0% found this document useful (0 votes)
18 views18 pages

Index Important

important
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
18 views18 pages

Index Important

important
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 18
fe moganmagnin pyran MSBTE Table of Conten! ‘comparison/Relatonal OPEFt0"S 7 12 : es NET 1.3 Assignment Opera os ren rogrem |? 14 Loge Operators 28 —aumtn ana Syntax of Python Prowram | gue opranrs Chapter 1° In attott7 | * 28 | rombership Operators : = aman wmeracve best onenied.|| 217 dently Pera ° pammue Feanres ch Pyton | 7 os a sree am secede pyten tusana Went ||| 218 pymon Operator Procedenee rners Keywors, ngentaon, vara ' 21.9 eangel) Functor » ne Pen and worry 1 HOE FUNG || Gon Flow Ssorer® 29 nay weicome’ message Pyton Data || 2? ro mroaris OR 048" ap Tp. ists, Ocbonary Decaravonand |] 2° Conaitiona a Making Statements 7 ay | 231 The # Statement so ha | 232 Theil else statement 2 care Evervnng s Odect ConeeptOR Pytons | 233 Theit- el ee statement OR The else Dyname Typed Language 12 statement a2 2p pymons Sman Memory Management 13 | yy the nested-if Statement 213 2 a 14 | 35 The Shorthand i-else Statement a4 Pyne laentiers 1 a oe a 2.4 Looping in Pytho yinen Keywor 14 248 yinen Indentation. 16 | 241 Trewnle Loo. ymon Vanabes +5 | 242 TheforLoop. 216 comments in Pytnon 16 | 25 Loop Manipulation | pyon Eneronment Setup Instaiaion and Working ot | 251 Leap Manipulation using Keyword cont we 17 2 Loop Manipulation using Keyword "break 28 +5 Running Simple Python Scripts to Display Welcome 2 are 8 Message tir | 253. Loop Manipulation using Keyword “pass” 220 Pymen Data Types 1-13 | 25.4 Loop Manipulation using Keyword “else 220 Pyton Numbers 143 | 26 Nested Loops 222 2 Pymon Sting 34 Pyan List 1415 UNIT IIT 4 Ryton Tuple 116 Gc a : iron Dictonary 1-17 | Chapter3:_Data Structures in Python 1 to 3-38 UNIT IT Syllabus : Lists : (a) Detining lists, accessing values in lst — deleting values in list, updating lists.(b) Basic List Operations | Chapter 2: Python Operators and Control (c) Bui in List tnctions. Tuples : (a) Accessing values in Flow Statements 21 10 2-24 || Tuples, deleting values in Tuples, and updating Tuples (b) Basic | . “Tuple operations. (c) Built-in Tu Sylabue: Base Operators: Atmetc, Comparison Rotational, ||| Sey Cd tah ee ete | Aesiprtat, Loyal, Bhnloe, Membership, Monty opeaor, 8: (a) Accessing values in Set, deleting values in Set and | ppt OpraerPacacerea, ‘Cant Fow, Condon updating Sets. (b) Basic Set operations. (c) Bult ~ in Set functions [Stet wr reser hen te op Dictionaries : (a) Accessing values in Dictionary, deleting values Se a eee seats el ||(none aed Dictionary break, ese ‘operations. (c) Built —in peice cen a mls) = ) ay Basic Operators. 4 a4 List aa 2 2.1.1 Arthmetic Operators. auq_| tt Destaring Ust OR Greating Uist OR Defining List...3-1 AF Frontaweieane 113. Funetton Arguments and Parameter Passing 43 414 Retum Statement 46 415. Retuming Muttole Values 48 416 Scope of Vaniabies “117 Funston wih Default Arguments Parametrs Chapter 5 syllabus. ‘and Overriding. Data Hiding Data abstraction Table of Contents © Progaming wih Fyiton MSETE) 3 _Tevie of Contents UNIT V EEE ‘Object Oriented Programming in,Python 5-1 to 5-28 1s and Objects. Method Overloading tours ant | Crmating Class nn classes. Customization via inheritance special ‘0m Functions wth Optional composi Arguments Parameters 4612 || innented methods = 4.18 Keyword Arguments OR kwargs in Python 414 | 51 Creating Classes and Orjects 54 4418 Nested Function i allowed in Python 511 Creating Class 5A (OR inner Functions 415 | 51.2 Declaring Object 52 42110 yon Functions Nature 51.3. The Self Parameter 53 Pass by Valve oF Pass by Reteronce is | 51.4 Create instant Attributes of Object OR Externally Moxitying Object’s Properties 55 4111 Vanable Length Arguments 416 5.1.8 Deleting an Attribute 57 2 Pytron Buta Functions 419 i 5.16 Defining Constructor OR The __int__( Method... 5-7 421 Oatanype and Object Related Functions. 420 | 61 Detaut Constructor 5 ‘ata Conversion Functions 423 | 51.52 Parameterized Constructor 59 ee ee 428 | 5.1.63 Constructor Overloading isnot alowed in Pytnon 5-8 424 Files and Expression Related 428 | 5.1.6.4 Constructor with Default Arguments ass and Inheritance Related. 4-29 | 5.1.7 Defining destructor OR The __del__() Method.....5-11 Mathematical Functions. 430 | 81.8 — ‘CanManually Call Constructor and Destructor. 7"...5-11 forbuttin Help 4qy | 519 Deleting an Object. 512 5.1.10 The Pi . . ee he Pass Statement 513 : 52 DataHiding 513 437 Wing Modules. 433 59 Inheritance and Composition Classes. 545 432. mporing Modul sou poring Modules 53.1 Single Inheritance. 516 4321 Semple im : sth! 434 532 Constructor and Destructor in inheritance. 516 4322 Impon wn Renaming... 4-34 | 5.3.3 Parameterized Constructors in Base Ciass and Derived 4323 The from. import Statement OR Importing Objects from Class. 5-18 Modules OF Importing individual Object. 435 | 534 — Mutiple inhertance 548 4324 impo everything using * 435 | 535. Muttievel inheritance 5-20 4325 Importing Mutiple Modules as | 54 Data Abstraction ca 433 Pyton buttin Moduies tas | 55 Mettod Overoading and Overrsing 5-23 551 433.1 Numeric and Mathematical Modules, 436 Method Overloading 5:23 552 Method Overridin 43 9 . $2 Functional Programming Module 445 1553 Useot Sy - — a 1 of Super to Access Members of Base Class.....5-26 a oo 5.6 Customization via Inheritance Specializing inherited oe 4-50 ‘Methods on 441 Wt - ing Python Packages co 442 us sing Standard and user-defined Packages 454 W Teatacnteaye Table of Contents, eu W Programming with Python (MSBTE) oon —— 624 : 7 UNIT VE 625 Oe mest te en na proctor ea en ing | 028 File VO Handing and Exception Henan vrvent D4ectOr” : ona ° 6-110 6-28 | G26! Gating Current 12 ee snangina pirectO"Y — sane chaning ws er Symabve = 1 Operators Renan Aaya np Pong © |] Pe ves a a caer ae nanang openny ne mato mo accosny |] 6262 NET ay, : Secowern wang sarderaitraryhrctore, fecing and || 02.84 amare 13 Tague coryane Reranryansoiny in Orcs |} gags Rename ONT, on sno Foe ans sector reiates standard tneons Exception |] 55 Removing ae rs - evanyinvocchon “Exceston hanging - ty ercept’|! 5°. Gnecking Exstone® " ; scamrent ruse statenent, User Seed exception vrectory of File 4 tere’ raise: star defined exceptions. 3260 Checking Whether DeCtOrY a 51 WWoverabors 6 ee peraring ana otto FS “ eee © | 53 exception Handling: Prntng t Screen 6 ~ ee 631 Introduction 8 nm) Functon's Keyword Arguments 62 |e peapton Handing excep statment 617 £14 Outaut Fomating OR Formatted Sting Output......63 . : a 6321 tryexcept Statement 67 1 Sting Mogulo Operator (%) 63 . 6 6322 try with Multiple Except Blocks... 18 62 Fie Harding = : i 1CKS rn (Opening File in Different Modes. a | 0329 tr enceptelee be co Accessing Fie Contents using Standard 63.2.4 except Block without any Exception Name OR Generic pray Functions. . oe except.bock.. 620 Reading and Writing Files, gg | 6325 except Block with Mutiple Exceptions... 621 Wrtng into File using write() Function 5 | 6328 — tw- finally Blocks. on ning into Fie sing witelines/) Function.......66 | 227 Syexceptiinaly Blocks... .. 623 esading File using readl ) Function....... 67 | 893. The Raise Statement OR Manually easing trom File using readine( ) Function. 67 Raising Exception... ca 6 leading from File using readlines{ ) Function. 6g | O84 User Detined Exceptions : Reading File using for loop. 68 + Listof Practicals, File Porters Manipulation : seek() nd tel) Functions ‘ Time Management Sheet 68 ‘Model Question Papers Q-1 to O- 13.12 Accessing List Elements using Index Numbers 32 1.3 Negative List Indexing 0 oa 3.1.4 Iterating through List using forloep. aa 3.15 icing Ute (Using Sing Operator) 0" U0 a4 3.1.6 Basic List Operatons. . “ ad 3.1.61 Acting element: appease) and extend) FURBO. . a8 2) Function... 98 Fncing Length of List: using . Je". 3182 131163 Updating Element: Using Assignment Operator (=) rete VARI oss 38 31164 Delete or Remove Element trom List on 3.165 Testing Membership Operator on List. 310 S17 Bun List Functone 4 att 3.1.8 Nested List (Mut-Dimensional Uist). 32 319° Deleting Ut... i 318 a ee 316 321 Dectanng Tuple OR Deciaring Tule 316 ‘Accessing Tuple Elements using Index Numbers set union 3344 jane sete" ae sxe at symmotte ST asuenrete™ = ase oeietng Set rionaries 3 ae, ting oietioneY Leen 343 asa 345 es change x update Exrnerts 0 nee Le 3452 Finding Length of ist tahg_ Jen) Function... Bi 7 345.3 Updating Dictionary over-wrte Value 41454 Remove Element: pop() poptert ) and clear) ee : = 3.05 346 _Bultin Dictionary Functions = 3.47 Deleting Dictionary, Chapter 4: Python Functions, Modules and Packages: 4-1 to 4.57 Syllabus : sit yl mute f Python built : in functions (e.g. type/ data conver ions, noe mec garting 2a) User defined functions: | nese = calling, function arguments and | P ‘etum statement, Scope of Variables: Global | Names; Pi pace Pasa Inraeton, Wang pr and Scoping. Python -0: math, eclpy, Numpy, matpot 'on packages, Using standard i P,Pandas etc.) and user defined Elements OR ‘Set Object does not 333 334 3341 3942 Finding Length of Set ‘using _ Jen Function... L-() 3343 Removing Elem 3-28 ont clear) Functions... sare), remove), pop) and 325 | unit4 : Introduction to Computer and Information Security Unita : User Authentication and ‘Access Control (Book Code : MDE61A) ta tb Lo Syllabus Unit Outcomes (UOs) (incognitive domain) Explain the importance of the given component of computer security Explain the characteristics of the aiven type of threat Explain the given type of attacks related with security, Describe the features of given type of update of operating system. Classify Information, If, Explain Principles of Information Security Explain techniques of the given type of attack on passwords. Explain mechanism of the given type of Biometric. Apply the relevant Authentication ‘method for the given situation with an example. Describe features of the given ‘access control policy, Topics and Sub-topies Foundations of Computer Secunity Definition and Need of computer sec Threat Analysis — Assets, Threats, Risks, Counter 1.2 Risk and Vuinerataty, measures | 1.3. Thweatto Secunty : Viruses, Phases of | Viruses, Types of Virus, Dealing with Viruses, Worms, Trojan Horse Intruders, insiders. Type of Attacks: Active and Passive 14 Denial of Service, OOS, attacks, Backdoors and Trapdoors, Sniffing, Spoofing, Man in the Middle, Replay TCPYIP Hacking, Encryption attacks Operating system security: Operating system updates HotFix, Patch, Service Pack. Information, Need and Importance of Information, information classification criteria for information classification Security, need of security, Basics principles of information security. | User | 2.4 Identification and. Authentication name and Password, Guessing password, | Password atacks-Piggybacking, Shoulder | suring, Dumpster diving Biometrics © Finger Prints, Hand prints, | 22 Retina, pattems, Voice pattems, | Signature and Writing pattems, | Keystrokes. | ‘Access controls : Definition, Authentication Mechanism, principle-Authentication, Authorization, ‘Audit, Policies : DAC, MAC,RBAC. 23 unite tt Cryptography Intrusion Detection | sa Unitav : Firewall and | 4a Jo given toxt eaypubecrynt the east stitution | sing different SY techniques uxt to cipher text and sewer ai ve s the giver’ versa using ae sition technique. transp convert the steganography the given technique of yy using example. ssage using given Explain cryptography Compare types of firewall on the given parameter(s) Explain function of the given type of 4.1 Introduction: Plain Text, Cipher Text, Cryptography, Cryptanalysis, Cryptology, Encryption, Decryption 4.2 Substitution Techniques > Caesar, cipher, Modified Caesar's Cipher Transposition Techniques — Simpig | Columnar Transposition 3.3. Steganography : Procedure 3.4 Symmetric and Asymmetric cryptography: Introduction to ‘Symmetric encryption, DES (Data encryption Standard) algonthm, Asymmetric key cryptography: Dig Signature 4.1 Firewall Need of Firewall, types of firewall- Packet Filters, Stateful Packet Filters, Application Gateways, Circur gateways, Information Security. system | 4b. EXE | CC trewall configuration. 4c. Compare various IDS techniques | 4.2 Firewall Policies, Configuration | onthe given parameter(s). limitations, DMZ. 4d, Describe features of the given IDS | 4,3 intrusion Detection System Vulnerability | technique. Assessment, Misuse detection, Anomaly | Detection, Network- Based IDS, Host- Based IDS, Honeypots Unit-V: Network | Sa. Explain the given component of | 5.1 Kerberos: Working, AS, TGS, SS Security, Cyber | Kerberos authentication protocol 5.2 IP Security- Overview, Protocols- AH, Lows and | 5b. Explain the given IP Security ESP, Modes- transport and Tunnel. coe | protocol with modes. 5.3 Email security- SMTP, PEM, PGP. 5c. Explain working of the given | 5.4 Public key infrastructure (PKI): ETE | Protocol for Email security Introduction, Certificates, Certificate 5d. Describe the given component of authority, Registration Authority, | Public Key Infrastructure. X.509/PKIX certificate format. 5e. Classify the given Cyber crime. 5.5 Cyber Crime : Introduction, Hacking 5f. Explain the specified Cyber law. Digital Forgery, Cyber 9g. Describe compliance standards for Stalking/Harassment, Cyber Pronography, Identify Theft and Fraud, Cyber terrorism, Cyber Defamation. 5.6 Cyber Laws Introduction need, Categories : Crime against Individual. Government, Property. 5.7 Compliance standards : Implementing and Information Security Management ‘System, ISO 27001, ISO 20000, BS 25999, PCI DSS, ITIL framework, COBIT framework. 13 (MsBTE) Table of Conte : 4-110 1:33 Chapter 4 :_ Introduction to Computer & information Security jsp oun of Compe Sciy eto and wd of cman ey, Sey Be | Tusneton nnd Retabity, Rak and Threat Analysis | | confidentiality, Integrity, Availablity, Accountability, Non jses, Phases of Viruses, Types of | Assats, Vunerabiity, Threats, Risks, Counter measures. Throat to Securlty : Vs Insiders. Type of Attacks : Active and Passive attacks, Spoofing, Man in the Middle, Replay, TCP/IP Hacking, rus, Dealing with Viruses, Worms, Trojan Horse, Intruders, I Denial of Service, ODS, Backdoors and Trapdoors, Sniffing, Enoyption attacks. Operating system security : Operating system updates Hotfix, Patch, Service Pack ia for information classification, | information. Need and Importance of Information, information classification, crter Secunty, need of security, Basics principle of information security. 11 Foundation of Computer Security 1.44 Definition of Security 4 1A 112 Need of Security 12 14.3. Seourty Basics. on 12 Riskand Theat Anatysis 14 121 Assets 14 122 Vulnerabitty a 123° Toate... \s 12. 4 Risks. 7 12 res, 5 Countermeasu 7 Threat to Secu. 18 131 Vises 18 132 Phases of Vises (Life Cycle of Viruses), fe 133 Types of Viruses 19 134 Dealing wth Viruses 1-10 135° Worms 110 136 Trojan Horse 112 1.3.7 Intruders. 112 138 Insider... 1.413 WF Secttacwtatne Network and Information Security (MS®TE) 22 Blometncs 2.2.1. Types of Brometnc 2.2.1) ingen 2.2.18) Hand Print 22 (C) Retna 22. 1(0) Vorcw/Speech Pattors 2.2.1(€) Signature and Wrting Pattoms 22.1(F) Keystrokes 234 232 233 234 235 236 Audit. Policies - DAC, MAC, RBAC sea Chapter 3: Cryptography Sylabus ; Introduction; Plain Text, Cipher Text, Cryptography, Cryptanalysis, Cryptology, Encryption, Decrypson | Substitution Techniques : Caesar's cipher, Modified Caesar's Cipher, Transposition Techniques : Simple Columnar mnagraphy : Procedure. Symmetric and Asymmetric cryptography: Introduction to Symmetnc encrypaon Transposition. Stegar DES (Data encryption Standard) algorithm, Asymmetric key cryptography: Digital Signature, - 31 Inroduation B 34.1 Plaintent 3.12 Cipher > 3.1.3 Cryptography 32 3.14 Cryptanalysis, 32 3.4.5 Cryptology o 3.1.6 Encryption ex) 3.1.7 Decryption a4 Table of Conten! Worn an nforaen security (MSBTE) unit v 5-1 to 5-42 Nanwork Socurity, Cyber Laws & Standards —} ocuny. Overwow, Protects AH, ESP, Maio anspor and Tune! | ‘onan intext, Cticntos, Corieato aurory: | Infroducton, Hacking, Digtal Forgery, Cyber chapter S: [ syuanue : Kerberos: Working, AS. TGS. SS. IP mas security. SMTP, PEM, PGP. Public Key inkastuctire | pogistraion Authority, X SOBPKIX oovteate format cyber Crime seaming Harassment, Cyber Prosograpy, Identiy Theft and Fraud, Cyber terrorism, Cyber Defamation, Cyber Laws rproguction need, Categories Crime agains! Indivktial, Government Property Compliance standards - Implementing and Intoraton Secunty Management System, 150 27001, {SO 20000, 8S 25999, PCI DSS, ITIL framework, COBIT | tramewook si Kertros ” sit AS.TOS.58 i 12 Working ve 52 (PSecrty 5s 521 Ovenew $6 522 Modes - Transport and Tunnel 56 523. Protects AH and ESP. 57 55 emai Seurty 58 53.1 Simple Mall Transfer Protocol (SMTP) 510 532 Privacy Enhanced Mal PEM)... sit 539. Pretty Good Privacy (PGP), 54 Pbk Key nrastuctre (PKI nnn - CR : _ fas) coe _ 543° Centcate Author (CA). : - 544 Regstraton Authonty (RA) . so 7 545° XS0QIPKIX Comficste Fomat = eee 519 — son oe sn 20 =e ool 553. Digital Forgery 5.5.4 Cyberstalking or Harassment Table of Conten, Network and Information Security (MSBTE) 5a 855 Cyber Pomography Sy $5.6 Identity Theft and Fraud 524 557 Cyber Terorism 54 558 Cyber Defamation... 525 56 Laws a 525 561 _ Introduction and Need 5-26 582 Categories. vse 26 57 Compliance Standards ..... 5.7.1. _ Implementing and information Security Management System (ISMS) Sar 572 18027001 we 528 573 a) 574 SB 575 52 6 $7 53 57.7 COBIT Framework... 56 ‘+ Time Management Sheet * Model Question Papers 1006 rogram Group Computer Engineering PF Pbectaa S0/CMIF/CW) ean Caos (cow Semester sixth —_ Tite Mobile Application Developm Course f - Sowve a Topics andSub-topics Unit Outcomes(UO®) re Une cognitive domal | 7 1.1 Inraduction to Android, open | Ia Explain the given basic terms tation 19 Aas om | Android related to Android Fa Ecosystem. system. / : of Android, Features Of | th Explain with sketches Android | 1.2 Need of An h Android | architecture for the given Unit | application 13 Tools and sofware requied for | Android and its tool | Ic. Identify tools and software developing an Android Applica [retes chapter] required for developing the 1.4 Android Architecture | given Android application with justification, | 1d. Explain significance ofthe given component in. Android | [architecture - : | 2a. Describe function of the given | 2.1 Operating System, Java JDK, ‘component to operate the specified RaiatiGor! bot ; tated to | 22 Android Development 2b, Explain the given term related to DD Unit - 0 Installation and configuration of Android os virtual machine. 2c. Explain the given basic term related to Android development tools. 2d. Describe the features of given android emulator. 2c. Describe the steps to configure the given android development environment 3a. Explain with relevant analogy the given Directory Structure. 3b. Describe the steps to use the given Android rich UI component. 3e. Describe the steps to use the given type of Layout 3d. Develop the given basic Android 2.3. Android Virtual Devices(AVDs) 2.4 Emulators 2.5 Dalvik Virtual ~~ Machine, Difference between JVM and DVM 2.6 Steps to install and configure Android Studio and SDK 3.1 3.2 Components of a Fundamental UI Design 3.3. Linear Layout; Absolute Layout; Frame Layout; Table Layout; Relative Layout Control Flow, Directory Structure sereen, application. Topics andSub-topicg gi Ten View, Edit Text, Baton mage Button: TOBEIE Buoy | fenton And Radio Grog WV Checkbox; Progress Bor peste the given 4.2. List View: Grid Views Image Vigy, Interface With View Explain Seroll View; Custom Toast Aler, display Alert , | 4.3 Time And Date Picker Fg evel the given appieation UE | ime an date picks . t 5.1 Intent, Intent Filter Sa, Apply the given Ients and 5 coe in Appice 5.2 Activity Lifecycle: Broadcas development. Lifecycle sb. Use Fragment to generate the 5.3. Content Provider: Fragments given multiple activities, ‘5a Service: Features OF service, | se. Develop programs to play the ‘Android — platform service given multimedia Defining new service, Service Unit-V 5d, Write the query to perform the Lifecycle, Permission, example of ern ‘given database management service Aci And Makipedia | operation 55. Android System Architecture ee aia framework, Play corns ‘Audio and Video, Text to speect, Sensors, Async tasks 5.6 Audio Capture, Camera | 5.7 Bluetooth, Animation 5.8 SQLite Database, necessity of | SQLite, Creation and connection | of the database, extracting value | from cursors, Transactions. 6a. Explain the given location | 6.1 SMS Telephony based service. oe ; 6.2 Location Based Services: Creating oe oa the project, Getting the maps API given permisions for users oo oe a oe 6c. Explain features of the given Dupiayiag ie ote cal | android security service. ‘Navigating to a specific location, Unit- VI 64, Write the steps to publish the Adding markers, Getting location, Security and Application | Sven android APp. | Geocoding and reverse Geocoding Deployment Getting Location data, Monitoring | Location, 3 63. Android Security Model, Declaring and Using Permissions, Using Custom Permission, 64 i | eplicaton Deployment: Creatine Small Application, Signing of application, Deployin, . — Google Play ying app Publishes, Deve oom , + Developer Console an 9 obHe Apptcaton Developmen (MSBTE_ Sem 6 Compt) Table of Contents (vara) EE — ‘chapter 1: Android and It's Toots 41 t01-7 sysabos | | —— Neos of Arcot Featirns of Andro Toots and software required for developing an Android Anotcaton 1 Anda Anite | Intrasucton to Android 4 111 Open Mandset lance (OHA) . 112 Andro Ecosystem 43 12 Need of Android 19 121 Features of Android 14 13 Tools and Sofware Requirement for eveloping an Android Application 16 14 Android Architecture 16 UNIT I Chapter 2: Installation and Configuration of Android 21 to 214 Syfiabus 21 Operating System, Java JOK, Android SOK 12 Android evelopment Tools(ADT) ‘Android Vieual Devices(AVDs) Emusators Oalvk Vital Machine, Oiference betweon JVM and DVM | 28 _ Steps to instal and conigure Android Studio and SOK x parang System a4 Ey) yen Operating Sytem 24 2 sasK pre 23 oh a cneone 2s 29-7 Andon vial Doves 23 2347 Grmala and Manage Vital Doves 2a 2 eats 24 25 Dahak Vitun! Mactan (OM). 25 241 of Dalvie Vital Machine (OVM). 25 252. Dirence betwmen JVM ad OVM 25 26° Stops to Install and Conigure Android Studio and SOK 25 nrr iit Ul Components and Layouts 3-1 to3-19 3.1 Conttal Flow, Directory Structure 32 Components of a screen, Fundamental Ul Design \ 33. Linear Layout; Absolute Layout, Frame Layout; Table Layout Relative Layout 1) Control Flow aA “81 Additional Components... 32 31.2) Android Application Structure. 32 BAS Android Ul Contos. 38 3.4 Create Ul Contos 38 3.1.5 Directory Structure in Android Project. 35 3.1.8 Android Directory Structure 36 32 Component of Screen, Fundamental ot U! Design ...27 321 Fundamental of Android Ul Design 37 33 Types of Layout a7 3.3.1 Linear Layout. BT 8.8.1(A) Linear Layout Atibutes.. 38 332 Absolute Layout 810 3.3.2(A) Absolute Layout Attributes. GAO 3.3.2(8) Public Constructors SAO 393 Table Layout att 41 Test View, Eat Text Button, Image Button; Toggle Buon: ‘Radio Button And Radio Group; Checkbox, Progress Bar Chapter 5: Activity and Multimedia with Databases 5-1 to 5107 System Architecture, Mutimedia framework, Play Audio and Video, Text to speech, &; Aare i | rable of Contec ft = Mobile Application Development (MSBTE_Sem-6 Comp) 599 5.12 Satite Database gi Stet tnt 32 a 52 Activity Lifecycle... sto | 5.12.1 Query Language, + 21 Actvty States and App Visity 11 | 5122 Query Structure 5-93 gs Bomdcat Loy is | 5123 Quotes or Anois Site 59 gst Bada nents rs | s124 Necesty of SLi. so 32 System Bronoast nents eis | 5125 ontabeso Package 595 433. custom Bromtcat nents re | 5128 erecting Vales rm Caso 5-108 34 ronda Recovers sie | 5127. Tansacons 5-108 $4 Content rove ste | 512710) ACIO Properties. 108 ss ‘Fragments. 5-26 UNIT VI 551 Android Fragment Life Cycle 528 | Chapter6: Security and Application Deployment 552 How touse Fragments? 529 6-1 to 6-39 $53 Twesot Fragments 520 || syiabus: 58 Servons.. 99 || 61 8MS Tlophory 561 Foanres of Sovoos sano || 82 tocaton Based Series: Crating th poet ting he ‘maps API key, Displaying the map, Displaying the zoom 582 AnctidPatonm Senior 598 ane eveteeingtoa opectic ocaton, Ang MAH see eat Goting cation, Geecoding and reverse Geecacng, Geting Location data, Monitoring Location 584 Pemisson sae 6.3 Android Security Model, Declaring and Using Permissions 57 Android System Architecture ..... 545 Using Custom Permission. 57.1 Architecture... 6.4 Application Deployment: Creating Small Application, Signin ‘of application, Deploying app on Google Play Store, Becom CE le 548 || a Publisher, Developer Console, — a A .— 88 | 62 Location Based Senices... ‘ 575 Senco 621 The Location Object. . 57.6 Asyne Task... 622 Togetan APthey... '5.7.6(A) Limitations of AsyncTask 5-67 | 623 Android Google Map.... 7 58 Audio Capture 5-67 | 6.24 Methods of Google Map. se ‘Camera... — ——— ‘ 5.10 Android Set Bluetooth Permissions 580 | 62.5(A) important Methods of Zoom Controls St Animation 628 —ShowMarkeron a Location Table of Cons, Mobile Application Devel sr msere_sem6 compl) 62.7 —Geocode and Reverse G ere | 641 Signing Your Ave Manvaly 628 Location Data ese | 642 Publish Andro App On Praystore 83 628(A) Locatonsouce 618 | 643 Become a Publisher $0 6.2.8(8) Monitenng Location 619 | 6.4.3(A) Preparing Your App for Release... 6a is Anarord Security Mode! 625 | 6.4.3(6) Releasing Your App to Users . 67 631 Decianng and Enforcing Permissions. 6-26 | 64.4 Developer Console. 67 632 Using Custom Permissions 627 64 Generate Signed APK for Android App. 627

You might also like