MCA-Structure and Syllabus
MCA-Structure and Syllabus
SEMESTER I
Instructions
Hours per Evaluation
Week
Course Total
S.No Title of the Course Credits SEE
Code Marks
CIA
L T P
Marks Marks Duration
SEMESTER II
Instructions
Hours per Evaluation
Week
Course Total
S.No Title of the Course Credits SEE
Code Marks
CIA
L T P
Marks Marks Duration
SEMESTER III
Instructions
Hours per Evaluation
Week
Course Total
S.No Title of the Course Credits SEE
Code Marks
CIA
L T P
Marks Marks Duration
SEMESTER IV
Instructions
Hours per Evaluation
Week
Course Total
S.No Title of the Course Credits SEE
Code Marks
CIA
L T P
Marks Marks Duration
Objectives:
The course is designed to meet the objectives of:
1. To make the students familiar with the course and its importance.
2. Introduction to Basics of information technology.
3. Basic knowledge of Parts of Computer System.
4. Basic knowledge of Networking, Internet and Ecommerce..
Outcomes:
Students successfully completing this module will be able to:
Unit – I
Software Engineering Principles and C++ Classes: Classes: Variable - Accessing Class
members – Operators – Functions and Classes – Reference parameters and Class Objects –
Implementation of member function – Constructors – Destructors; Data Abstraction, Classes
and ADT – Information Hiding.
Pointers and Array based Lists : Pointer Data types and Pointer variables: Declaring Pointer
Variables – Address of Operator – Dereferencing Operator - Classes, Structures and Pointer
Variables – Initializing Pointer Variables – Dynamic Variables – Operators on Pointer Variables.
Unit – II
Linked Lists : Linked List – Properties – Item Insertion and Deletion – Building a Linked List –
Linked List as an ADT – Ordered Linked Lists – Doubly Linked Lists – Linked Lists with
header and trailer nodes – Circular Linked Lists.
Unit – III
Sorting Algorithms: Selection Sort – Insertion Sort – Quick Sort – Merge Sort – Heap Sort.
Unit – IV
Trees: Binary Trees – Binary Tree Traversal – Binary Search Tree – Non recursive Binary Tree
Traversal Algorithms – AVL Trees.
Prescribed Book:
D.S.Malik , “ Data Structures using C++ ” , Cengage Learning India Edition (2008). (
Chapters 1, 3, 5, 6, 7, 8, 9, 10, 11 and 12.)
Reference Books:
1. Mark Allen Weiss , “Data structures and Algorithem Analysis in C++” , Third Edition ,
Pearson Education (2008).
2. Adam Drozdek , ”Data Structures and Algorithms in C++“ , Cengage Learning , India
Edition .
Model Paper
UNIT - I
2.a) What is Class ? How can you define classes in C++.
b) Explain how we can access class members by using Pointer Variable.
OR
c) Write a C++ Program to implement the operations on Complex numbers using classes.
d) Explain about constructors and destructors in C++.
UNIT – II
3. a) Write procedure to insert an element in an ordered list.
b) Explain Backtracking with an example.
OR
c) Write procedures to delete an element & count number of nodes in Double Linked List.
d) Explain different collision resolution techniques.
UNIT - III
4. a) Define Stack. Implement operations on Stack using arrays.
b) Write the procedure for selection sort.
OR
c) What is Priority Queue? Write the procedure for implementing the operations on
Priority Queue.
d) Write a C++ program for sorting ‘n’ elements using Merge Sort technique.
UNIT - IV
5.a) Write a procedure to find minimum & maximum element in a binary search tree.
b) Write the non-recursive algorithm for post order.
OR
c) Explain Different Graph traversal techniques.
d) With an example graph. Explain how to generate minimum cost spanning tree
MCA 102 DATABASE MANAGEMENT SYSTEMS
Instruction: 4 periods / week Credits: 5
Internal : University Exam: Total :
30 marks 70 marks 100 Marks
Objectives:
The course is designed to meet the objectives of:
1. The purpose of a database management system (DBMS)
2. The role of the database administrator
3. Data consistency, data integrity, data redundancy and data independence
4. The concept of entity relationships and data normalization
5. The concept of a client/server database, and
6. The relevant advantages of a client/server database over a non-client/server database
Outcomes:
Students successfully completing this module will be able to:
1. Design database, different operations, queries performed for a management system problems,
2. Understand and design of ER-diagram in DBMS,
3. Implementation of different normalizations for database size reduction and removal of redundancy,
and able to implement PL/SQL, SQL injection, procedures etc.
Unit–I
Databases and Database Users: Introduction, Characteristics of the Database Approach, Actors on
the Scene, Workers behind the scene, Advantages of the using the DBMS Approach.
Database System Concepts and Architecture: Data Models, Schemas and Instances, Three Schema
architecture and Data Independence, Database Languages and Interfaces, Centralized and
Client/Server Architecture for DBMS, Classification of Database Management Systems.
Disk Storage, Basic File Structures and Hashing: Introduction, Secondary Storage Devices,
Buffering of Blocks, Placing file Records on Disk, Operations on Files, Files of Unordered Records,
Files of Ordered Records, Hashing Techniques, Other Primary File Organizations, Parallelizing Disk
Access using RAID Technology.
Indexing Structures for Files: Types of Single-Level Ordered Indexes, Multilevel Indexes and
Dynamic Multilevel Indexes Using B-Trees and B+ Trees, Indexes on Multiple Keys, Other Types of
Indexes.
Data Modeling Using the ER Model: Conceptual Data models, Entity Types, Entity Sets, Attributes
and Keys, Relationship types, Relationship sets, roles and structural Constraints, Weak Entity types,
Relationship Types of Degree Higher than Two, Refining the ER Design for the COMPANY
Database.
The Enhanced Entity-Relationship Model: Sub classes, Super classes and Inheritance,
Specialization and Generalization, Constraints and Characteristics of Specialization and
Generalization Hierarchies, Modeling of Union Types using Categories, An Example University ERR
Schema, Design Choices and Formal Definitions.
Unit-II
The Relational Data Model and Relational Database Constraints: Relational Model Concepts,
Relational Model Constraints and Relational Database Schemas, Update Operations, Transactions and
Dealing with Constraint Violations.
The Relational Algebra and Relational Calculus: Unary Relational Operations: SELECT and
PROJECT, Relational Algebra Operations from set Theory, Binary Relational Operations: JOIN and
DIVISION, Additional Relational Operations, Examples, The Tuple Calculus and Domain Calculus.
SQL-99: Schema Definition, Constraints, Queries and Views: SQL Data Definitions and Data
Types, Specifying Constraints in SQL, Schema Change Statements on SQL, Basic Queries in SQL,
More Complex SQL Queries, INSERT, DELETE and UPDATE statements in SQL, Triggers and
Views.
Unit-III
Unit-IV
Concurrency Control Techniques: Two Phase Locking Techniques for Concurrency Control,
Concurrency Control Based on Timestamp Ordering, Multiversion Concurrency control techniques,
Validation concurrency control Techniques, Granularity of Data Items and multiple Granularity
Locking.
Distributed Databases and Client Server Architectures: Distributed Database Concepts, Data
Fragmentation, Replication, and allocation Techniques for Distributed Database Design, Types of
Distributed Database Systems, An Overview if 3 Tier Client Server Architecture.
Prescribed Text :
Ramez Elmasri, Shamkant B. Navathe, “Fundamentals of Database Systems”, Fifth Edition, Pearson
Education (2007)
Reference Books :
1. Peter Rob, Carlos Coronel, “Database Systems” – Design, Implementation and Management,
Eigth Edition, Thomson (2008).
2. C.J. Date, A.Kannan, S. Swamynathan, “An Introduction to Database Systems”, VII Edition
Pearson Education (2006).
Unit-I
Unit-II
OR
5.a) Discuss about Views and its Limitations?
b) What is Index? Create an index for the employees belongs to the
Accounts and Sales departments.
Unit-III
8.a) What is Lock? Discuss about Shared and Exclusive Locking Process
b) Discuss about
i. Two-Phase Locking
ii. Time-Stamping Algorithm
OR
9.a) What is Dirty-Read Problem? Explain with an Example.
b) What is serializability? Discuss with aid of an example to test the conflicts in serializability?
******
MCA 103 PROBABILITY AND STATISTICS
Instruction: 4 periods / week Credits: 4
Internal : University Exam: Total :
30 marks 70 marks 100 Marks
Objectives:
The course is designed to meet the objectives of:
1. introducing the basic notions of probability theory and develops them to the stage where one can
begin to use probabilistic ideas in statistical inference and modelling, and the study of stochastic
processes,
2. providing confidence to students in manipulating and drawing conclusions from data and provide
them with a critical framework for evaluating study designs and results,
Outcomes:
Students successfully completing this module will be able to:
1. students will add new interactive activities to fill gaps that we have identified by analysing student
log data and by gathering input from other college professors on where students typically have
difficulties
2. students will add new simulation-style activities to the course in Inference and Probability
Unit I:
UNIT II:
Inferences on the mean and the Variance of a distribution: Hypothesis Testing, significance
testing, Hypothesis and significance test on the mean, Hypothesis tests on the Variance
UNIT III:
Comparing two means and two variances: point estimation: independent samples, Comparing
variances: the F-distribution,
Comparing means: variances equal,
Analysis of Variance: One-way classification fixed effects model, comparing variances, pair wise
comparisons, randomized complete block design
UNIT IV:
Simple linear regression and correlation : model and parameter estimation, inferences about slope,
inferences about intercept, Co-efficient of determination
Multiple linear regression models: least square procedures for model fitting, a matrix approach to
least squares, interval estimation.
Prescribed book:
J Susan Milton and Jesse C. Arnold: “Introduction to Probability and Statistics”, Fourth edition,
TMH,(2007).
Reference book:
William Mendenhall, Robert J Beaver, Barbara M Beaver: Introduction to Probability and Statistics,
Twelth edition, Thomson.
Model paper
UNIT-I
3.(a) Out of 800 families with 5 children each how many would you expect you have
(i) 3 boys (ii) 5 girls
(iii) Either 2 or 3 girls Assume equal probabilities for boys and girls.
(b) The distribution function of a random variate X is given by the following function.
f(x) = 0 ; if x < -2
1/2 ; if –2 x < 0
3/4 ; if 0 x < 2
1;x 2
i. Sketch the group h of F(x)
ii. Obtain P.D.F of f(x)
iii. Compute the probabilities P(X 1); P(X 2); P(1 X 2)
UNIT-II
4. (a) Derive the 100 (1- )% confidence interval limits of the mean in Normal distribution.
OR
5. (a) How can you derive the test statistic on significance of Difference of Proportions.
(b) Random samples of 400 men and 600 women were asked whether they would like to have a
flyover near their residence. 200 men 325 women were in favour of the proposal. Test the hypothesis,
that proportions of men and women in favour of the proposal are same against that they are not, at 5%
level.
UNIT-III
(b) The following data represent the number of units of production per day turned out by 5 different
workmen using different types of machines.
A B C D
1 46 40 49 38
2 48 42 54 45
3 36 38 46 34
4 35 40 48 35
5 40 44 51 41
(i) Test whether the mean productivity is the same for the four brands of machine type.
(ii)Test whether 5 different workmen differ with respect to productivity.
UNIT-IV
*****
MCA 104 OPERATING SYSTEMS
Instruction: 4 periods / week Credits: 4
Internal : University Exam: Total :
30 marks 70 marks 100 Marks
Objectives:
The course is designed to meet the objectives of:
1. appreciating the role of an operating system
2. making aware of the issues in management of resources like processor, memory and input-output,
3. selecting appropriate productivity enhancing tools or utilities for specific needs like filters or
version control
4. obtaining some insight into the design of an operating system.
Outcomes:
Students successfully completing this module will be able to:
1. understands what is an operating system and the role it plays
2. get high level understanding of the structure of operating systems, applications, and the relationship
between them
3. gather knowledge of the services provided by operating systems
4. get exposure to some details of major OS concepts.
UNIT–I:
System Structure: Operating System Services – User Operating System Interface – System Calls –
Types of System Calls – System Programs – Operating System Design and Implementation –
Operating System Structure – Virtual Machine – Operating System Generation – System Boot.
UNIT–II:
UNIT–IV:
File System : File Concept – Access Methods – Directory Structure – File System Mounting – File
Sharing – Protection.
Implementing File Systems :File System Structure – File System Implementation – Directory
Implementation – Allocation Methods – Free Space Management – Efficiency and Performance –
Recovery – Log structured File Systems.
Secondary Storage Structure : Overview of Mass – Storage Structure – Disk Structure – Disk
Attachment – Disk Scheduling – Disk Management – Swap Space Management – RAID structure.
I/O Systems: Overview – I/O Hardware – Application I/O Interface – Kernal I/O Interface –
Transforming I/O requests to Hardware Operations – Streams – Performance.
Prescribed Book:
Abraham Silberschatz, Peter Baer Galvin, Greg Gagne. “Operating System Principles”,
Seventh Edition, Wiley.
Reference Book:
1. William Stallings, “Operating Systems – Internals and Design Principles”, Fifth Edition,
Pearson Education (2007)
UNIT – I
UNIT – II
UNIT – III
UNIT - IV
Objectives:
The course is designed to meet the objectives of:
1. helping the students to develop an understand the nature and characteristics of the organisation and
design of the modern computer systems,
2. focusing on the organisation &operation of the CPU.
Outcomes:
Students successfully completing this module will be able to:
1. understand the key concepts that are likely to be included in the design of any modern computer
system
2. understand and to apply the basic metrics by which new and existing computer systems may be
evaluated
3. understand and to evaluate the impact that languages, their compilers and underlying operating
systems have on the design of computer systems
4. understand and to evaluate the impact that peripherals, their interconnection and underlying data
operations have on the design of computer systems
5. demonstrate the techniques needed to conduct the design of a computer
6. examine different computer implementations and assess their strengths and weaknesses.
Digital Logic Circuits: Digital Computers, Logic Gates, Boolean Algebra, Map Simplification,
Combinational Circuits, Flip-Flops, Sequential Circuits.
Digital Components: Integrated Circuits, Decoders, Multiplexers, Registers, Shift Registers, Binary
Counters, Memory Unit.
Data Representation: Data Types, Complements, Fixed Point Representation, Floating Point
Representation, Other Binary Codes, error Detection Codes.
Unit-II
Register Transfer and Microoperations: Register Transfer Languages, Register Transfer, Bus and
Memory Transfer, Arithmetic Micro Operations, Logic Micro Operations, Shift Micro Operations,
Arithmetic Logic Shift Unit
Basic Computer Organization and Design: Instruction Codes, Computer Registers, Computer
Instructions, Timing and Control, Instruction Cycle, Memory Reference Instructions, Input-Output
and Interrupt.
Unit-III
Unit-IV
Prescribed Book:
M.Morris Mano, “Computer System Architecture”, 3rd Edition, Pearson Education (2008).
Reference Books:
UNIT-I
UNIT-II
2. Program for finding the area of circle, rectangle and room using function overloading.
13. Program for traversing the given linked list in reverse order.
Table Name:Product_master
Description: This table stores the information about products.
Objectives:
The course is designed to meet the objectives of:
1. the need of software engineering, its different life cycles and different phases,
2. to measure cost, efforts, time and team management etc,
3. testing and maintenance techniques of big projects and
4. different risks and its management systems
Outcomes:
Students successfully completing this module will be able to:
1. the scope and necessity of software engineering
2. the causes solutions for software crisis
3. fragment problems into small units, code reusability, efficient coding and software development
management
4. different ways of software life cycles and their phases.
Introduction to Software Engineering: The Evolving Role of Software, Software, The Changing
Nature of Software, Legacy Software: The Quality of legacy software, Software Evolution, Software
Myths.
A Generic View of Process: Software Engineering-A Layered Technology, A Process Frame Work,
The capability Maturity Model Integration (CMMI), Process Patterns, Process Assessment, Personal
and Team Process Models: Personal Software Process (PSP), Team Software Process (TSP), Process
Technology, Product and Process.
Process Models: Prescriptive Models, The Waterfall Model, Incremental Process Models: The
Incremental Model, The RAD Model, Evolutionary Process Model: Prototyping, The Spiral Model,
The Concurrent Development Model, Specialized Process Models: Component Based Development,
The formal Methods Model, The Unified Process.
An Agile View of Process: What is Agility? What is Agile Process? Agile Process Models: Extreme
Programming, Adaptive Software Development, Dynamic Systems Development Method, Scrum,
Crystal, Feature Driven Development, Agile Modeling.
Unit-II
System Engineering: Computer Based Systems, The System Engineering Hierarchy, Business
Process Engineering: An Overview, System Modeling.
Building the Analysis Model: Requirement Analysis, Analysis Modeling Approaches, Data
Modeling Concepts, Object Oriented Analysis, Scenario Based Modeling, Flow Oriented Modeling,
Class Based Modeling, Creating a Behavioral Model.
Design Engineering: Design within the contextof Software Engineering, Design Process and Design
Quality, Design Concepts, The Design Model, Pattern Based Software Design.
Unit-III
Testing Strategies: A strategic Approach to Software Testing, Strategic Issues, Test Strategies for
conventional Software, Testing Strategies for Object Oriented Software, Validation Testing, System
Testing, the Art of Debugging.
Testing Tactics: Software Testing Fundamentals, Black Box and White Box Testing, White Box
Testing, Basis Path Testing, Control Structure Testing, Black Box Testing, Object Oriented Testing
Methods, Testing Methods Applicable at the class level, InterClass Test Case Design, Testing for
Specialized Environments, Architectures and Applications, Testing Patterns.
Project Management: The Management Spectrum, The People, The Product, The Process, The
Project, The W5HH Principles.
Metrics for Process and Projects: Metrics in the Process and Project Domains, Software
Measurement¸ Metrics for Software Quality, Integrating Metrics within Software Process, Metrics for
Small Organizations, Establishing a Software Metrics Program.
Unit-IV
Estimation: Observations on Estimations, The project planning process, Software Scope and
Feasibility, Resources, Software Project Estimation, Decomposition Techniques, Empirical
Estimation Models, Estimations for Object Oriented Projects, Specialized Estimation Techniques, The
Make/Buy Decision
Quality Management: Quality Concepts, Software Quality Assurance, Software Reviews, Formal
Technical Reviews, Formal Approaches to SQA, Statistical Software Quality Assurance, Software
Reliability, The ISO 9000 Quality Standards, the SQA Plan
Formal Methods: Basic Concepts, Object Constraint Language (OCL), The Z specification language,
The Ten Commandments for Formal Methods.
Prescribed Book:
Roger S Pressman, “Software Engineering–A Practitioner’s Approach”, Sixth Edition, TMH
International.
Chapters : 1,2,3,4,5,6,8,9,13,14,21,22,23,26,28,29
Reference Books:
1. Sommerville, “Software Engineering”, Seventh Edition Pearson Education (2007)
2. S.A.Kelkar, “Software Engineering – A Concise Study”, PHI.
3. Waman S.Jawadekar, “Software Engineering”, TMH.
4. Ali Behforooz and Frederick J.Hudson, “Software Engineering Fundamentals”, Oxford
(2008).
Model Paper
Unit-I
Unit-II
4.a) What is Use Case? Discuss about the importance of Use Cases in
Software Engineering.
b) What is Class? Explain Class Responsibility Collaborator
Modeling.
(or)
5. Discuss different Levels of Data Flow Diagrams with the help of
an example.
Unit-III
Unit-IV
UNIT I
UNIT II
Text Files: Strings, Formatted Output, Files, Errors and Exception Handling, Execution and
Control Structures: if Statement, for Loop, Two Dimensional Lists, while Loop, More Loop
Patterns, Additional Iteration Control Statements, Containers and Randomness: Dictionaries,
Other Built-in Container Types, Character Encoding and Strings, Module random, Set Data
Type.
UNIT III
UNIT IV
Graphical User Interfaces: Basics of tkinter GUI Development, Event-Based tkinter Widgets,
Designing GUIs, OOP for GUI, The Web and Search: The World Wide Web, Python WWW
API, String Pattern Matching, Database Programming in Python
Prescribed Book:
Reference Book:
UNIT II
4. (a) Explain built in Exception in python with examples
(b) Write short notes on Dictionaries
OR
5. Explain String functions
UNIT III
6. (a) Differentiate Global and local namespaces
(b) Explain Multiple exception handlers
OR
7. Explain class, object and instance variables.
UNIT IV
8. Explain the concept designing GUIs
OR
9. Explain Python WWW API
MCA 203 COMPUTER NETWORKS
Instruction: 4 periods / week Credits: 4
Internal : University Exam: Total :
30 marks 70 marks 100 Marks
Objectives:
The course is designed to meet the objectives of:
Outcomes:
Students successfully completing this module will be able to:
1. learn components and rules of communications
2. configuration and design of a small network.
3. learn about research areas and future internets research fields
UNIT – I
Introduction : Uses of Computer Networks: Business Application, Home Applications, Mobile Users
– Social Issues. Network Hardware : Local Area Networks – Metropolitan Area Networks – Wide
Area Networks – Wireless Networks – Home Networks – Internetworks. Network Software: Protocol
Hierarchies – Design Issues for the Layers – Connection Oriented and Connectionless Services –
Service Primitives – The relationship of Services to Protocols. Reference Models: The OSI Reference
Model – The TCP/IP Reference Model – A Comparison of OSI and TCP/IP reference Model – A
Critique of the OSI Model and Protocols – A Critique of the TCP/IP reference model. Example
Networks: The Internet – Connection Oriented Networks:x.25, Frame Relay, and ATM – Ethernet –
Wireless LANs Network Standardization: Who’s who in the Telecommunication World – Who’s who
in the International Standards World – Who’s who in the Internet Standards World.
Physical Layer: Guided Transmission Media: Magnetic Media – Twisted Pair – Coaxial Cable –
Fiber Optics
Data Link Layer: Data Link Layer Design Issues: Services Provided to the Network Layer –
Framing – Error Control – Flow Control. Error Detection and Correction: Error correcting Codes –
Error Detecting Codes. Elementary Data Link Protocols : An unrestricted Simplex Protocol – A
simplex Stop- and – wait Protocol – A simplex Protocol for a Noisy channel. Sliding Window
Protocols: A one-bit sliding Window Protocol – A Protocol using Go Back N – A Protocol using
selective Repeat. Example Data Link Protocols: HDLC – The Data Link Layer in the Internet.
UNIT – II
The Medium Access Control Sublayer : Ethernet : Ethernet Cabling – Manchester Encoding – The
Ethernet MAC sublayer Protocol – The Binary Exponential Backoff Algorithm – Ethernet
Performance – Switched Ethernet – Fast Ethernet – Gigabit Ethernet – IEEE 802.2: Logical Link
Control – Retrospective on Ethernet. Wireless Lans: The 802.11 Protocol Stack - The 802.11 Physical
Layer - The 802.11 MAC sublayer Protocol - The 802.11 Frame Structure. Bluetooth: Bluetooth
Architecture – Bluetooth Applications – The Bluetooth Protocol Stack – The Bluetooth Radio Layer –
The Bluetooth Baseband Layer – The Bluetooth L2CAP layer – The Bluetooth Frame Structure. Data
Link Layer Switching: Bridges from 802.x to 802.y – Local Internetworking – Spanning Tree Bridges
– Remote Bridges – Repeaters, Hubs, Bridges, Switches, Routers and Gateways – Virtual LANs.
UNIT – III
The Network Layer: Network Layer Design Issues : Store – and Forward Packet Switching –
Services Provided to the Transport Layer – Implementation of Connectionless Services –
Implementation of Connection Oriented Services – Comparison Of Virtual Circuit and Datagram
subnets. Routing Algorithms : The Optimality Principle – Shortest Path Routing – Flooding –
Distance Vector Routing – Link State Routing – Hierarchical Routing – Broadcast Routing –
Multicast Routing – Routing for Mobile Hosts. Internet Working : How Networks Differ – How
Networks can be connected – Concatenated Virtual Circuits – Connectionless Internetworking –
Tunneling – Internet work Routing – Fragmentation. The Network Layer in the Internet: The IP
Protocol – IP address – Internet Control Protocols – OSPF – The Internet Gateway Routing Protocol –
BGP – The Exterior Gateway Routing Protocol.
The Transport Layer: The Transport Service: Services provided to the Upper Layers – Transport
Services Primitives – Berkeley Sockets. Elements of Transport Protocols : Addressing – Connection
Establishment – Connection Release – Flow Control and Buffering – Multiplexing – Crash Recovery.
The Internet Transport Protocols :UDP
Introduction to UDP – Remote Procedure Call – The Real Time Transport Protocol. The Internet
Transport Protocols: TCP Introduction to TCP – The TCP Service Model – the TCP Protocol – The
TCP segment header – TCP connection establishment – TCP connection release – Modeling TCP
connection management- TCP Transmission Policy – TCP congestion Control – TCP Timer
Management – Wireless TCP and UDP – Transactional TCP.
UNIT – IV:
The Application Layer: DNS : The Domain Name System : The DNS Name Space – Resource
Records – Name Servers. Electronic Mail : Architecture and Services – The User Agent – Message
Formats – Message Transfer – Final Delivery. The World Wide Web: Architecture Overview – Static
Web Documents – Dynamic Web Documents – HTTP – The Hyper Text Transfer Protocol –
Performance Enhancements – The Wireless Web. Multimedia: Introduction to Digital Audio – Audio
Compression – Streaming Audio – Internet Radio – Voice Over IP – Introduction to Video – Video
Compression – Video on Demand.
Prescribed Book:
Chapters: 1.1 to 1.6, 2.2, 3.1 to 3.4, 3.6, 4.3, 4.4, 4.6, 4.7,
5.1, 5.2.1 to 5.2.9, 5.5, 5.6.1 to 5.6.5, 6.1.1 to 6.1.3,
6.2, 6.4, 6.5, 7.1 to 7.4
Reference Books:
1.James F.Kurose, Keith W.Ross, “Computer Networking”, Third Edition, Pearson Education
UNIT – I
2. a) Compare OSI and TCP/IP reference models.
b) Describe Go Back N protocol.
OR
3. a) Explain the architecture of the Internet
b) Write about design issues of a Data Link layer.
UNIT – II
OR
5. a) Describe architecture,applications, protocol stack ofBluetooth
b) Explain Switched Ethernet
UNIT – III
UNIT – IV
*****
MCA 204 WEB TECHNOLOGIES
Instruction: 4 periods / week Credits: 5
Internal : University Exam: Total :
30 marks 70 marks 100 Marks
Objectives:
The course is designed to meet the objectives of:
Using Graphics, Animations and Multithreading for designing Simulation and Game based
applications.
Design and develop GUI applications using AWT, Swing and Event Handling.
Design and develop Web applications
Designing Enterprise based applications by encapsulating an application’s business logic.
Outcomes:
Students upon completion of this course will be able to:
UNIT I
Java Basics: Java buzzwords, Review of OOP concepts, dynamic binding, abstract classes
and methods, interfaces, Packages.
GUI Programming with JAVA: Event Handling, Applets, Swing - Introduction to Swing,
Swing vs. AWT,MVC architecture, Hierarchy for Swing components, Containers , JFrame,
JApplet, JWindow, JDialog, JPanel, A simple swing application, Overview of several swing
components, Layout management - Layout manager types – border, grid, flow, box.
UNIT II
HTML: Common Tags: List, Tables, images, forms, Frames, Cascading Style Sheets;
Java Script: Introduction to Java Scripts, Objects in Java Script, Dynamic HTML with Java
Script.
XML:Document type definition, XML Schemas, Document Object model, Presenting XML,
Using XML Processors: DOM and SAX
UNIT III
Network Programming and RMI: why networked Java – Basic Network Concepts –
looking up Internet Addresses – URLs and URIs – UDP Datagrams and Sockets – Remote
Method Invocation.
Unit –IV
Web Servers and Servlets: Tomcat web server, Introduction to Servlets: Lifecycle of a
Servlet, JSDK, The Servlet API, The javax.servlet Package, Reading Servlet parameters,
Reading Initialization parameters. The javax.servlet HTTP package, Handling Http Request
& Responses, Using Cookies-Session Tracking, Security Issues.
Introduction to JSP: The Problem with Servlet. The Anatomy of a JSP Page, JSP
Processing. JSP Application Design with MVC Setting Up and JSP Environment: Installing
the Java Software Development Kit, Tomcat Server & Testing Tomcat
Prescribed Textbooks
1. The Complete reference Java, Herbet Schildt, 7th Edition, McGraw Hill.
2. Java Programming with JDBC ;Donald Bales, O’Reilly
3. Web Technologies – a computer science perspective, Jeffrey C. Jackson, Pearson,
2007.
Reference Textbooks
1 a) Define Interface
b) Differentiate Swing and AWT
c) List out Table Tags
d) Explain DTD
e) Explain Result Sets
f) Explain Servlet API
g) Write steps for installing JDK
UNIT – I
2. a) Differentiate abstract class and interface
b) Write short notes on dynamic binding
OR
3. What are events handler? Explain five event handlers
UNIT – II
UNIT – III
OR
9. Explain the life cycle of Servlet.
MCA 205 ARTIFICIAL INTELLIGENCE
Instruction: 4 periods / week Credits: 4
Internal : University Exam: Total :
30 marks 70 marks 100 Marks
Objectives:
The course is designed to meet the objectives of:
1. To introduce the fundamental concepts of artificial intelligence;
2. To equip students with the knowledge and skills in logic programming using Prolog;
3. To explore the different paradigms in knowledge representation and reasoning
Outcomes:
Students successfully completing this module will be able to:
1. understand the history, development and various applications of artificial intelligence
2. familiarize with propositional and predicate logic and their roles in logic programming;
3. understand the programming language Prolog and write programs in declarative programming
style;
4. learn the knowledge representation and reasoning techniques in rule-based systems, case-based
systems, and model-based systems;
5. appreciate how uncertainty is being tackled in the knowledge representation and reasoning process.
Unit-I :
What is AI? : The AI Problems, The Underlying Assumption, What is AI Technique?, The level of
the Model, Criteria for Success.
Problems, Problem spaces & Search: Defining the Problem as a State Space Search, Production
Systems, Problem Characteristics, Production System Characteristics, Issues in the design of Search
Programs, Additional Problems.
Heuristic search techniques: Generate and Test, Hill Climbing, Best First Search, Problem
Reduction, Constraint Satisfaction, Means Ends Analysis.
Unit-II :
Using Predicate Logic: Representing Simple Facts in Logic, Representing Instance and Isa
Relationships, Computable Functions and Predicates, Resolution, Natural Deduction
Unit-III :
Planning : Overview, An Example Domain : The Blocks World, Components of a Planning System,
Goal Stack Planning, Nonlinear Planning Using Constraint Posting, Hierarchical Planning, Reactive
Systems, Other Planning Techniques
Unit-IV :
Expert Systems: Representing and Using Domain Knowledge, Expert System Shells, Explanation,
Knowledge Acquisition
Prescribed Book :
Reference Book :
Unit-I
2. a. When you call a technique is a A.I technique ? What is meantby A.I problem explain in detail.
b. Discuss about problem Reduction Algorithm.
( or )
3. a. Explain Depth-First search and Breadth –First search in Reasoning.
b. Explain Non linear planning using constraint posting.
Unit-II
4.a. Advantages and disadvantages of Forward chaining. When compared to backward chaining.
b. Explain Issues in knowledge Representation.
(or)
5. Write principles of resolution with example.
Unit-III
Unit-IV
8. a. i) Define and explain below terms
Morphological Analysis
Syntactic Analysis
Semantic Analysis
Discourse Analysis
Pragmatic Analysis
ii) Explain Goal Stack planning.
( or )
9. Explain about Expert systems in detailed.
* * * * *
MCA 206 PYTHON PROGRAMMING LAB
Instruction: 6 periods / week Credits: 3
Internal : University Exam: Total :
30 marks 70 marks 100 Marks
Lab Cycle
Simple Programs
1. Write a program using print Pascal triangle.
2. Write a program to find out the roots of the quadratic equations.
3. Write a program to display the Fibonacci series using generators.
4. Write a program to check the given number is palindrome or not.
5. Write a program to find the sum of digits of a given number
1 2 4 8
6. Write a Python program to calculate X= + + +
2! 4! 8! 16!
7. Write a Python program to remove the punctuations from a string.
8. Write a Python program to implement the simple calculator.
9. Write a Python program to print the lower and upper triangles of a matrix.
10.Write a Python program to merge two mails.
Functions
1. Write a recursive Python function that has a parameter representing a list of integers and returns
the maximum stored in the list.
2. Write a recursive Python function to that generates the top 20 even prime numbers in the range 1
to 1000.
3. Write a python function to calculate the multiplication of two matrices.
4. Write a Python function to reverse the given string.
5. Write a Python function that takes an integer n and a character c, returns a string and displays as
“xxxxx” ( Ex: the length of the retuned string is 5, then the output as XXXXX)
6. Write Python function that the search the given number in the list of numbers by using binary
search.
7. Write a Python function to convert the given decimal number into binary number by using
recursion.
8. Write a Python function to sort the list of records in a file.
GUI Programs
1. Construct a GUI application to generate the employee pay slip
2. Construct a GUI application to generate a Bar Graph for a excel data
3. Construct a GUI application to perform the Arithmetic operations
Read Input Values through input window
Choose choice and Operation through following windows
Choice Operations
1. Integer 1. Addition
Arithmetic 2. Subtraction
2. Real 3. Multiplicat
Arithmetic ion
4. Division
1. Write a Java Program to define a class, describe its constructor, overload the constructors and
instantiate its object
3. Develop an applet that receives an integer in one text field, and computes its factorial Value
and returns it in another text field, when the button named “Compute” is clicked
4. Develop and demonstrate a HTML document that illustrates the use of external style
sheet, ordered list, table, borders, padding, color, and the <span> tag.
a) Our form uses frames, one to hold the links bar at the top of the browser window.
b) Other is a larger frame that provides the main view.
c) The links bar should contain 5 links, which when clicked, should display the
appropriate HTML file in the larger frame.
8. Write a JavaScript code block using arrays and generate the current date in words, this
should include the day, month and year.
9. Create a web page using two image files, which switch between one another as the
mouse pointer moves over the images. Use the onMouseOver and onMouseOut event
handlers.
12. write a java program to illustrate java to database connectivity using JDBC
13. Write a program to print the Fibonacci numbers using RMI.
14. write a java servlet program to conduct online examination and to display student
mark list available in a database
15. Create a java program to create an airline reservation service and a travel agent and
the travel agent is searching for an airline using web services and database.
MCA 208 SEMINAR
Instruction: 3 periods / week Credits: 2
Internal : University Exam: Total :
50 marks --- 50 Marks
MOOCS
Credits: 2
Note: Students should mandatorily complete one MOOCS Course in this semester.
SEMESTER III
MCA 301 Data Mining and Big Data
Instruction: 4 periods / week Credits: 5
Internal : University Exam: Total :
30 marks 70 marks 100 Marks
Objectives:
The course is designed to meet the objectives of:
To identify the scope and essentiality of Data Warehousing and Mining.
To analyze data, choose relevant models and algorithms for respective applications.
To develop research interest towards advances in data mining
To provide an overview of an exciting growing field of big data analytics.
Outcomes:
Students upon completion of this course will be able to:
Understand Data Warehouse fundamentals, Data Mining Principles
Identify appropriate data mining algorithms to solve real world problems
Compare and evaluate different data mining techniques like classification, prediction,
clustering and association rule mining.
Understand the key issues in big data management and its associated applications in
intelligent business and scientific computing.
Acquire fundamental enabling techniques and scalable algorithms like Hadoop, Map
Reduce in big data analytics
Unit – I
Data mining – Introduction, Data mining on what kind of data , Data mining functionalities,
classification of Data mining systems, Major issues in Data mining
Unit – II
Mining Association rules in large databases - Association rule mining, Mining single-
Dimensional Boolean association rules from Transactional databases, Mining multi-Dimensional
Association rules from relational Databases and Data Warehouses
Unit – III
Unit – IV
Big Data: Introduction – distributed file system – Big Data and its importance, Four Vs, Drivers
for Big data, Big data analytics, Big data applications.
Hadoop: Hadoop Architecture, Hadoop Storage: HDFS, Common Hadoop Shell commands,
Anatomy of File Write and Read., Hadoop MapReduce paradigm. Writing Hadoop MapReduce
Programs
Prescribed Books :
1. Jiawei Han Micheline Kamber, “Data mining & Techniques”, Morgan Kaufmann publishers
2. Boris lublinsky, Kevin t. Smith, Alexey Yakubovich, “Professional Hadoop Solutions”, Wiley,
ISBN: 9788126551071, 2015.
3. Chris Eaton, Dirk deroos et al., “Understanding Big data ”, McGraw Hill, 2012.
4. Tom White, “HADOOP: The definitive Guide” , O Reilly 2012.
Model Paper
MCA 301: Data Mining and Big Data
Time: 3 Hrs Max. Marks: 70
Answer Question No.1 Compulsory: 7 x 2 = 14 M
Answer ONE Question from each unit: 4 x 14 = 56 M
UNIT – I
2. a) What are the different data partitioning techniques and explain the importance of data
partitioning?
b) What is ETL Process and explain the ETL Architecture
OR
3. a) Explain the major issues in data mining
b) Explain data mining as a step in the process of knowledge discovery
UNIT – II
4. a) How can we mine multilevel Association rules efficiently using concept hierarchies?
Explain.
b) Explain Apriori algorithm with example and how the efficiency of Apriori algorithm can be
improved.
OR
5. a) Write a brief on classification of data mining systems
b) Can we design a method that mines the complete set of frequent item sets without candidate
generation? If yes, explain with example.
UNIT – III
UNIT – IV
8. a) What is Bigdata? and discuss in detail why big data is more important with real time
examples
b) Discuss Bigdata in terms of three dimensions, volume, variety and velocity
OR
9. a) Discuss the design of Hadoop distributed file system and concept in detail
b) Explain in detail about map-reduce in detail and discuss partitioning and combining
MCA 302 CRYPTOGRAPHY AND NETWORK SECURITY
Instruction: 4 periods / week Credits: 5
Internal : University Exam: Total :
30 marks 70 marks 100 Marks
Objectives:
The course is designed to meet the objectives of:
1. Security breaches can be very expensive in terms of business disruption and the financial losses that
may result,
2. Increasing volumes of sensitive information are transferred across the internet or intranets
connected to it,
3. Networking that make use of internet links are becoming more popular because they are cheaper
than dedicated leased lines. This, however, involves different users sharing internet links to transport
their data,
4. Directors of business organizations are increasingly required to provide effective information
security.
Outcomes:
Students successfully completing this module will be able to:
1. Identify some of the factors driving the need for network security,
2. Identify and classify particular examples of attacks,
3. Compare and contrast symmetric and asymmetric encryption systems and their vulnerability to
attack, and explain the characteristics of hybrid systems,
4. Describe the use of hash functions and explain the characteristics of one-way and collision-free
functions,
5. Describe and distinguish between different mechanisms to assure the freshness of a message,
6. Explain the role of third-party agents in the provision of authentication services,
7. Discuss the effectiveness of passwords in access control and the influence of human behaviour,
8. Identify types of firewall implementation suitable for differing security requirements,
9. Distinguish between firewalls based on packet-filtering routers, application level gateways and
circuit level gateways.
Introduction: Security trends, the OSI security architecture, security attacks, security services,
security mechanisms, a model for network security.
Block cipher and the data encryption standard:Blockcipher principles, the strength of DES,
Differential and linear cryptanalysis, Block cipher design principles.
Public key cryptography and RSA: Principles of public key crypto systems, The RSA algorithm
UNIT-III
Web security: Web security considerations, Secure Socket Layer and transport layer security, Secure
electronic transaction.
UNIT-IV
Malicious Software: Viruses and related threads, virus counter measures, distributed denial of
service attacks.
Firewalls: Firewall Design principles, trusted systems, common criteria for information technology,
security evaluation.
Prescribed Book:
Reference Books:
3. Jon Erickson, “Hacking – The Art of Exploitation”, SPD, NOSTARCH Press (2006).
Section-A
1.a) Abbreviate VIRUS.
b) What is meant by interception?
c) What are the various places where the data can get hacked?
d) What is the difference between authentication and
authorization?
e) Explain the role played by the certificate management authority
in providing security for the data.
f) SEPP architecture.
g) What are the different elements involved in cryptography?
h) Digital signatures.
Section-B
Unit- I
Unit- II
(or)
5. Discuss different authentication protocols.
Unit-III
Unit-IV
Objectives:
The course is designed to meet the objectives of:
1. The student will learn about the cloud environment, building software systems and
components that scale to millions of users in modern internet
2. cloud concepts capabilities across the various cloud service models including
Iaas,Paas,Saas,
3. developing cloud based software applications on top of cloud platforms.
Outcomes:
Students successfully completing this module will be able to:
1. Understanding the key dimensions of the challenge of Cloud Computing
2. Assessment of the economics , financial, and technological implications for selecting cloud
computing for own organization
Unit – I
Cloud Computing Basics: Cloud Computing Overview, applications, Intranets and the
Cloud, FirstMovers in the Cloud.
Your Organiztion and Cloud Computing : When you can use Cloud Computing ,Benefits
Limitations.
Cloud Computing with Titans : Google, EMC, NetApp, Microsoft, Amazon,
Salesforce.com, IBM and partnerships.
Unit –II
The Business Case for Going to the Cloud - Cloud Computing Services, How those
Applications Help your Business,Deleting your Datacenter, Thomson Reuters.
Hardware and Infrastructure: Clients, Security- Data Leakage, Offloading work, Logging,
Forensics, Compliance VPNs, Key management; Network; Services-identify, integration,
mapping, payment, search.
Accessing the Cloud: Platforms web applications, Web APIs, Web Browsers.
Unit- III
Unit-IV
Prescribed Book:
Anthony T. Velte, Toby J.Velte , Robert Elsenpeter, “Cloud Computing A Practical Approach”, Mc
Graw-Hill.
REFERENCES:
1.
a) Define cloud computing?
b) What are the major goals of OSGA
c) Write about Microsoft windows Azure
d) Explain fault tolerance
e) Explain about service design
f) What is Deming Cycle
g) Write any four technical benefits of cloud computing
UNIT – I
UNIT – II
5. Explain different issues to to concern while establishing the Cloud Computing Environment
UNIT - III
UNIT – IV
8 a) Explain about Amazon E2 Services
b) Discuss about benefits of IaaS and SaaS.
OR
9. Explain about Virtualization and different kinds of Virtualization.
MCA 304 MACHINE LEARNING
Instruction: 4 periods / week Credits: 4
Internal : University Exam: Total :
30 marks 70 marks 100 Marks
Objectives:
The course is designed to meet the objectives of:
1. To introduce to the students the basic concepts and fundamentals of machine learning
2. To develop skills of implementing machine learning techniques
3. To familiarize the students with latest technologies
4. To implement machine learning solutions to classification, regression and clustering
Learning Outcomes
UNIT - I
Introduction - Well-posed learning problems, designing a learning system, Perspectives and
issues in machine learning
Concept learning and the General to Specific Ordering – Introduction, A concept learning
task, Concept learning as search, Find-S: finding a maximally specific hypothesis, Version
spaces and the Candidate-Elimination algorithm, Remarks on version spaces and Candidate-
Elimination, Inductive Bias
UNIT - II
Decision Tree learning – Introduction, Decision tree representation, Appropriate problems
for decision tree learning, The basic decision tree learning algorithm, Hypothesis space
search in decision tree learning, Inductive bias in decision tree learning, Issues in decision
tree learning
Evaluation Hypotheses – Motivation, Estimation hypothesis accuracy, Basics of sampling
theory, A general approach for deriving confidence intervals, Difference in error of two
hypotheses, Comparing learning algorithms
Bayesian learning – Introduction, Bayes theorem, Bayes theorem and concept learning,
Maximum likelihood and least squared error hypotheses, Maximum likelihood hypotheses for
predicting probabilities, Minimum description length principle, Bayes optimal classifier,
Gibbs algorithm, Naïve Bayes classifier, An example learning to classify text, Bayesian
belief networks The EM algorithm
UNIT - III
Unit- IV
Genetic Algorithms – Motivation, Genetic Algorithms, An illustrative Example, Hypothesis
SpaceSearch, Genetic Programming, Models of Evolution and Learning, Parallelizing
Genetic Algorithms
Prescribed Textbook:
Machine Learning – Tom M. Mitchell, - MGH
Reference Book:
1. Introduction to Machine Learning,- Ethem Alpaydin, - PHI
Unit-I
2 a. What is Machine Learning? Explain different perspective and issues in machine learning.
b. Describe the Find-s algorithm. Explain how to find a maximally specific hypothesis.
OR
3 a. List and explain the steps to design a learning systems in detail.
b. Illustrate the candidate elimination algorithm with suitable example.
UNIT-II
4 a. Describe the Inductive Bias in decision tree learning.
b. Write about handling training examples with missing attribute values.
OR
5 a. Explain about estimating hypothesis accuracy.
b. Write a note on practical considerations in comparing learning algorithms
UNIT - III
6 a. Write Bayes theorem. What is the relationship between Bayes theorem and the problem
of concept learning?
b. Explain Maximum Likelihood Hypothesis for predicting probabilities.
OR
7 a. Explain Naïve Bayes Classifier with an Example.
b. Explain the EM Algorithm in detail.
UNIT-IV
8 a. Define the following terms
i) Error of a Hypothesis. ii) Optimal Mistake Bounds iii) Weighted-Majority Algorithm
b. Explain about sample complexity for finite hypothesis spaces
OR
9.a. Explain the K – nearest neighbour algorithm for approximating a discrete – valued
function with pseudo code
b. Write about locally weighted regression.
MCA 305.1 MOBILE COMPUTING WITH ANDROID
Instruction: 4 periods / week Credits: 4
Internal : University Exam: Total :
30 marks 70 marks 100 Marks
Objectives:
The course is designed to meet the objectives of:
Outcomes:
Students successfully completing this module will be able to:
Unit – II
Unit – III
User preferences, persisting data to files, creating and using databases, sharing data in
android, using a content provider, creating your own content provider, SMS messaging, e-
mails and networking.
Unit – IV
Creating own services, communicating between a service and an activity, binding activities to
services, publishing, deploying APF files and eclipse.
Prescribe Book
Beginning Android 4 Application Development, Wei-MengLee, Wiley
Reference Books
Professional Android 4 Application Development, Reto Meier, Wiley India, (Wrox).
Model Paper
Unit – I
2. a. Explain features of android?
b. What are the tools for android application development? Explain them.
(OR)
3. a. What are the languages used to develop android applications?
b. Discuss about passing data to an activity.
Unit –II
4. a. Describe linear, table and frame layouts.
b. Explain different orientations?
(OR)
5. Explain the working of radio button and checkbox?
Unit – III
6. Create a DBA helper class. Explain it with an example.
(OR)
7. a. Discuss about projections, filtering and sorting in content provider?
b. Explain how to insert and delete records into and from a content provider.
Unit –IV
8. Explain how to create a service in the background?
(OR)
9. a. Write about the feature of eclipse.
b. How to publish an android application.
MCA 305.2 OPEN SOURCE TECHNOLOGIES
Instruction: 4 periods / week Credits: 4
Internal : University Exam: Total :
30 marks 70 marks 100 Marks
Objectives:
The course is designed to meet the objectives of:
Outcomes:
1. Students upon completion of this unit will be able to:
2. Understand essential of PHP
3. Perform basic operations in PHP using flow controls, strings and arrays.
4. Accessing data from web page using PHP
5. Handle PHP browser.
UNIT – I
Essential PHP
Operators and Flow Control
Strings and Arrays.
UNIT – II
Reading Data in Web Pages
PHP Browser-HANDLING Power.
UNIT – III
Object Oriented Programming
Advanced Object Oriented Programming
File Handling.
UNIT – IV
Working with Databases
Sessions, Cookies, and FTP
Ajax
UNIT – V
Advanced Ajax
Drawing Images on the Server
XML and RSS.
Prescribed Book
1. Steven Holzner, “PHP: The Complete Reference”, TATA McGraw Hill, 2015.
Reference Books
1. W. Jason Gilmore,“Beginning PHP and MySQL: From Novice to Professional”, Apress.
2. Steve Suehring, Tim Converse, Joyce Park,“PHP 6 and MySQL 6 Bible”, Wiley Publishing, Inc.
Model Paper
UNIT – II
4. a. Differentiate Text Field with Text Area. Write a program to justify them.
b. Explain Check boxes and radio buttons handling
(OR)
5. Describe data validation and explain client side data validation.
UNIT - III
(OR)
7. Define Interface and explain how to create an interface.
UNIT – IV
Objectives:
The course is designed to meet the objectives of:
Unit – II
Symmetric Cryptography, working with the OpenSSL command line, cryptographic
primitives. Public Key Cryptography, asymmetric cryptography, public and private keys and
financial markets and trading.
Learning Outcomes:
Students upon completion of this unit will be able to:
Work with openSSL command line environment
Apply cryptography systems
Unit – III
Introducing Bitcoin, Bitcoin, digital keys and addresses, transactions, blockchain, mining.
Alternative Coins. Limitations of Bitcoin
Learning Outcomes:
Students upon completion of this unit will be able to:
Understand how blockchain system Bitcoin works
Unit – IV
Bitcoin Network and payments, The Bitcoin network, wallets, Bitcoin payments, innovation
in Bitcoin, Bitcoin Clients and APIs.
Learning Outcomes:
Students upon completion of this unit will be able to:
Perform payment operations with Bitcoin Network
Prescribe Book
Mastering Blockchain 2 nd Edition, Imran Bashir, PACKT Publication
Reference Books
Arvind Narayanan, Joseph Bonneau, Edward Felten, Andrew Miller, and Steven Goldfeder.
Bitcoin and cryptocurrency technologies: a comprehensive introduction. Princeton University
Press, 2016.
Model Paper
UNIT-I
2.a. Explain the types of Blockchain?
b. Describe smart contracts?
OR
3. Explain methods of decentralization.
UNIT-II
UNIT-III
6. a. Explain various interactive picture construction techniques.
b. Describe Bitcoin. Explain how Bitcoin works?
OR
7. Explain the limitation of Blockchain?
UNIT-IV
8. How to pay with Bitcoin and Bitcoin cash?
OR
9. a. Describe wallets.
b. Describe Bitcoin mining.
MCA 306 Data Mining and Big Data LAB
Instruction: 6 periods / week Credits: 3
Internal : University Exam: Total :
30 marks 70 marks 100 Marks
(Using Python, Java, WEKA or any open source data mining tool)
CYCLE – 2 Hadoop
1. Implement the following Data structures in Java a)Linked Lists b) Stacks c) Queues
d) Set e) Map
3. Hadoop commands
4. Run a basic Word Count Map Reduce program to understand Map Reduce Paradigm.
1. Write a Java program to perform encryption and decryption using the following
algorithms:
a) Ceaser Cipher
b) Substitution Cipher
c) Hill Cipher
2. Write a Java program to implement the DES algorithm logic.
3. Write a Java program to implement RSA Algorithm.
4. Write a C/JAVA program to implement the Blowfish algorithm logic.
5. Write a C/JAVA program to implement the Rijndael algorithm logic.
6. Using Java Cryptography, encrypt the text “Hello world” using Blowfish. Create your own
key using Java key tool.
7. Calculate the message digest of a text using the SHA-1 algorithm in JAVA.
8. Write a program to implement digital signature.
9. Compute common secret key between client and server using Diffie-Hellman key
exchange technique. Perform encryption and decryption of message using the shared secret
key (Use simple XOR operation to encrypt and decrypt the message).
10. Implement DSS algorithm for signing and verification of messages between two parties
(obtain H (M) using simple XOR method of hash computation on M).
MCA 308 Technical Report Writing
MOOCS
Credits: 2
Note: Students should mandatorily complete one MOOCS Course in this semester.
SEMESTER IV
Master of Computer Applications (MCA)
SEMESTER IV
Instruction
s Hours Evaluation
per Week Total
Course Title of the
S.No Credits SEE Mark
Code Course CIA s
L T P Mark Mark Duratio
s s n