BCA Syllabus 3rd Yr .
BCA Syllabus 3rd Yr .
INSTRUCTIONSTOPAPERSETTERS:
1. Question No. 1 should be compulsory and cover the entire syllabus. There should be10
questions of short answer type of 2.5 marks each, having at least 2 questions from each
unit.
2. Apart from Question No. 1, rest of the paper shall consist of four units as per the
syllabus. Every unit should have two questions to evaluate analytical/technical skills of
candidate. However, student may be asked to attempt only 1 question from each unit.
Each Question should be of12.5 marks, including its subparts, if any.
3. Examiners are requested to go through the Course Outcomes (CO) of this course and
prepare the question paper accordingly, using Bloom‟s Taxonomy (BT), in such a way
that every question be mapped to some or other CO and all the questions, put together,
must be able to achieve the mapping to all the CO(s), in balanced way.
LEARNING OBJECTIVES:
In this course, the learners will be able to develop expertise related to the following:-
1. Working and functionalities of operating system
2. Understand the concept of process scheduling, ,memory management, deadlock and file system
3. Understand basic commands of Linux and shell scripts.
PRE-REQUISITES:
1. Basic understanding of hardware and software of computer organization.
*BT
CO# Detailed Statement of the CO MappingtoPO #
Level
Understand the basic concept of Operating System with
CO1 BTL2 PO1, PO4
the help of Unix and Linux Architecture.
Understand the concept of Processes, Process Scheduling,
CO2 Process Synchronization and applying process commands BTL3 PO1, PO2,PO4,PO5
in Linux environment.
Understand the concept of memory management and
CO3 BTL2 PO1, PO2,PO4,PO5
deadlock.
Understand the concept of file Systems, Types and
CO4 BTL3 PO1, PO2,PO4
Access Methods by using Linux commands.
UNIT–I
No. of Hours: 12 Chapter/Book Reference: TB1 [Chapter 1]; TB2 [Chapters 1, 2, 3, 4, 5]
Introduction: What is an Operating System, Functions of Operating System, Simple Batch Systems;
Multi programmed Batch systems, Time-Sharing Systems, Personal-computer systems, Parallel
systems, Distributed Systems, Real-Time Systems.
Introduction to Linux: Architecture of Linux OS, Basic directory structure of Linux, Basic
commands of Linux:-man,info,help,whatis,apropos, basic directory navigation commands like
Bachelor of Computer Applications
cat,mkdir,rmdir ,cd, mv, cp, rm, ,file, pwd ,date,cal,echo,bc,ls,who,whoami, hostname, uname,
tty,aliase
Vi Editor: vi basics, Three modes of vi Editor, how to write, save, execute a shell script in vi editor
UNIT–II
No. of Hours: 12 Chapter/Book Reference: TB1 [Chapters 3, 5, 6]; TB2 [Chapter 9]
Information Management: Introduction, File Concept, Access methods, Directory and Disk
structure, File Protection
Linux File Security: Permission types, Examining permissions, changing permissions (symbolic
method numeric method)
TEXT BOOKS:
[TB1] Silbersachatz and Galvin, “Operating System Concepts”, John Wiley & Sons, 10 th
Ed. 2018
[TB2] Sumitabha Das, “Unix Concepts and Application”, TMH
REFERENCE BOOKS:
REFERENCES: [R1] Madnick E., Donovan J., “Operating Systems”, Tata McGraw Hill,
2011
REFERENCES: [R2] [R2] Tannenbaum, “Operating Systems”, PHI, 4th Edition, 2015
REFERENCES: [R3] Sivaselvan, Gopalan, “A Beginner‟s Guide to UNIX”, PHI Learning
Bachelor of Computer Applications
Course Code: BCA 303 L T C
Course Name: Computer Graphics 3 1 4
LEARNING OBJECTIVES:
In this course, the learners will be able to develop expertise related to the following:
1. Concept of Computer graphics, types of display devices and their techniques.
2. Methods of drawing of graphic objects on the display devices.
3. Concepts of viewport, mapping of real world objects to display device, clipping
4. Knowledge of projection concepts and their types
PRE-REQUISITES:
1. Programming in C/C++
UNIT – I
No. of Hours: 11 Chapter/Book Reference: TB1, TB2
Clipping
Cohen- Sutherland Algorithm, Cyrus-Beck Algorithm
Geometrical Transformations
2D Transformations, Homogeneous Coordinates and Matrix Representation of 2D Transformations,
Composition of 2D Transformations, Window-to-Viewport Transformation, Introduction of Matrix
Representation of 3D Transformations of translation, scaling and rotation (without derivation).
UNIT – III
No. of Hours: 11 Chapter/Book Reference: TB1, TB2
Representing Curves
Introduction to Polygon Meshes and its types, Parametric Cubic Curves: parametric and geometric
continuity, Hermite, Bezier & B-Spline.
Surfaces
Surface rendering- Basic Illumination, Effect of ambient lighting and distances, Shading models-
Gourard Shading, phong model.
UNIT – IV
No. of Hours: 11 Chapter/Book Reference: TB1, TB2
TEXT BOOKS:
TB1. Foley, Van Dam, Feiner, Hughes, Computer Graphics Principles & Practice, 2000, Pearson
TB2. Chennakesava R. Alavla “Computer Graphics”, PHI Learning Pvt. Limited
REFERENCES BOOKS:
RB1. D. Hearn & Baker: Computer Graphics with OpenGL, Pearson Education, Third Edition,
2009.
RB2. Foley, J.D. & Van Dam, A: Fundamentals of Interactive Computer Graphics.
RB3. Rogers & Adams, “Mathematical Elements for Computer Graphics”, McGraw Hill, 1989.
Bachelor of Computer Applications
Course Code: BCA 305 L T C
Course Name: Cloud Computing 3 1 4
LEARNING OBJECTIVES:
In this course, the learners will be able to develop expertise related to the following:
1. Understand current cloud computing technologies, including technologies for different cloud
services.
2. Analyze the components of cloud computing
3. Perform Large data processing in the cloud
PRE-REQUISITES:
1. Basics of Computer Network
2. Knowledge of Operating System and Databases.
UNIT – I
No. of Hours: 11 Chapter/Book Reference: TB1 [Chapters - 1, 10], TB2 [Chapters - 1, 2]
Principles of Parallel and Distributed Computing: Parallel vs. distributed computing - Elements of
parallel computing - Hardware architectures for parallel processing, Approaches to parallel
programming - Laws of caution.
UNIT – IV
No. of Hours: 11 Chapter/Book Reference: TB1 [Chapter - 3], TB2 [Chapter - 8]
TEXT BOOKS:
TB1. Rajkumar Buyya, Christian Vecchiola and S. Thamarai Selvi, “Mastering Cloud Computing” -
Foundations and Applications Programming, MK publications, 2013.
TB2. Gautam Shroff, “Enterprise Cloud Computing: Technology, Architecture, Applications” by
Cambridge University Press, 2010.
REFERENCE BOOKS:
RB1. Michael J.Kavis, “Architecting the Cloud: Design Decisions for Cloud Computing Service
Models (SaaS, PaaS, and IaaS)”, John Wiley & Sons Inc., Jan 2014.
Bachelor of Computer Applications
Course Code: BCA 307 L T/P C
Course Name: Minor Project 0 8 4
PROJECT REPORT
All the students are required to submit a report based on the project work done by them
during the sixth semester.
SYNOPSIS (SUMMARY/ABSTRACT) :
All students must submit a summary/abstract separately with the project report. Summary,
preferably, should be of about 3-4 pages. The content should be as brief as is sufficient enough to
explain the objective and implementation of the project that the candidate is going to take up. The
write up must adhere to the guidelines and should include the following:
TOPIC OF THE PROJECT- This should be explicitly mentioned at the beginning of the
Synopsis. Since the topic itself gives a peep into the project to be taken up, candidate is advised to
be prudent on naming the project. This being the overall impression on the future work, the topic
should corroborate the work.
OBJECTIVE AND SCOPE: This should give a clear picture of the project. Objective should be
clearly specified. What the project ends up to and in what way this is going to help the end user
has to be mentioned.
RESOURCES AND LIMITATIONS: The requirement of the resources for designing and
developing the proposed system must be given. The resources might be in form of the
hardware/software or the data from the industry. The limitation of the proposed system in respect
of a larger and comprehensive system must be given.
CONCLUSION: The write-up must end with the concluding remarks- briefly describing
innovation in the approach for implementing the Project, main achievements and also any other
important feature that makes the system stand out from the rest.
Bachelor of Computer Applications
The following suggested guidelines must be followed in preparing the Minor Project Report:
Good quality white A4 size paper should be used for typing and duplication. Care should be
taken to avoid smudging while duplicating the copies.
Normal Body Text: Font Size: 12, Times New Roman, Double Spacing, Justified. 6 point
above and below para spacing
Paragraph Heading Font Size: 14, Times New Roman, Underlined, Left Aligned. 12 point
above & below spacing.
Chapter Heading Font Size: 20, Times New Roman, Centre Aligned, 30 point above and below
spacing. Coding Font size : 10, Courier New, Normal
Submission of Project Report to the University : The student will submit his/her project report in
the prescribed format. The Project Report should include:
4. ACKNOWLEDGEMENTS
In the “Acknowledgements” page, the writer recognizes his indebtedness for guidance and
assistance of the thesis adviser and other members of the faculty. Courtesy demands that he also
recognize specific contributions by other persons or institutions such as libraries and research
foundations. Acknowledgements should be expressed simply, tastefully, and tactfully.
Bachelor of Computer Applications
Course Code: BCA 311 L T C
Course Name: Machine Learning with Python 4 1 5
LEARNING OBJECTIVES:
In this course, the learners will be able to develop expertise related to the following:
1. To make student able to learn mathematical concepts, and algorithms used in machine learning
techniques for solving real world problems and developing new applications based on machine
learning.
2. To introduce students to the state-of-the-art concepts and techniques of Machine Learning using
Python.
PRE-REQUISITES:
1. Basics of Python Programming
COURSE OUTCOMES(COs):
After completion of this course, the learners will be able to:-
CO# Detailed Statement of the CO *BT Mapping to
Level PO#
CO1 Explain machine learning concepts on real world BTL2 PO1, PO2,
applications and problems. PO8
CO2 Analyze and Implement Regression techniques. BTL2, PO1, PO4,
BTL3 PO5, PO7
CO3 Solve and design solution of Classification BTL3, PO2, PO3,
problem BTL6 PO4,PO8
CO4 Understand and implement Unsupervised learning BTL2, PO4, PO5,
algorithms BTL3 PO6, PO8
CO5 Interpret various machine learning algorithms in a BTL3 PO2, PO6,
range of real world applications. PO7
UNIT–I
No. of Hours: 11 Chapter / Book Reference: TB1 [Chapters - 1, 3, 4, 8, 9], TB2 [Chapters -
1, 4]
Introduction to Machine Learning, Why Machine learning, Types of Machine Learning Problems,
Applications of Machine Learning. Supervised Machine Learning- Regression and Classification.
Binary Classifier, Multiclass Classification, Multilabel Classification. Performance Measures-
Confusion Matrix, Accuracy, Precision & recall, ROC Curve. Advanced Python- NumPy, Pandas.
Bachelor of Computer Applications
Python Machine Learning Library Scikit-Learn, Linear Regression with one Variable, Linear
Regression with Multiple Variables, Logistic Regression.
UNIT-II
No. of Hours: 11 Chapter / Book Reference: TB1 [Chapters - 5, 6, 7], TB2 [Chapter - 6]
Supervised learning Algorithms: Decision Trees, Tree pruning, Rule-base Classification, Naïve
Bayes, Bayesian Network. Support Vector Machines, k-Nearest Neighbor, Ensemble Learning and
Random Forest algorithm.
UNIT - III
No. of Hours: 11 Chapter / Book Reference: TB1 [Chapter - 10], TB3 [Chapters - 2, 6]
TEXT BOOKS:
TB1. GeronAurelien, “Hands-On Machine Learning with Scikit-Learn & TensorFlow”, O‟REILLY,
First Edition, 2017.
TB2. U Dinesh Kumar and Manaranjan Pradhan, “Machine Learning using Python", Wiley, 2019.
TB3. Fausett Laurence, “Fundamentals of Neural Networks”, Pearson, Ninth Edition, 2012.
REFERENCE BOOKS:
RB1. Tom Mitchell, “Machine Learning”, First Edition, McGraw- Hill, 1997.
RB2. Budd T A, "Exploring Python", McGraw-Hill Education, 1st Edition, 2011.
RB3. Jake VanderPlas,“Python Data Science Handbook”, O‟Reilly,1st Edition,2017.
List of Practical
LEARNING OBJECTIVES:
In this course, the learners will be able to develop expertise related to the following:
1. Students will be able to learn the techniques needed for providing protection and security to our
data and information resources over internet.
2. To understand and learn web application and its Architecture.
3. Students will be able to develop awareness regarding Cyber laws and crimes.
4. Students will be able to understand the internet and web application security issues.
5. Students will be able to learn and understand wireless network security issues.
6. To learn and understand the concept of web services, ajax and other technology which are
helpful.
PRE-REQUISITES:
1. Computer Network
2. C/C++/HTML (Programming Knowledge of C/C++/HTML/JS)
COURSE OUTCOMES(COs):
After completion of this course, the learners will be able to:-
UNIT–I
Bachelor of Computer Applications
No. of Hours: 12 Chapter/Book Reference: TB1 [Chapter - 1], TB2 [Chapters - 1, 3]
Components of Internet, Weak points of Internet, HTTP vs HTTPS, Overview of web authentication
technologies, Web application architecture, Recent attack trends, Types of Web Security, Web
infrastructure security/Web application firewalls, managing configurations for web apps, Techniques
of Web Hacking, Methods of Attacking users, Importance of Web Application Security, Web
Application Security vs Network Security. Social Media security - What is Online Social Networks,
data collection from social networks, challenges, opportunities, and pitfalls in online social networks,
APIs Collecting data from Online social media. Trust, credibility, and reputations in social systems.
UNIT–II
No. of Hours: 11 Chapter/Book Reference: TB1 [Chapters - 4, 6], TB2 [Chapters - 8, 11]
Internet and Web Application Security: Email security (PGP and SMIME), Web Security: Web
authentication, Injection Flaws, Programming Bugs and Malicious code, XSS and SQL Injection,
Memory corruption exploits, Web Browser Security, E-Commerce Security
UNIT–III
No. of Hours: 11 Chapter/Book Reference: TB1 [Chapter - 5], TB2 [Chapters - 1, 10, 11]
Wireless Network Security: Components, Security issues, Securing a Wireless Network, Mobile
Security Management: Disaster Recovery, Ethical Hacking, Penetration Testing, Computer
Forensics, Cyber laws and crime, Security Audit and Investigation, Cyber Security Solutions
UNIT–IV
No. of Hours: 10 Chapter/Book Reference: TB1 [Chapter - 6], TB2[Chapters - 5, 10, 11]
Web services overview, Honeytoken, XML security, AJAX attack trends and common attacks,
REST security, Content Security Policy Serialization security, Clickjacking, DNS rebinding,
HTML5 security, Logging collection and analysis for web apps, Security testing, IPv6 impact on
web security
TEXT BOOKS:
TB1. Joel Scam bray, Vincent Liu, Caleb Sima, “Hacking Exposed Web Applications, 3rd
Edition”, McGraw-Hill, October 2010
TB2. Baloch, R., Ethical Hacking and Penetration Testing Guide, CRC Press, 2015.
REFERENCE BOOKS:
RB1. Dafydd Stuttard, and Marcus Pinto, The Web Application Hacker's Handbook: Finding and
Exploiting Security Flaws, 2nd Edition, John Wiley & Sons, 2011.
RB2. Council, Ec. , Computer Forensics: Investigating Network Intrusions and Cybercrime,
Cengage Learning, Second Edition, 2010.
RB3. John W. Ritting house, William M. Hancock, “Cyber Security Operations
Handbook”, Elsevier Pub
RB4. Deborah G Johnson, “Computer Ethics”, 4th Edition, Pearson Education Publication.
RB5. Earnest A. Kallman, J.P Grillo, “Ethical Decision making and IT: An Introduction with
Cases”, McGraw Hill Publication.
Bachelor of Computer Applications
List of Practicals
2. Analysis of the security and privacy features and issues in CO1, CO2
Ecommerce & social media websites i.e., Facebook, Twitter and
Google+
9. Implement Reconnaissance with the help of Google and Whois CO5, CO6
10. Implement Clickjacking, DNS rebinding & Ajax Attack CO5, CO6
Note:
1. In total 10 practicals to be implemented. 2 additional practical may be given by the
course instructor.
2. This is a suggestive list of programs. However, the instructor may add programs as
per the requirement of the course.
Bachelor of Computer Applications
Course Code: BCA 315 L T C
Course Name: Web Development with Java & JSP 4 1 5
LEARNING OBJECTIVES:
In this course, the learners will be able to develop expertise related to the following:-
1. Learn Web development using Java.
2. Understand the basics of J2EE and Web development.
3. Understand and implement Servlet
4. Creating and implementing JDBC application.
5. Implement JSP and JSF concepts.
6. Understand the fundamentals of Hibernate, Struts and springs.
PRE-REQUISITES:
1. Programming Knowledge of Java
2. HTML
Introduction to HTML, CSS and Java Script: Content, layout, and styling of web page
J2EE and Web Development: Java Platform, J2EE Architecture Types, Types of Servers in J2EE
Application, HTTP Protocols and API, Web Application Structure, Web Containers and Web
Architecture Models.
Swings: Introduction and comparison with AWT controls.
UNIT – II
No. of Hours: 11 Chapter/Book Reference: TB1 [Chapter - 37], TB2 [Chapters - 34, 41, 42]
Introduction to Java EE Web Component: Overview of Servlet, Servlet Life Cycle, Types of
Servlet, HTTP Methods Structure and Deployment descriptor Servlet Context and Servlet Config
interface, State Management: client and server side,
JDBC Programming: JDBC Architecture, Types of JDBC Drivers, Introduction to major JDBC
Classes and Interface, Creating simple JDBC Application, Database operations using JDBC, Types
of Statement (Statement Interface, Prepared Statement, Callable Statement), Exploring Result Set
Operations.
UNIT – III
No. of Hours: 11 Chapter/Book Reference: TB2 [Chapters - 43, 44]
Java Server Pages: Introduction to JSP, Comparison with Servlet, JSP Architecture, JSP Life Cycle,
JSP Directives, JSP Action, JSP Standard Tag Libraries, JSP Session Management.
Develop Web Applications with JSF: JavaServer Faces (JSF) framework, architecture of JSF web
applications, development view of a JSF application.
UNIT – IV
No. of Hours: 11 Chapter/Book Reference: TB1 [Chapters - 22, 37, 39], TB2[ 33, 36]
Java Beans, Java Web Frameworks: Spring MVC: Java Beans, Spring Introduction, Spring
Architecture, Spring MVC Module, Bean life cycle, Spring API.
Hibernate and Struts: Java Beans, Introduction to Hibernate, Hibernate Architecture, Hibernate
Mapping Types, Introduction to Struts, core components, architecture, Interceptors, validation.
Advance Networking: Networking Basics, Introduction of Socket, Types of Socket, Socket API,
TCP/IP client sockets, URL, TCP/IP server sockets, Datagrams, java.net package Socket,
ServerSocket, InetAddress, URL, URLConnection.
TEXT BOOKS:
TB1. Herbert Schildt, "Java - The Complete Reference", Oracle Press, 9th Edition, 2014
TB2. Y. Daniel Liang, “Introduction to Java Programming, Comprehensive Version, Pearson.
TB3. Sams Teach Yourself HTML, CSS & JavaScript Web Publishing in One Hour a Day by Laura
Lemay, Rafe Colburn, Jennifer Kyrnin, 2015
REFERENCE BOOKS:
RB1. E. Balaguruswamy, “Programming with Java”, Tata McGraw Hill, 4th Edition, 2009.
RB2. Cay Horstmann, “Computing Concepts with Java 2 Essentials”, John Wiley & Sons, 2nd
Edition, 1999.
RB3. Jeffrey C. Jackson, “Web Technologies: A Computer Science Perspective”, Pearson.
RB4. Jakarta Struts Cookbook, by Bill Siggelkow, O'Reilly Media, Inc. 2005
List of Practicals
Bachelor of Computer Applications
4. Write a java program that connects to a database using JDBC and does CO3
add, delete and retrieve operations.
5. Create and Develop a web application using JSF. CO3
6. Write a program to implement a Java Beans to set and get values. CO2
7. Create a Java application to demonstrate Socket Programming in Java. CO5
8. Write a program to retrieve hostname--using methods in Inetaddress CO2
class
Application Based Practicals (Implement minimum 5 out of 10 practicals)
9. Write a client-server program which displays the server machine's date CO1
and time on the client machine.
10. Create a table in the database containing the columns to store book CO3
details like: book name, authors, description, price and URL of the
book‟s cover image. Using JSP and JDBC retrieve the details in the table
and display them on the webpage
11. Write a program to create a login page using Java Beans.Also validate CO1
the username and password from the database.
12. Create a form for inputting text and uploading image using struts CO4
13. Create a Student Registration application using Hibernate. CO4
14. Write a program to implement MVC using Spring Framework CO4
Note:
1. In total 10 practicals to be implemented. 2 additional practical may be given by the course
instructor.
2. This is a suggestive list of programs. However, the instructor may add programs as per the
requirement of the course.
Bachelor of Computer Applications
Course Code: BCA 331 L T C
Course Name: Summer Training Project 0 0 2
Objective:
All the students enrolled for BCA Programme, have to undergo compulsory summer training/ Project
of minimum 06 weeks in an organization in the IT field. The aim of the project is to give the students
an integrated experience in solving a real-life problem by applying knowledge and skills gained on
completion of theory papers and in-house practical papers during BCA course. It provides an
occasion for students to realize the importance of resource and time management, ownership of task
towards deliverables, innovation and efficiency in the task management. It also provides a good
opportunity for students to build, enhance and sustain high levels of professional conduct and
performance and evolves a problem solver frame of mind in students at early stage. It also prepares
students for taking up responsible assignments in the corporate establishment.
General Guidelines:
1. The project should be original, of real-life value, and not copied from existing material from
any source. A student should ensure that he understands what is expected by preparing a
requirement document of his understanding and get it reviewed by the guide.
2. Design document should also be reviewed and code should also be peer reviewed.
3. A user manual has to be prepared and reviewed.
4. Testing has to be thorough and at various levels, followed by an acceptance test based on the
requirement document and user manual.
5. Students should follow the steps as discussed in Software Development Life Cycle while
writing dissertation and use Software Engineering Methodologies for development of
deliverables, mere programming will not be sufficient. Students must note that interviewers
for job are often more interested in the problem solved, alternatives that could have been tried
and the benefits derived from the developed application, rather than just implementation
details.
6. One Project will be submitted only by one student. However, if the nature of the project is
very big & large enough to be divided in different independent big modules having an
estimated required effort of minimum 06 weeks to be developed by one person, can be taken
up and designed in such a way that every student will be responsible for one module and will
submit only that specific module as it were a complete software project.
7. Every student has to get his / her synopsis approved from the guide.
8. The synopsis must be brief i.e., not more that 4-6 pages. It must address details like
(however, students may follow the SRS format of IEEE for writing Synopsis)
a. Name / title of the project,
b. Statement about the problem,
c. Why the Particular topic is chosen? It must address Present State of the Art.
d. Objective and scope of the project,
e. Analysis, Design, Development & Testing Methodology,
f. H/W & S/W to be used,
g. Testing Technologies to be used,
h. What contribution / value addition would the project make?
i. Limitations / constraints of the project,
j. Conclusion, Future Scope for Modification,
k. References and Bibliography.
9. After approval of the Synopsis, Students will need to give Two Presentations /
Demonstration, as per the schedule fixed by their respective Institutions or University. First
Bachelor of Computer Applications
Presentation will ideally be given after Design Phase is over. Second should be given when
System Testing is over. First Presentation (Summer Training) should be given in the first
month. Second Presentation (Projects) is in second month. Final Project reports should be
given latest by the end of the third month of the semester.
10. Summer Training report has to be submitted by 31st October of every academic year.
11. The student will submit his/her project report/thesis in the prescribed format, as given
hereunder, after the second presentation. The project report/thesis should include: -
a. ONE hard copy (Maroon colour with golden print) of the project report / thesis.
b. Soft copy of project on CD including all resource code/ compiled binary code and the
manuscript in MS-Word document format.
12. Note the following guidelines with respect to Preparation of the Documentation. Please note
that documentation is meant for other people, and hence it must be self-explanatory, in all
respect.
12.1.1 The sequence of the Pages in the Project Report will be as follows:
1. One Transparency Sheet
2. Title Page (Strictly as per the sample supplied)
3. Institute‟s Certificate
4. Company‟s Certificate
5. Candidate Declaration of originality of work
6. Acknowledgement.
7. Abstract
8. List of Figures (Strictly as per the sample supplied)
9. List of Tables (Strictly as per the sample supplied)
10. List of Abbreviations (Strictly as per the sample supplied)
11. Contents (Strictly as per the sample supplied) and then body of the
dissertation according to the content.
12.2 The pages coming under the preview of the CONTENTS will only be numbered in the
BOTTOM of the Page Centrally Aligned.
12.3 ONE Hardbound Copies (One Original and Two Xerox) will be submitted with the
Institute out of which one will be given back to the candidate. All the students are
required to follow the same binding format in maroon color with back quote
mentioning title of the project, name of the student and year.
12.4 At the end of the Project Report Two White blank sheets must be attached.
12.5 At the beginning of each chapter one blank page (Strictly as per the sample supplied)
must be attached. These pages will neither be numbered nor counted in total
numbering of pages. They will only indicate the beginning of a New Chapter with its
learning objectives.
12.6 Font size of the documentation will be 12 Times New Roman and the pages will be
one and half line spaced. The page margin will be as under: -
Top – 1 inch, Bottom – 1 inch,
Left – 1.5 inch, Right – 1 inch.
12.7 Kindly note that all-methodological details and theoretical aspects must be written in
students‟ own words. Copying from books or other students will not be accepted, in
any case.
All students are informed not to write definition of various concepts in index, mention the
topics w. r. t. to your project (i.e., how various concepts have been implemented in the project)
*********
# Please note that for all the System Design (Database, Input & Output) the basic Prototype,
format, Table Structure, etc. is to be discussed along with related validations, verifications &
normalization. However, the sample Input & Output (Screen Snapshots) will be attached in
the annexure.
## Under Testing, you have to discuss the approach of Testing, Test Data, Test Cases and Test
Report. How Debugging has been performed, on the basis of Test Report, must be also
discussed?
Bachelor of Computer Applications
Template for blank page before every chapter
CHAPTER 2
SYSTEM ANALYSIS
LIST OF TABLES
LIST OF ABBREVIATIONS
Abbreviation Description
CAD Context Analysis Diagram
DFD Data Flow Diagram
HIPO Hierarchical Input Process Output
References/Bibliography:
1. Patterson D W, “Introduction to Artificial Intelligence and Expert Systems”, Second Edition,
2002, Prentice Hall of India Private Ltd., New Delhi.
2. V. Rajaraman, “An Introduction to Digital Computer Design”, Third Edition, 1995, Prentice
Hall of India Private Ltd., New Delhi.
PRE-REQUISITES:
List of Practicals
S. Detailed Statement Mapping to CO #
No.
Core Practicals
Connect to the Linux Server and understand the basic Directory CO1
Structure of Linux.
1
3. To understand basic directory navigation commands like cat,cd, mv, cp, CO2
rm, mkdir,rmdir ,file, pwd command.
6. To understand process related commands like: - ps, top, pstree, nice, CO3
renice in Linux.
7 To understand how to examine and change File permissions. CO4
8 Set a file to be read-only with the chmod command. Interpret the file CO4
Bachelor of Computer Applications
permissions displayed by the ls -l command.
9 Delete one or more directories with the rmdir command. See what CO2
happens if the directory is not empty. Experiment (carefully!) with
the rm -r command to delete a directory and its content.
10 Change your directory to the directory exercises. Create a file in that CO2
directory, named the file as example1 using the cat command
containing the following text: water, water everywhere and all the
boards did shrink; water, water everywhere, no drop to drink.
11 Write basic shell script to display the table of a number. CO5
12 Write basic shell script to input a character from user and then check
whether it is uppercase, lowercase or digit.
13 Write basic shell script to calculate factorial of a number.
14 Write basic shell script to input the month number and generate
corresponding calendar.
15 Write basic shell script to list all directories.
16 Write basic shell script to display greatest of three numbers.
17 Write basic shell script to check whether the number entered by user
is prime or not.
Note:
1. 1. In total 15 practicals to be implemented. 2 additional practical may be given by the course
instructor.
2. This is a suggestive list of programs. However, the instructor may add programs as per the
requirement of the course.This is a suggestive list of programs. However, the instructor may add
programs as per the requirement of the course.
Bachelor of Computer Applications
Course Code: BCA 373 L T/P C
Course Name: Practical - XI CG Lab 0 4 2
LEARNING OBJECTIVES:
In this course, the learners will be able to develop expertise related to:
1. Concept of Computer graphics, the coordinate system of display devices.
2. Implementing various scan converting algorithms.
3. Methods of drawing of graphic objects on the display devices.
4. Generating complex graphic objects
5. Implementation of various 2D transformations
6. Implementing line clipping algorithms
PRE-REQUISITES:
Knowledge of Programming in C/C++ is preferable
Understanding of various functions included in graphics.h header files
List of Practicals
Bresenham's
4. Circle Algorithms CO2
5. Translation in 2D CO3
6. Rotation in 2D CO3
7. Scaling in 2D CO3
8. Reflection in 2D CO3
9. Shearing in 2D CO3
Note:
1. In total 15 practicals to be implemented. 2 additional practical may be given by the course
instructor.
2. This is a suggestive list of programs. However, the instructor may add programs as per the
requirement of the course.
Bachelor of Computer Applications
Course Code: BCA 302 L T C
Course Name: Data Ware Housing and Data Mining 3 1 4
LEARNING OBJECTIVES:
In this course, the learners will be able to develop expertise related to the following:-
1. To understand the basic principles, concepts and applications of Data warehousing and
ELT tools.
2. Differentiate Online Transaction Processing and Online Analytical processing
3. To understand the Data Mining Process, Technologies & Rules, platform tools and data
pre-processing or data visualization techniques.
4. Identifying business applications of data mining
5. Develop skills in selecting the appropriate data mining algorithm for solving practical problems.
PRE-REQUISITES:
1. Discrete Mathematics
2. Information system concept
CO6 Test real data sets using popular data mining tools such BTL6 PO1, PO2, PO3,PO4,
as WEKA PO6, PO7, PO8
Bachelor of Computer Applications
UNIT – I
No. of Hours:12 Chapter/Book Reference: TB3 [Chapters - 1, 2, 3]
Introduction to Data Warehousing: Overview, Difference between Database System and Data
Warehouse, The Compelling Need for data warehousing, Data warehouse – The building Blocks:
Defining Features, data warehouses and data marts, overview of the components, three tier
architecture, Metadata in the data warehouse.
ETL tools: - Defining the business requirements: Dimensional analysis, information packages – a
new concept, requirements gathering methods, requirements definition: scope and content
UNIT – II
No. of Hours:11 Chapter/Book Reference: TB3 [Chapters - 10, 11, 12]
UNIT – III
No. of Hours:10 Chapter/Book Reference: TB1 [Chapters: 1, 3], TB2 [Chapter - 3], RB5
[Chapter - 17]
UNIT – IV
No. of Hours: 10 Chapter/Book Reference: TB1 [Chapters - 1, 3], RB2, RB3
TEXT BOOKS:
TB1. Kamber and Han, “Data Mining Concepts and Techniques”, Third edition, Hartcourt India
P.Ltd.,2012.
TB2. Pang-Ning Tan, Michael Steinbach, Vipin Kumar, “Introduction to data mining”, Pearson
education, 2006
TB3. Paul Raj Poonia, “Fundamentals of Data Warehousing”, John Wiley & Sons, 2004
Bachelor of Computer Applications
REFERENCE BOOKS:
RB1. Ashok N. Srivastava, Mehran Sahami, “Text Mining Classification, Clustering, and
Applications”, Published by Chapman and Hall/CRC1st Edition, June 23, 2009
RB2. Ian H., Eibe Frank, Mark A. Hall, Christopher Pal “Data Mining: Practical Machine Learning
Tools and Techniques”Published by Morgan Kaufmann; 4th edition ,December 1, 2016
RB3. G. K. Gupta, “Introduction to Data Mining with Case Studies”, PHI, 2006
RB4. Alex Berson and Stephen J.Smith, “Data Warehousing, Data Mining & OLAP”, Tata McGraw
Hill, 1 July 2017
RB5. Shmueli, “Data Mining for Business Intelligence : Concepts, Techniques and Applications in
Microsoft Excel with XLMiner”,Wiley Publications
Bachelor of Computer Applications
Course Code: BCA 304 L T C
Course Name: E-Commerce 3 1 4
LEARNING OBJECTIVES:
In this course, the learners will be able to develop expertise related to the following: -
1. To learn and understand the basic nature of e-commerce.
2. To study how the internet and web support e-commerce.
3. To explain how to use technologies to build e-commerce websites.
4. To make students aware of the business environment associated with e-commerce.
PRE-REQUISITES:
1. Basic Knowledge of computers and business concepts.
2. Basic knowledge of the Internet.
COURSE OUTCOMES(COs):
After completion of this course, the learners will be able to: -
CO# Detailed Statement of the CO *BT Mapping to PO #
Level
CO1 Understand the framework and business models BTL2 PO1, PO2, PO3, PO7
of
E-commerce.
CO2 Explain the concept of network infrastructure and BTL2 PO1, PO2, PO3, PO7,
gain knowledge about mobile commerce. PO10
CO3 Demonstrate the process of secure electronic BTL3 PO1, PO2, PO3, PO4
transactions for E-commerce.
CO4 Analyze various e-commerce secure payment BTL4 PO1, PO2, PO3, PO4,
gateway. PO7
CO5 Evaluate Internet banking platform to work with BTL5 PO1, PO2, PO3,
E-commerce infrastructure. PO4, PO11
CO6 Implement ecommerce website for online BTL6 PO1, PO2, PO3, PO4,
business. PO6, PO7, PO8
Bachelor of Computer Applications
UNIT-I
No. of Hours: 10 Chapter/Book Reference: TB1[Chapters – 1,2],
UNIT II
No. of Hours: 10 Chapter/Book Reference: TB1 [Chapters - 2, 3], RB1,RB3
Building an e-commerce presence: Planning, System Analysis, Design, Choosing Software,
Hardware, Other E-commerce site tools: Tools For website design, Tools for SEO, Interactivity and
active contents (Server side scripting)
Important Components of E-commerce website: Product Cataloging, Product Listing Page,
Product description Page, Cart building and Checkout, Third party integrations: Payment systems,
Data Layer Integrations for analytics, Customer support integration, Order tracking, Shipping, return
and cancellation
New Technologies for E-commerce: Chatbots, Recommendation systems (Personalisation), Smart
Search, Product Comparison, Augmented reality, Big data, Cloud computing
UNIT III
No. of Hours: 10 Chapter/Book Reference: TB2 [Chapters - 5, 6, 7], RB1, RB3
Electronic Payment Systems-
Overview of Electronics payments, electronic Fund Transfer, Digital Token based Electronics
payment System, Smart Cards, Credit Cards, Debit Cards, Emerging financial Instruments
Smartphone wallet, Social / Mobile Peer to Peer Payment systems, Digital Cash and Virtual
Currencies, Online Banking, Payment Gateway, Electronic Billing Presentment and Payment.
UNIT IV
No. of Hours: 10 Chapter/Book Reference: TB1[Chapters - 5, 6, 7], RB4
Security Threats and Issues: Cyber crimes, Credit card frauds/theft, Identity fraud, spoofing ,
sniffing, DOS and DDOS attacks, Social network security Issues, Mobile Platform Security issues,
Cloud security issues
Technology Solutions: Encryption : Secret Key Encryption, Public Key Encryption, Digital
Certificates and public key infrastructure
Securing channels: Secured Socket Layer (SSL), Transport Layer Security(TLS) , Virtual Private
Network (VPN ), Protecting Networks: Firewalls, Proxy Servers, Intrusion detection and protection
systems , Anti Virus software
TEXT BOOKS:
TB1. Kenneth C. Laudon, “E-Commerce: Business, Technology and Society”, 15th Edition,
Pearson education
TB2. KK Bajaj & Debjani Nag,” E-Commerce: The Cutting Edge of Business “McGraw Hill, II
edition, 2015
TB3. Efraim Turban, Jae Lee, David King, H. Michael Chung, “Electronic Commerce – A
Managerial Perspective", Addison-Wesley.
Bachelor of Computer Applications
REFERENCE BOOKS:
RB1. The Complete Reference: Internet, Margaret Levine Young, Tata McGraw Hill.
RB2. E-Commerce: Concepts, Models, Strategies, CSV Murthy, Himalayas Publishing House.
RB3. Frontiers of Electronic Commerce, Ravi Kalakota & Andrew B. Wilson, Addison-Wesley (An
Imprint of Pearson Education).
RB4. Network Security Essentials: Applications & Standards, William Stallings, Pearson Education.
Bachelor of Computer Applications
Course Code: BCA 306 L T C
Course Name: Internet of Things 3 1 4
LEARNING OBJECTIVES:
In this course, the learners will be able to develop expertise related to the following:
1. To learn and understand the concept of Internet of Things (IOT).
2. To study the constituent components of Internet of Things.
3. To design and develop IoT applications using different, Sensors/actuators.
4. To seek working knowledge of Arduino, Raspberry pi Boards and to develop cloud based
IOT projects.
PRE-REQUISITES:
1. Basic Programming Knowledge
2. Use of Internet
Hardware for IoT: Sensors, Digital sensors, Actuators, Radio frequency identification (RFID)
technology, Wireless sensor networks, Participatory sensing technology.
Embedded Platforms for IoT: Embedded computing basics, Overview of IOT supported hardware
platforms such as Arduino, NetArduino, Raspberry Pi, Beagle Bone, Intel Galileo boards and ARM
cortex.
UNIT–III
No. of Hours: 11 Chapter/Book Reference: TB1 [Chapters - 1,3,4,], TB2 [Chapters - 2,3,6],
TB4 [Chapter - 7]
Network & Communication Aspects in IoT: Wireless medium access issues, MAC protocol
survey, Survey routing protocols, Sensor deployment & Node discovery, Data aggregation &
dissemination
Programming the Arduino: Arduino platform boards anatomy, Arduino IDE, Coding using
emulator, Using libraries, Additions in Arduino, Programming the Arduino for IoT.
UNIT–IV
No. of Hours: 11 Chapter/Book Reference: TB1 [Chapters - 15,16], TB3[Chapters - 13,
14, 15, 16, 17], RB1[Chapter - 4]
TEXT BOOKS:
TB1. Olivier Hersent, David Boswarthick, Omar Elloumi, “The Internet of Things Key Applications
and Protocols”, Wiley.
TB2. Jeeva Jose, “Internet of Things”, Khanna Publishing House.
TB3. Michael Miller, “The Internet of Things”, Pearson Education.
TB4. Raj Kamal, “Internet of Things”, McGraw-Hill, 1st Edition, 2016
TB5. Adrian McEwen, Hakin Cassimally, “Designing the Internet of Things”, Wiley India
REFERENCE BOOKS:
RB1. Arshdeep Bahgaand Vijay Madisetti,"Internet of Things: A Hands-on Approach", University
Press, 2015
RB2. Pethuru Raj and Anupama C. Raman, “The Internet of Things: Enabling Technologies,
Platforms, and Use Cases", CRC Press, 2017.
Bachelor of Computer Applications
Course Code: BCA 308 L T/P C
Course Name: Major Project 0 12 6
PROJECT REPORT
All the students are required to submit a report based on the project work done by them
during the sixth semester.
SYNOPSIS (SUMMARY/ABSTRACT) :
All students must submit a summary/abstract separately with the project report. Summary,
preferably, should be of about 3-4 pages. The content should be as brief as is sufficient enough to
explain the objective and implementation of the project that the candidate is going to take up. The
write up must adhere to the guidelines and should include the following:
TOPIC OF THE PROJECT- This should be explicitly mentioned at the beginning of the
Synopsis. Since the topic itself gives a peep into the project to be taken up, candidate is advised to
be prudent on naming the project. This being the overall impression on the future work, the topic
should corroborate the work.
OBJECTIVE AND SCOPE: This should give a clear picture of the project. Objective should be
clearly specified. What the project ends up to and in what way this is going to help the end user
has to be mentioned.
RESOURCES AND LIMITATIONS: The requirement of the resources for designing and
developing the proposed system must be given. The resources might be in form of the
hardware/software or the data from the industry. The limitation of the proposed system in respect
of a larger and comprehensive system must be given.
CONCLUSION: The write-up must end with the concluding remarks- briefly describing
innovation in the approach for implementing the Project, main achievements and also any other
important feature that makes the system stand out from the rest.
The following suggested guidelines must be followed in preparing the Final Project Report:
Bachelor of Computer Applications
Good quality white A4 size paper should be used for typing and duplication. Care should be
taken to avoid smudging while duplicating the copies.
Normal Body Text: Font Size: 12, Times New Roman, Double Spacing, Justified. 6 point
above and below para spacing
Paragraph Heading Font Size: 14, Times New Roman, Underlined, Left Aligned. 12 point
above & below spacing.
Chapter Heading Font Size: 20, Times New Roman, Centre Aligned, 30 point above and below
spacing. Coding Font size : 10, Courier New, Normal
Submission of Project Report to the University : The student will submit his/her project report in
the prescribed format. The Project Report should include:
SELF CERTIFICATE
4. ACKNOWLEDGEMENTS
In the “Acknowledgements” page, the writer recognizes his indebtedness for guidance and
assistance of the thesis adviser and other members of the faculty. Courtesy demands that he also
recognize specific contributions by other persons or institutions such as libraries and research
foundations. Acknowledgements should be expressed simply, tastefully, and tactfully.
Bachelor of Computer Applications
Course Code: BCA 312 L T C
Course Name: Data Visualization & Analytics 4 1 5
LEARNING OBJECTIVES:
In this course, the learners will be able to develop expertise related to the following:
1. Students will develop relevant programming abilities.
2. Students will demonstrate proficiency with statistical analysis of data.
3. Conduct exploratory data analysis using visualization.
4. Craft visual presentations of data for effective communication.
PRE-REQUISITES:
1. Basics of Python Programming (BCA-206)
COURSE OUTCOMES(COs):
After completion of this course, the learners will be able to:-
CO# Detailed Statement of the CO *BT Mapping to PO #
Level
CO1 Illustrating the features of Multithreading in python. BTL2 PO1, PO2,
PO3, PO5
CO2 Analyzing data using suitable python library. BTL2 PO1, PO2,
PO3,PO7,
PO10
CO3 Visualizing data using Matplotib, Seaborn library. BTL3 PO1, PO2,
PO3,PO4
CO4 Develop python applications with database BTL3 PO1, PO2,
connectivity operations. PO3,PO4
UNIT–I
No. of Hours: 11 Chapter/Book Reference: TB1 [Chapters - 1, 2], TB2 [Chapters - 1, 2]
Analytics: Basic Nomenclature, Analytics Process Model, Analytics part in different profiles,
Analytical Model Requirements.
Data Sources for data collection, Sampling and Sampling distribution, Types of data elements,
Missing Values, Outlier Detection and Treatment, Standardization using Min/max and z-score,
categorization, Segmentation.
UNIT–II
No. of Hours: 11 Chapter/Book Reference: TB2 [Chapter - 3], TB3 [Chapter - 7]
Data Visualization: Graphs in Python: Line Graph, Bar charts, Pie-charts, Scatter plots, multiple
plots, Subplots, Legends, Changing figure Size, Styling plots using Matplotib Library. Functions like
relplot(), displot() and catplot ().
Seaborn Library: Introduction, Line plot, Dist plot, Lmplot, Count plot, Color palettes.
UNIT–IV
No. of Hours: 11 Chapter/Book Reference: TB5 [Chapter - 4], TB3 [Chapter - 7]
GUI Programming: Creating User-interface, GUI Widgets with Tkinter, Creating Layouts, Check
Box, Radio Buttons, List Box, Menus, Menus Options, Dialog Boxes
Database Access: Database Connectivity Operations: Create, lnsert, Select, Delete, Drop, Update.
TEXT BOOKS:
TB1. Analytics in a Big Data World, Essential Guide to Data Science and its Application, Bart
Baesens, Wiley Big Data Series.
TB2. Data Science & Big Data Analytics: Discovering, Analyzing, Visualizing and Presenting Data
Published by John Wiley & Sons, Inc
TB3. Data Science from Scratch, 2nd Edition by Joel Grus Publisher(s): O'Reilly Media, Inc
TB4. Agile tools for real world data: Python for Data Analysis by Wes McKinney, O‟Reilly
TB5. Python and Tkinter Programming JOHN E. GRAYSON
REFERENCE BOOKS:
RB1. Allen Downey, "Think Python: How to Think Like a Computer Scientist", O'Reilly, 2nd
Edition,2015.
RB2. ReemaThareja, "Python Programming using Problem Solving Approach", Oxford University
Press, 1" Edition, 2017. RB4. Joel Grus, "Data Science from Scratch", O'Reilly, 2no Edition ,2019.
RB3. Tony Gaddis, "starting out with Python", Pearson, 3'd Edition, 2014.
RB4. Y. Daniel Liang, "lntroduction to Programming Using Python", Pearson, 1" Edition, 201,3.
RB5. Programming in Python 3: A Complete Introduction to the Python Language (2nd Edition),
Mark Summerfield
List of Practicals
6. Implementing Line plot, Dist plot, Lmplot, Count plot using CO1, CO2,CO3
Seaborn library
Application Based Practicals (Implement minimum 5 out of 10 practicals)
7. Create a DataFrame namely aid that stores aid CO1, CO2,CO5
(Toys,books,uniform,shoes) by NGO‟s for different states. Write a
program to display the aid for:-
(a) Books and Uniforms only
(b) Shoes only
8. Create a DataFrame ndf having Name, Gender, Position, City, Age, CO1, CO2,CO5
Projects.
Write a program to summarize how many projects are being
handled by each position for each city?
Use pivot()
9. Marks is a list that stores marks of a student in 10 unit test. Write a CO1, CO2
program to plot Line chart for the student‟s performance in these
10 test.
10. Write a program to plot a horizontal bar chart from the height of CO1, CO2,CO3
some students.
11. CO1,
Write a program to implement ANNOVA.
CO2,CO3,CO5
12. Write a program to show correlation between two randomly CO1,
generated numbers . CO2,CO4,CO5
13. Write a program to implement Covariance. CO1, CO2, CO5
14. Create a GUI based form for admission purpose for your college CO1, CO2, CO3
15. The created GUI based application form is to connected to a CO1, CO2, CO5
database and use insert query to enter data.
Note:
1. In total 10 practicals to be implemented. 2 additional practical may be given by the
course instructor.
2. This is a suggestive list of programs. However, the instructor may add programs as per
the requirement of the course.
Bachelor of Computer Applications
Course Code: BCA 314 L T C
Course Name: Deep Learning with Python 4 1 5
PRE-REQUISITES:
Basics of Python Programming
What is Deep Learning? Deep vs Shallow Networks, Convolution Neural Networks (CNN) –
Convolution Layers, Pooling Layer, Flattening, FullyConnected Layers, Softmax and Cross-
Entropy, Building a CNN in Python, Fully Connected CNN, CNN Architectures – LeNet, AlexNet,
ZFNet, GoogLeNet, VGGNet, ResNet, DenseNet, Training a Convnet: weights initialization, batch
normalization, hyperparameter optimization
UNIT-III
No. of Hours:11 Chapter/Book Reference: TB1 [Chapters - 3, 4, 7]
Recurrent Neural Networks (RNN), LSTM, Sequence Prediction and Time Series Forecasting with
LSTM, Overview of Object Detection Techniques using Deep Learning, Overview of Transfer
Learning.
TEXT BOOKS:
TB1. Adam Gibson and Josh Patterson, Deep Learning: A Practitioner's Approach,
(O'Reilly).
TB2. Mohamed Elgendy, Deep Learning for Vision Systems, Manning Publications, ISBN:
9781617296192
TB3. Navin Kumar Manaswi, Deep Learning with Applications Using Python, Apress
(2018)
REFERENCE BOOKS:
RB1. Cosma Rohilla Shalizi, Advanced Data Analysis from an Elementary Point of View, 2015.
RB2. Deng & Yu, Deep Learning: Methods and Applications, Now Publishers, 2013.
RB3. Ian Goodfellow, Yoshua Bengio, Aaron Courville, Deep Learning, MIT Press, 2016.
RB4. Michael Nielsen, Neural Networks and Deep Learning, Determination Press, 2015.
RB5. Charu C. Aggarwal, Neural Networks and Deep Learning, Springer, 2018.
RB6. M. Arif Wani, Farooq Ahmad Bhat, Saduf Afzal, Asif Iqbal Khan, Advances in
Deep Learning, Springer, 2020.
List of Practical
Bachelor of Computer Applications
S.No. Detailed Statement Mapping to
CO#
1. Write a program for creating a perceptron. CO1
LEARNING OBJECTIVES:
In this course, the learners will be able to develop expertise related to the following:
1. Students will be able to have the basic clarity and understanding of cybercrimes and
cyber security laws
2. Students will be able to understand the need for cyber laws, will be able to describe and
differentiate between substantive, procedural, and preventive cybercrime laws.
3. To understand and critically assess national, regional, and international cybercrime laws.
4. To create awareness among the students about how crime being is committed in the
cyber world.
PRE-REQUISITES:
None
No. of Hours:14 Chapter/Book Reference: TB5 [Chapter - 1], RB2 [Chapters - 1, 2],
RB3 [Chapters - 1, 3]
Introduction to the Cyber World and Cyber Law: Cyber World: An Overview, The internet
and online resources, Introduction to Computer Crimes and Cyber Crimes, Distinction between
cybercrimes and conventional crimes, Reasons for commission of cyber-crime, Cyber forensic.
Classification of cyber-crimes: Cyber criminals and their objectives, Planning of attacks.
Types of cybercrimes: Cyber Stalking; Forgery and Fraud, Social engineering attacks, Phishing,
DoS and DDoS attacks, Identity Theft, Salami Attack, Net Extortion.
Introduction to Cyberspace: Cybercrime, Threats to the virtual world, Cyber Crimes & Social
Media attacks, Cyber Squatting, Cyber Espionage, Cyber Warfare, Cyber Terrorism, Cyber
Defamation, Crime related to IPRs, Computer Vandalism etc.
Access and Unauthorized Access, Data Security, E-Contracts and E-Forms
UNIT II
No. of Hours: 14 Chapter/Book Reference: TB1 [Chapter - 1], RB2 Chapter – 2]
Introduction to Cyber Law, Need for Cyber Law
Evolution of the IT Act, Genesis and Necessity - Salient features of the IT Act, 2000, Various
authorities under IT Act and their powers, Penalties & Offences, Amendments.
Impact on other related Acts (Amendments) - Amendments to Indian Penal Code, Indian Evidence
Act, Bankers Book Evidence Act, Reserve Bank of India Act - Cyberspace Jurisdiction.
Online Safety for all with special reference for women and children, Misuse of individual
information. Violation of privacy, Trafficking of Information and Data
UNIT-III
No. of Hours: 10 Chapter/Book Reference: TB1 [Chapter - 4], RB2 [Chapter -
7]
E–Commerce and Laws in India: Digital/Electronic Signature in Indian Laws, Digital Certificates,
Certifying Authority, E-Commerce Issues and provisions in Indian Laws, Concept of E-
Governance and its Implication in India, Issues related to E-Taxation in Cyberspace, E-Contracts
and its validity in India (f) Cyber Tribunal & Appellate Tribunal.
UNIT-IV
No. of Hours: 12 Chapter/Book Reference: TB1 [Chapter - 2], RB2 [Chapters - 4, 5]
Intellectual Property Rights - Domain Names and Trademark Disputes, Concept of Trademarks in
Internet Era, Cyber Squatting, Reverse Hijacking Jurisdiction in Trademark Disputes, Copyright in
the Digital Medium, Copyright in Computer Programmes.
Cyber Laws in India – Crime against Individual, Crime against Property, Crime against Nation,
Indian Case Laws, An introduction to International Cyber Laws
Bachelor of Computer Applications
TEXT BOOKS:
REFERENCE BOOKS:
RB1. Baase, S. (2013). A Gift of Fire: Social, Legal, and Ethical Issues for Computing
RB2. Cyber Law Simplifies: Vivek Sood, McGraw Hill Publication
RB3. Introduction to Cyber Security: Anand Shinde
RB4. Technology (4th ed.) Upper Saddle River, NJ: Pearson Education.
Bachelor of Computer Applications
Course Code: BCA-318 L T C
Course Name: Mobile Application Development 4 1 5
LEARNING OBJECTIVES:
In this course, the learners will be able to develop expertise related to the following:-
1. Identify various concepts of mobile application programming that make it unique from
programming for other platforms.
2. To help learner to gain a basic understanding of Android application development.
3. Program mobile applications for the Android operating system that use basic and advanced
phone features, and deploy applications to the Android marketplace for distribution.
PRE-REQUISITES:
1. Java Programming
2. Programming fundamental
CO5 Deploy applications to the Android marketplace for BTL6 PO1, PO2, PO3,
distribution PO4, PO11
Bachelor of Computer Applications
UNIT-I
No. of Hours: 11 Chapter/Book Reference: TB1 [Chapters - 1, 2], TB2 [Chapters - 2, 3]
Introduction: Brief history of mobile applications, Different types of mobile applications, Brief
history of Android, Introduction to Android Development Environment, Android Application
Design Essentials: Anatomy of an Android applications, Creating First Android Application,
Creating Android project , Project organization, Setting up real Android device , Setting up
Android emulator, Developing simple user interface , Running your first application
Android terminologies, Application Context, Activities, Services, Intents, Receiving and
Broadcasting Intents, Android Manifest File and its common settings, Using Intent Filter,
Permissions.
UNIT-II
No. of Hours: 11 Chapter/Book Reference: TB1 [Chapter - 3,4,5,6], TB2 [Chapters – 5, 6,
7]
User Interface in Android: Adaptive and responsive user interfaces, User Input Controls, Menus,
Screen Navigation, Recycler View, Drawables, Themes and Styles, Fragments Fragment Life
Cycle, Introduction to Material Design.
Android Application Components: App Widgets, Processes and Threads, User Interface
Components, Views and layouts, Input controls, Input Events, Settings, Dialogs, Menus,
Notifications, Toasts, Testing the user interface
UNIT – III
No. of Hours: 11 Chapter/Book Reference: TB1 [Chapters - 8, 9], TB2 [Chapter - 9]
Working with data in Android: Shared Preferences, App Setting, SQLite primer, Store data using
SQLite database, Content Providers, Content Resolver, Loader
Publishing Your App: Preparing for publishing, Signing and preparing the graphics, publishing to
the Android Market
Using Common Android APIs: Using Android Data and Storage APIs, Managing data using
Sqlite, Sharing Data between Applications with Content Providers, Using Android Networking
APIs, Using android Web APIs, Using Android Telephony APIs, Deploying Android Application
to the World.
TEXT BOOKS:
TB1. Lauren Darcey and Shane Conder, “Android Wireless Application Development”, Pearson
Education, 2nd ed. (2011)
TB2. Wei-Meng Lee,” Beginning Android 4 Application Development”, Wiley India Pvt. Ltd.
TB3. J. F. DiMarzio, “Android: A Programmers Guide”, McGraw Hill Education (India) Private
Limited.
Bachelor of Computer Applications
REFERENCE BOOKS:
RB1. Paul Deitel “Android for Programmers: An App-Driven Approach” 1st Edition, Pearson
India.
RB2. Wei-Meng Lee, “Beginning Android Application Development”, Wiley Publishing
List of Practicals
6. Write an application to mark the daily route of travel in map. CO4, CO5
8. Create a spinner application with strings taken from resource CO4, CO5
directory res/values/strings.xml and on changing the spinner
value, image will change. Image is saved in the drawable
directory.
9. Create an app that uses radio button group which calculates CO3,CO4, CO5
discount on shopping bill amount. Use ediitext to enter bill
amount and select one of three radio buttons to determine a
discount for 10, 15, or 20 percent.the discount is calculated
upon selection of one of the buttons and displayed in a
textview control.
Bachelor of Computer Applications
10. Create an application that uses checkbox for construction of a CO4, CO5
shopping list so the user can check off items as they are picked
up. The checked items should be displayed in a textview
control.
11. Create a login application to verify username and password. CO2, CO4, CO5
On successful login, redirect to another activity that has a
textview to display "welcome user" with logout button. On
click of logout button, a dialog should appear with ok and
cancel buttons. On click of oK button, go back to the login
activity and on click of cancel button, stay on the same
activity.
13. Create an application to pick up any image from the native CO4, CO5
application gallery and display it on the screen.
14. Read phonebook contacts using content providers and display CO2,CO4, CO5
in list.
15. Create an application to take picture using native application. CO2,CO4, CO5
Note:
1. In total 10 practicals to be implemented. 2 additional practical may be given by the
course instructor.
2. This is a suggestive list of programs. However, the instructor may add programs as per
the requirement of the course.
Bachelor of Computer Applications
Course Code: BCA 332 L T C
Course Name: Seminar/ Conference Presentation 0 0 2
OBJECTIVE:
Seminars/Conferences and Presentations provide a platform to the students, where they can learn
from what others are doing, learn about new things, ideas and important tips related to new
technologies. To foster the Innovations happening in upcoming technologies and harnessing the
entrepreneurial opportunities, Institutes must provide ample opportunities to the students to learn
and yield the advantages of new advancements in the field of technology. It is expected from a
student to learn latest in the industry and write an article related to it and present their findings in
front of a panel.
The following points need to considered while planning and evaluating the presentation
The seminars must be conducted after every 15 days/ or a month. A minimum of 3-4
seminar sessions can be organized during the semester.
A minimum of 7-8 slides must be there which would include the title slide. The first slide
should be the Introduction slide and the last one reference slide wherein all the links/books
references/paper reference to paper must be quoted. The rest of the slides should focus on
the technology, application areas etc.
The title of the seminar must be related to the field of Information technology and must talk
about the latest innovation/technology like IOT, Machine learning, Deep learning, AI Cloud
computing, Mobility, Hand held devices, Social Computing, NOSQL Database, CRM,
Social CRM, Open Source Application Development Frameworks, Zero Trust Security
Framework/ Architecture, Big Data/ Data Lake, Emerging and Innovative Technologies,
Conversational AI, Sentiments Analysis, DevOps, Real time Analytics, Fraud Detection.
Proper approval must be taken before starting the work.
Student‟s feedback must be taken after taking the seminar as to what learning they have
gathered after studying the topics. For this, a feedback form may be designed using Google
form utility.
Bachelor of Computer Applications
PRE-REQUISITES:
3. Basic Programming Knowledge
4. Use of Internet
List of Practicals
S.No. Detailed Statement Mapping to
CO #
2. Write the steps to add libraries in Arduino and setup of Arduino IDE for CO2, CO3
programming.
Bachelor of Computer Applications
3. Write a Program using Arduino for Blink LED. CO2, CO3
4. Write a Program for monitoring Temperature using Arduino and LM35 CO2, CO3,
Temperature Sensors.
5. Write a Program for Controlling Raspberry Pi with WhatsApp.
6. Write a program to shows how to fade an LED on pin 9 using the CO3,CO4
analog Write( ) function.
7. Write the steps to add blynk libraries for NodeMCU and account on CO2,
IFTTT for home automation. CO3,CO4
9. Write a program for Arduino by using Ultrasonic sensors and servo CO2,
motor (HC-SR04), and make a smart dustbin. CO3,CO4
10. Write a program for controlling bulb on/off by using Blynk app. CO2,
CO3,CO4
Note:
1. In total 10 practicals and one application to be implemented. 2 additional practical may
be given by the course instructor.
2. This is a suggestive list of programs. However, the instructor may add programs as per
the requirement of the course.
Bachelor of Computer Applications
Course Code: BCA 374 L T
C
Course Name: NSS/NCC/Cultural Clubs/Technical Society/Technical Club - - 2
(a) Papers with only theory component shall have 25 marks continuous evaluations by the
teacher and 75 marks term-end examinations. Both these component marks shall be
reflected on the marksheet of the student.
(b) Papers with only practical component shall have 40 marks continuous evaluation by the
teacher and 60 marks term-end examinations. Both these component marks shall be
reflected on the marksheet of the student.
(c) Papers with both theory and practical components shall have 25 marks continuous
evaluation by the teacher and 25 marks term-end examinations for practical and 50
marks term end examination for the theory component. All three component marks
shall be reflected on the marksheet of the student.
Bachelor of Computer Applications
Important Instructions:
1. The examination, attendance criteria to appear in examination, promotion and award of the
degree shall be governed by the Ordinance 11 of the University. The term “major discipline” /
“primary discipline” in this document refers to the discipline in which student is
admitted/studies from 3rd semester onwards.
2. Minimum duration of the Bachelor of Computer Applications (BCA) programme shall be 3
years (N=4 years) (6 semesters).
3. Maximum duration of the Bachelor of Computer Application (BCA) programme shall be 5
years (N+2 years). After completion of N+2 years of study, if the student has appeared in the
papers of all the semester upto 6th semester, then a maximum extension of 1 year may be
given to the student for completing the requirements of the degree if and only if the number of
credits already earned by the student is atleast 120. Otherwise, the admission of the students
shall stand cancelled. After the period of allowed study, the admission of the student shall be
cancelled.
4. The MOOC courses may be taken through SWAYAM / NPTEL MOOCs platform. The
student desirous of doing a specific MOOC based course must seek approval of the APC of
the institution for the same before the commencement of the semester. The APC shall allow
the MOOC paper to the student if and only if the MOOC subject / course being considered for
the student is being offered in line with the Academic Calendar applicable. The student shall
submit the successful completion certificate with marks to the institution for onwards transfer
to the Examination Division. The Examination Divisions shall take these marks on record for
calculation of the SGPA/CGPA of the student concerned by the examination division of the
University. Though the result of the MOOC courses may be declared subsequently. The MOC
course credits shall bot be considered for calculation of the promotion criterion from one
academic year of study to the next academic year.
5. Maximum Credits: at least 162. The student has to appear in the examinations for these credits
in all componenents.
6. Minimum Credits: atleast 150.
7. To earn an Honours degree, the student may enroll for 20 credits or more through SWAYAM
/ NPTEL MOOCs platform. This point has to be read together with other points specially
point 8. The acquisition of the credits should be completed before the 15th of the July of the
Bachelor of Computer Applications
admission year plus 3 years. That is, if a student is admitted in the year X, then these credits
must be acquired through MOOCs by 15th July of the year (X+3), no extra duration or time
shall be allocated. Honours in the degree shall be awarded if and only if at least 20 credits are
acquired through MOOCs. To obtain Honours in the programme, the student must apply to
the institution about the same, before the commencement of the 2nd semester and about
registration for the MOOCs and the specific courses through MOOCs shall be registered by
the student only after approval by the Academic Programme Committee (APC) of the
Institution. The APC shall approve the course if it is not already studied by the student or the
student shall not study it in future andadds value to the major area of specialization (which is
the degree). The papers for which the student desires to appear for Honours through MOOCs,
all papers results shall be submitted by the student to the school for onwards transfer to
Examination Division of the University, to be taken on record of the University. The results of
these papers shall be a part of the records of the examinations of the students. The records
shall be submitted by the student to the school, then transferred to the Examination division,
shall be notified by the examinations division of the University, and a separate marksheet
shall be issued by the Examinations divisions. The cost of taking the MOOC course is to be
borne by the concerned student. Such courses shall be reflected as additional courses / papers
for the student. The “Honours” in the degree shall be awarded if and only if in addition to the
20 credits earned as specified the student has a CGPA of 7.5 or above.
If a student acquires less than 20 credits through MOOCs, following the mechanism specified,
then also the results of these papers shall be taken on record as specified above, though no
Honours degree shall be awarded. The papers through MOOCs for Honours degree shall not
be a part of the set of the papers over which the SGPA / CGPA of the student shall be
calculated.
The paper through MOOCs for Honours degree shall be additional papers studied by the
students and are to be taken into account only for award of Honours in the degree programme,
if 20 credits are earned through MOOCs as approved by APC, by a student. See Clause 8 also.
8. The following degree route can be taken by a student (also refer point 7):
Bachelor of Computer Applications
a. A degree with the nomenclature Bachelor of Computer Applications with minor
specialization in <Discipline Specific Elective Group Name> (Honours) shall be
awarded if the following conditions are satisfied:
i. The student has acquired 150 credits, to meet the minimum credit requirement.
ii. The student has acquired 20 credits from one Discipline Specific Elective Group.
Student must pass all the subjects of Discipline specific course for the award of
Bachelor of Computer Applications with Specializaiton.
iii. The honours in the degree shall be specified on the degree certificate if the student
fulfills the criteria at point 7 and also has a CGPA of 7.5 or above.