5th Sem
5th Sem
5th Sem
INSTRUCTIONSTOPAPERSETTERS:
1. Question No. 1 should be compulsory and cover the entire syllabus. There should be10
questions of short answer type of 2.5 marks each, having at least 2 questions from each
unit.
2. Apart from Question No. 1, rest of the paper shall consist of four units as per the
syllabus. Every unit should have two questions to evaluate analytical/technical skills of
candidate. However, student may be asked to attempt only 1 question from each unit.
Each Question should be of12.5 marks, including its subparts, if any.
3. Examiners are requested to go through the Course Outcomes (CO) of this course and
prepare the question paper accordingly, using Bloom’s Taxonomy (BT), in such a way
that every question be mapped to some or other CO and all the questions, put together,
must be able to achieve the mapping to all the CO(s), in balanced way.
LEARNING OBJECTIVES:
In this course, the learners will be able to develop expertise related to the following:-
Working and functionalities of operating system
Understand the concept of process scheduling, ,memory management, deadlock and file system
Understand basic commands of Linux and shell scripts.
PRE-REQUISITES:
Basic understanding of hardware and software of computer organization.
*BT
CO# Detailed Statement of the CO MappingtoPO #
Level
Understand the basic concept of Operating System with
CO1 BTL2 PO1, PO4
the help of Unix and Linux Architecture.
Understand the concept of Processes, Process Scheduling,
CO2 Process Synchronization and applying process commands BTL3 PO1, PO2,PO4,PO5
in Linux environment.
Understand the concept of memory management and
CO3 BTL2 PO1, PO2,PO4,PO5
deadlock.
Understand the concept of file Systems, Types and
CO4 BTL3 PO1, PO2,PO4
Access Methods by using Linux commands.
UNIT–I
No. of Hours: 12 Chapter/Book Reference: TB1 [Chapter 1]; TB2 [Chapters 1, 2, 3, 4, 5]
Introduction: What is an Operating System, Functions of Operating System, Simple Batch Systems;
Multi programmed Batch systems, Time-Sharing Systems, Personal-computer systems, Parallel
systems, Distributed Systems, Real-Time Systems.
Introduction to Linux: Architecture of Linux OS, Basic directory structure of Linux, Basic
commands of Linux:-man,info,help,whatis,apropos, basic directory navigation commands like
Bachelor of Computer Applications
cat,mkdir,rmdir ,cd, mv, cp, rm, ,file, pwd ,date,cal,echo,bc,ls,who,whoami, hostname, uname,
tty,aliase
Vi Editor: vi basics, Three modes of vi Editor, how to write, save, execute a shell script in vi editor
UNIT–II
No. of Hours: 12 Chapter/Book Reference: TB1 [Chapters 3, 5, 6]; TB2 [Chapter 9]
Information Management: Introduction, File Concept, Access methods, Directory and Disk
structure, File Protection
Linux File Security: Permission types, Examining permissions, changing permissions (symbolic
method numeric method)
TEXT BOOKS:
[TB1] Silbersachatz and Galvin, “Operating System Concepts”, John Wiley & Sons, 10 th
Ed. 2018
[TB2] Sumitabha Das, “Unix Concepts and Application”, TMH
REFERENCE BOOKS:
REFERENCES: [R1] Madnick E., Donovan J., “Operating Systems”, Tata McGraw Hill,
2011
REFERENCES: [R2] [R2] Tannenbaum, “Operating Systems”, PHI, 4th Edition, 2015
REFERENCES: [R3] Sivaselvan, Gopalan, “A Beginner’s Guide to UNIX”, PHI Learning
Bachelor of Computer Applications
Course Code: BCA 303 L T C
Course Name: Computer Graphics 3 1 4
LEARNING OBJECTIVES:
In this course, the learners will be able to develop expertise related to the following:
1. Concept of Computer graphics, types of display devices and their techniques.
2. Methods of drawing of graphic objects on the display devices.
3. Concepts of viewport, mapping of real world objects to display device, clipping
4. Knowledge of projection concepts and their types
PRE-REQUISITES:
1. Programming in C/C++
UNIT – I
No. of Hours: 11 Chapter/Book Reference: TB1, TB2
Clipping
Cohen- Sutherland Algorithm, Cyrus-Beck Algorithm
Geometrical Transformations
2D Transformations, Homogeneous Coordinates and Matrix Representation of 2D Transformations,
Composition of 2D Transformations, Window-to-Viewport Transformation, Introduction of Matrix
Representation of 3D Transformations of translation, scaling and rotation (without derivation).
UNIT – III
No. of Hours: 11 Chapter/Book Reference: TB1, TB2
Representing Curves
Introduction to Polygon Meshes and its types, Parametric Cubic Curves: parametric and geometric
continuity, Hermite, Bezier & B-Spline.
Surfaces
Surface rendering- Basic Illumination, Effect of ambient lighting and distances, Shading models-
Gourard Shading, phong model.
UNIT – IV
No. of Hours: 11 Chapter/Book Reference: TB1, TB2
TEXT BOOKS:
TB1. Foley, Van Dam, Feiner, Hughes, Computer Graphics Principles & Practice, 2000, Pearson
TB2. Chennakesava R. Alavla “Computer Graphics”, PHI Learning Pvt. Limited
REFERENCES BOOKS:
RB1. D. Hearn & Baker: Computer Graphics with OpenGL, Pearson Education, Third Edition,
2009.
RB2. Foley, J.D. & Van Dam, A: Fundamentals of Interactive Computer Graphics.
RB3. Rogers & Adams, “Mathematical Elements for Computer Graphics”, McGraw Hill, 1989.
Bachelor of Computer Applications
Course Code: BCA 305 L T C
Course Name: Cloud Computing 3 1 4
LEARNING OBJECTIVES:
In this course, the learners will be able to develop expertise related to the following:
1. Understand current cloud computing technologies, including technologies for different cloud
services.
2. Analyze the components of cloud computing
3. Perform Large data processing in the cloud
PRE-REQUISITES:
1. Basics of Computer Network
2. Knowledge of Operating System and Databases.
UNIT – I
No. of Hours: 11 Chapter/Book Reference: TB1 [Chapters - 1, 10], TB2 [Chapters - 1, 2]
Principles of Parallel and Distributed Computing: Parallel vs. distributed computing - Elements of
parallel computing - Hardware architectures for parallel processing, Approaches to parallel
programming - Laws of caution.
UNIT – IV
No. of Hours: 11 Chapter/Book Reference: TB1 [Chapter - 3], TB2 [Chapter - 8]
TEXT BOOKS:
TB1. Rajkumar Buyya, Christian Vecchiola and S. Thamarai Selvi, “Mastering Cloud Computing” -
Foundations and Applications Programming, MK publications, 2013.
TB2. Gautam Shroff, “Enterprise Cloud Computing: Technology, Architecture, Applications” by
Cambridge University Press, 2010.
REFERENCE BOOKS:
RB1. Michael J.Kavis, “Architecting the Cloud: Design Decisions for Cloud Computing Service
Models (SaaS, PaaS, and IaaS)”, John Wiley & Sons Inc., Jan 2014.
Bachelor of Computer Applications
Course Code: BCA 307 L T/P C
Course Name: Minor Project 0 8 4
PROJECT REPORT
All the students are required to submit a report based on the project work done by them
during the sixth semester.
SYNOPSIS (SUMMARY/ABSTRACT) :
All students must submit a summary/abstract separately with the project report. Summary,
preferably, should be of about 3-4 pages. The content should be as brief as is sufficient enough to
explain the objective and implementation of the project that the candidate is going to take up. The
write up must adhere to the guidelines and should include the following:
TOPIC OF THE PROJECT- This should be explicitly mentioned at the beginning of the
Synopsis. Since the topic itself gives a peep into the project to be taken up, candidate is advised to
be prudent on naming the project. This being the overall impression on the future work, the topic
should corroborate the work.
OBJECTIVE AND SCOPE: This should give a clear picture of the project. Objective should be
clearly specified. What the project ends up to and in what way this is going to help the end user
has to be mentioned.
RESOURCES AND LIMITATIONS: The requirement of the resources for designing and
developing the proposed system must be given. The resources might be in form of the
hardware/software or the data from the industry. The limitation of the proposed system in respect
of a larger and comprehensive system must be given.
CONCLUSION: The write-up must end with the concluding remarks- briefly describing
innovation in the approach for implementing the Project, main achievements and also any other
important feature that makes the system stand out from the rest.
Bachelor of Computer Applications
The following suggested guidelines must be followed in preparing the Minor Project Report:
Good quality white A4 size paper should be used for typing and duplication. Care should be
taken to avoid smudging while duplicating the copies.
Normal Body Text: Font Size: 12, Times New Roman, Double Spacing, Justified. 6 point
above and below para spacing
Paragraph Heading Font Size: 14, Times New Roman, Underlined, Left Aligned. 12 point
above & below spacing.
Chapter Heading Font Size: 20, Times New Roman, Centre Aligned, 30 point above and below
spacing. Coding Font size : 10, Courier New, Normal
Submission of Project Report to the University : The student will submit his/her project report in
the prescribed format. The Project Report should include:
4. ACKNOWLEDGEMENTS
In the “Acknowledgements” page, the writer recognizes his indebtedness for guidance and
assistance of the thesis adviser and other members of the faculty. Courtesy demands that he also
recognize specific contributions by other persons or institutions such as libraries and research
foundations. Acknowledgements should be expressed simply, tastefully, and tactfully.
Bachelor of Computer Applications
Course Code: BCA 311 L T C
Course Name: Machine Learning with Python 4 1 5
LEARNING OBJECTIVES:
In this course, the learners will be able to develop expertise related to the following:
1. To make student able to learn mathematical concepts, and algorithms used in machine learning
techniques for solving real world problems and developing new applications based on machine
learning.
2. To introduce students to the state-of-the-art concepts and techniques of Machine Learning using
Python.
PRE-REQUISITES:
1. Basics of Python Programming
COURSE OUTCOMES(COs):
After completion of this course, the learners will be able to:-
CO# Detailed Statement of the CO *BT Mapping to
Level PO#
CO1 Explain machine learning concepts on real world BTL2 PO1, PO2,
applications and problems. PO8
CO2 Analyze and Implement Regression techniques. BTL2, PO1, PO4,
BTL3 PO5, PO7
CO3 Solve and design solution of Classification BTL3, PO2, PO3,
problem BTL6 PO4,PO8
CO4 Understand and implement Unsupervised learning BTL2, PO4, PO5,
algorithms BTL3 PO6, PO8
CO5 Interpret various machine learning algorithms in a BTL3 PO2, PO6,
range of real world applications. PO7
UNIT–I
No. of Hours: 11 Chapter / Book Reference: TB1 [Chapters - 1, 3, 4, 8, 9], TB2 [Chapters -
1, 4]
Introduction to Machine Learning, Why Machine learning, Types of Machine Learning Problems,
Applications of Machine Learning. Supervised Machine Learning- Regression and Classification.
Binary Classifier, Multiclass Classification, Multilabel Classification. Performance Measures-
Confusion Matrix, Accuracy, Precision & recall, ROC Curve. Advanced Python- NumPy, Pandas.
Bachelor of Computer Applications
Python Machine Learning Library Scikit-Learn, Linear Regression with one Variable, Linear
Regression with Multiple Variables, Logistic Regression.
UNIT-II
No. of Hours: 11 Chapter / Book Reference: TB1 [Chapters - 5, 6, 7], TB2 [Chapter - 6]
Supervised learning Algorithms: Decision Trees, Tree pruning, Rule-base Classification, Naïve
Bayes, Bayesian Network. Support Vector Machines, k-Nearest Neighbor, Ensemble Learning and
Random Forest algorithm.
UNIT - III
No. of Hours: 11 Chapter / Book Reference: TB1 [Chapter - 10], TB3 [Chapters - 2, 6]
TEXT BOOKS:
TB1. GeronAurelien, “Hands-On Machine Learning with Scikit-Learn & TensorFlow”, O’REILLY,
First Edition, 2017.
TB2. U Dinesh Kumar and Manaranjan Pradhan, “Machine Learning using Python", Wiley, 2019.
TB3. Fausett Laurence, “Fundamentals of Neural Networks”, Pearson, Ninth Edition, 2012.
REFERENCE BOOKS:
RB1. Tom Mitchell, “Machine Learning”, First Edition, McGraw- Hill, 1997.
RB2. Budd T A, "Exploring Python", McGraw-Hill Education, 1st Edition, 2011.
RB3. Jake VanderPlas,“Python Data Science Handbook”, O’Reilly,1st Edition,2017.
List of Practical
LEARNING OBJECTIVES:
In this course, the learners will be able to develop expertise related to the following:
1. Students will be able to learn the techniques needed for providing protection and security to our
data and information resources over internet.
2. To understand and learn web application and its Architecture.
3. Students will be able to develop awareness regarding Cyber laws and crimes.
4. Students will be able to understand the internet and web application security issues.
5. Students will be able to learn and understand wireless network security issues.
6. To learn and understand the concept of web services, ajax and other technology which are
helpful.
PRE-REQUISITES:
1. Computer Network
2. C/C++/HTML (Programming Knowledge of C/C++/HTML/JS)
COURSE OUTCOMES(COs):
After completion of this course, the learners will be able to:-
UNIT–I
Bachelor of Computer Applications
No. of Hours: 12 Chapter/Book Reference: TB1 [Chapter - 1], TB2 [Chapters - 1, 3]
Components of Internet, Weak points of Internet, HTTP vs HTTPS, Overview of web authentication
technologies, Web application architecture, Recent attack trends, Types of Web Security, Web
infrastructure security/Web application firewalls, managing configurations for web apps, Techniques
of Web Hacking, Methods of Attacking users, Importance of Web Application Security, Web
Application Security vs Network Security. Social Media security - What is Online Social Networks,
data collection from social networks, challenges, opportunities, and pitfalls in online social networks,
APIs Collecting data from Online social media. Trust, credibility, and reputations in social systems.
UNIT–II
No. of Hours: 11 Chapter/Book Reference: TB1 [Chapters - 4, 6], TB2 [Chapters - 8, 11]
Internet and Web Application Security: Email security (PGP and SMIME), Web Security: Web
authentication, Injection Flaws, Programming Bugs and Malicious code, XSS and SQL Injection,
Memory corruption exploits, Web Browser Security, E-Commerce Security
UNIT–III
No. of Hours: 11 Chapter/Book Reference: TB1 [Chapter - 5], TB2 [Chapters - 1, 10, 11]
Wireless Network Security: Components, Security issues, Securing a Wireless Network, Mobile
Security Management: Disaster Recovery, Ethical Hacking, Penetration Testing, Computer
Forensics, Cyber laws and crime, Security Audit and Investigation, Cyber Security Solutions
UNIT–IV
No. of Hours: 10 Chapter/Book Reference: TB1 [Chapter - 6], TB2[Chapters - 5, 10, 11]
Web services overview, Honeytoken, XML security, AJAX attack trends and common attacks,
REST security, Content Security Policy Serialization security, Clickjacking, DNS rebinding,
HTML5 security, Logging collection and analysis for web apps, Security testing, IPv6 impact on
web security
TEXT BOOKS:
TB1. Joel Scam bray, Vincent Liu, Caleb Sima, “Hacking Exposed Web Applications, 3rd
Edition”, McGraw-Hill, October 2010
TB2. Baloch, R., Ethical Hacking and Penetration Testing Guide, CRC Press, 2015.
REFERENCE BOOKS:
RB1. Dafydd Stuttard, and Marcus Pinto, The Web Application Hacker's Handbook: Finding and
Exploiting Security Flaws, 2nd Edition, John Wiley & Sons, 2011.
RB2. Council, Ec. , Computer Forensics: Investigating Network Intrusions and Cybercrime,
Cengage Learning, Second Edition, 2010.
RB3. John W. Ritting house, William M. Hancock, “Cyber Security Operations
Handbook”, Elsevier Pub
RB4. Deborah G Johnson, “Computer Ethics”, 4th Edition, Pearson Education Publication.
RB5. Earnest A. Kallman, J.P Grillo, “Ethical Decision making and IT: An Introduction with
Cases”, McGraw Hill Publication.
Bachelor of Computer Applications
List of Practicals
2. Analysis of the security and privacy features and issues in CO1, CO2
Ecommerce & social media websites i.e., Facebook, Twitter and
Google+
9. Implement Reconnaissance with the help of Google and Whois CO5, CO6
10. Implement Clickjacking, DNS rebinding & Ajax Attack CO5, CO6
Note:
1. In total 10 practicals to be implemented. 2 additional practical may be given by the
course instructor.
2. This is a suggestive list of programs. However, the instructor may add programs as
per the requirement of the course.
Bachelor of Computer Applications
Course Code: BCA 315 L T C
Course Name: Web Development with Java & JSP 4 1 5
LEARNING OBJECTIVES:
In this course, the learners will be able to develop expertise related to the following:-
1. Learn Web development using Java.
2. Understand the basics of J2EE and Web development.
3. Understand and implement Servlet
4. Creating and implementing JDBC application.
5. Implement JSP and JSF concepts.
6. Understand the fundamentals of Hibernate, Struts and springs.
PRE-REQUISITES:
1. Programming Knowledge of Java
2. HTML
Introduction to HTML, CSS and Java Script: Content, layout, and styling of web page
J2EE and Web Development: Java Platform, J2EE Architecture Types, Types of Servers in J2EE
Application, HTTP Protocols and API, Web Application Structure, Web Containers and Web
Architecture Models.
Swings: Introduction and comparison with AWT controls.
UNIT – II
No. of Hours: 11 Chapter/Book Reference: TB1 [Chapter - 37], TB2 [Chapters - 34, 41, 42]
Introduction to Java EE Web Component: Overview of Servlet, Servlet Life Cycle, Types of
Servlet, HTTP Methods Structure and Deployment descriptor Servlet Context and Servlet Config
interface, State Management: client and server side,
JDBC Programming: JDBC Architecture, Types of JDBC Drivers, Introduction to major JDBC
Classes and Interface, Creating simple JDBC Application, Database operations using JDBC, Types
of Statement (Statement Interface, Prepared Statement, Callable Statement), Exploring Result Set
Operations.
UNIT – III
No. of Hours: 11 Chapter/Book Reference: TB2 [Chapters - 43, 44]
Java Server Pages: Introduction to JSP, Comparison with Servlet, JSP Architecture, JSP Life Cycle,
JSP Directives, JSP Action, JSP Standard Tag Libraries, JSP Session Management.
Develop Web Applications with JSF: JavaServer Faces (JSF) framework, architecture of JSF web
applications, development view of a JSF application.
UNIT – IV
No. of Hours: 11 Chapter/Book Reference: TB1 [Chapters - 22, 37, 39], TB2[ 33, 36]
Java Beans, Java Web Frameworks: Spring MVC: Java Beans, Spring Introduction, Spring
Architecture, Spring MVC Module, Bean life cycle, Spring API.
Hibernate and Struts: Java Beans, Introduction to Hibernate, Hibernate Architecture, Hibernate
Mapping Types, Introduction to Struts, core components, architecture, Interceptors, validation.
Advance Networking: Networking Basics, Introduction of Socket, Types of Socket, Socket API,
TCP/IP client sockets, URL, TCP/IP server sockets, Datagrams, java.net package Socket,
ServerSocket, InetAddress, URL, URLConnection.
TEXT BOOKS:
TB1. Herbert Schildt, "Java - The Complete Reference", Oracle Press, 9th Edition, 2014
TB2. Y. Daniel Liang, “Introduction to Java Programming, Comprehensive Version, Pearson.
TB3. Sams Teach Yourself HTML, CSS & JavaScript Web Publishing in One Hour a Day by Laura
Lemay, Rafe Colburn, Jennifer Kyrnin, 2015
REFERENCE BOOKS:
RB1. E. Balaguruswamy, “Programming with Java”, Tata McGraw Hill, 4th Edition, 2009.
RB2. Cay Horstmann, “Computing Concepts with Java 2 Essentials”, John Wiley & Sons, 2nd
Edition, 1999.
RB3. Jeffrey C. Jackson, “Web Technologies: A Computer Science Perspective”, Pearson.
RB4. Jakarta Struts Cookbook, by Bill Siggelkow, O'Reilly Media, Inc. 2005
List of Practicals
Bachelor of Computer Applications
4. Write a java program that connects to a database using JDBC and does CO3
add, delete and retrieve operations.
5. Create and Develop a web application using JSF. CO3
6. Write a program to implement a Java Beans to set and get values. CO2
7. Create a Java application to demonstrate Socket Programming in Java. CO5
8. Write a program to retrieve hostname--using methods in Inetaddress CO2
class
Application Based Practicals (Implement minimum 5 out of 10 practicals)
9. Write a client-server program which displays the server machine's date CO1
and time on the client machine.
10. Create a table in the database containing the columns to store book CO3
details like: book name, authors, description, price and URL of the
book’s cover image. Using JSP and JDBC retrieve the details in the table
and display them on the webpage
11. Write a program to create a login page using Java Beans.Also validate CO1
the username and password from the database.
12. Create a form for inputting text and uploading image using struts CO4
13. Create a Student Registration application using Hibernate. CO4
14. Write a program to implement MVC using Spring Framework CO4
Note:
1. In total 10 practicals to be implemented. 2 additional practical may be given by the course
instructor.
2. This is a suggestive list of programs. However, the instructor may add programs as per the
requirement of the course.