0 ratings0% found this document useful (0 votes) 199 views65 pagesSixth Semester Complete Syllabus If
Sixth Semester Complete Syllabus If
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here.
Available Formats
Download as PDF or read online on Scribd
‘Maharashtra State Board of Technical Education, Mumbai
‘Teaching and Examination Scheme for Post S.S.C. Diploma Courses
iploma in Information Technology
Program Code: IF. With Effect From Academic Vear: 2017 - 18
‘Duration of Program : 6 Semesters Duration : 16 Weeks
Semester : Sixth Scheme
Teach
| a heen ion Scheme
s couse ite Course | Course Crett They | Frac Grant
N viation | ©98¢ | yp || p | @*T+P)] Exam ESE PAL Total T ‘ESE PA ‘Total ‘Total
oraton|-Max | Mia] Max | Min] Max | Mia Max | Min | Max | Min | Max | Min
ints | Marks [Marks [Marks Marks] Marks |Marks| Marks [Marks | Marks, Marks] Marks| Mark
1 Management mat | 22509] 3 )-|-| 3 | 2? |ro%#] 28 |30*| 00 | 10 | 4) - | - | - | - | ~ | ~ | 100
2_| Mobile Application map | 22617| 3. |-|4| 7 | 3 | 70 | 28 | 30*| 00 | 100) 40 | 25¢ | 10 | 25 | 10 | so | 20 | 150
2 | Development
Emerging Trends in 90
| 3 | Computer & Information ETI | 22618| 3 |-) - 3 Min To*# | 28 | 30* | 00 | 100 | 40 - _ ~ - - - 100
|__| Technotog
Wireless and Mobile .
4 Networks WMN | 22622} 3 |-|2 5 3 70 28 | 30" 00 | 100 | 40 | 25@} 10 | 25 10 50 20 150
[ Elective - II (Select Any One)
‘Web Based Application T - -
Development Using PHP WBP | 22619) 3 | - | 2 5 3 70 28 | 30’ 00 | 100 | 40 | 25@ | 10 | 25 10 50 20 150
\3 ane and Information | Nis | 92620] 3 |-|/2| s | 3 | 20 | 28 | 30*| 00 | 100| 40 | 25@) 10 | 25 | 10 | so | 20 | 150
L Cloud Computins ce 3 ]-[2 5 3 70, 28 | 30* | 00 [ 100 | 40 | 25@ | 10 | 25 10 50 20 150
TT Capstone Project —
6 | Execution & Repot -|-|4 4 - - ~ = _ - - 50# | 20 | 50~ | 20 | 100 | 40 100
Writing [ |
Total | 15 | - [12/27 -- | 350 | ~ | 150| — | 500 | — | 125 | — | 125) — | 250) — | 750
‘Student Contact Hours Per Week: 27 Hrs. Medium of Instruction: English
| Theory and practical periods of 60 minutes each. Total Marks : 730
Abbreviations: ESE- End Semester Exam, PA- Progressive Assessment, L - Lectures, T - Tutorial, P - Practical
@ Internal Assessment, # External Assessment, *# On Line Examination, “Computer Based Assessment
* Under the theory PA, Out of 30 marks, 10 marks are for micro-project assessment to facilitate integration of COs and the remaining 20 marks is the ayn
| taken during the semester for the assessment of the cognitive domain LOs requited for the attainment of the COs. oe
~ For the courses having ONLY Practical Examination, the PA marks Practical Part - with 60% weightage and Micro-Project Part with 40% weighta
> If Candidate not securing minit
“Detained” for that semester.
Oy,
jum marks for passing in the “PA” part of practical of any course of any semester then the canada a ‘be dectaréd as, =)
MSBTE ~ Final Copy Dt. 24.09.2019‘Management Course Code: 22509,
ProgramName __: Diploma in Automobile Engineering / Civil Engineering Group /
Electronics Engineering Group / Diploma in Plastic Engineering /
Diploma in Production Engineering /Diploma in Fashion &
Clothing Technology/ Computer Engineering Group
Program Code : AE/CE/CR/CS/ DE/EJ/ET/EN/EX/EQUS/C/IE/PG/PT/DC/
CO/CM/CWAF
Semester th
Course Title : Management.
Course Code 322509
1. RATIONALE
‘An engineer has to work in industry with human capital and machines. Therefore, managerial
skills are essential for enhancing their employability and career growth. This course is
therefore designed to provide the basic concepts in management principles, safety aspects and
Industrial Acts.
2 COMPETENCY
The aim of this course is to help the student to attain the following industry identified
competency through various teaching learning experiences:
Use relevant managerial skills for ensuring efficient and effective management.
3. COURSE OUTCOMES (COs)
‘The theory, practical experiences and relevant soft skills associated with this course are to be
taught and implemented, so that the student demonstrates the following industry oriented
COs associated with the above mentioned competency:
Use basic management principles to execute daily activities.
Use principles of planning and organising for accomplishment of tasks.
Use principles of direeting and controlling for implementing the plans.
Apply principles of safety management in all activities.
Understand various provisions of industrial acts.
eaege
4, TEACHING AND EXAMINATION SCHEME
“Teaching. rr
Teaching Examination Scheme
Create Theory Practical
|r) p [OTP paper [ESE | PA Total ESE, PA Total
rs. | Max [Min | Max | Min | Max | Min| Max | atin | Max | Min | Max | Min
s{-[—] 3 | 22, fre | 2s [0 | 00 fro feof - f-f-]-f- | -
(*#) Online Theory Examination.
(*): Under the theory PA, Out of 30 marks, 10 marks are for micro-project assessment to
facilitate integration of COs and the remaining 20 marks is the average of 2 tests to be taken
during the semester for the assessment of the cognitive domain UOs requiced-f
attainment of the Cos.(*#): Online examination “
MSBTE - Final Copy Dt. 24.09.2019 Page 1 of 6Management Course Code: 22509
Legends: L-Lecture; T — Tutorial/Teacher Guided Theory Practice; P - Practical; C ~ Credit,
ESE - End Semester Examination; PA - Progressive Assessment
5. COURSE MAP (with sample COs, PrOs, UOs, ADOs and topics)
This course map illustrates an overview of the flow and linkages of the topics at various levels
of outcomes (details in subsequent sections) to be attained by the student by the end of the
course, in all domains of learning in terms of the industry/employer identified competency
depicted at the centre of this map.
‘Klein at Mie ronson
site eae
{SB gli
“efor nc
o
ee
Paes
(SED
(OBE.
pes ee
oa oe
Se
oincrnivedane >
Figure 1 - Course Map
6. SUGGESTED PRACTICALS/ EXERCISES
= Not applicable -
7, MAJOR EQUIPMENT/ INSTRUMENTS REQUIRED
= Not applicable -
8. UNDERPINNING THEORY COMPONENTS
The following topics are to be taught and assessed in order to develop the sample UOs given
below for achieving the COs to attain the identified competency. More UOs could be added.
MSBTE — Final Copy Dt. 24.09.2019 Page 2 of 6Management Course Code: 22509
Unit Unit Outcomes (UOs) Topics and Sub-topics
(in cognitive domain)
Unit -1 la. Differentiate the concept and 1.1 Definitions of management, role
Introduction principles of management for the | and importance of management.
to given situation. 1.2 Management characteristics and
management | Ib.
concepts and
managerial | Ic,
Explain functions of management
for given situation.
Compare the features of the
principles, levels of management
and their functions; management,
administration and organization,
level
| Unit
and
level
Planning and
organizing at
supervisory | 2b.
mI
Directing
Controlling at
supervisory
planning and planning activities
for the given situation,
Suggest the step wise procedure
to complete the given activity in
the shop floor.
2c. Prepare materials and manpower
budget for the given production
activity.
Describe with block diagrams the
organization of the physical
resources required for the given
situation.
2e. Describe the human needs to
isfy the job needs for the
specified situation.
2f. List the tasks to be done by the
concemed individuals for
2d,
3a, Justify the chosen need of
directions and instructions to the
subordinates to complete the
specified task.
3b. Select the feasible set of
instructions to complete the given
imple task, with justification
3c. Predict the possible mistakes for
completing the given simple
activity
completing the given activity.
skills given types of planning relation between management and
1d. Suggest the steps in organizing in | administration,
the given situation. 1.3 Functions of management:
le, Suggest suitable type of planning, organizing,
organization for the given Teading/directing, staffing and
example. controlling.
1f, Identify the functional areas of | 1.4 Types of planning and steps in
management for the given planning
situation 1:5 Types of organization, Steps in
Ig. Suggest suitable managerial skills | organizing
for given situation with 1.6 Functional areas of management.
justification 1.7 Managerial skills
Unit-11 2a, Differentiate the nature of Planning at supervisory level
2.1 Planning by supervisor.
2.2 Planning activities, detailing and
following of each step.
2.3 Prescribing standard forms for
various activities.
2.4 Budgeting for materials and
‘manpower.
Organizing at supervisory level
2.5 Organizing the physical resources,
2.6 Matching human need with job
needs
2.7 Allotment of tasks to individuals.
and establishing relationship
among persons working in a group
Directing at supervisory level
3.1 Needs for directions and
instructions to subordinates;
Completeness and feasibilities of
nstructions
3.2 Personal counselling advanced
predictions of possible mistakes.
3.3. Elaborating decisions, laying
disciplinary standards in overall
working 0 ~
__|3d. Describe the managerial control
ontrolling ay/su
MSBTE
Final Copy Dt. 24.09.2019 Page 3 of 6Management Course Code: 22509
Unit Unit Outcomes (UOs) Topies and Sub-topies
(in cognitive domain) -
actions and remedial measures | 3.4 Managerial control;
required to be taken for Understanding team and link
completing the given task between various departments in
successfully respect of process and quality
standards; Steps in control
process
3.5 Controlling methods; Control
over the performance in respect
of quality, quantity of production,
time and cost. Measuring
performance, comparing with
standards, correcting unfavorable
- deviations. -
Unit-1V | 4a. State the general safety norms | 4.1 Need for safety management
Safety required to be taken in the given measures
Management | case. 4.2 General safety norms for an
4b. Suggest preventive measures of industrial unit; Preventive
plant activities in the given ‘measures
situation, 4.3 Definition of accident, types of
4c. Describe the safe procedural steps | industrial accident; Causes of
required to be taken to prevent accidents;
the given the type of accident. | 4.4 Fire hazards; Fire drill
4d. Prepare a work permit in to 4,5 Safety procedure
conduct the given maintenance | 4.6 Work permits.
activity.
4e. Explain the causes of the
specified type of accident in the
given situation,
4f. Prepare the specifications of the
firefighting equipment required
for the given type of fire. -
Unit=V Sa. Explain the purpose of the act | 5.1 Necessity of acts, Important
Legislative | Sb. Explain the main provisions of definition and Main provisions of
Acts the various acts and important acts.
definition.
5.2 Industrial Acts:
a. Indian Factory Act
b. Industrial Dispute Act
cc. Workman Compensation Act
d._ Minimum Wages Act
Note: To attain the COs and competency, above listed UOs need to be undertaken to achieve
the ‘Application Level’ and above of Bloom's ‘Cognitive Domain Taxonomy’
9. SUGGESTED SPECIFICATION TABLE FOR QUESTION PAPER DESIGN
[ Unit Unit Title [Teaching | Distribution of ‘Theory, Marks
No. Hours R u [A
Level_| Level | Level
1 [Introduction to management 12 06 | 06 | oF
MSBTE — Final Copy Dt. 24.09.2019 Page 4 of 6 z aManagement Course Code: 22509
Unit it Title [Teaching | Distribution of Theory Marks
No. Hours R U A | Total
Level_| Level | Level | Marks
coneepts and managerial skills
TT | Planning and organizing at 08 ov | 06 | 04 | 14
supervisory level |
Ti | Directing and controlling at 08 o4 | 06 | oF | 14
supervisory level
TV_| Safety Management 08 04 [06 | 04 [14
V_|Legislative Acts 12 o2_| 06 | 04 | 12
Total 48 20 | 30 | 20 | 70
Legends: R=Remember, U=Understand, A~Apply and above (Bloom's Revised taxonomy)
Note: This specification table provides general guidelines to assist student for their learning
‘and 0 teachers to teach and assess students with respect to attainment of UOs. The actual
istribution of marks at different taxonomy levels (of R, U and A) in the question paper may
vary from above table
10. SUGGESTED STUDENT ACTIVITIES
Other than the classroom and laboratory learning, following are the suggested student-related
co-curricular activities which can be undertaken to accelerate the attainment of the various
outcomes in this course: Students should conduct following activities in group and prepare
reports of about 5 pages for each activity, also collect/record physical evidences for thei
(student’s) portfolio which will be useful for their placement interviews
a. Write assignments based on the theory taught in classrooms. Assignments consist of
ten questions having long answers including charts, symbols, drawing, observations
ete
b. Prepare/Download information about various industrial acts.
c. Visit to any Manufacturing industry and prepare a report consisting of:
i, Organization structure of the organization/ Dept.
ii, Safety measures taken in organization.
iii, Mechanism to handle the disputes.
iv, Any specifie observation you have noticed.
d. Give seminar on relevant topi
¢. Undertake micro-projects.
11, | SUGGESTED SPECIAL INSTRUCTIONAL STRATE
These are sample strategies, which the teacher can use to ac
various outcomes in this course:
a. Massive open online courses (MOOCS) may be used to teach various topies/sub
topics.
b. ‘L? in item No. 4 does not mean only the traditional lecture method, but different
types of teaching methods and media that are to be employed to develop the outcomes,
c. About 15-20% of the topics/sub-topics which is relatively simpler or descriptive in
nature is to be given to the students for self-directed learning and assess the
development of the COs through classroom presentations (see implementation
guideline for details).
4. With respect 10 item No.10, teachers need to ensure to create opportunities and
provisions for co-curricular activities.
©. Guide student(s) in undertaking micro-projects.
f, Demonstrate students thoroughly before they start doing the pract
IES (if any)
rate the attainment of the
MSBTE — Final Copy Di. 24.09.2019 Page 5 of 6“Management Course Code: 22509
g. Encourage students to refer different websites to have deeper understanding of the
subjeet.
h. Observe continuously and monitor the performance of students in Lab.
12, SUGGESTED MICRO-PROJECTS
Only one micro-project is planned to be undertaken by a student that needs to be assigned to
hiny/her in the beginning of the semester. In the first four semesters, the micro-project are
group-based, However, in the fifth and sixth semesters, it should be preferably be individually
undertaken to build up the skill and confidence in every student to become problem solver so
that s/he contributes to the projects of the industry. In special situations where groups have to
be formed for micro-projects, the number of students in the group should not exceed three.
The micro-project could be industry application based, internet-based, workshop-
based, laboratory-based or field-based. Each micro-project should encompass two or more
COs which are in fact, an integration of PrOs, UOs and ADOs. Each student will have to
maintain dated work diary consisting of individual contribution in the project work and give a
seminar presentation of it before submission, The total duration of the micro-project should
not be less than 16 (sixteen) student engagement hours during the course. The student ought
to submit micro-project by the end of the semester to develop the industry oriented COs.
A suggestive list of micro-projects are given here. Similar micro-projects could be
added by the concerned faculty:
Study of management principles applied to a small scale industry,
Study of management principles applied to a medium scale industry.
Study of management principles applied to a large scale industry.
Prepare case studies of Safety measures followed in different types of organization.
Study of measures to be taken for ensuring cyber security.
peege
13. SUGGESTED LEARNING RESOURCE
No. Title of Book Author Publication
1 | Management and ‘Veerabhadrappa, ‘New age international publishers,
entrepreneurship Havinal New Delhi, 2014: ISBN: 978-81-
224-2602-1
2 | Principles of management | Chaudhry omvir New Age international publishers,
Singh prakash 2012, New Delhi ISBN: 978-81-
| ts 224-3039-4 —
3. | Industrial Engineering and |Dr.O.P. Khanna | Dhanpath ray and sons, New Delhi
|__| management —
Industrial Engineering and | Banga and Sharma | Khanna Publication, New Delhi
| management I
14. SUGGESTED SOFTWARE/LEARNING WEBSITES
a,__https://www.versesolutions.com/
https://www.books.google.co.in/books?isbn=817758412X
https:/www. www.educba.com » Courses » Business » Management
MSBTE ~ Final Copy Dt. 24.09.2019 Page 6 of 6 olMobile Application Development Course Code: 22617
Program Name: Computer Engineering Program Group
Program Code : CO/CM/TF/CW
Semester Sixth
Course Title : Mobile Application Development
Course Code 222617
. RATIONALE
Android application development is one of the rising and growing trend in the industry of
mobile. This course examines the principles of mobile application design and covers the
necessary concepts which are required to understand mobile based applications and develop
Android based Applications in particular. After completing this course students will design
and build a variety of real-time Apps using Android.
2. COMPETENCY
The aim of this course is to help the student to attain the following industry identified
competency through various teaching leaning experiences:
«Create simple Android applications.
3. COURSE OUTCOMES (COs)
The theory, practical experiences and relevant soft skills associated with this course are to be
taught and implemented, so that the student demonstrates the following industry oriented
COs associated with the above mentioned competency:
a) Interprete features of Android operating system.
b) Configure Android environment and development tools.
c) Develop rich user Interfaces by using layouts and controls.
d) Use User Interface components for android application development.
©) Create Android application using database.
f) Publish Android applications.
4, TEACHING AND EXAMINATION SCHEME
Teaching xaminaion Scheme
+} creti | —
\(L+T+P)) Theory 7 Sa
Lr Paper [_E PA 5 Tout |
|_| ries. lvtax | ntin [vax [in | Max | Min] Max Max | Min
af-fat 2 [3 |» | 28 [30 [on [100 [40 as] 10 | 2s | 10 | 30 | 20
(*): Under the theory PA; Out of 30 marks, 10 marks of theory PA are for micro-project
assessment to facilitate integration of COs and the remaining 20 marks is the average of 2
tests to be taken during the semester for the assessment of the UOs required for the
attainment of the COs.
Legends: L-Lecture; T ~ Tutorial/Teacher Guided Theory Practice; P -Practical; C- Credit,
ESE -End Semester Examination; PA - Progressive Assessment
5. COURSE MAP (with sample COs, PrOs, UOs, ADOs and topics)
This course map illustrates an overview of the flow and linkages of the topics at various levels
of outcomes (details in subsequent sections) to be attained by the student by the exdaf the
course, in all domains of learning in terms of the industry/employer identified competehey
depicted at the centre of this map. :
MSBTE ~ Final Copy Dt. 24.09.2019 Page 1 of 8‘Mobile Application Development Course Code: 22617
ee,
= > mt ‘
SQLite Database, necessity of
SQLite, Creatfon and connection
5.6
37
5.8
MSBTE — Final Copy Di. 24.09.2019
Page 5 of 8Mobile Application Development Course Code: 22617
Unit Unit Outcomes (COs) Topies and Sub-topies
(in cognitive domain)
of the database, extracting value
from cursors, Transactions.
Unit-VI__| 6a. Explain the given location 6.1 SMS Telephony
Secu based service. 6.2 Location Based Services: Creating
Appli 6b. Write the steps to customize the project, Getting the maps API
Deployment the given permissions for key, Displaying the map,
users. Displaying the zoom control,
6c. Explain features of the given Navigating to a specific location,
android security service. Adding markers, Getting location,
6d. Write the steps to publish the Geocoding and reverse Geocoding,
given android App. Getting Location data, Monitoring
Location,
6.3. Android Security Model,
Declaring and Using Permissions,
Using Custom Permission,
6.4 Application Deployment: Creating,
Small Application, Signing of
application, Deploying app on
Google Play Store, Become a
Publisher, Developer Console
Note: To attain the COs and competency, above listed UOs need to be undertaken to achieve
the ‘Application Level’ of Bloom's ‘Cognitive Domain Taxonomy’.
9. SUGGESTED SPECIFICATION TABLE FOR QUESTION
PER DESIGN
: ~__ | Distribution of Theory Marks
ae Unit Title [esti R | U | A | Total
: - Level | Level | Level | Marks
T-_ | Android and its tools ow | o2 | 2 | - | o
Wr Installation and configuration of 06 02 02 02 06
Android J
TI_| Ul Components and Layouts os | 2 | o | o4 | 08
IV_| Designing User Interface With View ro | 2 | o | os | 12
‘y_| Activity and Multimedia with ie | 2 | o | 2 1 20
databases
Vi_| Security and Application Deployment_| 18 | 02 | 06 | 12 | 20
Total | 2 | 2 | 38 | 7
Legends: R=Remember, U=Understand, A~Apply and above (Bloom's Revised taxonomy)
Note: This specification table provides general guidelines to assist students for their learning
and 1o teachers to teach and assess students with respect to attainment of LOs. The actual
distribution of marks at different taxonomy levels (of R, U and A) in the question paper may
vary from above table.
10. | SUGGESTED STUDENT ACTIVITIES a
Other than the classroom and laboratory learning, following are the suggested studentRlated
co-curricular activities which can be undertaken to accelerate the attainment of the vari
MSBTE — Final Copy Dt. 24.09.2019 Page 6 of 8“Mobile Application Development Course Code: 22617
outcomes in this course: Students should conduct following activities in group and prepare
reports of about 5 pages for each activity, also collect/record physical evidences for their
(student's) portfolio which will be useful for their placement interviews:
a) Prepare journal of practical
b) Undertake micro-projects.
1. SUGGESTED SPECIAL INSTRUCTIONAL STRATEGIES (if any)
These are sample strategies, which the teacher can use to accelerate the attainment of the
various outcomes in this course:
a) Massive open online courses (MOOCs) may be used to teach various topies/sub
topics.
b) ‘L? in item No. 4 does not mean only the traditional lecture method, but different
types of teaching methods and media that are to be employed to develop the outcomes.
©) About 15-20% of the topics/sub-topies which is relatively simpler or descriptive in
nature is to be given to the students for self-directed learning and assess the
development of the COs through classroom presentations (see implementation
guideline for details)
d) With respect to item No.10, teachers need to ensure to create opportunities and
provisions for co-curricular activities,
¢) Use different Audio Visual media for Concept understanding.
1) Guide student(s) in undertaking micro-projects.
g) Demonstrate students thoroughly before they start doing the pra
h) Ensure use of latest version of tools.
i) Encourage students to refer various web sites to have detail understanding of JSP and
related concepts.
ji) Encourage students to refer different web-applications to have deeper understanding
of web-applications.
k) Observe continuously the performance of students in laboratory,
12. SUGGESTED MICRO-PROJECTS
Only one micro-project is planned to be undertaken by a student that needs to be assigned to
him/her in the beginning of the semester. In the first four semesters, the micro-project are
group-based. However, in the fifth and sixth semesters, it should be preferably be individually
undertaken to build up the skill and confidence in every student to become problem solver so
that s/he contributes to the projects of the industry. In special situations where groups have to
be formed for micro-projects, the number of students in the group should of exceed three.
The micro-project could be industry application based, internet-based, workshop-
based, laboratory-based or field-based. Each micro-project should encompass two or more
COs which are in fact, an integration of PrOs, UOs and ADOs. Each student will have to
maintain dated work diary consisting of individual contribution in the project work and give a
seminar presentation of it before submission. ‘The total duration of the micro-project should
not be less than 16 (sixteen) student engagement hours during the course. The student ought
to submit micro-project by the end of the semester to develop the industry oriented COs.
‘A suggestive list of micro-projects is given here. Similar micro-projects could be
added by the concerned faculty:
a) Develop an android application on traffic surveying.
b) Develop an android application on online shopping.
©) Develop an android application for making a calculator.
d) Develop an android application for game.
Guidelines For Developing Micro Projects:
MSBTE - Final Copy Dt. 24.09.2019 Page 7 of 8 Ja‘Mobile Application Development Course Code: 22617
(Implement Following Relevant Guidelines For Micro Projects)
i
Must implement concepts of Advance java,
ii, Must publish the sample application on play store.
13. SUGGESTED LEARNING RESOURCES
a Title of Book Author Publication
1 | Anaroia Dixit, Prasanna Vikas Publications, New Delhi 2014,
si Kumar ISBN: 9789325977884
Maclean David, aa :
2 | Pro Android 5 Komatineni Satya, | SES rapleagons 2015, ISBN:
Allen Grant
‘Android Programming Packet Publication, 2015,
3 | for Beginners Hortan, John | ISBN: 978-1-78588-326-2
14, SOFTWARE/LEARNING WEBSITES
a) _https://www.tutorialspoint.com/android
b)__hitp://developer.android.com/guide/index.html,
©) _http://developer.android.com/reference/packages.html
4) _http://developer.android.com/guide/components/fundamentals. html
©) _http://developer.android.com/guide/topics/ui/index. html
r) /Ideveloper.android.com/guide/topics/ui/declaring-layout.html
g) _https://www.tutorialspoint.com/android/android_advanced_tutorial.pdf
MSBTE ~ Final Copy Dt. 24.09.2019 Page 8 of 8 XEmerging Trends in Computer and Information Technology Course Code: 22618
ProgramName: Comput
Program Code : CO/CMJ/IF/CW
Engineering Program Group
mester
Course Title : Emerging Trends in Computer and Information Technology
Course Code + 22618
4a, RATIONALE
Advancements and applications of Computer Engineering and Information Technology
are ever changing. Emerging trends aims at creating awareness about major trends that will define
technological disruption in the upcoming years in the field of Computer Engineering and
Information Technology. These are some emerging areas expected to generate revenue, increasing
demand as IT professionals and open avenues of entrepreneurship.
4b. COMPETENCY
The aim of this course is to help the student to attain the following indus
through various teaching learning experiences:
+ Acquire knowledge of emerging trends.
ry identified competency
de. COURSE OUTCOMES (COs)
Describe Artificial Intelligence, Machine learning and deep learning
* Interpret IoT concepts
+ Compare Models of Digital Forensic Investigation.
* Describe Evidence Handling procedures.
* Describe Ethical Hacking process.
+ Detect Network, Operating System and applications vulnerabilities
4d, TEACHING AND EXAMINATION SCHEME,
Creat, Teo Frail
+ |e [To Paper PA_|[ Tort | ESE PA Total
7 tis |Max | Min [Max in [Nox [Mia Max | in | May | Mn | Max | Min
90 y+ i * a «
-~| 3 Min | 70" «| 28 | 30* | 00 | 100 | 40 | | |
(*): Under the theory PA; Out of 30 marks, 10 marks of theory PA are for micro-project
assessment to facilitate integration of COs and the remaining 20 marks is the average of 2
tests(MCQ type) to be taken during the semester for the assessment of the UOs required for the
attainment of the COs.( *#) :Online Examination
Legends: L-Lecture; T — Tutorial/Teacher Guided Theory Practice; P -Practical; C ~ Credit,
ESE -End Semester Examination; PA - Progressive Assessment.
MSBTE - Final Copy Dt. 24.09.2019 Page 1 of 9Emerging Trends in Computer and Information Technology Course Code: 22618
de. COURSE MAP (with sample COs, UOs, ADOs and topics)
This course map illustrates an overview of the flow and linkages of the topics at various levels of
‘outcomes (details in subsequent sections) to be attained by the student by the end of the course, in
all domains of learning in terms of the industry/employer identified competency depicted at the
centre of this map. em taba
ES CONDON Talon 5
Cae hale
Co) -Descrie >
ime nin a
THe S~ = —
eplrmngael
‘ohne
Nip
Ecos
“AO. Arte
iin Outcome
UO in Comnive’™
Domain
Figure 1 - Course Map
MSBTE—
Page 2 of 9Emerging Trends in Computer and Information Technology Course Code: 22618
4f. SUGGESTED PRACTICALS/ EXERCISES
‘The practicals in this section are PrOs (i.e. sub-components of the COs) to be developed and
n the student for the attainment of the competency.
Approx.
Practical Outcomes (PrOs) UnitNo. | Hrs.
Required
Not Applicable
4g. | MAJOR EQUIPMENT/ INSTRUMENTS REQUIRED
The major equipment with broad specification mentioned here will usher in uniformity in conduct
of experiments, as well as aid to procure equipment by authorities concerned.
No. Equipment Name with Broad Specifications Pro
Not Applicable
4h. UNDERPINNING THEORY COMPONENTS.
Unit Outcomes (UOs) Topics and Sub-topics
(in cognitive domain)
la) Describe the concept of Al. 1.1 Introduction of AI
1b) State the components of Al * Concept
1c) List applications of AL * Scope of AI
(6m, 4 brs) | 14) Differentiate between machine * Components of Al
learning & deep learning. Types of Al
+ Application of Al
1.2 Concept of machine learning and
__| deep learning.
Unit He 2a) State the domains and application | 2.1 Embedded Systems:
Internet of | areas of Embedded Systems ‘Embedded system concepts,
Things 2b) Describe Io systems in which purpose of Embedded Systems,
Architecture of Embedded
(18m, 12 hrs)
Systems, Embedded Processors-
information and knowledge are
inferred from data. PIC, ARM. AVR, ASIC.
2c) Describe designs of loT. 2.2 IoT: Definition and characteristics
2d) State loT Issues and challenges in of oT
deployment. © Physical design of loT,
0 Things of oT
© IoT Protocols
* Logical design of IoT,
© oT functional blocks,
© lof Communication models,
© lof Communication APIs,
© loT Enabling Teohtiolagips
+ _loP levels and deployment
MSBTE ~ Final Copy Dt. 24.09.2019 Page 3 of 9Emerging Trends in Computer and Information Technology
~ Unit Outcomes (UOs)
Course Code: 22618
Unit _"Gneognitive domain) Topics and Sub-topics
templates
© IoT Issues and Challenges,
Applications
* lof Devices and its features:
Arduino, Uno, Raspberry Pi,
Node Mierocontroller Unit
Unit Hl: 3a. Describe the history of digi 3.1 Digital forensics
Basies of forensics + Introduction to digital forensic
Digital 3b. Define digital forensics * History of forensic
Forensics _|3c. List the rules of digital forensic Rules of
(8m-Shrs) [3d
Be.
Digital 4b,
Evidence
(10M- 08 Hrs) | 4c.
Describe the given model of
digital forensic investigation.
State the ethical and unethical
issues in digital forensics
the rules of digital
evidence.
State characteristics of digital
evidence.
igital forensic
* Definition of digital forensic
Digital forensics investigation and
its goal
3.2 Models of Digital Forensic
Investigation
* Digital Forensic Research Workshop
Group (DFRWS) Investigative
Model
* Abstract Digital Forensics Model
(ADEM)
* Integrated Digital Investigation
Process (IDIP)
+ End to End digital investigation
process (EEDIP)
+ Anextended model for cybercrime
investigation
* UML modeling of digital forensic
process model (UMDFPM)
3.3 Ethical issues in digital forensic
‘© General ethical norms for
investigators
[+ Unethical norms for investigation
41
* Definition of Digital Evidence
© Best Evidence Rule
* Original Evidence
4.2 Rules of Digital Evidence
4d. Deseribe the given type of | 4.3 Characteristics of Digital Evidence
evidences © Locard’s Exchange Principle
4e, Describe the given evidence | pigital Stream of bits
handling procedures 4.4 Types of evidence
Illustrative, Electronics, Documented,
Explainable, Substantial, Festimonial
- 4.5 Challenges in evidence havidhing
MSBTE — Final Copy Dt. 24.09.2019 Page 4 of 9 [37 A
}Emerging Trends in Computer and Information Technology
Course Ci
Unit
Unit Outcomes (UOs)
(in cognitive domain)
‘Topies and Sub-topies
Unit V: Basics |
of Hacking
(12M- 8Hrs)
Sa) Define hackers,
5b) Describe the need to hack your
own systems,
5c) Describe the dangers in systems.
Sd) Describe the Ethical hacking
Process
Se) Identify the Hacker's Mindset
* Authentication of evidence
* Chain of custody
* Evidence validation
4.6 Volatile evidence
5.1 Ethical Hacking
‘How Hackers Beget Ethical Hackers
+ Defining hacker, Malicious users
5.2 Understanding the need to hack
your own systems
5.3 Understanding the dangers your
systems face
‘© Nontechnical attacks
Network-infrastructure attacks
Operating-system attacks
Application and other specialized
attacks
5.4 Obeying the Ethical hacking
Principles
© Working ethically
* Respecting privacy
‘* Not crashing your systems
The Ethical hacking Process
Formulating your plan
Selecting tools
Executing the plan
:valuating results
+ Moving on
5.6 Cracking the Hacker Mindset
© What You're Up Against?
Who breaks in to computer systems?
Why they do it?
‘Planning and Performing Attacks
‘+ Maintaining Anonymity
Unit VI: Types
6a. Describe Network Infrastructure
6.1 Network Hacking
of Hacking | Vulnerabilities (wired/wireless) Network Infrastructure:
(16M- 11 Hrs) | 6b, List operating system © Network Infrastructure
Vulnerabilities Vulnerabilities
6c. Describe Messaging Systems © Scanning-Ports
Cheat Web Vulnerbiit ee
scribe Web Vulnerabilities oe >
6e. Describe Database Vulnerabilities | > a pana
© Analysing Network Data and
Network Analyzet
* MAC-daddy attack \
MSBTE— Final Copy Dt. 24.09.2019 Page sof sEmerging Trends in Computer and Information Technology Course Code: 22618
Unit Outcomes (UOs)
isa (in cognitive domain)
‘Topies and Sub-topics
Wireless LANs:
1s of Wireless Network
ies,
* Wireless Network Attacks
6.2 Operating System Hacking
* Introduction of Windows and Linux
Vulnerabilities
6.3 Applications Hacking
Messaging Systems
Vulnerabilities,
E-Mail Attacks- E-Mail Bombs,
Banners,
Best practices for minimizing e-mail
security risks
| Web Applications:
* Web Vulnerabilities,
* Directories Traversal and
Countermeasures,
Database system
* Database Vulnerabilities
* Best practices for minimizing
_|__ database security risks
4f, SUGGESTED SPECIFICATION TABLE FOR QUESTION PAPER DESIGN
Unit Title — 7 0 i aa fora
_ Level_| Level | Level | Marks
; Arica lignes 04 of | 02 | = | 06
1 a oF Things 2 10 | 04 | 04 | as
- Bases of Dig Forenis cs 0 | o2 | oo | os
WV Dil Evidese 08 06 | 02 | o2 | 10
ye «f= [otela
VI (sie i 06 08 02 16
Total 8 38_ | 2
Legends: R=Remember, U=Understand, A=Apply and above (Bloom's Re
MSBTE.— Final Copy Dt. 24.09.2019 Page 6 of 9Emerging Trends in Computer and Information Technology Course Code: 22618
Note: This specification table provides general guidelines to assist students for their learning and
to teachers to teach and assess students with respect to attainment of LOs. The actual distribution
of marks at different taxonomy levels (of R, U and A) in the question paper may vary from above
table.
4h. © SUGGESTED STUDENT ACTIVITIES
Other than the classroom learning, following are the suggested student-related co-curricular
activities which can be undertaken to accelerate the attainment of the various outcomes in this
‘course: Students should conduct following activities in group and prepare reports of about 5 pages
for each activity, also eollect/record physical evidences for their (student’s) portfolio which
will be useful for their placement interviews:
a) Prepare report on suggestive case study of digital forensic, digital evidence and hacking as
give below:
i. The Aaron Cafirey case ~ United Kingdom, 2003
http:/digitalcommons.law.scu.cdu/cgi/viewcontent.gi?artic!
ii. The Julie Amero case — Connecticut, 2007
hitp:/dfir.com. br/wp-content/uploads/2014/02/ julieamerosummary.pdf
he Michael Fiola case — Massachusetts, 2008
hitp://truthinjustice.org/fiola.htm.
b) Prepare report on any given case study of loT
370&context=chtlj
4i. SUGGESTED SPECIAL INSTRUCTIONAL STRATEGIES (if any)
These are sample strategies, which the teacher can use to accelerate the attainment of the various
outcomes in this course:
a) Massive open online courses (MOOCs) may be used to teach various topics/sub topics.
b) ‘L’ in item No. 4 does not mean only the traditional lecture method, but different types of
teaching methods and media that are to be employed to develop the outcomes.
©) About 15-20% of the topics/sub-topics which is relatively simpler or descriptive in nature
is to be given to the students for self-directed learning and assess the development of the
COs through classroom presentations (see implementation guideline for details).
4) With respect to item No.10, teachers need to ensure to create opportunities and provisions
for co-curricular activities.
e) Use different Audio Visual media for Concept understanding.
£) Guide student(s) in undertaking micro-projects.
g) Demonstrate students thoroughly before they start doing the practice.
h) Observe continuously and monitor the performance of students.
4). SUGGESTED MICRO-PROJECTS
Only one micro-project is planned to be undertaken by a student that needs to be assigned to
him/her in the beginning of the semester. In the first four semesters, the micro-project is group-
based. However, in the fifth and sixth semesters, it should be preferably be individually
undertaken to build up the skill and confidence in every student to become problem solver so that
s/he contributes to the projects of the industry. In special situations where groups have to be
formed for micro-projects, the number of students in the group should not exceed three.
The micro-project could be industry application based, internet-based, workshop-based,
laboratory-based or field-based. Each micro-project should encompass two or more COs which
are in fact, an integration of UOs and ADOs. Each student will have to maintain datéd work diary
consisting of individual contribution in the project work and give a semjnat presentational it
MSBTE - Final Copy Dt. 24.09.2019 Page 7 of 9Emerging Trends in Computer and Information Technology Course Code: 22618
before submission. The total duration of the micro-project should not be les
student engagement hours duting the cours:
than 16 (sixteen)
The student ought to submit micro-project by the
end of the semester to develop the industry-oriented COs,
A suggestive list of micro-project
s given here. Similar micro-projects could be added by
the concemed faculty:
a) 1oT Based Humidity and Temperature Monitoring
i Explain the need of loT Based Humidity and Temperature Monitoring,
ii ‘What will be the hardware requirements for designing this system.
ii. What will be the software requirements
iv. Explain how circuit can be designed for this system along with its working
ve Explain how to design an IoT application and how to store and retrieve a data on it.
b) [oT based Weather Monitoring System
i Explain the need of loT Based Weather Monitoring System,
What will be the hardware requirements for designing this system,
What will be the software requirements
Explain how circuit can be designed for this system along with its working
‘xplain how to design an IoT application and how to store and retrieve a data on it.
©) Study any case of fake profiling. Identify
‘The way digital forensics was used in detecting the fraud.
ii, Where was digital evidence located?
iii, Effers.
) Study any case of forgery /falsification crime case solved using digital forensics:
i Identify the model used for Digital Investigation.
ii, Was investigation done ethically or unethically.
iii, Where was digital evidence found for crime establishment?
iv. State the punishment meted
©) Study Credit card fraud as an identity threat. Identify:
i Use of digital media in carrying out fraud,
ii Vulnerability Exploited,
iii Effect of fraud.
iv. Protection/Precaution to be taken against such frauds.
1) Study any Trojan attack. Identify the Trojan attack:
i, State the way trojan got installed on particular Machine.
ii, State the effects of the Trojan.
iii. __Elaborate/Mention/State protection/Blocking mechanism for this specific Trojan,
example specification of any anti-threats platform which filters the Trojan.
MSBTE—
1 Copy Dt. 24.09.2019 Page 8 of 9Emerging Trends in Computer and Information Technology Course Code: 22618
4k. SUGGESTED LEARNING RESOURCES
: Title of Book Author Publication
1.| Antiticial Intelligence | R.B. Mishra PHI
Introduction to Tata Megraw Hill
2.| Embedded systems _| StibuK. V ISBN _978-0-07-014589-4
Internet OF Things-A | Arshadeep Bahga, Vijay | University Press
|__>+ | Hands-on Approach Madisetti, ISBN 978-8-17371-954-7
The Basies of Digital Elsevier
4 | Forensic John Sammons ISBN 978-1-59749-661-2
5, | Disital Forensic De Makeshi tan Wiley Publishing Inc.
"| (2017 Edition) i nenany) ISBN: 978-81-265-6574-0
Kalbande
Flacking for Dummies Wiley Publishing Ine.
© | (Sth Edition) Kevin Beaver CISSP | isp: 978-81-265-6554-2
41 SOFTWARE/LEARNING WEBSITES
a) https://www.allitebooks.in/the-internet-of-things!
b) _https://www.versatek.com/vp-content/uploads/2016/06/loT-eBook-versionS.pdf
©) _htips://www.tutorialspoint.conv/internet_of_things/internet_of things tutorial.pdf
4d) _http://www.spmkck.co.in/Notes/Learning20Internet%2001%20Things.pdf
©) https://resources.infosecinstitute.com/digital-forensics-models/#gref.
1) _https://www-researchgate.net/publication/300474145_Digital_Forensics/download
) _ htips://docs.microsoft.com/en-us/sysinternals/downloads/psloggedon
hh) www.openwall.com/passwords/windows-pwdump
i) _https://www.tutorialspoint.convethical_hacking/ethical_hacking_process.htm
j)_ hitps:/slideplayer.comvslide/7480056/
MSBTE — Final Copy Dt. 24.09.2019 Page 9 of 9 i:Wiztes and Mobile Network Course Code: 22622
Program Name _: Diploma in Information Technology
Program Code iF
Semester : Sixth
Course Title : Wireless and Mobile Network
Course Code 222622
1. RATIONALE
Wireless and mobile networks play an increasingly important role in the world of
communications. This course provides an introduction to various current and next generation
wireless networking technologies, and undertakes a detailed exploration of fundamental
architectural and design principles used at all layers of communication protocol stack.
Students will also be able to analyze wireless protocols and their performance using tools and
realistic simulations to maintain the wireless and mobile networks.
2. COMPETENCY
The aim of this course is to help the student to attain the following industry identified
competency through various teaching learning experiences.
* Maintain wireless and Mobile Networks.
3. COURSE OUTCOMES (COs)
The theory, practical experiences and relevant soft skills associated with this course are to be
taught and implemented, so that the student demonstrates the following industry oriented
COs associated with the above mentioned competency:
a) Select cellular Mobile system standard.
b) Maintain wireless network Technologies,
©) Maintain wireless mobile application.
d) Interpret the components of WLL Applications.
©) Maintain Adhoc and wireless sensor network,
4. TEACHING AND EXAMINATION SCHEME.
Teaching Examination Scheme
emer Credit =
Theo Practical
ult p \('T Paper [ESE PA | Totai_| ESE PA Tot
Vrs. [Max [Min [Max [Min | Miax | Min| Max | Min [ Max | Min | Max | Min
3|-[2[ 5 3_| 70 | 28 [30* | 00 | 100 | 40 [2s@[ 10 [| 25 | 10 | so | 20
Under the theory PA; Out of 30 marks, 10 marks of theory PA are for micro-project
assessment 10 facilitate attainment of COs and the remaining 20 marks for tests and
assignments given by the teacher
Legends: L-Lecture; T ~ Tutorial/Teacher Guided Theory Practice; P -Practical; C ~
Credit, ESE -End Semester Examination; PA - Progressive Assessment
se COURSE MAP (with sample COs, Learning Outcomes i.e.LOs and topics)
This course map illustrates an overview of the flow and linkages of the topics at various levels
of outcomes (details in subsequent sections) to be attained by the student by the end of the
course, in all domains of learning in terms of the industry/employer identified compateye)
depicted at the center of this map.
MSBTE — Final Copy Dt. 24.09.2019 Page 1 of 8Wireless and Mobile Network
)
a
Course Code: 22622
Cowa)sehr
ellie note
sem sti
ae
)
casemate. ro tae
“72 CO asinine SE eet tone
newt Teche, >, ube owe
eerie ote
Figure 1 - Course Map
6. SUGGESTED PRACTICALS/ EXERCISES
‘The practicals in this section are PrOs (i.e. sub-components of the COs) to be developed and
assessed in the student for the attainment of the above stated competenc;
Sr. Practical Outcomes (PrOs) Unit ne
No. No. | Required
1 | Test the different sections of mobile phone. (Such as ringer section, | T 02*
dialer section, receiver section and transmitter section) _
2 | Perform the process of call connection and call release of cellular | I o2*
Mobile system.
3) Transfer an image, audio and video file using Bluetooth protocol | IT 02"
with varying distance between two devices and analyze the
|__| performance.
4 | Configure Wi-Fi setting in mobile devices using mobile tethering | _
to connect two devices such as mobile phone to mobile phone,
|__| mobile phone to laptop. —
MSBTE - Final Copy Dt. 24.09.2019 Page 2 of 8Wireless and Mobile Network Course Cote: 22622
Sr. Practical Outcomes (PrOs) Unit —
No. No. | required
3 __ | Apply RFID technology for real life applications usingRFID kit. | | 02
6 | Establish seamless wireless connectivity using multiple access 1 @
point.
7 | Use AT commands to understand working of 3G network using 3G | TT | 02
mobile phone Trainer kit.
8 | Check network availability, manual and auto selection of network [TIT | 02*
using AT commands. -
9° | Simulate Bluetooth voice transmission to observe effect of AWGN | IIT 02
and interference of 802.1 1b on transmission using MATLAB and
simulink, L
10 | Develop a mobile application for wireless technology using any | IV | 02*
wizards such as available on www.appypie.com or any other.
TT | Simulate the line coding techniques using MATLAB and i @
simulink. |
12_| Simulate the Binary amplitude shift Keying using MATLAB and | IV | 02*
simulink
13 | Simulate the Binary phase shift keying using MATLAB and WV | 02
simulink,
14 _| Simulate the Delta modulation using MATLAB and simulink W_|_ 02
15 | Simulate the Direct sequence spread spectrum using MATLAB and | IV | 02°
simulink.
16 | Simulate WSN node to determine position on node and blink LED | V oF
using cupearbon simulator and senseript.
Total 2
Note
i. A suggestive list of PrOs is given in the above table. More such PrOs can be added 10
attain the COs and competency. The practicals marked as “*' are compulsory, so that the
student reaches the ‘Application Level’ of Bloom's Taxonomy’ as generally required by the
industry,
ii, The ‘Process’ and ‘Product’ related skills associated with each PrO are to be assessed
according to a suggested sample given below:
S.No. Performance Indicators Weightage in %
1___| Preparation of experimental set up 20
2__| Setting and operation 20
3__| Follow Safety measures 10
4 | Observations and Recording 10
5__ | Interpretation of result and Conclusion 20
| 6 _ | Answer to sample questions 10
7___| Submission of report in time 10
Total 100
The above PrOs also comprise of the following social skills/attitudes which are Affective
Domain Outcomes (ADOs) that are best developed through the laboratory/field based
experiences:
a) Work collaboratively in team
b) Follow ethical Practices.
MSBTE — Final Copy Di. 24.09.2019 Page 3 of 8Wireless and Mobile Network Course Code: 22622
‘The ADOs are not specific to any one PrO, but are embedded in many PrOs. Hence, the
acquisition of the ADOs takes place gradually in the student when s/he undertakes a series of
practical experiences over a period of time. Moreover, the level of achievement of the ADOs
according to Krathwohl’s ‘Affective Domain Taxonomy’ should gradually increase as planned
below:
© ‘Valuing Level’ in 1" year
© ‘Organization Level’ in 2" year.
© ‘Characterization Level’ in 3" year.
7. MAJOR EQUIPMENT/ INSTRUMENTSREQUIRED
The major equipment with broad specification mentioned here will usher in uniformity in
conduct of practicals, as well as aid to procure equipment by authorities concerned,
Equipment Name with Broad Specifications and Software Prone:
1__[ Mobile phone trainer kit with Battery
2 | Mobile phone trainer kit with Battery, SIM card of any GSM Service
provider supporting 90/1800 frequency band, power supply
[3 | Blue tooth enabled two mobile phones
4 _| Mobile devices, Wi Fi access points
5__|RFIDKit
6 | 3,4 wicfi enabled devices,Dlink wi fi access point
7
8
Mobile phone trainer kit with Battery
3G mobile phone Trainer kit,3G activated SIM card of any service
provider supporting Tri-band UMTS 2100/1900/850 MHz, power
supply,Hands free kit, RO/Spectrum Analyzer,connecting wires,antenna
with coaxial cable Micro SD card. _
PC with relevant software MATLAB 9,11,12,
L 13,14, 15
10_| PC with internet connection 10
11_[ PC with relevant software Cupearbon 16
co] a onfun| ales
8. UNDERPINNING THEORY COMPONENTS
The following topics/subtopics should be taught and assessed in order to develop UOs in
cognitive domain for achieving the COs to attain the identified competency. More UOs could
be added,
Unit Major Unit Outcomes (UOs) Topics and Sub-topies
(in cognitive domain)
la, Describe function of the given | 1.1 Personal Communication Services
component in PCS/GSM (PCS) architecture
architecture. 1.2. Global system for Mobile
1b. Classify the given GSM logical ‘Communication (GSM)
channel. Architecture, GSM frequency
le. Describe the given step of call spectrum , GSM radio aspects, GSM
processing in GSM. services, Supplementary services,
1d. Explain the significance of given GSM channel types, call processing
type of area in cellular network. in GSM
13 Mobitity mare, Loe
\
MSBTE — Final Copy Dt. 24.09.2019 Page 4 of &Wireless and Mobile Network
Course Code: 22622
Unit Major Unit Outcomes (UOs) Topies and Sub-topies
(in cognitive domain)
Mobile Subscriber Identity, concept
of roaming, Location area, routing
area, tracking area.
1.4. Network signaling.
Unit-I | 2a. Describe function of the given | 2.1 General Packet Radio Services
GPRS component of the GPRS (GPRS ) architecture, GPRS.
and architecture. Services, Quality of service
Mobile _ | 2b. Describe characteristics of the | 2.2. GPRS Network nodes, Mobility
Data given IEEE protocol standard for management and routing in GPRS,
Communi | wireless communication Logical channels in GPRS
cation networks. 23. WLANs (Wireless LANs) IEEE
. Explain architecture of the given 802.11 standard, RFID
IEEE 802.11 protocol standard. | 2.4 Bluetooth technology, Wi-Max, Wi-
2d. Compare the performance of Fi
given wireless network 2.5. Mobile IP: operational principle,
technologies based on given Home agent, foreign agent.
criteria.
2e, State the procedure of scheduled
maintenance of the given system
Unit- IM |3a. Describe the given specification [3.1 Mobile Internet standard, Wireless
Wireless for compatibility requirements of Application Protocol (WAP)
Applicati_ | IMT-2000 global standards. Gateway and Protocols.
on 3b. Explain features of the given next |3.2 Wireless Markup Languages (WML)
Protocol | generation standard. 3.3. International Mobile
and 3G __|3c. Describe the funetion of the given | _Telecommunications 2000 (IMT
Mobile section of UMTS network 2000) specification.
Services architecture 3.4. Wideband Code Division Multiple
3d, Compare features of the two ‘Access (W-CDMA), and CDMA
given next generation mobile 2000, Quality of services in third
communication networks based generation (3G) network.
on given criteria. 3.5 UMTS Technology: Features, UMTS
3e. State the procedure of scheduled data rates, UMTS Spectrum, UMTS
maintenance of the given system Architecture, applications and
advantages.
3.6 Features of 4G and 4G
LTE, VoLTE,4.5G,5G,4G
Architecture, applications of 4G
Unit-IV|4a. Describe the given application of | 4.1 WLL architecture, Wireless local
WLL, Wireless local loop. Loop (WLL) technologies
signal | 4b. Explain features of the given 4.2 WLL types: FWT and WT with
encoding | signal encoding technique for mobility, WLL Application
technique | wireless network. 4.3 Concept of LEC networks
sand 4c. Compare PCM, DPCM, DM 4.4 Line coding techniques
Spread modulation techniques on the 4.5 Amplitude shift keying, Bit
spectrum given criteria, shift keying; PCM, DPCM, DMs,
modulati_|4d. Describe characteristics of the features; Types of’spread spectn
inal Copy Di. 24.09.2019 Page 5 of 8Wireless and Mobile Network Course Cade: 2622
Unit Major Unit Outcomes (UOs) Topies and Sub-topies
(in cognitive domain)
on given Spread spectrum DSSS, FHSS
modulation technique.
4e, State the procedure of scheduled
maintenance of the given system
Unit-V _|5a. Explain the feature of given [5.1 MANET, MANET topologies,
Mobile component in MANET Features of MANET, Applications,
Ad-hoc architecture. types of MANET Architecture,
Networks | 5b. Explain characteristics of the Design challenges in MANET,
and given WSN architecture, [5.2 Mesh Networking; Wireless sensor
Wireless |Sc. Describe the given design network, Applications,
Sensor challenges in WSN Clustering of WSN, Characteristics
Networks |5d. Classify the given clustering of WSN; Sensor node: Block
algorithm, diagram, Different types of WSN
Se. State the procedure of scheduled Architecture, Energy efficiency in
maintenance of the given system WSN
5.3. WSN, MANET and 107; ISO
equivalent protocol layer architecture
for WSN, Classification of clustering
algorithms, Components of WSN
Architecture
Note: To attain the COs and competency, above listed Learning Outcomes (LOs) need to be
undertaken to achieve the ‘Application Level’ of Bloom's ‘Cognitive Domain Taxonomy’.
9. SUGGESTED SPECIFICATION TABLE FORQUESTION PAPER DESIGN
Unit Unit Tite ‘Teaching |_Distribution of Theory Marks
No. Hours R U | A | Total
Level_| Level | Level | Marks
Basics of PCS and GSM 10 04 | os | 08 12
I | GPRS and Mobile Data 12 : 04 | 08 12
Communication
III] Wireless Application Protocol and | 16 04 2 | oF | 20
3G Mobile Services
IV [| WEL, signal encoding techniques 4 o2 | 04 | 04 10
and Spread spectrum modulation
V_ | Mobile Ad-hoc Networks and 2 oF | 04 | 08 16
Wireless Sensor Networks
Total 64 14 [28 | 28 | 70
Legends: R=Remember, U=Understand, A=Apply and above (Bloom's Revised taxonomy)
Note: This specification table provides general guidelines to assist student for their learning
and to teachers to teach and assess students with respect to attainment of LOs. The actual
distribution of marks at different taxonomy levels (of R, U and A) in the question paper may
vary from above table
MSBTE — Final Copy Dt. 24.09.2019 Page 6 of 8Wireless and Mobile Network (Course Code: 22622
10, SUGGESTED STUDENT ACTIVITIES
Other than the classroom and laboratory leaming, following are the suggested student-related
co-curricular activities which can be undertaken to accelerate the attainment of the various
outcomes in this course:Students should conduct following activities in group and prepare
reports of about 5 pages for each activity, also collecV/record physical evidences for their
(student’s) portfolio which will be useful for their placement ir
a) Visit nearest MINL/BSNL exchange and prepare detail report of entire setup of their
cellular system,
b) Visit nearest CDMA based cellular switching center and prepare details of entire setup
of their cellular system.
11, | SUGGESTED SPECIAL INSTRUCTIONAL STRATEGIES (if any)
These are sample strategies, which the teacher can use to accelerate the attainment of the
various learning outcomes in this course:
a) Massive open online courses (MOOCs) may be used to teach various topics/sub
topics.
b) ‘L?in item No. 4 does not mean only the traditional lecture method, but different types
of teaching methods and media that are to be employed to develop the outcomes.
©) About 15-20% of the topics/sub-topics which is relatively simpler or descriptive in
nature is to be given to the students for self-directed learning and assess the
development of the LOs/COs through classroom presentations (see implementation
guideline for details).
d) With respect to item No.10, teachers need to ensure to create opportunities and
provisions for co-curricular activities
©) Guide student(s) in undertaking micro-projects.
f) Correlate subtopics with Electronics communication and Digital communication.
2) Use proper equivalent analogy to explain different concepts.
h) Use Flash/Animations to explain functions of mobile handset.
12. SUGGESTED MICRO-PROJECTS
Only one micro-project is planned to be undertaken by a student that needs to be assigned to
him/her in the beginning of the semester. In the first four semesters, the micro-project is
group-based. However, in the fifth and sixth semesters, it should be preferably be individually
undertaken to build up the skill and confidence in every student to become problem solver so
that s/he contributes to the projects of the industry. In special situations where groups have to
be formed for micro-projects, the number of students in the group should not exceed three.
The micro-project could be industry application based, internet-based, workshop-
based, laboratory-based or field-based. Each micro-project should encompass two or more
COs which are in fact, an integration of PrOs, UOs and ADOs. Each student will have to
‘maintain dated work diary consisting of individual contribution in the project work and give a
seminar presentation of it before submission. The total duration of the micro-project should
not be less than 16 (sixteen) student engagement hours during the course. The student ought
to submit micro-project by the end of the semester to develop the industry-oriented COs.
‘A suggestive list of micro-projects is given here. Similar micro-projects could be
added by the concerned faculty:
a) Prepare a report on TRAI regulations related to wireless and mobile Network.
b) Prepare a report on sectorisation, BTS Functions, Structure of BTS, Electronic Board
Identification, Mechanical structure, Base station controller, BSS interface, BSS
Planning of Base Station Subsystem. Epi OF RO
c) Prepare a report on CDMA Base Transreceiver Station which inc 8 TS Function’
BTS Position in the system, BTS system Architecture, Mechanica es
MSBTE - Final Copy Dt. 24.09.2019 Page 7 of 8Wireless and Mobife Network ‘Course Code: 22622
feature, Power Consumption, subsystem of BTS, Antenna and Feeder, Typical
application, BTS Network Topology.
4) Prepare a report on Mobile Value added Services which includes Mobile Messaging
Services, SMS, SMSC Deployment Architecture, EMS, WAPService, MMS Network
Architecture, VMS, Voiceportal, Cell Broadcast Service, Push to Talk
©) Prepare a report on Mobility management and associated algorithms in wireless and
mobile Networks.
13, SUGGESTED LEARNING RESOURCES
Ne Title of Book Author Publication
1 | Wireless and mobile Lin Yi-Bang, John Wiley &sons, New Delhi,2001
|__| network Architectures __| Clamtac Imrich __| ISBN 978-81-265-1560-8
2. | Wireless communication- | Theodore 8. Pearson publication New Delhi,2005
Principles and practice __| Rappaport ISBN:978-81-317-3186-4
3 | Wireless Communication | Singal TL. ‘McGraw Hill Education Private
Limited, New Dethi,2010,
| ISBN:978-0-07-068178-1
4 | Mobile Computing Talukdar Asoke — | McGraw Hill Education Private
Technology, Applications | K, Limited, New Delhi,2010,
and service creation Javagal Roopa R_ | ISBN:978-0070144576
14, SOFTWARE/LEARNING WEBSITES
a) Mobile network standards:-http://gallueci.net/blog/gsm-cdma-and-Ite-a-guide-to-
mobile-network..../3/4
b) Bluetooth technology: -www.radio-
Electronics.com/info/wireless/Bluetooth/Bluetooth_overview.php
©) The Evolution of mobile technologies:-https://www.qualcomm.cony.../the-evolution-
of-mobile-technologies-1 g-to-2g-t0-3g-
4) Wireless tutorials:
hups://www.octoscope.com/English/.../octoscope_WirelessTutorial_20090209.pdf
MSBTE ~ Final Copy Dt. 24.09.2019 Page 8 of 8Web fased Application development with PHP Course Code: 22619
Program Name : Computer Engineering Program Group
Program Code : CO/CMAF/CW
Semester ixth
Course Title : Web Based Application development with PHP
Course Code + 22619
1. RATIONALE
PHP is a general purpose, server-side scripting language run a web sever that's designed to
make dynamic pages and applications. PHP as a web development op secure, fast and
reliable, In the growing field of Web technology it is essential for every Diploma pass outs to
Jean PHP Language to help them build interactive web applications. This course is designed
to inculcate web based applications development skills in students using server side scripting
with PHP.
2. COMPETENCY
The aim of this course is to help the student to attain the following industry identified
competency through various teaching learning experiences:
«Develop simple web-based application using PHP language.
3. COURSE OUTCOMES (COs)
The theory, practical experiences and relevant soft skills associated with this course are to be
taught and implemented, so that the student demonstrates the following industry oriented
COs associated with the above mentioned competency:
a) Develop program using control statement.
b) Perform operations based on arrays and graphics.
c) Develop programs by applying various object oriented concepts.
d) Use form controls with validation to collect user’s input.
¢) Perform database operations in PHP.
4. TEACHING AND EXAMINATION SCHEME,
Teaching Pr
Ts Fast
Lip [*T paper [ESE PA Total ESE PA | Total
Hrs, |Max_|Min | Max [Min | Max |Min| Max | Min | Max | Min | Max | Min
s{-[2 [ss | % | 28 [30° | 00 [100 | 40] asf 10 | 25 | wo | so | 20
(*): Under the theory PA, Out of 30 marks, 10 marks are for micro-project assessment to
‘facilitate integration of COs and the remaining 20 marks is the average of 2 tests to be taken
‘during the semester for the assessment of the UOs required for the attainment of the COs.
Legends: L-Lecture; T ~ Tutorial/Teacher Guided Theory Practice; P - Practical; C— Credit,
ESE - End Semester Examination; PA - Progressive Assessment
5. COURSE MAP (with sample COs, PrOs, UOs, ADOs and topics)
This course map illustrates an overview of the flow and linkages of the topics at various levels
of outcomes (details in subsequent sections) to be attained by the student by the end of the
course, in all domains of learning in terms of the industry/employer identified competency
depicted at the centre of this map. »
MSBTE ~ Final Copy Dt. 24.09.2019 Page 1 of 7Wich Based Application development with PHP. - Couse Code: 22619
pi pet 9S
7
1 Ba
Figure 1 - Course Map
6. SUGGESTED PRACTICALS/ EXERCISES
‘The practicals in this section are PrOs (i.e. sub-components of the COs) to be developed and
assessed in the student for the attainment of the competency.
| Approx.
S Practical Outcomes (PrOs) Unit | Hrs,
0. No.
Required
‘a, Install and configure PHP, web server, MYSQL
1 |b: Write a program to print “Welcome to PHP”. 1 Pa
¢. Write a simple PHP program using expressions and
operators.
2 Write a PHP program to demonstrate the use of Decision
making control structures using-
a. If-statement 1 02"
b. Ifelse statement
c._ Switch statement -
3 | Write a PHP program to demonstrate the use of Looping
structures using-
a. While statement, b. Do-while statement c.For statement
4. Foreach statement
MSBTE — Final Copy Dt. 24.09.2019 Page 2 0f7‘ich Based Applisation development wih PHP
Course Code: 22619
| Approx.
Pd Practical Outcomes (PrOs) Sait Hrs.
. | Required
4 | Write a PHP program for ereating and manipul :
a. Indexed array i 0
b. Associative array
c. Multidimensional arra
5 | a. Write a PHP program to—
Caleulate length of string.
ii, Count the number of words in string -without using | jy | gps
string functions.
b. Write a simple PHP program to demonstrate use of various
built-in string funetions.
6 | Write a simple PHP program to demonstrate use of Simple |, oo
function and Parameterized function.
7 | Write a simple PHP program to create PDF document by using | 1, o
graphics concepts
3 | Write a PHP program to-
a. Inherit members of super class in subclass. m | oo
b. Create constructor to initialize object of class
~by using object oriented concepts
9 [Write a simple PHP program on Introspection and |, | gy
Serialization.
TO | Design a web page using following form controls: wl oo
a. Text box, b. Radio button, c, Check box, d. Buttons
TT [Design a web page using following form controls: wl om
a, List box, b, Combo box, ¢. Hidden field box
12 [Develop web page with data validation. W_|_0*
| 13. | Write simple PHP program to -
a, Set cookies and read it. wv | 02*
b, Demonstrate session Management.
14 [Write a simple PHP program for sending and receiving plain | yy | ype
text message (e-mail).
15 | Develop a simple application to-
a. Enter data into database v 02*
b. Retrieve and present data from database.
T6 | Develop a simple application to Update, Delete table data from | yy ge
database.
Total 32
Not
i. A suggestive list of PrOs is given in the above table. More such PrOs can be added to
attain the COs and competency. All the above listed practical need to be performed
compulsorily, so that the student reaches the ‘Applying Level’ of Bloom's ‘Cognitive
Domain Taxonomy’ as generally required by the industry,
ii. The ‘Process’ and ‘Product’ related skills associated with each PrO are to be assessed
according to a suggested sample given below.
Ss.
No.
Performance Indicators
Weightage in
a.
Write appropriate code to generate desired output in Web
application f'
MSBTE — Final Copy Dt. 24.09.2019 Page 3 of 7Web Based Application development with PHP Course Code: 22619
S. Performance Indicators Weightage in
No. —%
2 | Debug, Test and Execute the programs = | 30
3__| Presentation of Output 20
|__| Able to Answer to oral questions 10
5 Submission of report in time { 10
Total _ 100
The above PrOs also comprise of the following social skills/attitudes which are Affective
Domain Outcomes (ADOs) that are best developed through the laboratory/field based
experiences:
a) Work collaboratively in team.
b) Follow ethical practices.
‘The ADOs are not specific to any one PrO, but are embedded in many PrOs. Hence, the
acquisition of the ADOs takes place gradually in the student when s/he undertakes a series of
practical experiences over a period of time. Moreover, the level of achievement of the ADOs
according to Krathwohl’s ‘Affective Domain Taxonomy’ should gradually increase as planned
below:
© ‘Valuing Level’ in 1" year
* ‘Organization Level’ in 2™ year.
* ‘Characterization Level’ in 3" year.
7. MAJOR EQUIPMENT/ INSTRUMENTS REQUIRED
The major equipment with broad specification mentioned here will usher in uniformity in
conduct of practicals, as well as aid to procure equipment by authorities concerned.
*., Equipment Name with Broad Specifications
1 | Hardware = Computer system
|__| (Any computer system, preferably i3 - iS with basic configuration) All
2 | Operating system : Windows / Linux ||
3__| Any database too! such as MySQL, MariaDB or any equivalent tool — | 15.16
8. _ UNDERPINNING THEORY COMPONENTS:
The following topics/subtopics should be taught and assessed in order to develop UOs in
cognitive domain for achieving the COs to attain the identified competency. More UOs could
be added .
Unit Unit Outcomes (UOs) ‘Topies and Sub-topies
(in cognitive domain)
Unit—1 | 1a Write simple PHP program | 1.1 History and Advantages of PHP, ,
Expression] to solve the given Syntax of PHP.
sand expression 1.2. Variables, Data types, Expressions
control | 1b Use relevant decision and operators, constants
statements | making control statement to | 1.3. Decision making Control statements -
in PHP solve the given problem if, if-else, nested if, switeh, break and
le Solve the given iterative continue statement, =
problem using relevant loop | 1.4 Loop control structures-while doz
| statement. while , for an
MSBTE — Final Copy Dt. 24.09.2019 Page 4 of 7Web Based Applicaton development ih PHP.
Course Code: 22619
Unit “Gneogntive doma °° ‘Topies and Sub-topics
Unit-I [2a Manipulate the given type | 2.1 Creating and Manipulating Array,
Arrays, of arrays to get the desired Types of Arrays- Indexed ,
Funetions result. ‘Associative and Multi-dimensional
and 2b Apply implode, explode arrays
Graphies functions on the given array. | 2.2 Extracting data from arrays, implode,
2c Apply the given string explode, and array flip.
functions on the character | 2.3 Traversing Arrays
array. 2.4 Function and its types —User defined
2d_ Scale the given image using function, Variable function and
graphics concepts! Anonymous function,
function 2.5. Operations on String and String
fanctions:str_word_count()strlen(),str
rev(),strpos(),str_replace(),
uewords(),strtoupper(),
strtolower(),stremp().
2.6 Basic Graphics Concepts, Creating
Images, Images with text, Scaling
Images, Creation of PDF document.
Unit-T1 3a_ Write constructor and 3.1 Creating Classes and Objects
Apply destructor functions for the | 3.2. Constructor and Destructor
Object given problem in PHP. 3.3. Inheritance, Overloading and
Oriented | 3b Implement inheritance to Overriding, Cloning Object.
Concepts extend the given base class. | 3.4 Introspection, Serializati
inPHP — |3c_ Use overloading /
overriding to solve the
given problem.
3d_Clone the given object. 7
Unit-IV [4a Use the relevant form 4.1 Creating a webpage using GUI
Creating controls to get user’s input Components, Browser Role-GET and
and 4b Design web pages using POST methods, Server Role
validating | multiple Forms for the given | 4.2 Form controls: text box, text area,
forms problem. radio button, check box, list, buttons
4c Apply the given validation | 4.3 Working with multiple forms :
rules on form. - A web page having many forms
4d_ Set/ modify/ delete cookies ~ A form having multiple submit
using cookies attributes. buttons.
4e Manage the given session | 4.4 Web page validation.
using session variables. 4.5. Cookies - Use of cookies, Attributes
of cookies, create cookies, modify
cookies value, and delete cookies.
4.6 Session - Use of session, Start session,
get session variables, destroy session.
| 4.7 Sending E-mail. -
Unit-V_[5a Create database for the | 5.1 Introduction to MySQL ~ Create a
Database given problem using PHP database.
Operation script. 5.2 Connecting to a MySQlL.-database :
s 5b_ Insert data in the given MySQL database sever from PHP
database using PHP script. | 5.3 Database operaffons: Insertdata,”
Se Apply the specified update Retrieving the Query result\\
operation in database record_| 5.4 Update and delete operations on table
MSBTE — Final Copy Dt. 24.09.2019 Page 5 of7
ws aWel Bascd Application development with PHP. Couree Code: 22619
Unit Outcomes (UOs)
cognitive domain)
using PHP script. data
5d_ Delete the given record
from the database using
__PHP script.
‘Topics and Sub-topies
Note: To attain the COs and competency, above listed UOs need to be undertaken to achieve
the ‘Application Level’ of Bloom’s ‘Cognitive Domain Taxonomy’
9. SUGGESTED SPECIFICATION TABLE FOR QUESTION PAPER DESIGN
is «|_Distribution of Theory Marks
= Unit Title Teaching "RT ou [A ‘| Total
7 * | Levet_| Levet | Level | Marks
i Expressions and control statements in 7 o | os 2
T_| Arrays, Functions and Graphics 10 @ 04 | 10 16
7 Apply Object Oriented Concepts in a 7 ‘ou | io i’
TV_| Creating and validating forms 12 @ [06 | 12
V_| Database operations 08 o | 04 | 08 14
[ Total 48. 10 1s | 42 | 70
Legends: R=Remember, U=Understand, A~Apply and above (Bloom's Revised taxonomy)
Note: This specification table provides general guidelines to assist student for their learning
and to teachers to teach and assess students with respect to attainment of UOs. The actual
distribution of marks at different taxonomy levels (of R, U and A) in the question paper may
vary from above table.
10, SUGGESTED STUDENT ACTIVITIES
Other than the classroom and laboratory learning, following are the suggested student-related
co-curricular activities which can be undertaken to accelerate the attainment of the various
outcomes in this course: Students should conduct following activities in group and prepare
reports of about 5 pages for each activity, also collect/record physical evidences for their
(student’s) portfolio which will be useful for their placement interviews:
a) Prepare journal of practicals.
b) Undertake micro-projects.
i. SUGGESTED SPECIAL INSTRUCTIONAL STRATEGIES (if any)
‘These are sample strategies, which the teacher can use to accelerate the attainment of the
various learning outcomes in this course:
a) Massive open online courses (MOOCs) may be used to teach various topies/sub
topics
b) ‘L’ im item No. 4 does not mean only the traditional lecture method, but different
types of teaching methods and media that are to be employed to develop the outcomes.
©) About 15-20% of the topics/sub-topies which is relatively simpler or descriptive in
nature is to be given to the students for self-directed learning and assess the
development of the COs through classroom presentations (see_impeyaen
guideline for details).
d) With respect to item No.10, teachers need to ensure 10 create opportnn
provisions for co-curricular activities.
MSBTE - Final Copy Dt. 24.09.2019 Page 6 of 7 1Wb Based Applicaton development with PHP Course Code: 22619
e) Guide student(s) in undertaking micro-projects.
1) Demonstrate students thoroughly before they start doing the practice.
2) Encourage students to refer different websites to have deeper understanding of the
subject.
h) Observe continuously and monitor the performance of students in Lab.
12. SUGGESTED MICRO-PROJECTS,
Only one micro-project is planned to be undertaken by a student that needs to be
him/her in the beginning of the semester. In the first four semesters, the micro-proje:
group-based. However, in the fifth and sixth semesters, it should be preferably be individually
undertaken to build up the skill and confidence in every student to become problem solver so
that s/he contributes to the projects of the industry. In special situations where groups have to
be formed for micro-projects, the number of students in the group should not exceed three.
The micro-project could be industry application based, internet-based, workshop-
based, laboratory-based or field-based. Each micro-project should encompass two or more
COs which are in fact, an integration of PrOs, UOs and ADOs. Each student will have to
maintain dated work diary consisting of individual contribution in the project work and give a
seminar presentation of it before submission. The total duration of the micro-project should
not be less than 16 (sixteen) student engagement hours during the course. The student ought
to submit micro-project by the end of the semester to develop the industry-oriented COs.
‘A suggestive list of micro-projects is given here. Similar micro-projects could be
added by the concerned faculty
a) Develop web application for- Sending plain text email, Sending HTML message,
Sending e-mails with attachment
b) Develop web application for Library Management system. ~ Add book , Display list of
book , Search book
©) Develop web application for Student Feedback System.
4) Develop web application for Employee Pay Management System.
(Any other micro-projects suggested by subject faculty on similar line.)
13,__ SUGGESTED LEARNING RESOURCES.
No, | Title of Book Author Publication
1 | Programming PHP | Rasmus Lerdork, | O'Reilly, USA, ISBN -078-1-449-
Kevin.T and Peter M. | 39277-2, 2013
2 | The Complete Holzner, Steven [McGraw hill, New Delhi,
Reference PHP (Third ISBN 9780070223622, 2008
Edition covers PHP) _
3 | PHP and MySQL MeGrath, Mike MoGraw Hill, New Delhi, ISBN-
- __|13:978-1259029431
7 [Advance Web Di. Rajedta Kawle | Devraj Publication , ISBN 978-93-
Technolog ft 86492-01-2
14, SORTWARE/LEARNING WEBSITES
a) _https://www.w3schools.com/php/default.asp
b) _hitps://www.guru99,com/what-is-php-first-php-program.html
©) _hitps://www.tutorialspoint.com/php/
4d) _https://tutorialehtml.com/en/php-tutorial-introduction/
©) wwwatizag.com/phpT/
1) _hitps://books.goalkicker.com/PHPBook/
c.com/watch/php-ba:
~ Final Copy Dt. 24.09.2019 Page 7 of 7Network and Information Security Course Code: 22620
ProgramName _: Computer Engineering Program Group
Program Code O}CM/LF/CW
Semester : Sixth
Course Title : Network and Information Security
Course Code + 22620
1. RATIONALE
Computer network security is an important aspect in today’s world. Now days due to various
threats designing security in organization is an important consideration. It is essential to
understand basic security principles, various threats to security and techniques to address
these threats. The student will be able to recognize potential threats to confidentiality,
integrity and availability and also able to implement various computer security policies. This
course will introduce basic cryptographic techniques, fundamentals of computer/network
security, Risks faced by computers and networks, security mechanisms, operating system
security, secure System design principles, and network security principles. Also it will ereate
awareness about IT ACT and different Cyber laws.
2. COMPETENCY
The aim of this course is to help the student to attain the following industry identified
competency through various teaching learning experiences:
© Maintain Network and Information security of an organization.
3. COURSE OUTCOMES (COs)
The theory, practical experiences and relevant soft skills associated with this course are to be
taught and implemented, so that the student demonstrates the following industry oriented
COs associated with the above mentioned competency:
a) Identify risks related to Computer security and Information hazard in various
situations.
b) Apply user identification and authentication methods,
©) Apply cryptographic algorithms and protocols to maintain Computer Security.
) Apply measures to prevent attacks on network using firewall.
©) Maintain secured networks and describe Information Security Compliance standards,
4, ‘ACHING AND EXAMINATION SCHEME
‘Teaching |
Scheme
—| Credit
Theory Practical
Lt |p |°*T?) Paper [__ESI PA Total | PA Total
|_| irs. [Max | Min | Max [Min | Max | Min| Max | Min | Max | Min | Max | Min
3{-[2]|_s | 3 | 20 | 28 | 30* | 00 [ 100 | 40 | 25@] 10 | 25 | 10 | 50 | 20
(*): Under the theory PA, Out of 30 marks, 10 marks are for micro-project assessment to
facilitate integration of COs and the remaining 20 marks is the average of 2 tests to be taken
during the semester for the assessment of the UOs required for the attainment of the COs.
Legends: L-Lecture; T - Tutorial/Teacher Guided Theory Practice; P -Practical; C ~
Credit, ESE -End Semester Examination; PA - Progressive Assessment
8. COURSE MAP (with sample COs, PrOs, UOs, ADOs and topics) &K \
This course map illustrates an overview of the flow and linkages of the topics afarious levels \>\
of outcomes (details in subsequent sections) to be attained by the student by the end of the)
24.09.2019 Page lof 8 rel
MSBTE - Final Copy DNetwork and Information Security Course Code: 22620
course, in all domains of learning in terms of the industry/employer ide
depicted at the centre of this map.
ied competency
Cee
Ries
\ conic
shat
Deiat.
iii eitpe
) a
eR. i,
Cee
Figure 1 - Course Map
6. SUGGESTED PRACTICALS/ EXERCISES,
The practicals in this section are PrOs (i.e. sub-components of the COs) to be developed and
assessed in the student for the attainment of the competency.
—= -
unit | APPrOx-
Practical Outcomes (PrOs) Hrs.
No.
Required
| a. Install and configure Antivirus software on system (any). I 2 |
b. Set up operating system Updaies.
Perform Backup and Restore of the system,
| Set up passwords to operating system and applications.
Apply security to file folder or application using access
permissions and verify.
_| Write a program to implement Caesar Cipher
Write a program to implement Vernam Cipher
Create and verify Hash Code for given message
Write a program to implement Rail fence technique
Write a program to implement Simple Columnar Transposition
technique
-
ve Jolsjaful = fol] — | 2
e
MSBTE —
1 Copy Dt. 24.09.2019 Page 2 of & olNetwork and Information Security Course Code: 22620
| ADProx.
S Practical Outcomes (PrOs) Unit | is.
0. No. :
Required
10 | Create and verify digital signature using tool (e.g. Cryptool) Mi 2
11 | Use Steganography to encode and decode the message using any | IIT 2
tool.
12. | _& Install firewall on any operating system. _|
b. Configure firewall settings on any operating system. Vv 2
13 _| Create and verify Digital Certificate using tool (e.g. Cryptool) Vv 2
14 | Trace the origin of Email using any tool(e.g. email TrackerPro) v [2
15__| Trace the path of web site using Tracert Utilit Vv 2
PGP Email Security
16 | a. Generate Public and Private Key Pair. v 2
b._Enerypt and Decrypt message using key pair.
Total | 32
Note
7. A suggestive list of PrOs is given in the above table. More such PrOs can be added 10
attain the COs and competency. All the above listed practical need to be performed
compulsorily, so that the student reaches the ‘Applying Level’ of Blooms’s ‘Cognitive
Domain Taxonomy’ as generally required by the industry.
ii. The ‘Process’ and ‘Product’ related skills associated with each PrO are to be assessed
according to a suggested sample given below:
S.No. Performance Indicators Weightage in %
1 Correctness of the flow of procedures. 40
2 Debugging ability. 20
3 Quality of input and output displayed (messaging and 10
formatting)
4 Answer to sample questions 20
3 Submission of report in time 1 |
L Total 100
The above PrOs also comprise of the following social skills/attitudes which are Affective
Domain Outcomes (ADOs) that are best developed through the laboratory/field based
experiences:
a) Work collaboratively in team
b) Follow ethical Practices.
‘The ADOs are not specific to any one PrO, but are embedded in many PrOs. Hence, the
acquisition of the ADOs takes place gradually in the student when s/he undertakes a series of
practical experiences over a period of time. Moreover, the level of achievement of the ADOs
according to Krathwohl’s ‘Affective Domain Taxonomy’ should gradually increase as planned
below:
© ‘Valuing Level’ in 1" year
© ‘Organization Level’ in 2" year.
© ‘Characterization Level’ in 3" year.
7. MAJOR EQUIPMENT/ INSTRUMENTSREQUIRED
‘The major equipment with broad specification mentioned here will us
MSBTE ~ Final Copy Dt. 24.09.2019 Page 3 of 8 olNetwork and Information Security Course Code: 22620
i Equipment Name with Broad Specifications Hi >
T | Computer system ‘All
(Any computer system with basic configuration)
[2__| Antivirus Software(any) 7 [
3 [Any compiler : 6189
4 _| Encryption Decryption tool(preferably Open source based) 10,13
5__ | Steganography Tools. (preferably Open source based) I
| 6 | E-mail tracing Tools, (preferably Open source based) 4
7__[ Web tracing Tools. (preferably Open source based) 15
8. _ UNDERPINNING THEORY COMPONENTS
‘The following topics/subtopics should be taught and assessed in order to develop UOs in
cognitive domain for achieving the COs to attain the identified competency. More UOs could
be added.
Unit Unit Outcomes (UOs) Topies and Sub-topies
(in cognitive domain)
Unit —1 Ja, Explain the importance of |I.1 Foundations of Computer Security:
Introduction | the given component of Definition and Need of computer security,
toComputer | computer security. Security Basies: Confidentiality, Integrity,
and 1b. Explain the characteristics Availability, Accountability, Non-
Information of the given type of threat, Repudiation and Re ity.
Security | 1¢, Explain the given type of | |1-2 Risk and Threat Analysis: Assets,
attacks related with Vulnerability, Threats, Risks, Counter
security. measures,
1d. Describe the features of |!-3 Threat to Security: Viruses, Phases of
Viruses, Types of Virus, Dealing with
Viruses, Worms, Trojan Horse, Intruders,
Insiders.
1.4 Type of Attacks: Active and Passive attacks,
Denial of Service, DDOS, Backdoors and
Trapdoors, Sniffing, Spoofing, Man in the
Middle, Replay, TCP/IP — Hacking,
Encryption attacks,
1.5 Operating system security: Operating
system updates : HotFix, Patch, Service
Pack.
1.6 Information, Need and Importance of
Information, information classification,
criteria for information classification,
Security, need of security, Basies
principles of information security,
given type of update of
operating system.
Je. Classify Information,
1f. Explain Principles of
Information Security,
MSBTE - Final Copy Dt. 24.09.2019 Page 4 of 8Network and Information Security
Course Code: 22620
Unit Unit Outcomes (UOs) Topics and Sub-topics
_ (in cognitive domain)
Unit- 2a. Explain techniques of the | 2.1 Identification and Authentication: User
User given type of attack on name and Password, Guessing password,
Authenticati passwords. Password attacks-Piggybacking, Shoulder
on and 2b, Explain mechanism of the | __ surfing, Dumpster diving.
‘Access given type of Biometric. | 2.2 Biometrics: Finger Prints, Hand prints,
Control 2c. Apply the relevant Retina, patterns, Voice patterns, Signature
Authentication method and Writing patterns, Keystrokes.
for the given situation 2.3 Access controls: Definition, Authentication
with an example. Mechanism, principle-Authentication,
2d. Describe features of the Authorization, Audit, Policies: DAC,
given access control MAGRBAC.
polic}
Unit— TT 3a. Encrypt/Decrypt the given | 3.1 Introduction: Plain Text, Cipher Text,
Cryptograph | text using different Cryptography, Cryptanalysis, Cryptology,
y substitution techniques. Encryption, Decryption.
3b. Convert plain text to 3.2 Substitution Techniques: Caesar’s cipher,
cipher text and vice versa Modified Caesar’s Cipher, Transposition
using the given Techniques: Simple Columnar
transposition technique. Transposition.
3c. Convert the given 3.3 Steganography : Procedure
message using 3.4 Symmetric and Asymmetric cryptography:
steganography. Introduction to Symmetric encryption, DE
3d, Explain the given (Data encryption Standard) algorithm,
technique of cryptography | symmetric Key exyptography: Digital
< Signature.
using example.
Unit-IV__|4a, Compare types of firewall (4.1 Firewall : Need of Firewall, types of
Firewall and | on the given parameter(s). firewall- Packet Filters, Stateful Packet
Intrusion _|4b. Explain function of the Filters, Application Gateways, Circui
Detection given type of firewall gateways.
System configuration. l4.2 Firewall Policies, Configuration,
4c. Compare various IDS limitations, DMZ.
techniques on the given 4,3 Intrusion Detection System
parameter(s). Vulnerability Assessment, — Misuse
4d. Describe features of the detection, Anomaly Detection, Network-
| given IDS technique. Based IDS, Host-Based IDS, Honeypots
Unit-V 3a. Explain the given '5.1 Kerberos : Working, AS, TGS, SS
Network component of Kerberos [5.2 IP_ Sceurity- Overview, Protocols- AH,
Security, authentication protocol. ESP, Modes- transport and Tunnel.
Cyber Laws |5b. Explain the given IP 5.3. Email security- SMTP, PEM, PGP.
and Security protocol with [5.4 Public key infrastructure (PKI):
Compliance | modes. Introduction, Certificates, Certificate
Standards. |Sc. Explain working of the authority, Registration Authority,
given protocol for Email X.509/PKIX certificate format,
security. [5.5 Cyber Crime: Introduction, Hacking ,
Sd, Describe the given Digital Forgery, Cyber
component of Public Key Stalking/Harassment, Cyber, hy
Infrastructur , Identity Theft and on
Se. Classify the given Cyber terrorism, Cyber Defamation. — I
crime 5.6 Cyber Laws: _Intfoduction, need,
MSBTE — Final Copy Dt. 24.09.2019 Page Sof 8 aNetwork and Information Security Course Code: 22620
Unit Unit Outcomes (UOs) Topies and Sub-topies
(in cognitive domain) _|
r ~ |5f. Explain the specified egories: Crime against Individual,
Cyber law, Government, Property.
5g, Describe compliance ‘5.7 Compliance standards: Implementing and
standards for Information Information Security Management
Security, System, ISO 27001, ISO 20000, BS
25999, PCI DSS, ITIL framework,
_|__ COBIT framework.
Note:To attain the COs and competency, above listed UOs need to be undertaken to achieve
the ‘Application Level’ of Bloom's ‘Cognitive Domain Taxonomy”
9. SUGGESTED SPECIFICATION TABLE FOR QUESTION PAPER DESIGN
Unit Unit Title ' Jeaching | Distribution of Theory Marks
No. Hours R U | A | Total
_ Level_| Level | Level | Marks
[__ | Introduction to Computer and D o | o | o | 1
Information Security | |
tl User Authentication and Access 06 04 04 02 10
Control -
II_| Cryptography 06 02 04 08 14
1v_| Firewall and Intrusion Detection D os | o6 | os | as
System :
y_| Network Security, Cyber Laws and D o os | @ | a
Compliance Standards.
a Total] 48 2 [2% | 2 | 7
Legends: R-Remember, U=Understand, A=Apply and above (Bloom’s Revised taxonomy)
Note: This specification table provides general guidelines to assist student for their learning
‘and to teachers to teach and assess students with respect to attainment of UOs, The actual
distribution of marks at different taxonomy levels (of R, U and A) in the question paper may
vary from above table.
10, | SUGGESTED STUDENT ACTIVITIES
Other than the classroom and laboratory learning, following are the suggested student-related
co-curricular activities which can be undertaken to accelerate the attainment of the various
outcomes in this course: Students should conduct following activities in group and prepare
reports of about 5 pages for each activity, also collect/record physical evidences for their
(student’s) portfolio which will be useful for their placement interviews:
a) Prepare journal of practicals.
b) Undertake micro-projects.
11, SUGGESTED SPECIAL INSTRUCTIONAL STRATEGIES (if any)
These are sample strategies, which the teacher can use to accelerate the attainment of the
various learning outcomes in this course:
a) Massive open online courses (MOOCs) may be used to teach various topies/sub
topics. Tae
b) ‘L’ in item No. 4 does not mean only the traditional lecture methostu dilleratiy
types of teaching methods and media that are to be employed to develéys the outcomes. -\
©) About 15-20% of the topics/sub-topies which is relatively simpler! 4
nature is to be given to the students for self-directed learning and assess the
Xe.
‘nal Copy Dt. 24.09.2019 Page 6 0f8 X 6Network and Information Security Course Code: 22620
development of the COs through classroom presentations (see implementation
guideline for details).
4) With respect to item No.10, teachers need to ensure to create opportunities and
provisions for co-curricular activities.
€) Guide student(s) in undertaking micro-projects.
{) Demonstrate students thoroughly before they start doing the practice.
2) Encourage students to refer different websites to have deeper understan:
subject.
h) Observe continuously and monitor the performance of students in Lab.
ig of the
12, SUGGESTED MICRO-PROJECTS
Only one micro-project is planned to be undertaken by a student that needs to be assigned to
him/her in the beginning of the semester. In the first four semesters, the micro-project is
group-based. However, in the fifth and sixth semesters, it should be preferably be individually
undertaken to build up the skill and confidence in every student to become problem solver so
that s/he contributes to the projects of the industry. In special situations where groups have to
be formed for micro-projects, the number of students in the group should not exceed three.
The micro-project could be industry application based, internet-based, workshop-
based, laboratory-based or field-based. Each micro-project should encompass two or more
COs which are in fact, an integration of PrOs, UOs and ADOs. Each student will have to
maintain dated work diary consisting of individual contribution in the project work and give a
seminar presentation of it before submission, The total duration of the micro-project should
not be less than 16 (sixteen) student engagement hours during the course. The student ought
to submit micro-project by the end of the semester to develop the industry-oriented COs.
‘A suggestive list of micro-projects is given here. Similar micro-projects could be
added by the concerned faculty:
a) Case Studies in Secure Computing: Achievements and Trends.
b) Implement Client/Server communication using cryptography tools in your laboratory,
¢) Create digital certificate for your departmental! personal communication.
4) Implement communication system using steganography. Encrypt image and message
using any cryptography technique.
e) Implement communication system using steganography using audio files. Encrypt
audiofile and message using any cryptography technique.
f) Implement Three Level Password Authentication System,
2) Any other micro-projects suggested by subject faculty on similar line
13, SUGGESTED LEARNING RESOURCES
Title of Book Author Publication
Computer Security | Dieter Golimann _| Wiley Publication, New Delhi,
ISBN : 978-0-470-74115-3
Gyptography and Atul Kahate ‘McGraw Hill Education, New Delhi
Network Security __ | ISBN: 978-1-25-902988-2
Cyber Laws And IT Harish Chander | PHI Publication,New Delhi, 2012
Protection - ISBN: 978-81-203-4570-6
Implementing ‘Alan Calder ‘Van Haren Publishing
Information Security ISBN-13: 978-9087535414
based on ISO 27001 / ISBN-10: 9087535414
ISO 27002 (Best
Pras
MSBTE — Final Copy Dt. 24.09.2019 Page 7 of 8Network and Information Security Course Code: 22620
14.
a)
b)
°)
ad)
2
)
8)
h)
i)
i
SOFTWARE/LEARNING WEBSITES
http://nptel.ac.in/eourses/106105162/
https://www.tutorialspoint.com//computer_security/computer_security_quick_guide.ht
m
hitp://learnthat.com/introduction-to-network-security/
https://freevideolectures.com/course/3027/cryptography-and-network-security
https://oew.mit.edw/courses/electrical-engineering-and-computer-science/6-858-
computer-systems-security-fall-2014/video-lectures!
hittp://stylesuxx.github.io/steganography/
|tps://smartninja-pgp.appspot.com/
hitp://www.cyberlawsindia.net/eyber-india.htm!
https:/www.upcounsel.com/cyber-law
htip://eyberlaws.nev/cyber-law/
MSBTE - Final Copy Di. 24.09.2019 Page 8 of 8Cloud Computing, Course Code: 22624
ProgramName _: Computer Engineering Program Group
Program Code CO/CMITRICW
Semester : Sixth
Course Title : Cloud Computing
Course Code 222624
1. RATIONALE
Cloud computing has evolved as a very important computing model, which enables
information, software, and other shared resources to be provisioned over the network as
services in an on-demand manner. There are many aspects of cloud computing viz. cloud
types, storage in cloud, security in cloud, cloud monitoring and management. Having specific
skills in these areas is necessary for diploma pass-outs to create and maintain cloud based
services. After learning this course student will be able to implement virtualization, create
cloud based storage, Implement security, and manage cloud services.
2. COMPETENCY
‘The aim of this course is to help the student to attain the following industry identified
competency through various teaching learning experiences:
© Maintain cloud based services.
3. COURSE OUTCOMES (COs)
‘The theory, practical experiences and relevant soft skills associated with this course are to be
taught and implemented, so that the student demonstrates the following industry oriented
COs associated with the above mentioned competency:
a) Maintain Cloud Based Application.
b) Implement virtualization in Cloud Computing.
c) Maintain Storage System in Cloud.
4) Maintain Cloud Services.
¢) Implement Security in Cloud Computing.
£) Implement cloud on different platforms.
4. TEACHING AND EXAMINATION SCHEME,
Teaching Examination Scheme
beter Theory - Practical ]
L} or |p [+P paper __ESE_ PA Total ESE PA Total
rs. [Max [Min | Max win | Max | in| Max | Min | Max | Min | Max | in
3[-[2] 8 | 3 | 70 | 28 [30* [00 | 100 | 40 as@ | 10 | 25 | 10 | so | 20
(*): Under the theory PA; Out of 30 marks, 10 marks of theory PA are for micro-project
assessment to facilitate integration of COs and the remaining 20 marks is the average of 2
tests t0 be taken during the semester for the assessment of the UOs required for the
attainment of the COs.
Legends: L-Lecture; T ~ Tutorial/Teacher Guided Theory Practice; P -Practical; C~ Credit,
ESE -End Semester Examination; PA - Progressive Assessment.
5. COURSE MAP COURSE MAP(with sample COs, PrOs, UOs, ADOs atid bpiea es
This course map illustrates an overview of the flow and linkages of the topicsat various Jevelé
of outeomes (details in subsequent sections) to be attained by the student by thé-end OF the\,
MSBTE - Final Copy Dt. 24.09.2019 Page 1 of 8Cloud Computing ‘Course Code: 22624
course, in all domains of learning in terms of the industry/employer identified competency
depicted at the center of this map.
TWO Se: plea the >
coee
Cane
10 7- Dens
‘Cou Monae
CBs.
Cccot ete
ious tninins ame
J Cnatetig S. — (iRoeanttiie
CBee.
pes
P10 4-Crae
ae Vite es
ssiccac te
Senge Stem
> CRDOAfecine
2 © Bomin Ouse
opie
Figure 1 - Course Map
6. SUGGESTED PRACTICALS/ EXERCISES,
The practicals in this section are PrOs (i.e. sub-components of the COs) to be developed and
assessed in the student for the attainment of the competency.
., | Approx.
Re Practical Outcomes (PrOs) Sat Hts.
7 Required
1__| Use Goggle Doc to make spreadsheet and notes _ i 02*
2 [Install/Configure cloud using JustCloud I 02"
3__| Use Cloud9 to demonstrate use of different language | 02*
| 4 | Create/Delete Virtual Machines using VMware (Private Cloud)
5___| Implement Storage Service on Cloud using OpenStack fet
6 | Use OpenStack for File Management
MSBTE — Final Copy Dt. 24.09.2019 Page 2 of Via” alCloud Computing Course Code: 22624
. Approx.
S. Practical Outcomes (PrOs) Unit | rs
No. No.
Required
7__| Monitor cloud using Nagios Tool Ww | 02
8 | Create and Host Simple Web Application on Microsoft wv | 02
Azure/Google cloud/Any cloud platform(Part-1)
9 _ | Create and Host Simple Web Application on Microsoft Ww] 0
Azare/Google cloud/Any cloud platform (Part-I)
10 | Work in Codenvy to show Provisioning and Sealing ofa website | IV | 02
(art-l)
TT | Work in Codenvy to show Provisioning and Sealing ofa website | IV | 02
(Part-II)
12 | Implement Identity Management and Access Management using | V | 02°
OpenStack
13_| Configure Servers using Microsoft Azureto secure it, Part-I) Vv 0
14 | Configure Servers using Microsoft Azureto secure it. (Part-ID) v |
15 | Design a small application based on ToT using Arduino or wi [02
Raspberry pi (Part-I)
16 | Design a stnall application based on ToT using Arduino or wi |
Raspberry pi (Part-II)
Total 32
Note
i. A suggestive list of PrOs is given in the above table. More such PrOs can be added to
attain the COs and competency. The practicals marked as ‘*" are compulsory, so that the
student reaches the ‘Application Level’ of Bloom's Taxonomy’ as generally required by the
industry.
ii. The ‘Process’ and ‘Product’ related skills associated with each PrO are to be assessed
according to a suggested sample given below:
S.No. Performance Indicators Weightage in %
“1__| Preparation of experimental setup 30.
2 _ | Setting and Operation 20
3__ | Observation and Recording 20
4 [Interpretation of result and conclusion 10
'5__| Answer to sample questions 10
6 _| Submission of report in time 10
Total 100
The above PrOs also comprise of the following social skills/attitudes which are Affective
Domain Outcomes (ADOs) that are best developed through the laboratory/field based
experiences:
a) Work collaboratively in team
b) Follow ethical Practices
‘The ADOs are not specific to any one PrO, but are embedded in many PrOs. Hence, the
acquisition of the ADOs takes place gradually in the student when s/he undertakes a series of
practical experiences over a period of time, Moreover, the level of achievemei
according to Krathwohl’s ‘Affective Domain Taxonomy’ should gradual
below: fy
MSBTE ~ Final Copy Dt. 24.09.2019 Page 3 of 8Cloud Computing Course Code: 22624
© ‘Valuing Level’ in 1" year
© ‘Organization Level’ in 2 year.
© ‘Characterization Level’ in 3 year,
7. MAJOR EQUIPMENT/ INSTRUMENTS REQUIRED
‘The major equipment with broad specification mentioned here will usher in uniformity in
conduct of practicals, as well as aid to procure equipment by authorities concerned.
Equipment Name with Broad Specifications a ee
‘Computer system - Hardware: Min 8GB RAM, 512 GB HDD, Gigabit
Ethernet network equipment,
Software Requirement: Apache Tomcat, Java, Python, Virtualization All
Software
|__| Academie version of any public cloud service(Google/AWS/Avure)
8. UNDERPINNING THEORY COMPONENTS
The following topics/subtopics should be taught and assessed to develop UOs in cognitive
domain for achieving the COs to attain the identified competency. More UOs could be added.
Unit “Major Unit Outcomes (UOs) Topies and Sub-topies
(in cognitive domain) =
=T | la. Explain the specified T1 Cloud Computing, Essential
Fundamen | characteristics of Cloud characteristics of cloud computing
tals of Computing, 1.2 Cloud Deployment Model: Publie
Cloud 1b, Compare the given Cloud cloud, Private cloud, Community
Computing | Deployment Models on the cloud, Hybrid cloud
given criteria, 1.3. Cloud Service Models: laa, PaaS,
1c, Explain the given service SaaS
offered by identified Cloud | 1.4 Cloud Economics and Benefits
Service Model. 1.5. Architecture of Cloud Computing
1d. Explain the given component | 1.6 Cloud Computing Infrastructure
of cloud computing 1,7, Cloud-Based Integrated Development
architecture Environment (IDE) to write, run, and
le. Write steps to use Cloud Based | debug code with a browser,
Integrated Development
Environment to develop the
given application.
Unit-IT | 2a. Explain the given feature of | 2.1 Introduction, Virtualization Reference
Virtualizat | Virtualization. Model, Characteristics of virtualized
ion 2b. Explain the characteristics of environment
the specified Virtualization | 2.2. Virtualization Types
type 23 Technology Example: VMWare,
2c. Write generic steps to build a Microsoft Hyper-V, KVM , Xen
virtual machine using 24 Advantages: Virtual Machine(VM),
VMWare on the given OS. VM Migration, VM Consolidation,
2d, Describe the given VM Management
disadvantage of Virtualization. | 2.5 Disadvantages of Vira gE
NSWTE~Fival Copy Dt 24092019 Page do 2