apply the concepts of accurate English while writing and 5 2
CO 1 become equally at ease in using good vocabulary and
language skills.
Understand the importance of pronunciation and apply the 5 2
CO 2
same day to day conversation.
Apply the concepts of Ratios, Percentages, Averages and 1 2
Analysing the given information, a student is required to
understand the given information and thereafter answer the
CO 3 given questions on the basis of comparative analysis of the
data in the form of tabulation, bar graphs, pie charts, line
graphs. Analyse the given data to find whether it is
sufficient or not.
Apply the basic functionality of Clocks and Calendars to 1 2
find the solutions for the problems. Analyze the given
CO 4 symbols to understand the hidden meaning of the given
expression and finding the solutions. Analyze the given
conditions and finding out all the possible arrangements in
linear & circular order.


Writing Skills:How to Write a Definition, Defining Technical Terms,Product and Process

Advanced Grammar Skills: Transformation of Sentences,Phrases,Clauses,Sentences—
Simple, Compound, Complex Sentences,Concord,Lexis 1:Synonyms, Antonyms, Analogies,
Sentence Equivalence-One-Word Substitutes.

Language Laboratory Interactives: Debate, Blind-fold, Role Play, Situation Reaction

Test--Build an Island nation

Quantitative Aptitude: Data Interpretation, Data Sufficiency

Reasoning:Symbols and Notations, Clocks and Calendars, Analytical Reasoning-II

Reference Books:

1. Dictionary of Technical Terms

2. Dr. Meenakshi Raman and Dr. Sangeetha Sarma: Technical
Communication.Oxford University Press: Delhi.2016.
3. The Ultimate Verbal and Vocabulary Builder. Texas: Lighthouse Review.2000.
4. Rajeev Vasisth: Interactive Vocabulary Drills. New Delhi: Arihant Publications
Limited. 2011.
5. Language LaboratoryTeacher Manual, KLEFU

Course Code: 18MT1208 L-T-P-S: 3-0-2-0

Pre-requisite: Nil Credits: 4

CO. No Course Outcome Mapped BTL

To understand the basic concepts of statistics and explains the 1 1
CO 1
various methods of descriptive data collection and analysis
Construct the probability distribution of a random variable, based 1 3
CO 2 on real-world situation, and use it to compute expectation and
Predict the relationship between two variables and construct the 1 2
CO 3
linear and non-linear regression lines for the given data
Predict the trend variations for times series data and also identify 1 2
CO 4
the Statistical data using Ms-Excel
Verify the solution of problems through MINITAB 8 3


Basic Statistics: Importance of Statistics-Primary and secondary data-Data collection

methods Presentation of numerical and categorical data. Concepts of central tendency and
dispersion-Mean, median and mode-Partition values-Quartiles for grouped and ungrouped
data-Range-Quartile deviation-Standard deviation and coefficient of variation for grouped
and ungrouped data..

Probability Distribution: Random Variable- Discrete Random and Continuous Random

variable, Probability Distribution of a Random Variable, Mathematical Expectation Types:
Binomial, Poisson, Normal Distribution, Mean and Variance of Binomial, Poisson, and
Normal Distribution.

Correlation: Introduction, Types, Properties, Methods of Correlation: Karl Pearson’s

Coefficient of Correlation, concept of point biserial correlation, Rank Correlation and Phi-
Regression: Introduction, Aim of Regression Analysis, Types of Regression Analysis, Lines
of Regression, Properties of Regression Coefficient and Regression Lines, Comparison with

Working on Statistical data with Ms-Excel: Working with Data using MS-Excel, Importing
Data Sort, Data Filter, Advance Filter, Data Validation, Data Consolidation, What-If
Analysis, Data Grouping, Subtotal, Data regression, Working with function; statistical

Index numbers-Laspeyere-Passche-Fisher’s price and quantity index numbers Time reversal

and factor reversal tests.

Time series-Different components-Trend analysis by moving average and Least squares

method-Measurement of Cyclical variation by residual method2. Gupta
&Kapoor,”Fundamental of Mathematical Statistics” Sultan Chand & Sons Publication, 11th
Edition, ISBN- 8180540049

Text Books:

1. Ronald E. Walpole, Sharon L. Myers and Keying Ye, “Probability and Statistics for
Engineers and Scientists”, 8th Edition, Pearson.

2. Richard A. Johnson, Miller & Freund’s Probability & Statistics for Engineers, 11th Edition
PHI, New Delhi.

3. MINITAB Software

Reference Books :

1. B. Sooryanarayana : “A textbook of probability and statistics” , S. Chand 2003

2. Gupta &Kapoor,”Fundamental of Mathematical Statistics” Sultan Chand & Sons

Publication, 11th Edition, ISBN- 8180540049

3. Dr Rahul Sawlikar, “Basic of Computer and Statistical Technique”, Das GanuPrakashan

4. Dr. S.B. Kishor, “Information Technology (Ms-Offiice)”, Das GanuPrakashan

5. S.P.Gupta,”Statistical Methods”, Sultan Chand & Sons, ISBN-818054026X

6. Vinayaka Moorthy and Srimani : “A textbook of probability and statistics”, Subhas Stores
Course Code : 18MB4055 L-T-P-S : 3-0-0-0
Pre-requisite : Nil Credits : 3

CO. No Course Outcome Mapped BTL

Understand the theories and approaches of organizational 6 1
CO 1
CO 2 Understand the basics of organization structure 7 1
Understand the methods for motivating in competitive business 6 2
CO 3
Understand the basic modes of maintaining good industrial 7 1
CO 4


Development of Management thought – Introduction, Various theories; Functional approach,

scientific management approach, human relations approach, latest management thoughts,
organisation theory-classical organisation, neo-classical organisation theory, modern
organisation theory.

Organization Structure--Principles of organisation, organizational theories, departmentalism,

authority, power, organizing, organizational effectiveness, structuring the organisation,
organizational change, organisation charts; types of organisations—line , functional and line
and staff relations, Organisational manuals.Motivation, Morale and behavioral science—
Motivation: Characteristics, importance, Kinds of motivation. Thoughts of motivational
philosophy: Gouglass Mc Gregore—X and Y theory; Herzberg’s theory. Human needs,
Incentive as motivators, Managing dissatisfaction and frustration. Morale, Absenteeism,

Behavioral science, Group dynamics, Group behavior. Leadership—Meaning, importance,

styles, theories, leaders Vs managers. Management concept—Management, Administration,
Organisation, Difference and Relationship between Management, Administration and
Organisation, Importance of Management, Characteristics of management, Managerial Skills,
Managerial Objectives, Harmonization of Objectives, Hirechy of Objectives.Industrial

Trade Union And Collective Bargaining—Industrial relations, Industrial Psychology,

Industrial disputes, Conflict management, Views about conflict, Labor Policy. Workers
grievances, Suggestion system. Trade Unions. Collective Bargainning, Negotiations,
Industrial Safety—working conditions, Accidents, Preventive measures, Safety training.


1. Stephen P. Robins, Organizational behavior, PHI / Pearson education, 11tedition ,

2. Koontz &Wehrich., Essentials of Management, 12th edition, Tata Mc Grawhill, 2007.

1. Banga&Sarma , Industrial Engineering Management including Productionmanagement,

11th edition, 2010.
2. O.P. Khanna , Industrial engineering management, Khanna publications, 2006.

Course Code : 18CA1204 L-T-P-S : 3-0-2-0

Pre-requisite : Nil Credits : 4

CO. No Course Outcome Mapped BTL

Discuss how to establish a connection among various 1 2
CO 1 devices. Explain the different networking concepts and
devices that are used today for establishing connectivity.
Summarize the functionalities of different network 5 1
CO 2
Describe different WAN technologies, topologies and other 5 1
CO 3
basic networking concepts.
CO 4 Explain how to troubleshoot a network. 1 2

Networking Fundamentals Basics of Network & Networking, Advantages of Networking,
Types of Networks, Network Terms- Host, Workstations, Server, Client, Node, Types of
Network Architecture- Peer-to-Peer & Client/Server, Workgroup Vs. Domain. Network
Topologies, Types of Topologies, Logical and physical topologies, selecting the Right
Topology, Types of Transmission Media, Communication Modes, Wiring Standards and
Cabling- straight through cable, crossover cable, rollover cable, media connectors (Fiber
optic, Coaxial, and TP etc.) Introduction of OSI model, Seven layers of OSI model,
Functions of the seven layers, Introduction of TCP/IP Model, TCP, UDP, IP, ICMP,
ARP/RARP, Comparison between OSI model & TCP/IP model. Overview of Ethernet

Basics of Network Devices Network Devices- NIC- functions of NIC, installing NIC, Hub,
Switch, Bridge, Router, Gateways, And Other Networking Devices, Repeater, CSU/DSU,
and modem, Data Link Layer: Ethernet, Ethernet standards, Ethernet Components,Point-to-
Point Protocol(PPP), PPP standards, Address Resolution Protocol, Message format,
transactions, Wireless Networking: Wireless Technology, Benefits of Wireless Technology,
Types of Wireless Networks: Ad-hoc mode, Infrastructure mode, Wireless network
Components: Wireless Access Points, Wireless NICs, wireless LAN standards: IEEE
802.11a, IEEE 802.11b, IEEE 802.11g, wireless LAN modulation techniques, wireless
security Protocols: WEP,WPA, 802.1X, Installing a wireless LAN

Basics of Network, Transport and Application Layers Network Layer: Internet

Protocol (IP ), IP standards, versions, functions, IPv4 addressing, IPv4 address Classes, IPv4
address types, Subnet Mask, Default Gateway, Public & Private IP Address, methods of
assigning IP address, IPv6 address, types, assignment, Data encapsulation, The IPv4
Datagram Format, The IPv6 Datagram Format, Internet Control Message Protocol (ICMP ),
ICMPv4, ICMPv6, Internet Group Management Protocol (IGMP ),Introduction to Routing
and Switching concepts, Transport Layer: Transmission Control Protocol(TCP), User
Datagram Protocol (UDP), Overview of Ports & Sockets, Application Layer: DHCP, DNS,

WAN Technology What Is a WAN?, WAN Switching, WAN Switching techniques

Circuit Switching, Packet Switching etc., Connecting to the Internet : PSTN, ISDN, DSL,
CATV, Satellite-Based Services, Last Mile Fiber, Cellular Technologies, Connecting LANs :
Leased Lines, SONET/SDH, Packet Switching, Remote Access: Dial-up Remote Access,
Virtual Private Networking, SSL VPN, Remote Terminal Emulation, Network security:
Authentication and Authorization, Tunneling and Encryption Protocols, IPSec, SSL and TLS,
Firewall, Other Security Appliances, Security Threats

Network Operating Systems and Troubleshooting Network Network Operating

Systems: Microsoft Operating Systems, Novell NetWare, UNIX and Linux Operating
Systems, Macintosh Networking, Trouble Shooting Networks: Command-Line interface
Tools, Network and Internet Troubleshooting, Basic Network Troubleshooting :
Troubleshooting Model, identify the affected area, probable cause, implement a solution, test
the result, recognize the potential effects of the solution, document the solution, Using
Network Utilities: ping, traceroute, tracert, ipconfig, arp, nslookup, netstat, nbtstat, Hardware
trouble shooting tools, system monitoring tools

Text Book:
1. CCNA Cisco Certified Network Associate: Study Guide (With CD), by Todd
Lammle, Wiley India,
Reference Books:
1. CCENT/CCNA ICND1 640-822 Official Cert Guide 3 Edition (Paperback), Pearson,
2. Routing Protocols and Concepts CCNA Exploration Companion Guide (With CD)
(Paperback), Pearson, 2008
3. CCNA Exploration Course Booklet : Routing Protocols and Concepts, Version 4.0
(Paperback), Pearson, 2010

Course Code : 18CA1205 L-T-P-S : 3-0-2-4

Pre-requisite : C Credits : 5

CO. No Course Outcome Mapped BTL

Discuss different object oriented concepts, features and its 1 2
CO 1
application through java.
Apply the java concepts to create standalone desktop 2,7 1&3
CO 2
CO 3 Identify the different predefined classes and methods in packages 1 2
Apply java concepts to create UI oriented applications, along 2 3
CO 4
with database manipulation.
CO 5 Create applications using java concepts, swings and JDBC 2 3

Introduction to Java History, Overview of Java, Object Oriented Programming, A simple
Program, Two control statements - if statement, for loop, using Blocks of codes, Lexical
issues - White space, identifiers, Literals, comments, separators, Java Key words. Data types:
Integers, Floating point, characters, Boolean, A closer look at Literals, Variables, Type
conversion and casting, Automatic type promotion in Expressions Arrays. Operators:
Arithmetic operators, The Bit wise operators, Relational Operators, Boolean Logical
operators, Assignment Operator, Operator Precedence. Control Statements: Selection
Statements - if, Switch: Iteration Statements - While, Do-while, for Nested loops, Jump

Classes and objects Class Fundamentals, Declaring objects, Assigning object reference
variables, Methods, constructors, “this” keyword, finalize ( ) method A stack class, Over
loading methods, using objects as parameters, Argument passing, Returning objects,
Recursion, Access control, Introducing final, understanding static, Introducing Nested and
Inner classes, Using command line arguments. Inheritance: Inheritance basics, Using super,
method overriding, Dynamic method Dispatch, using abstract classes, using final with
Java Packages Definition, Access protection importing packages, Interfaces:
Definition implementing interfaces. Exception Handling: Fundamental, Exception types,
Using try and catch, Multiple catch clauses, Nested try Statements, throw, throws, finally,
Java’s Built - in exception, using Exceptions.

Multithreaded Programming in Java The Java thread model, The main thread,
Creating a thread, Creating multiple thread, Creating a thread, Creating multiple threads,
Using isalive() and Join(), Thread - Priorities, Synchronization, Inter thread communication,
suspending, resuming and stopping threads, using multi threading. 1/0 basics, Reading
control input, writing control output, Reading and Writing files, Applet Fundamentals, the
AWT package, AWT Event handling concepts The transient and volatile modifiers, using
instance of using assert.

JAVA Database Connectivity (JDBC) : Database connectivity: JDBC architecture,

JDBC Drivers, the JDBC API: loading a driver, connecting to a database, Creating and
executing JDBC statements, Handling SQL exceptions, Accessing result sets: Types of result
sets, Methods of result set interface. An example JDBC application to query a database.

Text Book:

 Programming with Java, by E. Balagurusamy, McGraw Hill Education

Reference Books:

1. The complete reference Java –2: V Edition By Herbert Schildt Pub. TMH.
2. SAMS teach yourself Java – 2: 3rd Edition by Rogers Cedenhead and Leura Lemay
Pub. Pearson Education.

Course Code:18CA1206 L-T-P-S : 3-0-2-4

Pre-requisite : Programming in C Credits : 5

CO. No Course Outcome Mapped BTL

Discuss various data structures and explain how they can be used 1 2
CO 1
for searching and sorting elements
Identify the pros and cons of different searching and sorting 1 2
CO 2
Discuss the working of different data structures and their 1 2
CO 3
CO 4 Summarize the working of linked lists, trees and graphs 1 2
Create programs to demonstrate the functionality of different data 2 3
CO 5
structures, sorting algorithms, searching algorithms, etc.

Introduction to Data structures: Definition, Classification of data structures: primitive and
non primitive, Elementary data organization, Time and space complexity of an algorithm
(Examples), String processing. Dynamic memory allocation and pointers: Definition of
dynamic memory allocation, Accessing the address of a variable, Declaring and initializing
pointers, Accessing a variable through its pointer, Meaning of static and dynamic memory
allocation, Memory allocation functions: malloc(), calloc(), free() and realloc(). Recursion:
Definition, Recursion in C (advantages), Writing Recursive programs – Binomial coefficient,
Fibonacci, GCD.
Searching and Sorting: Basic Search Techniques: Sequential search: Iterative and Recursive
methods, Binary search: Iterative and Recursive methods, Comparison between sequential
and binary search. Sort: General background and definition, Bubble sort, Selection sort,
Insertion sort, Merge sort, Quick sort
Stack and Queue: Stack – Definition, Array representation of stack, Operations on stack:
Infix, prefix and postfix notations, Conversion of an arithmetic expression from Infix to
postfix, Applications of stacks. Queue: Definition, Array representation of queue, Types of
queue: Simple queue, Circular queue, Double ended queue (deque), Priority queue,
Operations on all types of Queues

Linked List: Definition, Components of linked list, Representation of linked list, Advantages
and Disadvantages of linked list. Types of linked list: Singly linked list, doubly linked list,
Circular linked list, Operations on singly linked list: creation, insertion, deletion, search and

Tree Graphs and their Applications: Definition : Tree, Binary tree, Complete binary tree,
Binary search tree, Heap Tree terminology: Root, Node, Degree of a node and tree, Terminal
nodes, Non-terminal nodes, Siblings, Level, Edge, Path, depth, Parent node, ancestors of a
node. Binary tree: Array representation of tree, Creation of binary tree. Traversal of Binary
Tree: Preorder, Inorder and postorder. Graphs, Application of Graphs, Depth First search,
Breadth First search.

Text Book:
 Data Structures using C by E. Balagurusamy, McGraw Hill Education

Reference Books:
1. Weiss, Data Structures and Algorithm Analysis in C, II Edition, Pearson Education,
2. Lipschutz: Schaum’s outline series Data structures Tata McGraw-Hill
3. Robert Kruse Data Structures and program designing using ‘C’
4. Trembley and Sorenson Data Structures
5. E. Balaguruswamy Programming in ANSI C.
6. Bandyopadhyay, Data Structures Using C Pearson Education, 1999
7. Tenenbaum, Data Structures Using C. Pearson Education, 200
8. Kamthane: Introduction to Data Structures in C. Pearson Education 2005.
9. Hanumanthappa M., Practical approach to Data Structures, Laxmi Publications, Fire
Wall media 2006
10. Langsam, Ausenstein Maoshe & M. Tanenbaum Aaron Data Structures using C and
C++ Pearson Education
Semester III

Course Code:18UC3206 L-T-P-S : 0-0-4-0

Pre-requisite: Nil Credits : 2

CO. No Course Outcome Mapped BTL


Analyzebasicconcepts 6 1
CO 1 ofcriticalandanalyticalreasoningskills applystrategies to
analyzeissues,arguments and some aspects ofcorporate
Creativity in writing of any given context like sending 6 2
CO 2 Emails, Reports, Proposals etc. Make the student to face HR
Apply the concepts of Arithmetic, the students enhance 1 2
CO 3 their problem solving skills which helps themto succeed in
campus drives, grooming the younglearners into the
corporate world.
CO 4 AnalyzethebasicconceptsofCriticalandAnalyticalReasoning 1 2


Lexis -2 :Vocabulary-Analogies–Advanced Level, Words often Confused,

WordClassification,Idioms and Phrases, Sentence Completions, Paragraph Jumble.
Writing Skills–Resume, Email Writing, Company Profile, Briefing and Debriefing, Press
note, Catch Phrases, Caption Writing

Critical Thinking:Engineering Ethics through Case Analysis: Ford Pinto, Chernobyl, Hyatt
Residency,Bhopal Gas Tragedy, Boys of Football Team-Rescue Operation from the
ThanLuangCave in Thailand

Interview Skills:Personal Interview-Concept and Practice,Telephone-Etiquettes, Email-

Etiquettes,Dress code and Grooming, Preparing Portfolio,Group Discussion, Mock
Interviews, Unconventional HR questions
SimulatedTesting: Co-Cubes, E-Litmus and Amcat Practice, Infosys Placement Papers,
Wipro Placement Papers, CTS and Accenture Paper Pattern

Reference Books
1.Ken Taylor. Telephoning and Teleconferencing Skills. Hyderabad: Orient Black
2.E. Suresh Kumar, B. Sandhya.Communication for Professional Success. Delhi: Orient
Black Swan.2013
3. Judith Verify: Succeeding at Interview. Mumbai: Viva Books Private Limited.2000
4. Norman L. Frigon, Sr.&Harry K.Jackson, Jr. The Leader- Developing the Skills and
Personal Qualities. Mumbai: Magna Publishing Co Ltd.2000.

Course Code: 18UC0010 L-T-P-S: 1-0-2-0

Pre-requisite: Credits: 2

CO. No Course Outcome Mapped BTL

Understand and identify the basic aspiration of human 6 1
CO 1
Envisage the roadmap to fulfill the basic aspiration of 6 1
CO 2
human beings.
CO 3 Analyze the profession and his role in this existence. 6 2


Introduction to Value Education: Understanding Value Education, Self-exploration as the

Process for Value Education, Continuous Happiness and Prosperity - The Basic Human
Aspirations, Right Understanding, Relationship and Physical Facilities, Happiness and
Prosperity – Current Scenario, Method to fulfill the Basic Human Aspirations.
Harmony in the Human Being: Understanding the Human Being as Co-existence of Self
(‘I’) and Body, Discriminating between the Needs of the Self and the Body, The Body as an
Instrument of ‘I’, Understand Harmony in the Self (‘I’), Harmony of the Self (‘I’) with the
Body, Program to Ensure Sanyam and Svasthya.

Harmony in the Family and Society: Harmony in the Family - the Basic Unit of Human
Interaction, Values in Human-to-Human Relationships, ‘Trust’ – the Foundational Value in
Relationships, ‘Respect’ – as the Right Evaluation, Understand Harmony in the Society,
Vision for the Universal Human Order.
Harmony in the Nature (Existence): Understand Harmony in the Nature,
Interconnectedness, Self-regulation and Mutual Fulfillment among the Four Orders of Nature,
Realizing ‘Existence is Co-existence’ at All Levels, The Holistic Perception of Harmony in

Implications of the Right Understanding – a Look at Professional Ethics: Natural

Acceptance of Human Values, Definitiveness of (Ethical) Human Conduct, A Basis for
Humanistic Education, Humanistic Constitution and Universal Human Order, Competence in
Professional Ethics, Holistic Technologies, Production Systems and Management Models -
Typical Case Studies, Strategies for Transition towards Value-based Life and Profession.

Text Book:

1. R R Gaur, R Sangal and G P Bagaria, “A Foundation Course in Human Values and

Professional Ethics”, 1st Ed, Excel Books.

Course Code: 18CA2107 L-T-P-S: 3-0-2-4

Pre-requisite: Computer Networks Credits: 5

CO. No Course Outcome Mapped BTL

CO 1 Describe cloud concepts and types of cloud 4 2
CO 2 Migration and governance in cloud 1 3
CO 3 Enumerate basic concepts of Virtualization 1 1
CO 4 Illustrate deployment of VMWare 4,8 2

Introduction to cloud computing : Introduction to Cloud Computing, History and Evolution
of Cloud Computing, Types of clouds, Private Public and hybrid clouds, Cloud Computing
architecture, Cloud computing infrastructure, Merits of Cloud computing, , Cloud computing
delivery models and services (IaaS, PaaS, SaaS), obstacles for cloud technology, Cloud
vulnerabilities, Cloud challenges, Practical applications of cloud computing.

Cloud Computing Companies and Migrating to Cloud : Web-based business services,

Delivering Business Processes from the Cloud: Business process examples, Broad
Approaches to Migrating into the Cloud, The Seven-Step Model of Migration into a Cloud,
Efficient Steps for migrating to cloud., Risks: Measuring and assessment of risks, Company
concerns Risk Mitigation methodology for Cloud computing, Case Studies
Governance in the Cloud : Industry Standards Organizations and Groups associated with
Cloud Computing, Need for IT governance in cloud computing, Cloud Governance Solution:
Access Controls, Financial Controls, Key Management and Encryption, Logging and
Auditing, API integration. Legal Issues: Data Privacy and Security Issues, Cloud Contracting
models, Jurisdictional Issues Raised by Virtualization and Data Location, Legal issues in
Commercial and Business Considerations
Basics of Virtualization Understanding Virtualization, Need of Virtualization and
Virtualization Technologies: Server Virtualization, Storage Virtualization, I/O Virtualization,
Network Virtualization, Client Virtualization, Application virtualization, Desktop
virtualization, Understanding Virtualization Uses: Studying Server Consolidation,
Development and Test Environments , Helping with Disaster Recovery

Deploying and Managing an Enterprise Desktop Virtualization Environment

Configure the BIOS to support hardware virtualization; Install and configure
Windows Virtual PC: installing Windows Virtual PC on various platforms (32-bit, 64-bit),
creating and managing virtual hard disks, configuring virtual machine resources including
network resources, preparing host machines; create, deploy, and maintain images
Text Books:

1. Virtualization with Microsoft Virtual Server 2005 by Twan Grotenhuis, Rogier

Dittner, Aaron Tiensivu, Ken Majors, Geoffrey Green, David Rule, Andy Jones,
Matthijs ten Seldam, Syngress Publications, 2006
2. Virtualization--the complete cornerstone guide to virtualization best practices, Ivanka
Menken, Gerard Blokdijk, Lightning Source Incorporated, 2008
3. Cloud Computing: Principles and Paradigms, Rajkumar Buyya, James Broberg,
Andrzej M. Goscinski,, John Wiley and Sons Publications, 2011
4. Brief Guide to Cloud Computing, Christopher Barnett, Constable & Robinson
Limited, 2010
5. Handbook on Cloud Computing, Borivoje Furht, Armando Escalante, Springer, 2010

Course Code : 18CA2108 L-T-P-S : 3-0-2-0

Pre-requisite : Nil Credits : 4

CO. No Course Outcome Mapped BTL

Discuss the working of an operating system, with its features, 1 2
CO 1
uses, and other functionalities.
Describe process and storage management and how OS performs 1 2
CO 2
various functionalities
Identify the purpose of different process synchronization and 1 1
CO 3
management methods
Describe security and file system management in an operating 2 2
CO 4

Introduction to Operating System: Introduction, Objectives and Functions of OS,
Evolution of OS, OS Structures, OS Components, OS Services, System calls, System
programs, Virtual Machines.

Process Management - Part 1: Processes: Process concept, Process scheduling, Co-

operating processes, Operations on processes, Inter process communication, Communication
in client-server systems. Threads: Introduction to Threads, Single and Multi-threaded
processes and its benefits, User and Kernel threads, Multithreading models, Threading issues.
CPU Scheduling: Basic concepts, Scheduling criteria, Scheduling Algorithms, Multiple
Processor Scheduling, Real-time Scheduling, Algorithm Evaluation, Process Scheduling

Process Management - Part 2: Process Synchronization: Mutual Exclusion, Critical –

section problem, Synchronization hardware, Semaphores, Classic problems of
synchronization, Critical Regions, Monitors, OS Synchronization, Atomic Transactions.
Deadlocks: System Model, Deadlock characterization, Methods for handling Deadlocks,
Deadlock prevention, Deadlock Avoidance, Deadlock Detection, Recovery from Deadlock.

Storage Management: Memory Management: Logical and physical Address Space,

Swapping, Contiguous Memory Allocation, Paging, Segmentation with Paging. Virtual
Management: Demand paging, Process creation, Page Replacement Algorithms, Allocation
of Frames, Thrashing, Operating System Examples, Page size and other considerations,
Demand segmentation. File-System Interface: File concept, Access Methods, Directory
structure, File- system Mounting, File sharing, Protection and consistency semantics. File-
System Implementation: File-System structure, File-System Implementations, Directory
Implementation, Allocation Methods, Free-space Management, Efficiency and Performance,
Recovery. Disk Management: Disk Structure, Disk Scheduling, Disk Management, Swap-
Space Management, Disk Attachment, stable-storage Implementation.

Protection and Security: Protection: Goals of Protection, Domain of Protection, Access

Matrix, Implementation of Access Matrix, Revocation of Access Rights, Capability- Based
Systems, Language – Based Protection. Security: Security Problem, User Authentication,
One – Time Password, Program Threats, System Threats, Cryptography, Computer –
Security Classifications.

Text Book :
1. Operating System Concepts by Silberschatz, Gavin, and Gagne, John Wiley and Sons

Reference Books :
1. Milan Milonkovic, Operating System Concepts and design, II Edition, McGraw Hill
2. Tanenbaum, Operation System Concepts, 2nd Edition, Pearson Education.
3. Silberschatz / Galvin / Gagne, Operating System,6th Edition,WSE (WILEY
4. William Stallings, Operating System, 4th Edition, Pearson Education.
5. H.M.Deitel, Operating systems, 2nd Edition ,Pearson Education
6. Abraham Silberschatz and peter Baer Galvin, Operating System Concepts, 8th Edition,
Pearson Education 1989 (Chapter 1,3.1,3.2,3.3,3.4,3.6,4,5,6 (Except 6.8,6.9), 7,
8,9,10,11,13, (Except 13.6) 19 (Except 19.6),20(Except 20.8, 20.9), 22,23)
7. Nutt: Operating Systems, 3/e Pearson Education 2004

Course Code : 18CA2109 L-T-P-S : 2-1-2-0

Pre-requisite : Nil Credits : 4

CO. No Course Outcome Mapped BTL

Discuss the importance of creating and maintaining an error free 1 2
CO 1
CO 2 Apply different SQL commands to manipulate a database 1 2
CO 3 Discuss how to normalize a database 1 2
CO 4 Describe transaction concepts in a database 1 2
CO 5 Create database tables and manipulate them using SQL queries 2 2

Introduction to Database Management System: Purpose of Database System Views of
data, Data Models, Database Languages, Database System Architecture, Database users and
Administrator, Entity– Relationship model (E-R model ), E-R Diagrams, Introduction to
relational databases

Relational Model The relational Model, The catalog, Types, Keys - Relational Algebra –
Domain Relational Calculus, Tuple Relational Calculus - Fundamental operations –
Additional Operations- SQL fundamentals. Oracle data types, Data Constraints, Column level
& table Level Constraints, working with Tables. Defining different constraints on the table,
Defining Integrity Constraints in the ALTER TABLE Command, Select Command, Logical
Operator, Range Searching, Pattern Matching, Oracle Function

SQL Database:Grouping data from Tables in SQL, Manipulation Data in SQL. Joining
Multiple Tables (Equi Joins), Joining a Table to itself (self Joins), Sub queries Union,
intersect & Minus Clause, Creating view, Renaming the Column of a view, Granting
Permissions, - Updating, Selection, Destroying view Creating Indexes, Creating and
managing User. Integrity – Triggers - Security – Advanced SQL features –Embedded SQL–
Dynamic SQL- Missing Information– Views – Introduction to Distributed Databases and
Client/Server Databases

Database Design Functional Dependencies – Non-loss Decomposition – Functional

Dependencies – First, Second, Third Normal Forms, Dependency Preservation – Boyce/Codd
Normal Form-Multi-valued Dependencies and Fourth Normal Form – Join Dependencies and
Fifth Normal Form

Transactions Transaction Concepts - Transaction Recovery – ACID Properties – System

Recovery – Media Recovery – Two Phase Commit - Save Points – SQL Facilities for
recovery –Concurrency – Need for Concurrency – Locking Protocols – Two Phase Locking –
Intent Locking – Deadlock- Serializability – Recovery Isolation Levels – SQL Facilities for

NoSQL: Introduction and definition, History, Bigdata, Scalability, Key/Value

stores,Document databases, Graph Databases, Working with Language Bindings, Interfacing
and interacting with databases-Storing and accessing data, Language Bindings for NoSQL

Text Books:

1. An Introduction to Database Systems, by C.J. Date, Pearson

2. Abraham Silberschatz, Henry F. Korth, S. Sudharshan, “Database System
Concepts”, Fifth Edition, Tata McGraw Hill, 2006.
3. Professional NoSQL by Shashank Tiwari.

Reference Books:

1. RamezElmasri, Shamkant B. Navathe, “Fundamentals of Database Systems”,

Fourth Edition, Pearson/Addision Wesley

2. Raghu Ramakrishnan, “Database Management Systems”, Third Edition, McGraw


3. Database Systems: The Complete Book, by Hector Garcia-Molina, Jeffrey D.

Ullman and Jennifer Widom, Pearson

Course Code : 18CA2110 L-T-P -S: 3-0-2-4

Pre-requisite : FIT/JAVA Credits : 5

CO. No Course Outcome Mapped BTL

CO 1 Describe the features of different web technologies 2 3
CO 2 Illustrate applications using HTML, CSS and JS 1 2
Identify the different tools used for creating web pages and what 1 2
CO 3
are their pros and cons
Apply multimedia, canvas and storage concepts to develop 3 3
CO 4
HTML5 apps
Create web pages, forms, etc. Use styling techniques in the web 3 3
CO 5
pages and validate them.

Introduction to HTML and CSS: HTML tags, Backgrounds, Lists, Tables, Borders,
Frames, Iframes, Images, Blocks , Margins, Marquee, Forms, Padding, Cursors, Outlines,
Dimensions, Scrollbars

JavaScript: Introduction to JS, Embedding JS into Html, Variables, Data types, Operators,
Conditional statements, Looping statements, Strings, Arrays, Math Object, Date Object,
Functions, Objects, Event Handling, Document Object Model, Form validation.

Introduction to Html5 : Why HTML5? HTML, XHTML, Styling HTML5 with CSS, When
can you use HTML5? Introduction to canvas, multimedia, storage, working offline,
geolocation, input types, placeholder text, microdata.

Multimedia and Storage in HTML5: Video containers, video codec, audio codec,
Multimedia accessibility, MIME. Communication API. Basics of Canvas, Using transforms,
capturing images, drawing on the animating the canvas, Web storage, Web SQL database

Text Books:

1. HTML5: Up and Running by Mark Pilgrim, O’Reilly, August 2010

2. Pro Html5 Programming: Powerful App Is For Richer Internet Application Development
by Peter Lubbers, Brian Albers, Frank Salim, Ric Smith, Apress, 2010

3. HTML, XHTML & CSS Bible, Brian Pfaffenberger, Steven M.Schafer, Charles White,
Bill Karow- Wiley Publishing Inc, 2010

Reference Books:

1. HTML5 For Web Designers by Jeremy Keith, June 2010

2. Head First HTML5 Programming by Eric Freeman, Elisabeth Robson, O’Reilly, October

3. Learning PHP & My SQL, Michele Davis, Jon Philips- O’Reilly Publisher, 2009
Semester IV


Course Code: 18UC2204 L-T-P-S: 0-0-4-0

Pre-requisite: Nil Credits: 2

CO. No Course Outcome Mapped BTL

Apply the concept of Critical Reading and Analytical 5 2
CO 1
Reading and comprehend the keyideas and gist of a passage.
Apply the concepts of grammar, various strategies and the 5 2
CO 2
usage of formal language in written expression
Apply the concepts of Numbers to solve the problems 1 2
CO 3 related to divisibility rules, problems based on Unit’s digit,
Remainders, Successive Division, Prime Factorization,
LCM & HCF problems.
Apply the various concepts of cubes to find out how to cut a 1 2
cube to get the maximum number of smaller identical
CO 4 pieces, how to minimize the number of cuts required to cut
a cube into the given number of smaller identical pieces,
how to count the number of smaller cubes which satisfy the
given painting scheme.

Syllabus :

Directed Listening and Thinking Activity (DLTA) Skills:

Reading, Listening, Thinking,Writing, Presentation - Method: Flipped Classroom.
Writing Skills:Paraphrasing,Summarizing,Notice, Circular, Agenda, Minutes, Memo

Body Language ( Kinesics) :Postures, gestures,eye contact

SoftSkills: The Art of Compromise, Learn to Say: “I Don’t Know”, Being organized,
Showing Self-awareness,An eye on success, being self‐motivated, Showing self-awareness,
Find Direction from Someone Who Is Lost: “The Drifter”
Self‐Assessment for Attainable Career Objectives--Defining a Career Objective

Quantitative Aptitude: Numbers,Averages andAlligations, Mensuration

Reasoning: Cubes, Binary Logic, Ordering and Sequencing

Reference Books:
1.Daniel G.Riordan and Steven E. Pauley: Technical Report Writing Today. New Delhi:
2.Ken Taylor.Telephoning and Teleconferencing Skills. Hyderabad:Orient Black Swan.2008.
3.E. Suresh Kumar, B. Sandhya.Communication for Professional Success. Delhi: Orient
Black Swan.2013
4Reasoning Trainer Plus.:Hyderabad:Brain Mapping Academy.2012

Course Code : 18CA2211 L-T-P-S : 2-0-2-0

Pre-requisite : Nil Credits : 3

CO. No Course Outcome Mapped BTL

Discuss the need for following a well-structured format for 1 2
CO 1
the development of software applications
Generalize how to reduce the complexity to transition from 7 2
CO 2
one phase in software development to another.
CO 3 Summarize different testing concepts 1 2
CO 4 Identify how to manage a software development project 4 2

Introduction to Software Engineering: Characteristics, Emergence of
SoftwareEngineering, Software Metrics & Models, Process & Product Metrics.Software Life
Cycle Models: Waterfall, Prototype, Spiral Models,prototyping mode, evolutionary model,
spiral model, RAD model, Agile models: Extreme Programming, and Scrum.

Software Project Management: Size Estimation- LOC and FP Metrics, Cost Estimation-
Delphi and Basic COCOMO, Introduction to Halstead’s Software Science, Staffing Level
Estimation- Putnam’s Model.Software Requirements Specification: SRS Documents, their
Characteristics andOrganization.

Software Design: Classification, Software Design Approaches, Function Oriented Software

Design, Structured Analysis- Data flow Diagrams and Structured Design, Introduction to
Object Oriented Design.Coding and Testing of Software: Unit Testing, Block Box Testing,
White Box Testing,Debugging, Program Analysis Tools, System Testing.

Software Reliability and Quality Assurance: Reliability Metric- Musa’s Basic Model.
Software Quality Assurance: ISO 9000 and SEI CMM and their Comparison.Software
Maintenance: Maintenance Process Models and Reverse Engineering, Estimationof
Maintenance Costs.Software Development Tools: Introduction to “ Rational Rose”.

Text Book:
1.Rajib Mall -Fundamentals of Software Engineering,4\ED, Prentice Hall of India, New
Reference Book:
1. PankajJalote- An Integrated Approach to Software Engineering, 3rd Edition, Narosa
Publishing House, New Delhi,2005
2. Richard Fairley- Software Engineering Concepts, Tata McGraw Hill, New Delhi, 2006

Course Code : 18CA2212 L-T-P-S : 2-2-0-0

Pre-requisite : Nil Credits : 4

CO. No Course Outcome Mapped BTL

CO 1 Explain various information security concepts 1 2
Discuss the need for information security in the internet, and how 1 2
CO 2
to manage the risks.
CO 3 Summarize how to identify and access risks 3,6 1&2
Describe network infrastructure security and how to monitor a 3,6 1&2
CO 4

Introduction to Information Security: Definition of Information Security, Evolution of
Information Security; Basics Principles of Information Security; Critical Concepts of
Information Security; Components of the Information System; Balancing Information
Security and Access; Implementing IT Security, The system Development Life cycle,
Security professional in the organization.

The Need for IT Security - Part 1 Business Needs-Protecting the functionality, Enabling
the safe operations, Protecting the data, safe guarding the technology assets

The Need for IT Security - Part 2 Threats-compromises to Intellectual property, deliberate

software attacks, Espionage and trespass, sabotage and vandalism; Attacks-Malicious Codes,
Back Doors, Denial of Service and Distributed Denial of Service, Spoofing, sniffing, Spam,
Social Engineering.

Risk Management Definition of risk management, risk identification, and risk control,
Identifying and Accessing Risk, Assessing risk based on probability of occurrence and likely
impact, the fundamental aspects of documenting risk via the process of risk assessment, the
various risk mitigation strategy options, the categories that can be used to classify controls.

Network Infrastructure Security and Connectivity: Understanding Infrastructure Security-

Device Based Security, Media-Based Security, Monitoring and Diagnosing; Monitoring
Network- Firewall, Intrusion Detection System, Intrusion Prevention system; OS and
Network Hardening, Application Hardening; Physical and Network Security- Policies,
Standards and Guidelines.

Text Book:

1. Information Systems Security: Security Management, Metrics, Frameworks and Best

Practices by Nina Godbole

Reference Books:

1. Information Security Risk Analysis - Thomas R. Peltier, Third Edition, Pub:

Auerbach, 2012
2. Operating System Concepts, 8th Edition by Abraham Silberschatz, Peter B. Galvin,
Greg Gagne, Pub: John Wiley & sons, Inc., 2009.
3. Information security: Principles and Practice - Mark Stamp, 2nd Edition, Pub: John
Wiley & Sons, Inc., 2011

Course Code : 18CA2213 L-T-P-S : 2-2-2-0

Pre-requisite : Information Security Fundamentals Credits : 5

CO. No Course Outcome Mapped BTL

CO 1 Explain the concepts and types of Ethical Hacking 1 2
CO 2 Using tools create hack in scenarios 3,6 1&3
CO 3 Identify how to perform web hacking 3,7 2
CO 4 Implement report writing and mitigation 1,8 2&3
Demonstrate the concepts of ethical hacking using tools and 3,4,6 1&3
CO 5

Introduction to Ethical Hacking : Hacking Methodology, Process of Malicious Hacking,
Footprinting and Scanning: Footprinting, Scanning. Enumeration: Enumeration. System
Hacking and Trojans: System Hacking, Trojans and Black Box Vs White Box Techniques

Hacking Methodology : Denial of Service, Sniffers, Session Hijacking and Hacking Web
Servers: Session Hijacking, Hacking Web Servers. Web Application Vulnerabilities and Web
Techniques Based Password Cracking: Web Application Vulnerabilities, Web Based
Password Cracking Techniques

Web and Network Hacking : SQL Injection, Hacking Wireless Networking, Viruses,
Worms and Physical Security: Viruses and Worms, Physical Security. Linux Hacking: Linux
Hacking. Evading IDS and Firewalls: Evading IDS and Firewalls

Report writing & Mitigation :Introduction to Report Writing & Mitigation, requirements
for low level reporting & high level reporting of Penetration testing results, Demonstration of
vulnerabilities and Mitigation of issues identified including tracking

Text Book:

1. Hacking Exposed 7th Edition, by Stuart McClure, Joel Scambray, George Kurtz –
McGraw Hill

Course Code : 18CA2214 L-T-P-S : 3-1-0-0

Pre-requisite : Information Security Fundamentals Credits : 4

CO. No Course Outcome Mapped BTL

CO 1 Explain concepts of cryptography/ algorithms/ keys 1 2
CO 2 Identify the use of digital signatures 1 2
CO 3 Explain concepts involved in key management 3,4 1&2
CO 4 Discuss various applications of cryptography 3 2

Introduction to Cryptography : The Confidentiality, Integrity & Availability (CIA) Triad,
Cryptographic concepts, methodologies &practices, Symmetric& Asymmetric cryptography,
public& private keys, Cryptographic algorithms and uses, Construction& use of Digital

Types of Algorithms : The basic functionality of hash/crypto algorithms (DES, RSA, SHA,
MD5, HMAC, DSA) and effects on key length concepts in Elliptical Curve Cryptography &
Quantum Cryptography

Key Management : The basic functions involved in key management including creation,
distribution, verification, revocation and destruction, storage, recovery and life span and how
these functions affect cryptographic integrity

Application of Cryptography : Major key distribution methods and algorithms including

Kerberos, ISAKMP etc., Vulnerabilities to cryptographic functions, the Use and functions of
Certifying Authorities (CAs),Public Key Infrastructure (PKI) and System architecture
requirements for implementing cryptographic functions

Text Books:

1. Bruce Schneier, “Applied Cryptography”, John Wiley & Sons

2. Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone “Handbook of
Applied Cryptography”, CRC Press.
Reference Books:

1. Cryptography: An Introduction by V. V. I Ashchenko, Pub: American Mathematical

Society - 2002
2. Cryptanalytic attacks on RSA – by Song Y. Yan 2005

Course Code :18CA2215 L-T-P-S : 2-1-0-0

Pre-requisite : Operating System/Computer Networks Credits : 3

CO. No Course Outcome Mapped BTL

Explain the basic concepts of data center and its 1 2
CO 1
CO 2 Describe data center designs 1 2
CO 3 Compare different types of server farms 3 2
Discuss data center construct and back-up/recovery 4,8 1
CO 4

Overview of Data Centers : Data Centers Defined, Data Center Goals, Data Center
Facilities, Roles of Data Centers in the Enterprise, Roles of Data Centers in the Service
Provider Environment, , Application Architecture Models. The Client/Server Model and Its
Evolution, the n-Tier Model, Multitier Architecture Application Environment, Data Center

Data Centre Requirements:Data Center Prerequisites, Required Physical Area for

Equipment and Unoccupied Space, Required Power to Run All the Devices, Required
Cooling and HVAC, Required Weight, Required Network Bandwidth, Budget Constraints,
Selecting a Geographic Location, Safe from Natural Hazards, Safe from Man-Made
Disasters, Availability of Local Technical Talent, Abundant and Inexpensive Utilities Such as
Power and Water, Selecting an Existing Building (Retrofitting), tier standard

Data Centre Design : Characteristics of an Outstanding Design, Guidelines for Planning a

Data Center, Data Center Structures, No-Raised or Raised Floor, Aisles, Ramp, Compulsory
Local Building Codes, Raised Floor Design and Deployment, Plenum, Floor Tiles,
Equipment Weight and Tile Strength, Electrical Wireways, Cable Trays, Design and Plan
against Vandalism,
Introduction to Server Farms :Types of server farms and data centre, internet server farm,
intranet server farm, extranet server farm , internet data center, corporate data center,
software defined data center, data center topologies, Aggregation Layer, Access Layer, Front-
End Segment, Application Segment, Back-End Segment, Storage Layer, Data Center
Transport Layer, Data Center Services, IP Infrastructure Services, Application Services,
Security Services, Storage Services.

Business Continuity and Disaster Recovery fundamentals : Business continuance

infrastructure services, the need for redundancy,, Information availability , BC terminology ,
BC planning life cycle , BC technology solutions , backup and recovery considerations ,
backup technologies , Uses of local replicas , Local replication technologies , Restore and
restart considerations , Modes of remote replications , remote replication technologies .

Text Books:
1. Data Center Fundamentals by Mauricio Arregoces, CISCO Press
2. Administering Data-Centers, KailashJayswal, Wiley

Course Code : 18CA2216 L-T-P-s: 3-2-0-0

Pre-requisite : Operating System/Computer Networks Credits : 5

CO. No Course Outcome Mapped BTL

CO 1 Explain the types of storage and usage in different scenarios 1,4 2
Outline concepts of a backup recovery and management of 1,4 2
CO 2
Explain consistency and management of storage 1,8 2
CO 3
CO 4 Identify different storage management challenges 4,7 2


Introduction to Information storage and Management: Information Storage: Data –

Types of Data –Information - Storage , Evolution of Storage Technology and Architecture,
Data Center Infrastructure - Core elements- Key Requirements for Data Center Elements -
Managing Storage Infrastructure, Key Challenges in Managing Information, Information
Lifecycle - Information Lifecycle Management - ILM Implementation -ILM Benefits

Storage System Environment: Components of a Storage System Environment – Host –

Connectivity – Storage, Disk Drive Components –Platter – Spindle - Read/Write Head -
Actuator Arm Assembly - Controller - Physical Disk Structure - Zoned Bit Recording -
Logical Block Addressing , Disk Drive Performance -1 Disk Service Time , Fundamental
Laws Governing Disk Performance , Logical Components of the Host - Operating System -
Device Driver -Volume Manager - File System – Application , Application Requirements
and Disk Performance, Summary

Backup and Recovery : Backup Purpose -Disaster Recovery - Operational Backup –

Archival, Backup Considerations, Backup Granularity, Recovery Considerations, Backup
Methods , Backup Process, Backup and Restore Operations, Backup Topologies -
Serverless Backup , Backup Technologies -Backup to Tape - Physical Tape Library -
Backup to Disk - Virtual Tape Library

Local Replication : Source and Target -Uses of Local Replicas, Data Consistency -
Consistency of a Replicated File System - Consistency of a Replicated Database , Local
Replication Technologies - Host-Based Local Replication - Storage Array-Based Replication
, Res tore and Restart Considerations - Tracking Changes to Source and Target , Creating
Multiple Replicas, Management Interface

Managing the storage Infrastructure : Monitoring theStorage Infrastructure -Parameters

Monitored - Components Monitored - Monitoring Examples - Alerts, Storage Management
Activities - Availability management - Capacity management - Performance management -
Security Management - Reporting- Storage Management Examples, Storage Infrastructure
Management Challenges

Text Book:

1. Storage Networks: The Complete Reference, Robert Spalding, Tata McGraw Hill

Reference Book:

1. Information Storage and Management: Storing, Managing, and Protecting Digital

Information, EMC Education Services, Wiley
Semester V

Course Code:18UC3105 L-T-P-S : 0-0-4-0

Pre-requisite: Nil Credits : 2

CO. No Course Outcome Mapped BTL

Apply the strategies and techniques learnt in carrying out 6 2
conversations in different contexts. Analyse the different
CO 1
parameters and formats of written technical communication
and apply in everyday work and life.
Analyse the concepts of critical and analytical reading 6 2
CO 2 skills. Apply the strategies and techniques learnt in handling
interviews in different contexts.
Apply the concepts of Ratio & Proportion, Percentages, 1 2
Profit &Loss, Simple & Compound Interest, students will
CO 3 be able to solve the problems based on Ratios, problems
involving Percentages, problems related to cost price,
selling price, profit, loss, marked price and discounts,
problems involving interest.
Analyze the given series of numbers to predict the next 1 2
number in the series. Analyze the given set of numbers or
letters to find the analogy. Analyze the given data to find
CO 4 the code which is used to encode a given word and use the
same code in the process of decoding. Apply the given set
of conditions to select a team from a group of members.

Syllabus :
Critical Reading: Reading to Identify the Theme, Reading to Identify the Central Idea;
Reading to Identify the Tone, Reading to Identify Writer’s Attitude, Reading to Identify
Parallel Ideas,Reading to Identify Logical Conclusions.
Writing Skills:Note- making and Note- taking, Report Writing.
Presentation Skills- Preparing for the Presentation, Audience Analysis, Processing
Information, Ice-breakers, Quotations, Presentation Structure, Say what you want to say- Say
it, Say what you have said to say, Preparing for Question Hour,Funnel Effect and How to
Overcome it.
Trinity Guild Hall - Communication Skills - Graded Evaluation and Testing-
1-8 grades

Quantitative Aptitude:Ratio andProportion, Percentages, Profit and Loss, Simple Interest

and Compound Interest

Reasoning:Number and Letter Series, Number and Letter Analogy, Coding and decoding,
Odd man out. Selections

Reference Books

1. Dr. Meenakshi Raman and Dr. Sangeetha Sarma: Technical

Communication.Oxford University Press: Delhi.2016.
2. M. Ashraf Rizvi: Effective Technical Communication. New Delhi:McGraw Hill
Education(India) Private Limited
3. Tom Rath: Strengths Finder2.0. New York:Gallup Press.2007.
4. C. Weaver. Reading Process and Practice. Portsmouth US: Heinemann
Educational Bokks.1988.

Course Code : 18CA3117L-T-P-S : 2-2-2-0

Pre-requisite : Information Security Fundamentals Credits : 5

CO. No Course Outcome Mapped BTL

CO 1 Explain Forensics in Information Technology World 1,6 1&2
CO 2 Discuss different data recovering methods 1,6 1&2
CO 3 Identify various forensics techniques and their working 3,6 1&3
CO 4 Explain the use of cyber laws and describe them 1,6 1&2
CO 5 Analyze and validate forensic data 3,4 3

Computer Forensics: Introduction to Computer Forensics, Forms of Cyber Crime, First
Responder Procedure- Non-technical staff, Technical Staff, Forensics Expert and Computer
Investigation procedure

Storage Devices & Data Recover Methods: Storage Devices- Magnetic Medium, Non-
magnetic medium and Optical Medium. Working of Storage devices-Platter, Head assembly,
spindle motor. Data Acquisition, Data deletion and data recovery method and techniques

Forensics Techniques: Windows forensic, Linux Forensics, Mobile Forensics,


Forensics Techniques - Part 2: Application Password cracking-Brute force, Dictionary

attack, Rainbow attack. Email Tacking – Header option of SMTP, POP3, IMAP

Cyber Law: Corporate espionage, Evidence handling procedure, Chain of custody, Main
features of Indian IT Act 2008 (Amendment)

Text Book:

1. Guide to Computer Forensics and Investigations – 3rd Edition –B. Nelson, et al, -
Cengage, 2010 BBS

Course Code :18CA3118L-T-P-S : 3-2-0-0

Pre-requisite :Principles Of Virtualization & Cloud Technology Credits : 5

CO. No Course Outcome Mapped BTL

CO 1 Explain importance of Information Security in the Cloud Context 3 2
CO 2 Discuss various concepts of cloud security 3 2
CO 3 Classify the cloud vulnerabilities and threats 4 3
CO 4 Outline how cloud and Security works in a seamless model 8 1

Introduction to Virtualization & Cloud : Virtualization and Cloud computing concepts,
Private cloud Vs Public cloud, IAAS, PAAS & SAAS concepts, Virtualization security
concerns, Hypervisor Security, Host/Platform Security, Security communications, Security
between Guest instances, Security between Hosts and Guests

Cloud Security :Cloud Security vulnerabilities and mitigating controls, Cloud Trust
Protocol, Cloud Controls Matrix. Complete Certificate of Cloud Security Knowledge

Cloud Trust Protocol &Transparency :Introduction to Cloud Trust Protocol &

Transparency, Cloud Trust Protocol and Transparency, Transparency as a Service, Concepts,
Security, Privacy & Compliance aspects of cloud

Cloud Controls Matrix &Top Cloud Threats :Introduction to Cloud Controls Matrix &
Top Cloud Threats, Cloud Controls Matrix, Trusted Cloud Initiative architecture and
reference model, requirements of Security as a Service (Secaas) model and Top Security
threats to the cloud model

Text Book:

1. Cloud Security – A comprehensive Guide to Secure Cloud Computing by Ronald L.

Krutz and Russel Dean Vines
Reference Books:

1. Visible Ops Private Cloud – Andi Mann, Kurt Miline and Jeanne Morain, IT Process
Institute, Inc.; first edition (April 8, 2011)
2. Cloud Computing Explained – John Rhoton 2009

Course Code : 18CA3119L-T-P-S : 3-2-0-0

Pre-requisite : Information Security Fundamentals Credits : 5

CO. No Course Outcome Mapped BTL

CO 1 Define Governance in Info Sec areas 1 2
CO 2 Classify various threats and risk involved 2 2
CO 3 Summarize the Risk IT Framework 2 2
CO 4 Identify how to manage information security 2 2


IT Governance: Introduction & Concepts, Role of Governance in Information Security, Best

Practices for IT Governance. Role of IT Strategy Committee, Standard IT Balanced

Scorecard. Val-IT framework of ISACA

Risk Management Program: Develop a Risk Management Program. Risk Management

Process, Framework and Life Cycle, Risk Analysis methods, Quantitative versus Qualitative

Risk Assessment, Defining Information Security Metrics, Automating Metrics Calculations

and Tools, Industry case studies, Risk-IT Framework of ISACA.

Information Security Management: Introduction, Role of Strategic Planning for IT, Role of

Steering committee, Policies and Procedures ,Performance Optimization, IT Security roles &

responsibilities, Segregation of Duties, Description of COBIT and other Frameworks

Intellectual Property Rights: Intellectual Property Law Basics, Evolutionary past Types of

Intellectual Property, Agencies Responsible for Intellectual Property Registration. Trade

Marks , Copyrights, Patents : Registration Process , Post registration procedures ,

Maintenance , Transfer of rights , Infringement , Dilution of Ownership , Claims , Litigation ,

International Laws for Trade Mark, Copyrights and Patents.

Text Books:

1. IT Governance – Peter Weill and Jeanne Ross, Pub: Harvard Business Review Press; 1
edition (June 1, 2004)

2. Managing Risk and Information Security – Malcolm Harkins, Pub: Apress; 1 edition
(December 17, 2012)

3. Intellectual property- patents,copyrights,trade marks and allied rights by Cornish W R


Course Code: 18CA3120 L-T-P-S : 2-2-2-0

Pre-requisite: Computer Networks/Linux Programming Credits : 5

CO. No Course Outcome Mapped BTL

Ability to understand the components of Windows Server 4,8 3
CO 1
2008 and their functions
Ability to configure and manage network services and 1 2
CO 2
active directory domain services
Ability to understand the components of Linux OS and their 1,2 3
CO 3
CO 4 Ability to manage advanced users and groups 1,2 3


Installing and Configuring Windows Server 2008: History of Server OS, Introduction to
windows server 2003 & 2008, Overview of Windows Server 2008, Installing Windows
Server 2008, Managing Server Roles and Features, AD installation and DCpromo,
Configuring and Managing Windows Server 2008 Server Core, Choosing a Deployment
Technology, Deploying Windows Server 2008, Introduction and Creation of Users accounts

Configuring and Managing Active Directory Domain Services: Active Directory

Enhancements in Windows Server 2008 and 2008 R2, Installing and Configuring Domain
Controllers, Configuring Read-Only Domain Controllers, Configuring Fine-Grained
Password Policies, Sites and Global Catalog, Managing Active Directory Objects with
Windows PowerShell, Active Directory Database Management, Replication between the
Domain Controllers.

Linux Server : Linux Ideas and History, Open source information, Linux Origin, Linux
Usage basics, Linux Principles, virtual console and graphical environment, X windows,
Logging into Linux system, Linux Distributions, Redhat Distributions, Linux installation,
Getting help, man, cal, date, browsing file system, pwd, ls, cd, cp, md, absolute and relative
path names,tools for extracting-analyzing and manipulating text data, vi & vim

Network configuration and managing Process : Network and printer settings, web clients,
mail clients, ftp clients, ssh, scp, rsync, network diagnosis tools, Process management
(background and foreground), Signals, Job Control, Termination of processes, The test
Command, if Statement,Virtualization with Xen, Remote installation, and troubleshooting:

Text Books:

1. 70-642:Windows Server 2008 Network Infrastructure Configuration (MOC) from

John Wiley & Sons, 2009
2. The Complete Reference - Linux, Sixth Edition by Richard Petersen
Reference Books:
1. Red hat Linux Administration By Michael Turner and Steve Shah-McGraw-Hill
Companies, Inc Publisher, 2010
2. Windows Server 2008: the definitive guide By Jonathan Hassell, O’Reilly, 2008
French Language

Course Code: 18FL3054L-T-P-S : 2-0-0-0

Pre-requisite: Credits : 2
CO. No Course Outcome Mapped BTL
CO 1 Ability to pronounce French words 5 2
CO 2 Understanding of French culinary 5 1
CO 3 Ability to converse in French language 5 3


Objective: To create awareness about the importance of French in the hotel operations and to
acquire the correct pronunciation of French terminology. To use standard phrases in French
in hotel operations. To integrate the French curriculum with the core syllabus of the course.

Unit I: General French -Pronunciation-The Alphabet-The Accents -Numbers (0 to 100)-

Cardinal-Ordinal-Time (only 24 hr clock) Days of the week-Months of the year-Date-
Weights & Measures ‘Formules de politesse’-Conjugation of verbs in the present tense
relevant to the hotel industry (only ‘je’ and ‘vous’ forms).

Unit II: Food & Beverage Service -Restaurant Brigade-Hot Plate Language. The French
Classical Menu- (17courses) with classic examples of each course, terminology and
meanings in brief. Wines - Wines of France, Wine terminology-Reading a wine label- Laying
a cover.

Unit III: Food Production -The Kitchen Brigade-Ingredients used in Kitchen. Dairy
Products, Vegetables, Fruits, Herbs & Spices, Poultry, Fish, Meat, Cereals, Seasonings,
French Cheeses, Culinary Terms in French.

Unit IV: Conversations 1. Greetings / Introduction. 2. Dialogue / Conversation-At the front

desk, travel & tourism enquiries-At the restaurant-3 French Classical Menu- Suggest a menu,
Read a given menu-Give examples of dishes in a particular course &menu-4 Wines - Read a
wine label-Wine Terminology. 5. Culinary terms-Give the various correct French Culinary

Reference Book

1. French for Hotel Management & Tourism Industry – by S. Bhattacharya

Recommended Text Book

1. F & B Service - by Dennis Lillicrap John Courins& Robert Smith

2. Modern Cookery Vol 1 - by Thangam Philip

Semester VI

Course Code : 18CA3222L-T-P-S : 2-0-2-0

Pre-requisite : Information Security Fundamentals Credits : 3
CO. No Course Outcome Mapped BTL
CO 1 Explain context of security in Wireless environment a 2
CO 2 Summarize how to provide VoIP security a 2
CO 3 Classify types of threats in Wireless and VOIP c 2
Explain how security should be enforced during mobile a 2
CO 4
application development

Introduction to Mobile communication:Mobile & Telecommunication protocols and their
vulnerabilities, Gain knowledge of managerial, technical and procedural controls to address
Mobile & Telecommunication vulnerabilities

Wireless Security:Wireless protocols and their vulnerabilities, Gain knowledge of

managerial, technical and procedural controls to address Wireless vulnerabilities

Voice over Internet Protocol (VOIP) Security:VOIP concepts, protocols and

vulnerabilities, Gain knowledge of managerial, technical and procedural controls to address
VOIP vulnerabilities

Mobile Forensics & Data Extraction:Mobile forensics process including seizure, data
acquisition types like Physical, Logical, Manual, External & Internal memory, storage,
analysis using tools & techniques

Security in Mobile Application Development:Introduction to secure mobile application

development, Overview of Android Security, Methods of protecting sensitive data on mobile
Text Books:

1. Computer security handbook, Seymour Bosworth, Michel E. Kabay

2. Securing wireless LANs: a practical guide for network managers, Gilbert Held

3. Mobile telecommunications protocols for data networks by Anna Hać


Course Code : 18CA3223 L-T-P-S : 2-0-2-0

Pre-requisite : Cloud Computing Credits : 3

CO. No Course Outcome Mapped BTL

CO 1 Define windows azure basics and cloud background 1,4,7 1&2
CO 2 Discuss the concepts of storage in Azure 1,4 2
CO 3 Summarize the process for creating and manipulating tables 1,4 1&2
CO 4 Identify the steps for creating a web site 1,4,7,8 1&2
CO 5 Illustrate how to create basic elements such as websites, SQL 6,4,7 1&2
server etc


Introduction : Introduction to MS. Azure, Virtual Machines: Creating Virtual Machines,

Difference Between Basic and Standard VMs, Logging in to a VM and Working, Attaching
an empty Hard Disk to VM, Hosting a Website in VM , Configuring End Points, Scaling up
and Down, Creating a custom Image from VM, Creating a VM from a custom Image, Shut
down VM without Getting Billed, VM Pricing

Managing Infrastructure in Azure : Managing Infrastructure in Azure: Azure Virtual

Networks, Highly Available Azure Virtual Machines ,Virtual Machine Configuration
Management, Customizing Azure Virtual Machine Networking. Load Balancing: Creating
Cloud Services, Adding Virtual Machines to a Cluster, Configuring Load Balancer.

Windows Azure : Azure Storage: What is a Storage Account, Advantages, Tables, blobs,
queues and drives, Azure Appfabric: Connectivity and Access control Automation:
Introduction Windows Power Shell ,Creation of Runbooks, Uploading a Shell Script,
Authoring a Shell Script

SQL Azure : SQL Azure: Creating a SQL Server, Creating a SQL DB, Creating Tables,
Adding Data to the Tables, View Connection Strings, Security Configurations, Migrating on
premise DB to SQL Azure.
Websites : Websites: Creating a Website, Setting deployment credentials, Choosing a
platform, Setting up Default page for website, Scaling ,Auto Scaling by Time, Auto Scaling
by Metric, Difference between Free, Shared, Basic and Standard websites, Creating a website
using Visual studio

Text Book:

1. Cloud Computing Bible, Barrie Sosinsky, Wiley-India, 2010

Reference Books:

1. Cloud Computing: Principles and Paradigms, Editors: Rajkumar Buyya,

James Broberg, Andrzej M. Goscinski, Wiley, 2011
Course Code : 18CA3224 L-T-P-S : 4-0-0-0
Pre-requisite : DBMS Credits : 4

CO. No Course Outcome Mapped BTL

CO 1 Understand the characteristics of big data. 1 2
CO 2 Explore Hadoop framework and its components 1 2
Use HDFS and Map Reduce to analyze various industry use 1 2
CO 3 cases of big data analytics.

CO 4 Understand the YARN Infrastructure. 1 2

CO 5 Learning different Sorting, Shuffling 6 3


Introduction to Big Data, Characteristics and its Use Case
Introduction – Why Big data - What is big data – Facts about Big Data - importance of Big Data
Evaluation of Big Data – Market Trends – Sources of Data Explosion – Types of Data – Case
Study for Netflix and the house of card. Need of Big Data – Big Data and its sources –
Characteristics of Big Data – Difference between Traditional IT Approach and Big Data
Technology – Capabilities of Big Data – Handling Limitations of Big Data - Technologies
Supporting Big Data - Big Data Use Cases.

Introduction to Hadoop
Introduction – Why Hadoop – What is Hadoop – History and Milestone of Hadoop – Core
Components of Hadoop – Difference between Regular File System and HDFS – Common
Hadoop Shell Commands – Hadoop Configuration.

Hadoop Distributed File System (HDFS)
Concepts and Architecture - Data Flow (File Read, File Write) - Fault Tolerance - Java Base API
- Different Daemons in Hadoop cluster (NameNode, Secondary NameNode, Job Tracker, Task
Tracker and DataNode) - Loading a dataset into the HDFS.
Introduction to YARN and MapReduce
What is YARN – YARN Infrastructure - Introduction of MapReduce – Analogy of MapReduce –
MapReduce Architecture - Example of MapReduce –Sorting, Shuffling – Reducing – Combiner –
Partitioner – Creating MapReduce program by using Eclipse.

Introduction to Big Data Streaming 9
Real time Big Data Streaming, Big data streaming framework, data streaming process, tools for
big data streaming, industry use cases for big data streaming.

1. SeemaAcharya (Author), SubhashiniChellappan, Big Data and Analytics (2015). Wiley
2. Data Science and Big Data Analytics: Discovering, Analyzing, Visualizing and Presenting
Data (2015), EMC Education Services

1. Big Data, Black Book: Covers Hadoop 2, MapReduce, Hive, YARN, Pig, R and Data
Visualization (2016), DT Editorial Services
2. Tom White, Hadoop: The Definitive Guide, 4th Edition (2015)