logo
Admissions Helpline: +91 9501105714

3-YEAR BACHELOR of COMPUTER APPLICATIONS
PROGRAM STRUCTURE

Course Scheme
Year – I
1st Semester
Course Code Title of the Course Hours(L+T+P) Credit
CAL4101 Introduction to Information Technology 4+0+0 4
CAL3108 PC Assembly and Troubleshooting 3+0+0 3
AML5103 Foundation Course in Mathematics 5+0+0 6
CAL5109 Programming Concepts 5+0+0 5
CAP2101 Introduction to Information Technology-Lab 0+0+4 2
CAP2108 PC Assembly and Troubleshooting -Lab 0+0+2 1
CAP2111 Programming Concepts -Lab 0+0+4 2
Total 23
2nd Semester
Course Code Title of the Course Hours(L+T+P) Credit
AML5106 Basics of Statistical Mathematics 5+0+0 5
CAL4207 System Analysis and Design 4+0+0 4
CAL6103 Introduction to Programming Language 6+0+0 6
CAL6104 Computer Networks 5+0+0 6
CAP2103 Introduction to Programming Language- Lab 0+0+4 2
CAP2106 Computer Networks – Lab 0+0+4 2
CAP2107 Web Development – Lab 0+0+4 2
Total 26
Year – II
3rd Semester
Course Code Title of the Course Hours(L+T+P) Credit
CAL4104 Object Oriented programming 4+0+0 4
CAL5112 Database Management System 4+0+0 4
CAL4204 Operating System 4+0+0 4
CAL2202 Advanced Web Development 2+0+0 2
AML5108 Discrete Mathematics 4+0+0 4
CAP2104 Object Oriented Programming – Lab 0+0+4 2
CAP2204 Database Management System – Lab 0+0+4 2
CAP2212 Advanced Web Development- Lab 0+0+4 2
Total 29 24
4th Semester
Course Code Title of the Course Hours(L+T+P) Credit
CAL6209 Data Structures 5+0+0 6
CAL5208 Software Engineering 5+0+0 5
CLW4214 Business Communication 4+0+0 4
CAL4315 Client Side Scripting 4+0+0 4
CAL4311 Introduction To Java Programming  4+0+0 4
CAP2315 Client Side Scripting – Lab 0+0+4 2
CAP2209 Data Structures – Lab 0+0+4 2
CAP2311 Introduction to Java Programming  – Lab 0+0+4 2
Total 29
Year – III
5th Semester
Course Code Title of the Course Hours(L+T+P) Credit
CAL3313 Cyber Security 3+0+0 3
CAL4308 Data Warehousing Concepts 4+0+0 4
CAL5314 Digital Marketing 5+0+0 5
CAP1308 Data Warehousing Concepts – Lab 0+0+2 1
CAP2312 Programming in Python 0+0+4 2
CAS4304 Major Project / Project Work 0+0+8 4
Total 19
6th Semester
Course Code Title of the Course Hours(L+T+P) Credit
GTI2302 Logical Reasoning 48 Hrs 2
CLL4304 Life Skills – I 48 Hrs 4
CAT9302 Industry Sabbatical 14
Total 20
Year – I, Semester – 1

CAL4101 Introduction to Information Technology (4-0-0)

4 Credits
Basics of Computer System: Evolution/Generations/Types of computer systems, Block diagram of computer, Application Areas of Computers.
Memory and Storage, Need, Types of computer memory. Data storage devices.
Number System: need, types, conversions from one number system to another number system. Arithmetic Operations on numbers of different number systems. Computer Codes.
Boolean Algebra: Concepts, Postulates, Principles, forms of Boolean expressions. Logic Gates and Logic Circuits
Computer Software: Introduction, types and categories. Programming languages: Need, categories. Introduction to CPU, RISC versus CISC, Use of registers, buses, IO Interfaces.
Computer Networking: basics, types, topologies, devices employed in networking. Introduction to Internet, cloud and cloud-based services, effects of cloud-based services on business.
Operating System: Need, functions, basic operations. Open source Software: History, principles, success, methodologies, various open-source licensing options.

Suggested Book(s):

Sinha, P. K. & Sinha P., 2010, “Computer Fundamentals”, 4th Ed., BPB Publications
Norton P., 2008, “Introduction to Computers”, 6th Ed., Tata McGraw-Hill.

CAL3108 PC Assembly and Troubleshooting (3+0+0)

3 Credits
Computer Basics: Use of Address, Data, Control Bus, Different types of registers inside a computer. Form Factors of Motherboard: Introduction to Motherboard components (SIMM, DIMM, RIMM, ISA, PCI, AGP ETC.). Safety Precautions, Common errors and faults during assembly and disassembly of a personal computer. Common Chipset in Computer Systems: North Bridge and South Bridge.
Introduction to Power Supply : Switch mode power Supply(SMPS), Liner Mode Power Supply (LMPS). Memory : Types of RAM, Types of Memory Packages, Hard disk : (IDE, ATA, PATA, SATA, SCSI). CD /DVD-Rom and CD Writer/Combo Drives (Basic Composition of CD/DVD, Types of CDs/DVD, CD/DVD Drivers, Structure of CD/DVD drive.
Brief Introduction to Network devices (Router, Switch, Modem, Hub).
Printers: Types and working of a Laser Printer. Classification of Computers, Disk Partitioning and Formatting, Image of disk volume.
Hardware requirement for Installation of Operating System (Windows/Linux), Virtual Machines: Concept, Steps to install multiple OS on a single machine using VMware, Virtual Box, etc. File systems of prominent operating systems. Firewalls: Working, mechanisms, Recovery & Backup Procedures. Troubleshooting Techniques (Visual, Audio and POST inspection), Software diagnostic tools.

Suggested Book(s):

Minasi, M., & Petroutsos, E. (1999). The complete PC upgrade and maintenance guide (No. 1). San Francisco, CA: Sybex.
Mueller, S. (2003). Upgrading and repairing PCs. Que Publishing.

AML5103 Foundation Course In Mathematics (5+0+0)

6 Credits
Matrices & Determinants: Types, Properties, Inverse. Solution of Linear System of equations, Rank, Consistency of linear system of equations, Cayley Hamilton Theorem, Eigen values and Eigen vectors, Diagonalization of matrices. Expansion & Properties of Determinants, Cramer’s Rule. Coordinate Geometry: Review, Equations of Straight Lines, Circle, Ellipse, Parabola, Hyperbola. Differentiation: Derivatives, Derivatives Of Sum, Differences, Product and Quotients, chain Rule, Composite functions, Logarithmic Differentiation, Maxima & Minima.

Suggested Book(s):

Foundation Mathematics by K.F.Riley and M.P.Hobson, Cambridge University Press.
Applied Mathematics (Vol.II) by Dr.J.S.Bindra and K.S. Gill, 5 th revised edition.
Engineering Mathematics – I, Chitkara University Publications
Applied Mathematics – II, Bindra J S & Gill K S, Bindra Publications.
Calculus by Apostol, Tom M, Published by J.Wiley.

CAL5109 Programming Concepts (5+0+0)

5 Credits
Overview of Computers and Logic: Simple program logic, program development cycle, developing pseudo code statements, Flowcharts, need of sentinel values. Understanding programming and user environments, programming models.
Working with Data, Creating Modules, and Designing Quality Programs. Modularization, Creating hierarchy charts. Structured programming: need, paradigms and techniques for structuring and modularizing unstructured logic
Decision making: Evaluating Boolean expressions to make comparisons, various operators used in programming logic, precedence rules for operators.
Iteration: Concept, need, application, types of loops, nested loops, common mistakes using loops
Arrays: Concept, memory occupancy, array usage, traversal, manipulation of specific values in array, manipulating arrays to replace nested decisions, searching, parallel arrays.
File Handling: Understanding computer files, data hierarchy, performing file operations on sequential files, merging sequential files, master and transaction file process, Random Access Files versus sequential files.

Suggested Books:

Farrell, Joyce, ‘Programming Logic and Design Comprehensive’, Sixth Edition, Cengage Learning.

Year – I, Semester – 2

AML5106 Basics of Statistical Mathematics (5+0+0)

5 Credits
Statistics : Measures of Central Tendency : Arithmetic Mean, Weighted Arithmetic Mean, Median, Mode, Geometric Mean, Harmonic Mean, Measures of Variation : Range and its coefficient, Mean Deviation, Quartile Deviation and its coefficient, Standard Deviation, Coefficient of variation and variance, Correlation and Regression Analysis.
Probability : Elementary events, Sample Space, Compound events, Types of events : Mutually exclusive, Independent Events, Additional Law of Probability, Conditional Probability, Multiplication Theorem of Probability, Baye’s Theorem.
Integration: Fundamental Theorem of Calculus (statement only), Indefinite Integrals (simple problems), Substitution Method, Partial Fractions, By Parts Method, Area of a plane region.

Suggested Books:

Foundation Mathematics by K.F.Riley and M.P.Hobson, Cambridge University Press.
Engineering Mathematics – I, Chitkara University Publications
Applied Mathematics – II, Bindra J S & Gill K S, Bindra Publications.
Calculus by Apostol, Tom M, Published by J.Wiley.
Business Statistics – S.P.Gupta, M.P.Gupta, Sultan Chand & Sons.
Mathematical Statistics – S.P.Gupta, Sultan Chand & Sons.

CAL4207 System Analysis and Design (4+0+0)

4 Credits
Overview of System Analysis & Design, System Definition, characteristics and elements, Types of system, System Development Life Cycle, Requirement Determination, System analyst skills, multifaceted role of System Analyst, Place of analyst in MIS organization, Preliminary Investigation, Information gathering concepts and tools, Structured Analysis Tools, Feasibility Analysis process, Process and Stages of System Design, Coupling and Cohesion, Design of software, Basic File terminology. Code Testing Techniques, Quality Assurance.

Suggested Book(s):

Systems Analysis and Design, by Kenneth E Kendall & Julie E Kendall

CAL6103 Introduction to Programming Language (6+0+0)

6 Credits
Programming languages – introduction, need & evolution. Comparison of high-level, middle-level and low-level programming languages. Language translators, compiled versus interpreted languages.
C Language: Compilation, linking and execution of a ‘C’ program. C Language character set: identifiers, keywords and constants. Features of ‘C’, Data Types, Statements and Expressions, Operators: Types, Precedence and Associativity, I/O functions in C Language, Control Statements, Iteration. Jumping statements: Break, Continue, Goto and Return. Functions: Concept, Types, Library and User Defined Functions, Function calls- Call by Value, Call by Reference. Introduction to Arrays: Definition, Their Need and Importance, Types of Arrays, Initialization. Single and Multidimensional Arrays and functions. Strings: Definition, Reading and Writing Strings. String Manipulation, String Manipulations using Functions. Pointers: Concept and Usage, Pointers And Arrays, Pointer Arithmetic, String manipulation using pointers. Pointer to functions, Pointers and Strings, Array of pointers. Recursion, Storage classes, User Defined Data Types – typedef, enumerated Structures: Declaring & initializing structures, Array of structures, Nested Structures, Pointers and structures. Self referential structures. Unions : Declaration, Accessing union members, Difference between Structures and union Types of memory allocations: Static and dynamic memory allocation. C support: Library Functions malloc () and calloc () . File Handling: Introduction to Files, Their Importance and Need, Steps in processing a file. File opening modes, Input and output operations of files, Direct/Random Access operations on functions

Suggested Books:

Let us C by Yashavant Kanetkar, BPB Publications
Schaum’s Outline of Programming with C by Byron S. Gottfried

CAL6104 Computer Networks (5+0+0)

5 Credits
Introduction to Computer Networks, Data Communication, Key components of data communication. Mode of Data communication, Network attributes (Point to Point, Multipoint). Physical Topologies, Network Models. Layered model to describe network functionality. TCP/IP model and the OSI model. Role of various layers in data transmission. Transmission Media (Guided and Unguided), Switching Circuit Techniques. Data Link Layer Design issues. Error Detection and Correction. Role of Network Layer, Network layer protocol, Internet Protocol and its feature for connectionless and best effort service. Routing Algorithms, Congestion Control Techniques (Open Loop and Close Loop), Open Loop- Flow Control, Retransmission policy, Caching and Routing, Traffic Shaping (Leaky Bucket and Token Bucket), Close Loop: Choke Packets and Load Shedding. Elements of Transport Protocol: Flow Control and Buffering multiplexing, UDP and TCP, TCP Protocol, Role of Application Layer and protocols of Application Layers

Suggested Books:

Behrouz. A Forouzan; “Data communication and Networking” third edition; TMH, 1993
Andrew S. Tanenbaum; “Computer Networks”; seventh edition, Prentice Hall, 2000

CAP2107 Web Development – Lab (0+0+4)

Year – II, Semester – 3

CAL4104 Object Oriented Programming (4+0+0)

4 Credits
What is object oriented programming, Structure Of C++ program Keyword, Basic data type Derived data type Declaration of variables, Operators in C++, Control Structure, Function, Storage class specifier, Recursive function, Arrays , Structures, Union, Pointers, Pointers And Function, Pointers And Arrays, This Pointer, Classes, Arrays within class, Friend Functions, Constructor, Copy Constructor, constructor overloading , Destructor, Operator Overloading, Function Overloading, Inheritance, Virtual Base class, Abstract Class, Intro to Virtual Functions .

Suggested Book(s):

Mastering C++, Published By Tata Mcgraw-Hill Edition

CAL5112 Database Management System (5+0+0)

5 Credits
Database System Application and Purpose, Comparison between File based and Database System, Advantages and Disadvantages of DBMS, Database System Architecture: Data Independence and Mapping among Views. Components of DBMS, Responsibilities of Database Administrator, Structure of DBMS. Entity Relationship Model: Entity and Relationships, ER Diagram Cardinality and Participation, Weak and Strong Entity. Representation of ER Diagram. Data Models: Hierarchical and Network Model, Relational Data model and Comparison of all the Models, Integrity Rules Relational Algebra: Union, Intersection, Division, Product Relational Calculus: Tuple Calculus, Domain Calculus. SQL: Introduction to SQL (DDL, DML, DCL), Query Representation, Constraints, Dependencies, Anomalies, Normal Forms.
Database Transaction and its states, properties of database transaction concurrency Management, Concurrency Related Problems, Dirty Read Concurrency Control, Deadlock Prevention, Deadlock Detection and Recovery, Granularity of Locking, Timestamp-Based Locking. Database Reliability and Recovery: Types of Failures, Detection Scheme, Checkpoints, Recovery Techniques, Shadow Paging Database Security and Integrity: Security and Integrity Threats, Defense Mechanisms., Security Policies, Authorization, Data Encryption, Data Integrity: Integrity Constraint.

Suggested Books:

Rob Coronel, “Database Systems”, Seventh Edition, Gex Publications
Bipin C Dessi ,“Introduction to Database System” ,Seventh Edition, Galgotia Publication

CAL4204 Operating System (4+0+0)

4 Credits
Types of computer systems, System Components, Operating System Services, System Calls/API, System Programs, Process Concept – Process Scheduling – Operations on Processes – Cooperating Processes – Inter-process Communication. Threads Multithreading Models. CPU Scheduling, Scheduling Criteria Scheduling Algorithms Multiple-Processor, Scheduling Real Time Scheduling. Process Synchronization – The Critical-Section Problem. Synchronization Hardware, Introduction to Semaphores, System Model Deadlock Characterization, Methods for handling Deadlocks, Deadlock Prevention , Deadlock avoidance, Deadlock detection
Memory Management: Swapping, paging, Segmentation, Segmentation with paging, Virtual Memory, Demand Paging, Process creation, Page Replacement Algorithms, Allocation of frames, Thrashing. File Concept Access Methods Directory Structure File System Mounting – File Sharing – Protection, File System Structure, File System Implementation Directory Implementation Allocation Methods Free-space Management. Kernel I/O Subsystems. Disk Structure – Disk Scheduling. Security Problem, User Authentication Problem, Program Threats, System Threats

Suggested Book(s):

Abraham Silberschatz, Peter Baer Galvin and Greg Gagne, “Operating System Concepts”, Sixth Edition, John Wiley & Sons (ASIA) Pvt. Ltd, 2003.

CAL2202 Advanced Web Development (2+0+0)

2 Credits
Introduction to LAMP/XAMPP, Apache Web Server: Installation and Configuration, MySQL: Installation and Administration, PHP Installation and Configuration, Testing and troubleshooting. XAMPP Installation, Manipulating Data, Identifiers, Constants and Variables, Conditional Structures and iteration, Functions and Constructs, PHP and the Web, Arrays, Strings and Regular Expressions, File Manipulation, Managing Date and Time, Managing E- mail, PHP and Database Connections, Stream and Network Programming, Security Issues.

Suggested Book(s):

Setting Up LAMP : Getting Linux, Apache, MySQL, and PHP Working Together, Rosebrock, Eric.; Filson, Eric., Sybex

AML5108 Discrete Mathematics (5+0+0)

5 Credits
Set Theory: Sets and Elements, Types, Venn Diagrams, Set Operations, Duality, The Inclusion – Exclusion principle, Partitions. Relations: Representation, Composition, Types, Properties, Equivalence & Partial Ordering relations. Functions: Types, Domain, Co-domain and Range, Into Functions, One-to-One, Onto & Invertible Functions, Cardinality, Composition, Function as a relation.
Lattices: Laws, Types : Bounded, Distributive, Complemented Lattices. Boolean Algebra : Duality, Basic Theorems Boolean Algebras as Lattices, SOP form of Sets, SOP form of Boolean Algebras, Logic Gates, Boolean Functions, Truth Tables, Circuits, Karnaugh’s map.
Graph Theory: Types, Eulerian Paths and Circuits, Hamiltonian graphs, Bipartite Graphs, Weighted graphs, Cut vertices and Cut Edges, Matrix representation, Multi graph, Planar and Non-planar graph, Graph coloring, Isomorphism of graphs, Homeomorphic graphs , Shortest Path Problems: Dijkstra’s
Permutation, The Pigeonhole principle, Combination.

Suggested Book(s):

Schaum’s Outline: Discrete Mathematics, by S. Lipschutz, M. Lipson, Second Edition, Adapted by Varsha Patil

Year – II, Semester – 4

CAL6209 Data Structures (5-0-0)

6 Credits
Data structures: Need and application, Brief concept of Complexity analysis with various notations. Various Algorithm Conventions. Introduction to array as first data structure. Types of arrays Operations on Arrays, Significance of sorting an array. Sorting techniques. Insertion Sort Advanced sorting techniques. Introduction to linked list as another data structure, linked list versus array, types of linked lists, Operations of linear linked list, Applications of linear and circular linked list: Introduction to two-way list: Operations on two way list, Stack, Operations and Application of stack, Queue, Operations on Queue, Tree, binary search tree.

Suggested Book(s):

Schaum’s Outlines Data structures by Seymour Lipschutz

CAL5208 Software Engineering (5-0-0)

5 Credits
Introduction to Software Engineering/Software Development, Requirement Analysis Concepts and Principles , Design Concepts : The Design Process, Design Principles, The Design Model , Design Documentation, Coding, Top Down And Bottom Up Approach Of Programming, Structure, Level Of Testing, Test Cases, Test Criteria, Software Testing Strategies, Maintenances Characteristics, Software Project Scheduling And Designing, Software Project Management, Cost Estimation, Project Scheduling, Project Staffing, Risk Management, Quality Assurance, Project Monitoring, Overview of Component based development.

Suggested Book(s):

Pressman, R. S. (2005). Software engineering: a practitioner’s approach. McGraw Hill.

CLW4214 Business Communication (4-0-0)

4 Credits
This course aims to help the student develop the proficiency needed to succeed in today’s technologically enhanced workplace by focusing on the development of verbal and written communication skills. Having good oral communication and writing skills is imperative in today’s workplace. This course gives the opportunity to a student to become dexterous in verbal and written communication along with the formats of report writing and presentation skills.

Writing and speaking processes through organization, drafting, revision, editing. Communicate with the public and colleagues via electronic mail, Internet, phone, and other technologies and in person, and in meetings. Writing e-mails, memos, formal reports, and business letters for different scenarios
Presentation: specifying audience and purpose, Deliver professional verbal presentations
Appropriate communication alternatives, participate effectively in groups with emphasis on listening, critical and reflective thinking, and responding.
Research and writing a documented paper and/or to give an oral presentation. Write a polished resume and cover letter and effectively prepare for interviews

CAL4315 Client Side Scripting (4-0-0)

4 Credit
jQuery concepts, jQuery & standards mode, DOM, Executing jQuery code.
Using a hosted version of jQuery, Executing jQuery code when DOM is parsed without using ready(), jQuery chaining. Using destructive jQuery methods, Aspects of the jQuery function.
Extracting elements from a wrapper set, using them directly without jQuery, Checking to see if the wrapper set is empty, Using .each() when implicit iteration is not enough, Elements in jQuery wrapper set returned in document order.
Custom jQuery filters can select elements when used, Using the is() method to return a Boolean value, Differences between filtering by numeric order vs. DOM relationships, Selecting elements by id when the value contains meta-characters, Grokking the :nth-child() filter, Nesting selector filters, Selecting elements by searching attribute values using regular expressions , Difference between selecting direct children vs. all descendants.
Filters, Passing filter() a function instead of an expression, Traversing up the DOM.
Creating, operating, and adding HTML on the fly, Grokking the index() method, Grokking the text() method, Update or remove characters using a regular expression.
Grokking the .contents() method, Disable/enable form elements, determine if a form element is disabled or enabled.
Selecting/clearing a single check box or radio button, Selecting/clearing multiple check boxes or radio button inputs, Determining if a check box or radio button is selected or cleared.
Determine if a form element is hidden, Setting/getting the value of an input element, Setting/getting the selected option of a select element, Setting/getting selected options of a multi-select element, Setting/getting text contained within a [textarea], Setting/getting the value attribute of a button element, Editing select elements.
Attaching/removing events, Programmatically invoke a specific handler via short event methods , jQuery normalizes the event object, Event object attributes.
Event object methods, Adding a function to several event handlers, Cancel default browser behavior.
Cancel event propagation, Cancelling default behavior and event propagation via return false.

Suggested Book(s):

1. jQuery Succintly, Cody Lindley, Syncfusion
2. JavaScript & jQuery, The Missing Manual, David Sawyer, O’REILLY

CAL4311 Introduction to Java Programing (4-0-0)

4 Credit
History and Goals of Java, Java Virtual Machine, Garbage Collection, JAVA BASICS, Identifiers and Keywords, Primitive Data Types, Integral, Operators, Branching and Looping, OO Programming, Creating a Data Type, Arrays: Declaring, Creating, and Accessing Arrays, Initializing Array , Multidimensional Arrays, Copying Arrays, Advanced Class Concepts, exceptions, stream I/O, Servlets, WebSphere Studio Application Developer Integration Edition, WebSphere Studio Enterprise Developer, Basic Operations with RAD Views and Perspectives, Searching, Setup Compiler Class Path, JRE Switching, Refactoring, Changing Class, Method, and Variable Name, Moving a Class to a Different Package, Extracting Code to a Method, Pull-up Method, Migrating Workspace from WSAD v5.x ,Project Interchange Feature, Migrating J2EE.

Suggested Book(s):

Programming with Java by E Balagurusamy,Advanced Java Technology by Dreamtech Press

Year – III, Semester – 5

CAL3313 Cyber Security (3-0-0)

3 Credits
Introduction to Cyber Crime: Definition and origins of the world, cyber crime and information security, cyber criminals, classification of cyber crimes, cybercrime and ITA. Cyber Offense: Categories of Cybercrime, How criminals plans the attack, social engineering, cyber stalking, cybercafé and cybercriminals, Botnet, cloud computing. Cloud Computing Cyber Crime: Proliferation of Mobile and Wireless Devices, Trends in Mobility, Credit Card Frauds in Mobile and wireless computing era, Security challenges posed by mobile devices, Registry setting for Mobile Devices, Authentication service security, Attacks on Mobile/Cell Phones, Mobile Devices: Security Implications for organizations. Tools and Methods used in Cybercrime: Proxy Server and anonymizers, Phishing, Password cracking, Keyloggers and spywares, Virus and Worms, Trojan Horse and Backdoors, Stegnography, Dos and DDos Attacks, SQL Injection, Buffer Overflow, Attacks on wireless network Cyber security Organizational Implications : Cost of cyber crimes and IPR issues, Web Threats for Organizations, Security and Privacy Implications from cloud computing, Social Media Marketing, Social Computing and the Associated Challenges for Organizations ,Organizational guidelines for Internet Usage, Safe Computing, Guidelines and Computer Usage Policy, Incident Handling: An essential component of cyber security, Forensic Best Practices for Organizations, Cybercrime and Cyber terrorism: Social Political, Ethical and Psychological Dimensions: Intellectual Property in the Cyberspace, The ethical dimension of cybercrime, The psychology, mindset and skills of hackers and other cybercriminals, Ethical Hackers Cybercrime: Illustrations, examples and mini-cases: Real Life examples, mini cases

Suggested Book(s):

Singer P.W. and Friedman A., 2014, “Cyber Security and Cyber War “, First Edition, Oxford Publication

CAL4308 Data Warehousing Concepts (4+0+0)

4 Credits
Introduction to Data, Structured, Semi-Structured and Unstructured Data. Data Warehousing: Need, characteristics, Ralph Kimball’s Approach vs. W.H. Inmon’s Approach, Goals of Data warehousing, Data Sources, Extract, Transform, Load, Data Integration, Technologies, Data Quality and Data Profiling, Data Warehousing Components : Sourcing, Acquisition, Cleanup and Transformation Tools. Access Tools.

Warehouse Architecture, Data Warehouse and Data Marts, Multidimensional Data Modeling: Basics, Types, Techniques, Fact Table, Dimensional Model, Typical Dimensional Models: Star Schema, Snowflake Schema,

Introduction to Meta Data: Repository, Management, Trends, Categorization of OLAP Tools: ROLAP and MOLAP

Introduction to Business Intelligence, Business Intelligence Users and Applications, Business Intelligence Roles and Responsibilities

Suggested Book(s):

Alex Berson, Stephen J. Smith, Data Warehousing, Data Mining, & OLAP , Tata Mcgraw
R.N. Prasad, Seema Acharya , Fundamentals of Business Analytics, Wiley Publishing

CAL5314 Digital Marketing (5-0-0)

5 Credits
Digital Marketing Strategy: Introduction, Key terms and concepts, Understanding marketing strategy, Building blocks of marketing strategy; Crafting a digital marketing strategy.

Content Marketing Strategy: Introduction, Key terms and concepts, Defining content marketing, Strategic building blocks, Content creation, Content channel distribution, Tools of the trade, Advantages and challenges.

Web Presence: How to increase online presence and drive more traffic for a website, Search result visibility in Google for chosen keyword and phrases, Using e-mail marketing to drive traffic for a website, Posting social media content for lead generation, Tools to create and manage content, Use of Blogging as content strategy.
Content Management: Writing and posting content on the web and in social networks, creating content: info graphics, the perfect blog and video; create lead and sales funnels; Create, manage and implement a content marketing strategy; Monitoring and recording results to improve content marketing campaigns; Successful content marketing examples, strategies and case studies.

Suggested Book(s):

Venakataramana Rolla, “Digital Marketing Practice guide for SMB: SEO, SEM and SMM”, CreateSpace Independent Publishing Platform, 1 st edition.
Damian Ryan Kogan “Understanding Digital Marketing: Marketing strategies for Engaging the Digital Generation”, 3 rd edition.
Shivani Karwal, “Digital Marketing Handbook: A Guide to search Engine Optimization, Pay Per Click Marketing, Email Marketing and Content Marketing”, CreateSpace Independent Publishing Platform, 1st edition.

CAP2312 Programming in Python (0+0+4)

2 Credits
Introduction to Objects & Python’s Math Library: Understanding variables and basic operations on number and string data, dealing with basics of math library (pow, sqrt, round, exp, pi, ceil, floor), displaying strings and numbers, while statement.
String Object Methods: understanding string methods like upper(), lower(), isdigit(), isallnum(), isalpha(), isnumeric(), split(), endswith(), startswith(), join(), count(), strip() and exploring string iterations, basic if statement.
Number Object Operations: working with number literals, dealing with hexadecimal, octal and binary numbers, basic arithmetic operations, mix type conversion, integer to float and float to integer conversion, formatting numbers.
List Object: creating empty list, initializing list, list indexing and slicing operations, input method, single and multidimensional arrays, Concatenating multiple lists, generating range based lists, nested lists.
Introduction to Dictionaries: creating empty dictionaries, initializing dictionaries, Accessing dictionary items, merging, and deletion. understanding dictionary specific methods, and dictionary comprehension.
Exploring Statements and Syntax: Iterations, branching, assignment statement and expression statement and exploring print method.
Introduction to python Modular Programming: declaring and calling user defined methods, recursive calls and returning multiple values via return statement, Understanding local and global scopes, argument passing techniques (normal arguments: matched by position, keyword arguments: matched by name, default arguments, Using * and ** during calling time and receiving time.
Object-Oriented Programming In Python: Creating classes, objects, attributes, classes v/s dictionaries, constructors and idea of inheritance.
GUI Programming: Understanding and Installing PyQT4 and QT Designer Interface, Using GUI controls like push-buttons, text-boxes, radio buttons, checkboxes, labels, managing resource files, combo boxes, list boxes, menu’s and sub menu’s, calendar control and other controls, Understanding signal and slots, Dealing with PyQt4 event handling mechanism. Push button events, checkbox and radio button events, menu events, combo box and list box events etc.

Suggested Book(s):

Lutz, Mark. Learning Python. ” O’Reilly Media, Inc.”, 2013.
Barry, Paul. Head first Python. ” O’Reilly Media, Inc.”, 2010.
Swaroop, C. H. “A Byte of Python.” Enllaç web (2003).

CAS4304 Major Project /Project Work (0+0+4)

4 Credits
The students will be given an exposure to the world of software development. Students will be required to work in teams, and develop working software application that has some utility for the target audience. Students will use their knowledge to integrate and mingle with software, hardware, networking, tools etc. that they have learned to use during the previous semesters. The purpose of project shall be to make the learners conversant with the complete life cycle of the software project, and also to make them appraise the need, benefits and methods of documentation.
Year III, Semester 6

GTI2302 Logical Reasoning (48 Hrs)

2 Credits

Suggested Book(s):

CLL4304 Life Skills – I (48Hrs)

4 Credits
Group discussions (GD) and interviews.
Group Discussions: Communication Skills, Team Dynamics and Body language which are a hallmark of a thorough professional.
Handling pressure during interviews.
Teamwork, Interpersonal Communication, and Conflict Resolution,
Body Language (including facial expressions), voice modulation/ intonation, role plays
Team Dynamics via text based group presentations
Leadership Skills via flipped classrooms
Research Aptitude via projects
Effective communication with emphasis on capturing the attention of the audience

CAT9302 Industry Sabbatical

14 Credits
The student shall be required to undergo training on live project in an organization where some software project development is being carried out. The motive for this course is to allow the students to gain hands-on experience in software development by allowing live views of various phases of software development life cycle. The students will have practical knowledge of the software development model being followed by the development team, and would be able to relate the experience thus gained in the future projects. The progress of the students will be monitored closely through the internal supervisors to whom the students shall be required to report from time to time. The internal supervisors will also maintain liaison with the company to obtain reports about the student’s progress.
Calculation of CGPA

The CGPA (calculated on a 10 point scale) would be used to describe the overall performance of a student (from the semester of admission till the point of reckoning) in all courses for which LETTER GRADES will be awarded. GPA will indicate the performance of student for any particular semester. Formulas for calculation of GPA and CGPA have been provided as below:

cgpaformula-01

Where n = number of subjects in the semester; N = number of semesters; GPAi = GPA for the ith semester; Cij = number of credits for the jth course in ith semester; and Gj = Grade point corresponding to the grade obtained in the jth course.
Table below shows the grade point for every valid grade that may be awarded to a student pursuing a particular course:

%Marks Range of total Grade Qualitative Meaning Grade points
80 – 100 O Outstanding 10
70 – 79 A+ Excellent 9
60 – 69 A Very Good 8
55 – 59 B+ Good 7
50 – 54 B Above Average 6
45 – 49 C Average 5
40 – 44 P Pass 4
0 – 39 E Exposed 0
I Incomplete

‘I’ grade would be awarded to those students, who due to some reason or the other have not been able to appear in certain required number of evaluation components conducted for a course. Later ‘I’ grade would be changed to a relevant grade, once a student has fulfilled the requirement of appearing in certain number of evaluation components for a course.

Example to Understand the Calculation of GPA

Suppose a student is registered in four courses ‘W’, ‘X’, ‘Y’ and ‘Z’ in a particular semester as mentioned below in the Column – I of the table. Column – II in the table below depicts the number of credits, which those courses carried. At the end of the semester, student was awarded with the grades as mentioned in Column – III in the table given below. Column – IV indicates the corresponding grade weight. Column – V and Column – VI indicate essentially the Credit value and Grade Points for every course completed by a student in that particular semester.

Course in Which student registered(Column – I) Credits(Column – II) Letter Grade Column – III Grade Value (Column – IV) Credit Value (Column – V) Column – VI)
Course W 3 B- 6 3 x 6 18
Course X 3 A- 8 3 x 8 24
Course Y 3 A+ 10 3 x 10 30
Course Z 2 A+ 10 2 x 10 20
Total 11 Total 92

Thus, the total GPA of the student would be =

GPAFormula

Suppose the GPA of the student in two successive semesters is 7.0 and 8.0 with respective course credits being 12 and 11, then the

CGPAFormula