0% found this document useful (0 votes)
51 views68 pages

BCA Syllabus 3rd Yr .

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
51 views68 pages

BCA Syllabus 3rd Yr .

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 68

Bachelor of Computer Applications

Proposed Scheme of Syllabus


(CHOICE BASED CREDIT SYSTEM)

W.E.F ACADEMIC SESSION 2021-22

BACHELOR OF COMPUTER APPLICATIONS


(BCA) DEGREE

GURU GOBIND SINGH INDRAPRASTHA UNIVERSITY


SECTOR-16C, DWARKA, NEW DELHI-110078
Bachelor of Computer Applications
SEMESTER WISE EVALUATION SCHEME

FIFTH SEMESTER EXAMINATION


Marks
Code Marks External Max
Paper Course Type L T/P Credits
No. Internal Marks
Th Pr
Core Course Theory
Operating
BCA Core Course 0 100
System & Linux 3 1 4 25 75
301 Theory
Programming
BCA Computer Core Course 0 100
3 1 4 25 75
303 Graphics Theory
Cloud
BCA Computing Core Course 0 100
3 1 4 25 75
305 Theory

Ability Enhancement Compulsory Course (AECC)


BCA 60 100
Minor Project AECC 0 8 4 40 0
307
*Discipline Specific Elective (Choose any One)
Machine
BCA 25 100
Learning with DSE-3 4 1 5 25 50
311
Python
BCA 25 100
Web Security DSE-3 4 1 5 25 50
313
Web
BCA 25 100
Development DSE-3 4 1 5 25 50
315
with Java & JSP
***Skill Enhancement Course (AEEC)
BCA Summer 0 100
SEC-4 0 0 2 100 0
331 Training Project
Core Course Practical
BCA Practical – X Core Course 60 100
0 4 2 40 0
371 Linux - OS Lab Practical
BCA Practical – XI Core Course 60 100
0 4 2 40 0
373 CG Lab Practical
Total 27 800

* Third Subject from Discipline specific chosen group


***NUES (Non – University Examination Subject) – Only Internal Assessment by the
Institute) i.e. the assessment shall be conducted by the institution for all 100 marks as
Teacher’s Continuous Assessment. Evaluation will be based on Summer Training held after
fourth semester.
TOTAL MARKS: 800
Bachelor of Computer Applications
SEMESTER WISE EVALUATION SCHEME

SIXTH SEMESTER EXAMINATION


Marks Max
Cre Marks External
Code No. Paper Course Type L T/P Mar
dits Internal
Th Pr ks
Core Course Theory
Data Ware
Core Course 0 100
BCA 302 Housing & Data 3 1 4 25 75
Theory
Mining
Core Course 0 100
BCA 304# E- Commerce 3 1 4 25 75
Theory
Core Course 0 100
BCA 306 Internet of Things 3 1 4 25 75
Theory
Ability Enhancement Compulsory Course (AECC)
BCA 308 **Major Project AECC ---- 12 6 40 0 60 100

*Discipline Specific Elective (Choose any One)


Data Visualization 25 100
BCA 312 DSE-4 4 1 5 25 50
& Analytics
Deep Learning 25 100
BCA 314 DSE-4 4 1 5 25 50
with Python
BCA 316 IT Act and Cyber DSE-4 4 1 5 25 75 100
Laws
Mobile Application 25 100
BCA 318 DSE-4 4 1 5 25 50
Development
***Skill Enhancement Course (AEEC)
Seminar/
BCA 332 Conference SEC – 5 0 0 2 100 0 0 100
Presentation
Core Course Practical
Practical – XII IOT Core Course 60 100
BCA 372 0 4 2 40 0
Lab Practical
NSS / NCC /
$ BCA Cultural Clubs / 0 100
Mandatory 0 0 2 100 0
374 Technical Society /
Technical Clubs
Total 29 800

*Fourth Subject from Discipline specific chosen group.


** The student shall do the Major project in the Discipline Specific Area/Curriculum based
subject /any emerging technology.
*** NUES (Non – University Examination Subject) – Only Internal Assessment by the
Institute i.e. the assessment shall be conducted by the institution for all 100 marks as
Teacher’s Continuous Assessment .Evaluation will be based on the presentation on any latest
Bachelor of Computer Applications
technology/research article in in-house/external seminar/conference and will be conducted by
the college committee only.
# Generic Elective (GE) for other undergraduate programmes
$ NUES (Non – University Examination Subject) Comprehensive evaluation of the students by
the concerned coordinator of NCC / NSS / Cultural Clubs / Technical Society / Technical Clubs out
of 100 marks as per evaluation schemes worked out by these societies / organizations at the
institution / University level. The coordinators shall be responsible for the evaluation of the same.
These activities shall start from the 1st semester and evaluation shall be conducted at the end of
6th semester for the students admitted in the first semester.
Note: Any Elective Subject will be offered if minimum 1/3 rd of the total strength of students in the
class will opt for it.
Bachelor of Computer Applications

SEMESTER WISE DETAILED SYLLABUS


Bachelor of Computer Applications
Course Code BCA 301
Course Name: Operating System & Linux Programming

INSTRUCTIONSTOPAPERSETTERS:
1. Question No. 1 should be compulsory and cover the entire syllabus. There should be10
questions of short answer type of 2.5 marks each, having at least 2 questions from each
unit.
2. Apart from Question No. 1, rest of the paper shall consist of four units as per the
syllabus. Every unit should have two questions to evaluate analytical/technical skills of
candidate. However, student may be asked to attempt only 1 question from each unit.
Each Question should be of12.5 marks, including its subparts, if any.
3. Examiners are requested to go through the Course Outcomes (CO) of this course and
prepare the question paper accordingly, using Bloom‟s Taxonomy (BT), in such a way
that every question be mapped to some or other CO and all the questions, put together,
must be able to achieve the mapping to all the CO(s), in balanced way.

LEARNING OBJECTIVES:
In this course, the learners will be able to develop expertise related to the following:-
1. Working and functionalities of operating system
2. Understand the concept of process scheduling, ,memory management, deadlock and file system
3. Understand basic commands of Linux and shell scripts.

PRE-REQUISITES:
1. Basic understanding of hardware and software of computer organization.

COURSE OUTCOMES (COs):


After completion of this course, the learners will be able to:-

*BT
CO# Detailed Statement of the CO MappingtoPO #
Level
Understand the basic concept of Operating System with
CO1 BTL2 PO1, PO4
the help of Unix and Linux Architecture.
Understand the concept of Processes, Process Scheduling,
CO2 Process Synchronization and applying process commands BTL3 PO1, PO2,PO4,PO5
in Linux environment.
Understand the concept of memory management and
CO3 BTL2 PO1, PO2,PO4,PO5
deadlock.
Understand the concept of file Systems, Types and
CO4 BTL3 PO1, PO2,PO4
Access Methods by using Linux commands.

UNIT–I
No. of Hours: 12 Chapter/Book Reference: TB1 [Chapter 1]; TB2 [Chapters 1, 2, 3, 4, 5]

Introduction: What is an Operating System, Functions of Operating System, Simple Batch Systems;
Multi programmed Batch systems, Time-Sharing Systems, Personal-computer systems, Parallel
systems, Distributed Systems, Real-Time Systems.
Introduction to Linux: Architecture of Linux OS, Basic directory structure of Linux, Basic
commands of Linux:-man,info,help,whatis,apropos, basic directory navigation commands like
Bachelor of Computer Applications
cat,mkdir,rmdir ,cd, mv, cp, rm, ,file, pwd ,date,cal,echo,bc,ls,who,whoami, hostname, uname,
tty,aliase
Vi Editor: vi basics, Three modes of vi Editor, how to write, save, execute a shell script in vi editor
UNIT–II
No. of Hours: 12 Chapter/Book Reference: TB1 [Chapters 3, 5, 6]; TB2 [Chapter 9]

Processes: Process Concept, Process Scheduling, Operation on Processes


CPU Scheduling: Basic Concepts, Scheduling Criteria, Scheduling Algorithms
Process Synchronization: Background, The Critical-Section Problem, Semaphores solution to
critical section problem
Process related commands in Linux: ps, top, pstree, nice, renice and system calls
UNIT–III
No. of Hours: 12 Chapter/Book Reference: TB1 [Chapters 7, 8, 9]

Memory Management: Background, Logical versus Physical Address space, swapping,


Contiguous allocation, Segmentation, Paging
Virtual Memory: Demand Paging, Performance of Demand Paging, Page Replacement, Page-
replacement Algorithms, Allocation of Frames, Thrashing
Deadlocks: System Model, Deadlock Characterization, Methods for Handling
Deadlocks, Deadlock Prevention, Deadlock Avoidance, Deadlock Detection, Recovery
from Deadlock
UNIT–IV
No. of Hours: 10 Chapter/Book Reference: TB1 [Chapter 10]; TB2 [Chapter 6]

Information Management: Introduction, File Concept, Access methods, Directory and Disk
structure, File Protection
Linux File Security: Permission types, Examining permissions, changing permissions (symbolic
method numeric method)

TEXT BOOKS:
[TB1] Silbersachatz and Galvin, “Operating System Concepts”, John Wiley & Sons, 10 th
Ed. 2018
[TB2] Sumitabha Das, “Unix Concepts and Application”, TMH

REFERENCE BOOKS:
REFERENCES: [R1] Madnick E., Donovan J., “Operating Systems”, Tata McGraw Hill,
2011
REFERENCES: [R2] [R2] Tannenbaum, “Operating Systems”, PHI, 4th Edition, 2015
REFERENCES: [R3] Sivaselvan, Gopalan, “A Beginner‟s Guide to UNIX”, PHI Learning
Bachelor of Computer Applications
Course Code: BCA 303 L T C
Course Name: Computer Graphics 3 1 4

INSTRUCTIONS TO PAPER SETTERS:


1. Question No. 1 should be compulsory and cover the entire syllabus. There should be 10
questions of short answer type of 2.5 marks each, having at least 2 questions from each unit.
2. Apart from Question No. 1, rest of the paper shall consist of four units as per the syllabus.
Every unit should have two questions to evaluate analytical/technical skills of candidate.
However, student may be asked to attempt only 1 question from each unit. Each question
should be of 12.5 marks, including its subparts, if any.
3. Examiners are requested to go through the Course Outcomes (CO) of this course and prepare
the question paper accordingly, using Bloom‟s Taxonomy (BT), in such a way that every
question be mapped to some or other CO and all the questions, put together, must be able to
achieve the mapping to all the CO(s), in balanced way.

LEARNING OBJECTIVES:
In this course, the learners will be able to develop expertise related to the following:
1. Concept of Computer graphics, types of display devices and their techniques.
2. Methods of drawing of graphic objects on the display devices.
3. Concepts of viewport, mapping of real world objects to display device, clipping
4. Knowledge of projection concepts and their types

PRE-REQUISITES:
1. Programming in C/C++

COURSE OUTCOMES (COs):


After completion of this course, the learners will be able to:-
CO # Detailed Statement of the CO *BT Mapping to
Level PO #
CO1 Develop basic knowledge of computer generated graphics, their BTL2 PO1, PO6
applications, display devices and drawing of graphic objects on
display devices.
CO2 To develop knowledge of various graphics 2D transformation BTL4 PO4,
operation, their mathematical calculations. PO8
CO3 To learn about the surfaces and curves, properties of curves and BTL2 PO4
shading of surfaces
CO4 To give basic knowledge of 3D projection and identifying hidden BTL2 PO1
surfaces to be removed.

UNIT – I
No. of Hours: 11 Chapter/Book Reference: TB1, TB2

Introduction: Introduction to computer graphics, Applications of Computer Graphics, Non


Interactive and interactive graphics, Conceptual Framework for Interactive Graphics. Introduction to
Raster and Random scan display, Characteristics of display devices, Aliasing and Antialiasing,
Introduction to latest display technologies (LED, OLED, Curved LED display)
Scan Conversion
Bachelor of Computer Applications
Scan Converting Lines using DDA & Bresenham‟s Algorithm, Scan Converting Circles using
Bresenham‟s algorithm.
UNIT – II
No. of Hours: 11 Chapter/Book Reference: TB1, TB2, RB3

Clipping
Cohen- Sutherland Algorithm, Cyrus-Beck Algorithm
Geometrical Transformations
2D Transformations, Homogeneous Coordinates and Matrix Representation of 2D Transformations,
Composition of 2D Transformations, Window-to-Viewport Transformation, Introduction of Matrix
Representation of 3D Transformations of translation, scaling and rotation (without derivation).
UNIT – III
No. of Hours: 11 Chapter/Book Reference: TB1, TB2

Representing Curves
Introduction to Polygon Meshes and its types, Parametric Cubic Curves: parametric and geometric
continuity, Hermite, Bezier & B-Spline.
Surfaces
Surface rendering- Basic Illumination, Effect of ambient lighting and distances, Shading models-
Gourard Shading, phong model.
UNIT – IV
No. of Hours: 11 Chapter/Book Reference: TB1, TB2

Three Dimensional Viewing: Introduction, Representation of Three-dimensional objects,


Projections, Parallel projections: Orthographic Projections, Oblique Projections. Perspective
Projection,
Hidden Surface Removal: Depth-Buffer (z-buffer) method, Depth-sorting Method (Painter‟s
algorithm)

TEXT BOOKS:
TB1. Foley, Van Dam, Feiner, Hughes, Computer Graphics Principles & Practice, 2000, Pearson
TB2. Chennakesava R. Alavla “Computer Graphics”, PHI Learning Pvt. Limited

REFERENCES BOOKS:
RB1. D. Hearn & Baker: Computer Graphics with OpenGL, Pearson Education, Third Edition,
2009.
RB2. Foley, J.D. & Van Dam, A: Fundamentals of Interactive Computer Graphics.
RB3. Rogers & Adams, “Mathematical Elements for Computer Graphics”, McGraw Hill, 1989.
Bachelor of Computer Applications
Course Code: BCA 305 L T C
Course Name: Cloud Computing 3 1 4

INSTRUCTIONS TO PAPER SETTERS:


1. Question No. 1 should be compulsory and cover the entire syllabus. There should be 10
questions of short answer type of 2.5 marks each, having at least 2 questions from each unit.
2. Apart from Question No. 1, rest of the paper shall consist of four units as per the syllabus.
Every unit should have two questions to evaluate analytical/technical skills of candidate.
However, student may be asked to attempt only 1 question from each unit. Each question
should be of 12.5 marks, including its subparts, if any.
3. Examiners are requested to go through the Course Outcomes (CO) of this course and prepare
the question paper accordingly, using Bloom‟s Taxonomy (BT), in such a way that every
question be mapped to some or other CO and all the questions, put together, must be able to
achieve the mapping to all the CO(s), in balanced way.

LEARNING OBJECTIVES:
In this course, the learners will be able to develop expertise related to the following:
1. Understand current cloud computing technologies, including technologies for different cloud
services.
2. Analyze the components of cloud computing
3. Perform Large data processing in the cloud

PRE-REQUISITES:
1. Basics of Computer Network
2. Knowledge of Operating System and Databases.

COURSE OUTCOMES (COs):


After completion of this course, the learners will be able to:-
CO # Detailed Statement of the CO *BT Mapping to PO #
Level
CO1 Overview of Cloud Computing BTL1 PO1, PO2, PO3, PO7
CO2 Understanding Cloud Computing Architecture BTL2 PO1, PO2, PO3, PO4,
PO7,
CO3 Working with Parallel and Distributed BTL3 PO1, PO2, PO3, PO4, PO5
Computing
CO4 Understanding the Concept of Virtualization BTL4 PO1, PO2, PO3, PO6, PO7

UNIT – I
No. of Hours: 11 Chapter/Book Reference: TB1 [Chapters - 1, 10], TB2 [Chapters - 1, 2]

Cloud Computing Overview –Services of Internet, Origins of Cloud computing – Cloud


components – Essential characteristics – On-demand self-service, The vision of cloud computing
– Characteristics, benefits, and Challenges ahead
UNIT – II
No. of Hours: 11 Chapter/Book Reference: TB1 [Chapter - 4], TB2 [Chapters - 5, 6, 17, 18]

Cloud Computing Architecture-Introduction – Internet as a Platform, The cloud reference model -


Types of clouds - Economics of the cloud, Computing platforms and technologies, Cloud computing
Bachelor of Computer Applications
economics, Cloud infrastructure - Economics of private clouds - Software productivity in the cloud -
Economies of scale: public vs. private clouds.
UNIT – III
No. of Hours: 11 Chapter/Book Reference: TB1 [Chapter - 2], TB2 [Chapter - 11]

Principles of Parallel and Distributed Computing: Parallel vs. distributed computing - Elements of
parallel computing - Hardware architectures for parallel processing, Approaches to parallel
programming - Laws of caution.

UNIT – IV
No. of Hours: 11 Chapter/Book Reference: TB1 [Chapter - 3], TB2 [Chapter - 8]

Virtualization: Introduction - Characteristics of virtualized environments - Taxonomy of


virtualization techniques - Virtualization and cloud computing - Pros and cons of virtualization -
Technology example: VMware: full virtualization, Types of hardware virtualization: Full
virtualization - partial virtualization - para virtualization

TEXT BOOKS:
TB1. Rajkumar Buyya, Christian Vecchiola and S. Thamarai Selvi, “Mastering Cloud Computing” -
Foundations and Applications Programming, MK publications, 2013.
TB2. Gautam Shroff, “Enterprise Cloud Computing: Technology, Architecture, Applications” by
Cambridge University Press, 2010.

REFERENCE BOOKS:
RB1. Michael J.Kavis, “Architecting the Cloud: Design Decisions for Cloud Computing Service
Models (SaaS, PaaS, and IaaS)”, John Wiley & Sons Inc., Jan 2014.
Bachelor of Computer Applications
Course Code: BCA 307 L T/P C
Course Name: Minor Project 0 8 4

PROJECT REPORT
All the students are required to submit a report based on the project work done by them
during the sixth semester.

SYNOPSIS (SUMMARY/ABSTRACT) :
All students must submit a summary/abstract separately with the project report. Summary,
preferably, should be of about 3-4 pages. The content should be as brief as is sufficient enough to
explain the objective and implementation of the project that the candidate is going to take up. The
write up must adhere to the guidelines and should include the following:

 Name / Title of the Project


 Statement about the Problem
 Why is the particular topic chosen?
 Objective and scope of the Project
 Methodology (including a summary of the project)
 Hardware & Software to be used
 Testing Technologies used
 What contribution would the project make?

TOPIC OF THE PROJECT- This should be explicitly mentioned at the beginning of the
Synopsis. Since the topic itself gives a peep into the project to be taken up, candidate is advised to
be prudent on naming the project. This being the overall impression on the future work, the topic
should corroborate the work.

OBJECTIVE AND SCOPE: This should give a clear picture of the project. Objective should be
clearly specified. What the project ends up to and in what way this is going to help the end user
has to be mentioned.

PROCESS DISCRIPTION: The process of the whole software system proposed, to be


developed, should be mentioned in brief. This may be supported by DFDs / Flowcharts to explain
the flow of the information.

RESOURCES AND LIMITATIONS: The requirement of the resources for designing and
developing the proposed system must be given. The resources might be in form of the
hardware/software or the data from the industry. The limitation of the proposed system in respect
of a larger and comprehensive system must be given.

CONCLUSION: The write-up must end with the concluding remarks- briefly describing
innovation in the approach for implementing the Project, main achievements and also any other
important feature that makes the system stand out from the rest.
Bachelor of Computer Applications
The following suggested guidelines must be followed in preparing the Minor Project Report:

Good quality white A4 size paper should be used for typing and duplication. Care should be
taken to avoid smudging while duplicating the copies.

Page Specification: (Written paper and source code)


 Left margin - 3.0 cms
 Right margin- 2.0 cms
 Top margin 2.54 cms
 Bottom margin 2.54 cms
 Page numbers - All text pages as well as Program source code listing should be
numbered at the bottom center of the pages.

Normal Body Text: Font Size: 12, Times New Roman, Double Spacing, Justified. 6 point
above and below para spacing

Paragraph Heading Font Size: 14, Times New Roman, Underlined, Left Aligned. 12 point
above & below spacing.

Chapter Heading Font Size: 20, Times New Roman, Centre Aligned, 30 point above and below
spacing. Coding Font size : 10, Courier New, Normal

Submission of Project Report to the University : The student will submit his/her project report in
the prescribed format. The Project Report should include:

1. One copy of the summary/abstract.


2. One hard Copy of the Project Report.
3. The Project Report may be about 75 pages (excluding coding).

FORMAT OF THE STUDENT PROJECT REPORT ON COMPLETION OF THE PROJECT

I. Cover Page as per format


II. Acknowledgement
III. Certificate of the project guide
IV. Synopsis of the Project
V. Main Report
i. Objective & Scope of the Project
ii. Theoretical Background Definition of Problem
iii. System Analysis & Design vis-a-vis User Requirements
iv. System Planning (PERT Chart)
v. Methodology adopted, System Implementation & Details of Hardware &
Software used System Maintenance & Evaluation
vi. Detailed Life Cycle of the Project
a. ERD, DFD
b. Input and Output Screen Design
c. Process involved
d. Methodology used testing
e. Test Report, Printout of the Report & Code Sheet
Bachelor of Computer Applications
VI. Coding and Screenshots of the project
VII. Conclusion and Future Scope
VIII. References

Formats of various certificates and formatting styles are as:

1. Certificate from the Guide


CERTIFICATE
This is to certify that this project entitled “ xxxxxx xxxxx xxxxx xxxx xxxx xxx” submitted in
partial fulfillment of the degree of Bachelor of Computer Applications to the
“xxxxxxxxxxxxxxxxxxxxxxxxxx” through xxxxxx xxxxx done by Mr./Ms. , Roll No.
is an is an authentic work carried out by
him/her at under my
guidance. The matter embodied in this project work has not been submitted earlier for award of any
degree to the best of my knowledge and belief.

Signature of the student Signature of the Guide

2. Project Report Cover Page Format:

Title of the Project/report


(Times New Roman, Italic, Font size = 24 )

Submitted in partial fulfilment of the requirements for the award of the


degree of
Bachelor of Computer Applications
(Bookman Old Style, 16 point, centre)

Submitted to: Submitted by:


(Guide Name) (Student’s name)
Roll No
College Name

3. Self-Certificate by the students


Bachelor of Computer Applications
SELF CERTIFICATE

This is to certify that the dissertation/project report entitled “…………………………………” is


done by me is an authentic work carried out for the partial fulfilment of the requirements for the
award of the degree of Bachelor of Computer Applications under the guidance of . The matter
embodied in this project work has not been submitted earlier for award of any degree or diploma to
the best of my knowledge and belief.

Signature of the student


Name of the Student
Roll No.

4. ACKNOWLEDGEMENTS

In the “Acknowledgements” page, the writer recognizes his indebtedness for guidance and
assistance of the thesis adviser and other members of the faculty. Courtesy demands that he also
recognize specific contributions by other persons or institutions such as libraries and research
foundations. Acknowledgements should be expressed simply, tastefully, and tactfully.
Bachelor of Computer Applications
Course Code: BCA 311 L T C
Course Name: Machine Learning with Python 4 1 5

INSTRUCTIONS TO PAPER SETTERS:


1. Question No. 1 should be compulsory and cover the entire syllabus. There should be 10
questions of short answer type of 2.5 marks each, having at least 2 questions from each unit.
2. Apart from Question No. 1, rest of the paper shall consist of four units as per the syllabus.
Every unit should have two questions to evaluate analytical/technical skills of candidate.
However, student may be asked to attempt only 1 question from each unit. Each question
should be of 12.5 marks, including its subparts, if any.
3. Examiners are requested to go through the Course Outcomes (CO) of this course and prepare
the question paper accordingly, using Bloom‟s Taxonomy (BT), in such a way that every
question be mapped to some or other CO and all the questions, put together, must be able to
achieve the mapping to all the CO(s), in balanced way.

LEARNING OBJECTIVES:
In this course, the learners will be able to develop expertise related to the following:
1. To make student able to learn mathematical concepts, and algorithms used in machine learning
techniques for solving real world problems and developing new applications based on machine
learning.
2. To introduce students to the state-of-the-art concepts and techniques of Machine Learning using
Python.

PRE-REQUISITES:
1. Basics of Python Programming

COURSE OUTCOMES(COs):
After completion of this course, the learners will be able to:-
CO# Detailed Statement of the CO *BT Mapping to
Level PO#
CO1 Explain machine learning concepts on real world BTL2 PO1, PO2,
applications and problems. PO8
CO2 Analyze and Implement Regression techniques. BTL2, PO1, PO4,
BTL3 PO5, PO7
CO3 Solve and design solution of Classification BTL3, PO2, PO3,
problem BTL6 PO4,PO8
CO4 Understand and implement Unsupervised learning BTL2, PO4, PO5,
algorithms BTL3 PO6, PO8
CO5 Interpret various machine learning algorithms in a BTL3 PO2, PO6,
range of real world applications. PO7

UNIT–I
No. of Hours: 11 Chapter / Book Reference: TB1 [Chapters - 1, 3, 4, 8, 9], TB2 [Chapters -
1, 4]

Introduction to Machine Learning, Why Machine learning, Types of Machine Learning Problems,
Applications of Machine Learning. Supervised Machine Learning- Regression and Classification.
Binary Classifier, Multiclass Classification, Multilabel Classification. Performance Measures-
Confusion Matrix, Accuracy, Precision & recall, ROC Curve. Advanced Python- NumPy, Pandas.
Bachelor of Computer Applications
Python Machine Learning Library Scikit-Learn, Linear Regression with one Variable, Linear
Regression with Multiple Variables, Logistic Regression.
UNIT-II
No. of Hours: 11 Chapter / Book Reference: TB1 [Chapters - 5, 6, 7], TB2 [Chapter - 6]

Supervised learning Algorithms: Decision Trees, Tree pruning, Rule-base Classification, Naïve
Bayes, Bayesian Network. Support Vector Machines, k-Nearest Neighbor, Ensemble Learning and
Random Forest algorithm.
UNIT - III
No. of Hours: 11 Chapter / Book Reference: TB1 [Chapter - 10], TB3 [Chapters - 2, 6]

Artificial Neural Networks, HebbNet, Perceptron, Adaline, Multilayer Neural Network,


Architecture, Activation Functions, Loss Function, Hyper parameters, Gradient Descent,
Backpropagation, Variants of Backpropagation, Avoiding overfitting through Regularization,
Applications of Neural Networks.
UNIT – IV
No. of Hours: 11 Chapter/Book Reference: TB1 [Chapter - 8], TB2 [Chapter - 7], TB3
[Chapter - 4]

Unsupervised learning algorithms: Introduction to Clustering, K-means Clustering, Hierarchical


Clustering, Kohonen Self-Organizing Maps. Implementation of Unsupervised algorithms. Feature
selection and Dimensionality reduction, Principal Component Analysis.

TEXT BOOKS:
TB1. GeronAurelien, “Hands-On Machine Learning with Scikit-Learn & TensorFlow”, O‟REILLY,
First Edition, 2017.
TB2. U Dinesh Kumar and Manaranjan Pradhan, “Machine Learning using Python", Wiley, 2019.
TB3. Fausett Laurence, “Fundamentals of Neural Networks”, Pearson, Ninth Edition, 2012.

REFERENCE BOOKS:
RB1. Tom Mitchell, “Machine Learning”, First Edition, McGraw- Hill, 1997.
RB2. Budd T A, "Exploring Python", McGraw-Hill Education, 1st Edition, 2011.
RB3. Jake VanderPlas,“Python Data Science Handbook”, O‟Reilly,1st Edition,2017.

List of Practical

S.No. Problem Statement Mapping to


CO#
1. Extract the data from the database using python. CO1
2. Write a program to implement linear and logistic regression CO2
3. Write a program to implement the naïve Bayesian classifier for a CO3
sample training data set stored as a .CSV file. Compute the accuracy
of the classifier, considering few test data sets.
4. Write a program to implement k-nearest neighbors (KNN) and CO3
Support Vector Machine (SVM) Algorithm for classification
5. Implement classification of a given dataset using random forest. CO3
Bachelor of Computer Applications
6. Build an Artificial Neural Network (ANN) by implementing the CO3
Back propagation algorithm and test the same using appropriate data
sets.
7. Apply k-Means algorithm k-Means algorithm to cluster a set of data CO4
stored in a .CSV file. Use the same data set for clustering using the
k-Means algorithm. Compare the results of these two algorithms and
comment on the quality of clustering. You can add Python ML
library classes in the program.
8. Write a program to implement Self - Organizing Map (SOM) CO4
9. Write a program for empirical comparison of different supervised CO4
learning algorithms
10. Write a program for empirical comparison of different CO4
unsupervised learning algorithms
Note:
1. In total 10 practicals to be implemented. 2 additional practical may be given by the course
instructor.
2. This is a suggestive list of programs. However, the instructor may add programs as per
the requirement of the course.
Bachelor of Computer Applications
Course Code: BCA 313 L T C
Course Name: Web Security 4 1 5

INSTRUCTIONS TO PAPER SETTERS:


1. Question No. 1 should be compulsory and cover the entire syllabus. There should be 10
questions of short answer type of 2.5 marks each, having at least 2 questions from each unit.
2. Apart from Question No. 1, rest of the paper shall consist of four units as per the syllabus. Every
unit should have two questions to evaluate analytical/technical skills of candidate. However,
student may be asked to attempt only 1 question from each unit. Each question should be of 12.5
marks, including its subparts, if any.
3. Examiners are requested to go through the Course Outcomes (CO) of this course and prepare the
question paper accordingly, using Bloom‟s Taxonomy (BT), in such a way that every question be
mapped to some or other CO and all the questions, put together, must be able to achieve the
mapping to all the CO(s), in balanced way.

LEARNING OBJECTIVES:
In this course, the learners will be able to develop expertise related to the following:
1. Students will be able to learn the techniques needed for providing protection and security to our
data and information resources over internet.
2. To understand and learn web application and its Architecture.
3. Students will be able to develop awareness regarding Cyber laws and crimes.
4. Students will be able to understand the internet and web application security issues.
5. Students will be able to learn and understand wireless network security issues.
6. To learn and understand the concept of web services, ajax and other technology which are
helpful.

PRE-REQUISITES:
1. Computer Network
2. C/C++/HTML (Programming Knowledge of C/C++/HTML/JS)

COURSE OUTCOMES(COs):
After completion of this course, the learners will be able to:-

CO# Detailed Statement of the CO *BT Mapping to PO #


Level
CO1 Define overall web security infrastructure, components, BTL1 PO1, PO4, PO7
issues and basic concept etc.
CO2 Describe briefly various types of security like social BTL2 PO1, PO2, PO4,
media security, email security, web application and web PO5, PO7
services security etc. Explain Web related services.
CO3 Apply and implementing various vulnerabilities for BTL3 PO1, PO4, PO6,
Ethically hacking a websites / Web Applications. PO8
CO4 Focusing Penetration Testing, Computer Forensics. BTL4 PO1, PO2, PO7
CO5 Evaluate different web security algorithms with the help BTL5 PO1, PO3, PO4,
of program. PO6, PO7, PO8
CO6 Design and implement XSS attacks, SQL Injection BTL6 PO1, PO3, PO4,
attack, password hashing and cracking. PO7, PO8

UNIT–I
Bachelor of Computer Applications
No. of Hours: 12 Chapter/Book Reference: TB1 [Chapter - 1], TB2 [Chapters - 1, 3]

Components of Internet, Weak points of Internet, HTTP vs HTTPS, Overview of web authentication
technologies, Web application architecture, Recent attack trends, Types of Web Security, Web
infrastructure security/Web application firewalls, managing configurations for web apps, Techniques
of Web Hacking, Methods of Attacking users, Importance of Web Application Security, Web
Application Security vs Network Security. Social Media security - What is Online Social Networks,
data collection from social networks, challenges, opportunities, and pitfalls in online social networks,
APIs Collecting data from Online social media. Trust, credibility, and reputations in social systems.
UNIT–II
No. of Hours: 11 Chapter/Book Reference: TB1 [Chapters - 4, 6], TB2 [Chapters - 8, 11]

Internet and Web Application Security: Email security (PGP and SMIME), Web Security: Web
authentication, Injection Flaws, Programming Bugs and Malicious code, XSS and SQL Injection,
Memory corruption exploits, Web Browser Security, E-Commerce Security
UNIT–III
No. of Hours: 11 Chapter/Book Reference: TB1 [Chapter - 5], TB2 [Chapters - 1, 10, 11]

Wireless Network Security: Components, Security issues, Securing a Wireless Network, Mobile
Security Management: Disaster Recovery, Ethical Hacking, Penetration Testing, Computer
Forensics, Cyber laws and crime, Security Audit and Investigation, Cyber Security Solutions
UNIT–IV
No. of Hours: 10 Chapter/Book Reference: TB1 [Chapter - 6], TB2[Chapters - 5, 10, 11]

Web services overview, Honeytoken, XML security, AJAX attack trends and common attacks,
REST security, Content Security Policy Serialization security, Clickjacking, DNS rebinding,
HTML5 security, Logging collection and analysis for web apps, Security testing, IPv6 impact on
web security

TEXT BOOKS:
TB1. Joel Scam bray, Vincent Liu, Caleb Sima, “Hacking Exposed Web Applications, 3rd
Edition”, McGraw-Hill, October 2010
TB2. Baloch, R., Ethical Hacking and Penetration Testing Guide, CRC Press, 2015.

REFERENCE BOOKS:
RB1. Dafydd Stuttard, and Marcus Pinto, The Web Application Hacker's Handbook: Finding and
Exploiting Security Flaws, 2nd Edition, John Wiley & Sons, 2011.
RB2. Council, Ec. , Computer Forensics: Investigating Network Intrusions and Cybercrime,
Cengage Learning, Second Edition, 2010.
RB3. John W. Ritting house, William M. Hancock, “Cyber Security Operations
Handbook”, Elsevier Pub
RB4. Deborah G Johnson, “Computer Ethics”, 4th Edition, Pearson Education Publication.
RB5. Earnest A. Kallman, J.P Grillo, “Ethical Decision making and IT: An Introduction with
Cases”, McGraw Hill Publication.
Bachelor of Computer Applications
List of Practicals

S.No. Detailed Statement Mapping to


CO#
1. Implement the Security in web browsers (Mozilla Firefox/Google CO1, CO2
Chrome/IE)

2. Analysis of the security and privacy features and issues in CO1, CO2
Ecommerce & social media websites i.e., Facebook, Twitter and
Google+

3. Implement CAPTCHA to keep the website secure. CO3, CO6

4. Implement Password hashing and cracking technique CO3, CO6

5. Implement SQL Injection Attack CO3, CO6

6. Implement XSS attacks CO3, CO6

7. Implement Malicious Code & Memory Corruption Exploits CO3, CO6

8. Implement the process of SSL Certificate CO4

9. Implement Reconnaissance with the help of Google and Whois CO5, CO6

10. Implement Clickjacking, DNS rebinding & Ajax Attack CO5, CO6

Note:
1. In total 10 practicals to be implemented. 2 additional practical may be given by the
course instructor.
2. This is a suggestive list of programs. However, the instructor may add programs as
per the requirement of the course.
Bachelor of Computer Applications
Course Code: BCA 315 L T C
Course Name: Web Development with Java & JSP 4 1 5

INSTRUCTIONS TO PAPER SETTERS:


1. Question No. 1 should be compulsory and cover the entire syllabus. There should be 10
questions of short answer type of 2.5 marks each, having at least 2 questions from each unit.
2. Apart from Question No. 1, rest of the paper shall consist of four units as per the syllabus. Every
unit should have two questions to evaluate analytical/technical skills of candidate. However,
student may be asked to attempt only 1 question from each unit. Each question should be of 12.5
marks, including its subparts, if any.
3. Examiners are requested to go through the Course Outcomes (CO) of this course and prepare the
question paper accordingly, using Bloom‟s Taxonomy (BT), in such a way that every question be
mapped to some or other CO and all the questions, put together, must be able to achieve the
mapping to all the CO(s), in balanced way.

LEARNING OBJECTIVES:
In this course, the learners will be able to develop expertise related to the following:-
1. Learn Web development using Java.
2. Understand the basics of J2EE and Web development.
3. Understand and implement Servlet
4. Creating and implementing JDBC application.
5. Implement JSP and JSF concepts.
6. Understand the fundamentals of Hibernate, Struts and springs.

PRE-REQUISITES:
1. Programming Knowledge of Java
2. HTML

COURSE OUTCOMES (COs):


After completion of this course, the learners will be able to:-
CO # Detailed Statement of the CO *BT Mapping to PO #
Level
CO1 Understand the concept of HTML, CSS and Java BTL2 PO3, PO4, PO5
Script.
CO2 Understand J2EE architecture, web application BTL2 PO3, PO4,
structure and web architecture models. PO5, PO8
CO3 Creating and configuring Servlets. BTL6 PO3, PO4, PO5
CO4 Understand JDBC architecture and design database BTL2 PO3, PO4,
applications using JDBC. PO5, PO8
CO5 Design applications using JSP and JSF. BTL3 PO3, PO4,
PO5, PO8
CO6 Elaborate the functional programming concepts of BTL1 PO3, PO4,
Hibernate, Struts and Springs. PO5, PO7, PO8
Bachelor of Computer Applications
UNIT – I
No. of Hours: 11 Chapter/Book Reference: TB1 [Chapters - 1, 13, 31, 32, 33], TB2
[Chapters - 1, 2, 18], TB3 [Chapters - 2, 3, 4, 11, 14]

Introduction to HTML, CSS and Java Script: Content, layout, and styling of web page
J2EE and Web Development: Java Platform, J2EE Architecture Types, Types of Servers in J2EE
Application, HTTP Protocols and API, Web Application Structure, Web Containers and Web
Architecture Models.
Swings: Introduction and comparison with AWT controls.
UNIT – II
No. of Hours: 11 Chapter/Book Reference: TB1 [Chapter - 37], TB2 [Chapters - 34, 41, 42]

Introduction to Java EE Web Component: Overview of Servlet, Servlet Life Cycle, Types of
Servlet, HTTP Methods Structure and Deployment descriptor Servlet Context and Servlet Config
interface, State Management: client and server side,
JDBC Programming: JDBC Architecture, Types of JDBC Drivers, Introduction to major JDBC
Classes and Interface, Creating simple JDBC Application, Database operations using JDBC, Types
of Statement (Statement Interface, Prepared Statement, Callable Statement), Exploring Result Set
Operations.
UNIT – III
No. of Hours: 11 Chapter/Book Reference: TB2 [Chapters - 43, 44]

Java Server Pages: Introduction to JSP, Comparison with Servlet, JSP Architecture, JSP Life Cycle,
JSP Directives, JSP Action, JSP Standard Tag Libraries, JSP Session Management.
Develop Web Applications with JSF: JavaServer Faces (JSF) framework, architecture of JSF web
applications, development view of a JSF application.
UNIT – IV
No. of Hours: 11 Chapter/Book Reference: TB1 [Chapters - 22, 37, 39], TB2[ 33, 36]

Java Beans, Java Web Frameworks: Spring MVC: Java Beans, Spring Introduction, Spring
Architecture, Spring MVC Module, Bean life cycle, Spring API.
Hibernate and Struts: Java Beans, Introduction to Hibernate, Hibernate Architecture, Hibernate
Mapping Types, Introduction to Struts, core components, architecture, Interceptors, validation.
Advance Networking: Networking Basics, Introduction of Socket, Types of Socket, Socket API,
TCP/IP client sockets, URL, TCP/IP server sockets, Datagrams, java.net package Socket,
ServerSocket, InetAddress, URL, URLConnection.

TEXT BOOKS:
TB1. Herbert Schildt, "Java - The Complete Reference", Oracle Press, 9th Edition, 2014
TB2. Y. Daniel Liang, “Introduction to Java Programming, Comprehensive Version, Pearson.
TB3. Sams Teach Yourself HTML, CSS & JavaScript Web Publishing in One Hour a Day by Laura
Lemay, Rafe Colburn, Jennifer Kyrnin, 2015

REFERENCE BOOKS:
RB1. E. Balaguruswamy, “Programming with Java”, Tata McGraw Hill, 4th Edition, 2009.
RB2. Cay Horstmann, “Computing Concepts with Java 2 Essentials”, John Wiley & Sons, 2nd
Edition, 1999.
RB3. Jeffrey C. Jackson, “Web Technologies: A Computer Science Perspective”, Pearson.
RB4. Jakarta Struts Cookbook, by Bill Siggelkow, O'Reilly Media, Inc. 2005

List of Practicals
Bachelor of Computer Applications

S. Detailed Statement Mapping to


No. CO#
Core Practicals (Implement minimum 8 out of 10 practicals)
1. Create a webpage that prints your name to the screen, print your name CO1
in Tahoma font, print a definition list with 5 items, Create links to five
different pages, etc.
2. Program to demonstrate Swing components. CO1
3. Configure Apache Tomcat and write a hello world JSP page. CO1

4. Write a java program that connects to a database using JDBC and does CO3
add, delete and retrieve operations.
5. Create and Develop a web application using JSF. CO3
6. Write a program to implement a Java Beans to set and get values. CO2
7. Create a Java application to demonstrate Socket Programming in Java. CO5
8. Write a program to retrieve hostname--using methods in Inetaddress CO2
class
Application Based Practicals (Implement minimum 5 out of 10 practicals)
9. Write a client-server program which displays the server machine's date CO1
and time on the client machine.
10. Create a table in the database containing the columns to store book CO3
details like: book name, authors, description, price and URL of the
book‟s cover image. Using JSP and JDBC retrieve the details in the table
and display them on the webpage
11. Write a program to create a login page using Java Beans.Also validate CO1
the username and password from the database.
12. Create a form for inputting text and uploading image using struts CO4
13. Create a Student Registration application using Hibernate. CO4
14. Write a program to implement MVC using Spring Framework CO4
Note:
1. In total 10 practicals to be implemented. 2 additional practical may be given by the course
instructor.
2. This is a suggestive list of programs. However, the instructor may add programs as per the
requirement of the course.
Bachelor of Computer Applications
Course Code: BCA 331 L T C
Course Name: Summer Training Project 0 0 2

Summer Training Project Guidelines

Objective:
All the students enrolled for BCA Programme, have to undergo compulsory summer training/ Project
of minimum 06 weeks in an organization in the IT field. The aim of the project is to give the students
an integrated experience in solving a real-life problem by applying knowledge and skills gained on
completion of theory papers and in-house practical papers during BCA course. It provides an
occasion for students to realize the importance of resource and time management, ownership of task
towards deliverables, innovation and efficiency in the task management. It also provides a good
opportunity for students to build, enhance and sustain high levels of professional conduct and
performance and evolves a problem solver frame of mind in students at early stage. It also prepares
students for taking up responsible assignments in the corporate establishment.

General Guidelines:
1. The project should be original, of real-life value, and not copied from existing material from
any source. A student should ensure that he understands what is expected by preparing a
requirement document of his understanding and get it reviewed by the guide.
2. Design document should also be reviewed and code should also be peer reviewed.
3. A user manual has to be prepared and reviewed.
4. Testing has to be thorough and at various levels, followed by an acceptance test based on the
requirement document and user manual.
5. Students should follow the steps as discussed in Software Development Life Cycle while
writing dissertation and use Software Engineering Methodologies for development of
deliverables, mere programming will not be sufficient. Students must note that interviewers
for job are often more interested in the problem solved, alternatives that could have been tried
and the benefits derived from the developed application, rather than just implementation
details.
6. One Project will be submitted only by one student. However, if the nature of the project is
very big & large enough to be divided in different independent big modules having an
estimated required effort of minimum 06 weeks to be developed by one person, can be taken
up and designed in such a way that every student will be responsible for one module and will
submit only that specific module as it were a complete software project.
7. Every student has to get his / her synopsis approved from the guide.
8. The synopsis must be brief i.e., not more that 4-6 pages. It must address details like
(however, students may follow the SRS format of IEEE for writing Synopsis)
a. Name / title of the project,
b. Statement about the problem,
c. Why the Particular topic is chosen? It must address Present State of the Art.
d. Objective and scope of the project,
e. Analysis, Design, Development & Testing Methodology,
f. H/W & S/W to be used,
g. Testing Technologies to be used,
h. What contribution / value addition would the project make?
i. Limitations / constraints of the project,
j. Conclusion, Future Scope for Modification,
k. References and Bibliography.
9. After approval of the Synopsis, Students will need to give Two Presentations /
Demonstration, as per the schedule fixed by their respective Institutions or University. First
Bachelor of Computer Applications
Presentation will ideally be given after Design Phase is over. Second should be given when
System Testing is over. First Presentation (Summer Training) should be given in the first
month. Second Presentation (Projects) is in second month. Final Project reports should be
given latest by the end of the third month of the semester.
10. Summer Training report has to be submitted by 31st October of every academic year.
11. The student will submit his/her project report/thesis in the prescribed format, as given
hereunder, after the second presentation. The project report/thesis should include: -
a. ONE hard copy (Maroon colour with golden print) of the project report / thesis.
b. Soft copy of project on CD including all resource code/ compiled binary code and the
manuscript in MS-Word document format.
12. Note the following guidelines with respect to Preparation of the Documentation. Please note
that documentation is meant for other people, and hence it must be self-explanatory, in all
respect.
12.1.1 The sequence of the Pages in the Project Report will be as follows:
1. One Transparency Sheet
2. Title Page (Strictly as per the sample supplied)
3. Institute‟s Certificate
4. Company‟s Certificate
5. Candidate Declaration of originality of work
6. Acknowledgement.
7. Abstract
8. List of Figures (Strictly as per the sample supplied)
9. List of Tables (Strictly as per the sample supplied)
10. List of Abbreviations (Strictly as per the sample supplied)
11. Contents (Strictly as per the sample supplied) and then body of the
dissertation according to the content.
12.2 The pages coming under the preview of the CONTENTS will only be numbered in the
BOTTOM of the Page Centrally Aligned.
12.3 ONE Hardbound Copies (One Original and Two Xerox) will be submitted with the
Institute out of which one will be given back to the candidate. All the students are
required to follow the same binding format in maroon color with back quote
mentioning title of the project, name of the student and year.
12.4 At the end of the Project Report Two White blank sheets must be attached.
12.5 At the beginning of each chapter one blank page (Strictly as per the sample supplied)
must be attached. These pages will neither be numbered nor counted in total
numbering of pages. They will only indicate the beginning of a New Chapter with its
learning objectives.
12.6 Font size of the documentation will be 12 Times New Roman and the pages will be
one and half line spaced. The page margin will be as under: -
Top – 1 inch, Bottom – 1 inch,
Left – 1.5 inch, Right – 1 inch.
12.7 Kindly note that all-methodological details and theoretical aspects must be written in
students‟ own words. Copying from books or other students will not be accepted, in
any case.
All students are informed not to write definition of various concepts in index, mention the
topics w. r. t. to your project (i.e., how various concepts have been implemented in the project)

* No detailed theories required


TEMPLATE FOR CHAPTER SCHEME
Bachelor of Computer Applications
CONTENTS
(font size -18)

CHAPTER 1: PROBLEM FORMULATION Page No. (15)


1.1 Introduction about the Company 1
1.2 Introduction about the Problem 4
1.3 Present State of the Art 6
1.4 Need of Computerization 10
1.5 Proposed Software / Project 13
1.6 Importance of the work 15

CHAPTER 2 : SYSTEM ANALYSIS


2.1 Feasibility Study 20
2.1.1 Technical Feasibility 20
2.1.2 Economical Feasibility 22
2.1.3 Operational Feasibility 23
2.1.4 Other Feasibility Dimensions 24
2.2 Analysis Methodology 25
2.3 Choice of the Platforms
2.3.1 S/W used 26
2.3.2 H/W used 28

CHAPTER 3 : SYSTEM DESIGN#


3.1 Design Methodology 32
3.2 Database Design 36
3.2.1 ERD 37
3.2.2 DFD 39
3.3 Input Design 42
3.4 Output Design 48
3.5 Code Design and Development

CHAPTER 4 : TESTING AND IMPLEMENTATION##


4.1 Testing Methodology 52
4.1.1 Unit Testing 55
4.1.2 Module Testing 56
4.1.3 Integration Testing 57
4.1.4 System Testing 59
4.1.5 White Box / Black Box Testing 62
4.1.6 Acceptance Testing 69
4.2 Test Data & Test Cases 70
4.3 Test Reports and Debugging 71
4.4 Implementation Manual 73
4.5 Implementation 75
4.6 Users‟ Training 76
4.7 Post Implementation Maintenance 79

CHAPTER 5 : CONCLUSION AND REFERENCES


5.1 Conclusion 81
5.2 System Specifications 83
5.2.1 H/W Requirement 83
5.2.2 S/W Requirement 84
Bachelor of Computer Applications
5.3 Limitations of the System 85
5.4 Future Scope for Modification 86
5.5 References/Bibliography (as per format) 88

CHAPTER 6 : ANNEXURES (Screen Snapshots must be annexed)


A-1 Menu Flow Diagram 92
A-2 Structure Chart 94
A-6 Decision Table/Tree 95
A-7 Data Dictionary 97
A-8 Test Reports 106
A-9 Sample Inputs 109
A-10 Sample Outputs 111
A-11 Coding (Optional) 118

*********
# Please note that for all the System Design (Database, Input & Output) the basic Prototype,
format, Table Structure, etc. is to be discussed along with related validations, verifications &
normalization. However, the sample Input & Output (Screen Snapshots) will be attached in
the annexure.
## Under Testing, you have to discuss the approach of Testing, Test Data, Test Cases and Test
Report. How Debugging has been performed, on the basis of Test Report, must be also
discussed?
Bachelor of Computer Applications
Template for blank page before every chapter

CHAPTER 2
SYSTEM ANALYSIS

2.1 Feasibility Study


2.1.1 Technical Feasibility
2.1.2 Economical Feasibility
2.1.3 Operational Feasibility
2.1.4 Other Feasibility Dimensions
2.2 Analysis Methodology
2.3 Choice of the Platforms
2.3.1 S/W used
2.3.2 H/W used
Bachelor of Computer Applications
Other Templates
LIST OF FIGURES

Figure No. Description Page No.


1.1 Organizational Chart 5
3.1 Data Entry Screen for Purchase 21
3.2
4.1

LIST OF TABLES

Table No. Description Page No.


3.1 Employee‟s Personnel Information 18
3.2 Purchase Information 20
3.3 Stock Information 22
3.4 Master Table 26

LIST OF ABBREVIATIONS

Abbreviation Description
CAD Context Analysis Diagram
DFD Data Flow Diagram
HIPO Hierarchical Input Process Output

References/Bibliography:
1. Patterson D W, “Introduction to Artificial Intelligence and Expert Systems”, Second Edition,
2002, Prentice Hall of India Private Ltd., New Delhi.

2. V. Rajaraman, “An Introduction to Digital Computer Design”, Third Edition, 1995, Prentice
Hall of India Private Ltd., New Delhi.

Note: All of the above three will be prepared on separate pages.


Bachelor of Computer Applications

INVENTORY MANAGEMENT SYSTEM STUDENT NAME ENROLLMENT NUMBER


Template for back-quote
Bachelor of Computer Applications
Course Code: BCA 371 L T/PC
Course Name: LINUX – OS LAB 0 42
LEARNING OBJECTIVES:
In this course, the learners will be able to develop expertise related to:
1. Unix/Linux environment
2. Understanding of Linux commands and scripts

PRE-REQUISITES:

COURSE OUTCOMES (COs):


After completion of this course, the learners will be able to:

CO Detailed Statement of the CO BT Level Mapping to PO #


#
CO1 Understand Linux Environment with the help of its BT Level 1 PO1,PO2
architecture.

CO2 Understand the Linux environment by using general BT Level 2 PO1,PO2,PO4


Linux Commands.

CO3 Implement Process Related commands. BT Level 4 PO1,PO2,PO4,PO5

CO4 Implement File Permission concept. BT Level 4 PO1,PO2,PO4,PO5

CO5 Understanding the shell script by combining commands. BT Level 2 PO1,PO2,PO4

List of Practicals
S. Detailed Statement Mapping to CO #
No.
Core Practicals
Connect to the Linux Server and understand the basic Directory CO1
Structure of Linux.
1

2. To understand help commands like:-man,info,help,whatis,apropos CO2

3. To understand basic directory navigation commands like cat,cd, mv, cp, CO2
rm, mkdir,rmdir ,file, pwd command.

4. To understand basic commands like:- CO2


date,cal,echo,bc,ls,who,whoami,hostname,uname,tty,aliase

5. To understand vi basics, Three modes of vi Editor, how to write, save, CO5


execute a shell script in vi editor.

6. To understand process related commands like: - ps, top, pstree, nice, CO3
renice in Linux.
7 To understand how to examine and change File permissions. CO4

8 Set a file to be read-only with the chmod command. Interpret the file CO4
Bachelor of Computer Applications
permissions displayed by the ls -l command.
9 Delete one or more directories with the rmdir command. See what CO2
happens if the directory is not empty. Experiment (carefully!) with
the rm -r command to delete a directory and its content.
10 Change your directory to the directory exercises. Create a file in that CO2
directory, named the file as example1 using the cat command
containing the following text: water, water everywhere and all the
boards did shrink; water, water everywhere, no drop to drink.
11 Write basic shell script to display the table of a number. CO5
12 Write basic shell script to input a character from user and then check
whether it is uppercase, lowercase or digit.
13 Write basic shell script to calculate factorial of a number.
14 Write basic shell script to input the month number and generate
corresponding calendar.
15 Write basic shell script to list all directories.
16 Write basic shell script to display greatest of three numbers.
17 Write basic shell script to check whether the number entered by user
is prime or not.

Note:
1. 1. In total 15 practicals to be implemented. 2 additional practical may be given by the course
instructor.
2. This is a suggestive list of programs. However, the instructor may add programs as per the
requirement of the course.This is a suggestive list of programs. However, the instructor may add
programs as per the requirement of the course.
Bachelor of Computer Applications
Course Code: BCA 373 L T/P C
Course Name: Practical - XI CG Lab 0 4 2
LEARNING OBJECTIVES:
In this course, the learners will be able to develop expertise related to:
1. Concept of Computer graphics, the coordinate system of display devices.
2. Implementing various scan converting algorithms.
3. Methods of drawing of graphic objects on the display devices.
4. Generating complex graphic objects
5. Implementation of various 2D transformations
6. Implementing line clipping algorithms

PRE-REQUISITES:
Knowledge of Programming in C/C++ is preferable
Understanding of various functions included in graphics.h header files

COURSE OUTCOMES (COs):


After completion of this course, the learners will be able to:
CO # Detailed Statement of the CO BT Mapping to
Level PO #
CO1 Develop basic computer generated graphic and drawing of BTL3 PO1, PO6
graphic objects on 2D display devices.
CO2 To perform various algorithms for generating objects BTL4 PO4
CO3 To implement various 2D transformation operations through BTL4 PO4, PO8
matrices.
CO4 Implementation of cohen-sutherland line clipping algorithm. BTL3 PO1

List of Practicals

S. No. Detailed Statement Mapping to


CO #
Core Practicals (Implement minimum 8 out of 10 practicals)
1. Drawing objects like circle, rectangle, polygon etc using graphic CO1
function
DDA Line
2. Graphics Inbuilt functions CO2
Bresenham's
3. Line Drawing Algorithms (DDA & Bresenham‟s Algorithm) CO2

Bresenham's
4. Circle Algorithms CO2

5. Translation in 2D CO3

6. Rotation in 2D CO3

7. Scaling in 2D CO3

8. Reflection in 2D CO3

9. Shearing in 2D CO3

10. Cohen Sutherland's Algorithm CO4


Bachelor of Computer Applications
Application Based Practicals (Implement minimum 5 out of 10 practicals)
11. Program to rotate a circle outside another circle CO1

12. Program to draw Flying Balloons CO1

13. Show Bouncing Ball Animation CO2

14. Draw pie chart of family income and Expenditure CO2

15. Show changing radius of circle CO2, CO3

16. Program to rotate a coin on table CO3

17. Making an Analog Clock CO3

18. Draw a moving cycle CO3, CO4

19. Design a screensaver CO4

20. Show Moving Car Animation CO3, CO4

Note:
1. In total 15 practicals to be implemented. 2 additional practical may be given by the course
instructor.
2. This is a suggestive list of programs. However, the instructor may add programs as per the
requirement of the course.
Bachelor of Computer Applications
Course Code: BCA 302 L T C
Course Name: Data Ware Housing and Data Mining 3 1 4

INSTRUCTIONS TO PAPER SETTERS:


1. Question No. 1 should be compulsory and cover the entire syllabus. There should be 10 questions
of short answer type of 2.5 marks each, having at least 2 questions from each unit.
2. Apart from Question No. 1, rest of the paper shall consist of four units as per the syllabus. Every
unit should have two questions to evaluate analytical/technical skills of candidate. However,
student may be asked to attempt only 1 question from each unit. Each question should be of 12.5
marks, including its sub parts, if any.
3. Examiners are requested to go through the Course Outcomes(CO) of this course and prepare the
question paper accordingly, using Bloom‟s Taxonomy(BT), in such a way that every question be
mapped to some or other CO and all the questions, put together, must be able to achieve the
mapping to all the CO(s), in balanced way.

LEARNING OBJECTIVES:
In this course, the learners will be able to develop expertise related to the following:-
1. To understand the basic principles, concepts and applications of Data warehousing and
ELT tools.
2. Differentiate Online Transaction Processing and Online Analytical processing
3. To understand the Data Mining Process, Technologies & Rules, platform tools and data
pre-processing or data visualization techniques.
4. Identifying business applications of data mining
5. Develop skills in selecting the appropriate data mining algorithm for solving practical problems.

PRE-REQUISITES:
1. Discrete Mathematics
2. Information system concept

COURSE OUTCOMES (COs):


After completion of this course, the learners will be able to:-
CO # Detailed Statement of the CO *BT Mapping to PO #
Level
CO1 Understand the various component of Datawarehouse BTL2 PO1, PO2, PO3,
PO7,PO5
CO2 Appreciate the strengths and limitations of various data BTL3 PO1, PO2, PO3,PO7,
mining and data warehousing models PO10
CO3 Critically evaluate data quality to advocate application BTL3 PO1, PO2, PO3,PO4
of data pre-processing techniques.
CO4 Describe different methodologies used in data mining BTL4 PO1, PO2, PO3,PO4,
and data ware housing. PO7
CO5 Design a data mart or data warehouse for any BTL5 PO1, PO2, PO3,
organization PO4, PO11

CO6 Test real data sets using popular data mining tools such BTL6 PO1, PO2, PO3,PO4,
as WEKA PO6, PO7, PO8
Bachelor of Computer Applications
UNIT – I
No. of Hours:12 Chapter/Book Reference: TB3 [Chapters - 1, 2, 3]

Introduction to Data Warehousing: Overview, Difference between Database System and Data
Warehouse, The Compelling Need for data warehousing, Data warehouse – The building Blocks:
Defining Features, data warehouses and data marts, overview of the components, three tier
architecture, Metadata in the data warehouse.
ETL tools: - Defining the business requirements: Dimensional analysis, information packages – a
new concept, requirements gathering methods, requirements definition: scope and content

UNIT – II
No. of Hours:11 Chapter/Book Reference: TB3 [Chapters - 10, 11, 12]

Principles of Dimensional Modeling: Objectives, From Requirements to data design, Multi-


Dimensional Data Model, Schemas: the STAR schema, the Snowflake schema, fact constellation
schema.
OLAP in the Data Warehouse: Demand for Online Analytical Processing, limitations of other
analysis methods, OLAP definitions and rules, OLAP characteristics, major features and functions,
hyper cubes.
OLAP Operations: Drill-down and roll-up, slice-and-dice, pivot or rotation, OLAP models,
overview of variations, the MOLAP model, the ROLAP model, the DOLAP model, ROLAP versus
MOLAP, OLAP implementation considerations. Query and Reporting, Executive Information
Systems (EIS), Data Warehouse and Business Strategy

UNIT – III
No. of Hours:10 Chapter/Book Reference: TB1 [Chapters: 1, 3], TB2 [Chapter - 3], RB5
[Chapter - 17]

Data mining and data pre-processing:


Data mining: Introduction, What kind of data can be mined, What kind of patterns to be mined,
Which technologies are used, What kinds of applications are targeted, Major issues in data
mining.
Data pre-processing: Overview of Data pre-processing, data cleaning, data integration, data
reduction, data transformation and data discretization, exploring data using IRIS datasets.
Introduction to apriori algorithm for association mining rule.

UNIT – IV
No. of Hours: 10 Chapter/Book Reference: TB1 [Chapters - 1, 3], RB2, RB3

Data mining applications, and Data mining Tools:


Applications of data mining: Data mining for retail and telecommunication industries, data mining
and recommender systems.
Introduction to data mining tools (open source): Weka, RapidMiner, IBM Watson for
classification and clustering algorithms using IRIS Datasets

TEXT BOOKS:
TB1. Kamber and Han, “Data Mining Concepts and Techniques”, Third edition, Hartcourt India
P.Ltd.,2012.
TB2. Pang-Ning Tan, Michael Steinbach, Vipin Kumar, “Introduction to data mining”, Pearson
education, 2006
TB3. Paul Raj Poonia, “Fundamentals of Data Warehousing”, John Wiley & Sons, 2004
Bachelor of Computer Applications
REFERENCE BOOKS:
RB1. Ashok N. Srivastava, Mehran Sahami, “Text Mining Classification, Clustering, and
Applications”, Published by Chapman and Hall/CRC1st Edition, June 23, 2009
RB2. Ian H., Eibe Frank, Mark A. Hall, Christopher Pal “Data Mining: Practical Machine Learning
Tools and Techniques”Published by Morgan Kaufmann; 4th edition ,December 1, 2016
RB3. G. K. Gupta, “Introduction to Data Mining with Case Studies”, PHI, 2006
RB4. Alex Berson and Stephen J.Smith, “Data Warehousing, Data Mining & OLAP”, Tata McGraw
Hill, 1 July 2017
RB5. Shmueli, “Data Mining for Business Intelligence : Concepts, Techniques and Applications in
Microsoft Excel with XLMiner”,Wiley Publications
Bachelor of Computer Applications
Course Code: BCA 304 L T C
Course Name: E-Commerce 3 1 4

INSTRUCTIONS TO PAPER SETTERS:


1. Question No. 1 should be compulsory and cover the entire syllabus. There should be 10
questions of short answer type of 2.5 marks each, having at least 2 questions from each
unit.
2. Apart from Question No. 1, rest of the paper shall consist of four units as per the syllabus.
Every unit should have two questions to evaluate analytical/technical skills of candidate.
However, student may be asked to attempt only 1 question from each unit. Each question
should be of 12.5 marks, including its sub parts, if any.
3. Examiners are requested to go through the Course Outcomes(CO) of this course and
prepare the question paper accordingly, using Bloom‟s Taxonomy(BT), in such a way that
every question be mapped to some or other CO and all the questions, put together, must be
able to achieve the mapping to all the CO(s), in balanced way.

LEARNING OBJECTIVES:
In this course, the learners will be able to develop expertise related to the following: -
1. To learn and understand the basic nature of e-commerce.
2. To study how the internet and web support e-commerce.
3. To explain how to use technologies to build e-commerce websites.
4. To make students aware of the business environment associated with e-commerce.

PRE-REQUISITES:
1. Basic Knowledge of computers and business concepts.
2. Basic knowledge of the Internet.

COURSE OUTCOMES(COs):
After completion of this course, the learners will be able to: -
CO# Detailed Statement of the CO *BT Mapping to PO #
Level
CO1 Understand the framework and business models BTL2 PO1, PO2, PO3, PO7
of
E-commerce.
CO2 Explain the concept of network infrastructure and BTL2 PO1, PO2, PO3, PO7,
gain knowledge about mobile commerce. PO10
CO3 Demonstrate the process of secure electronic BTL3 PO1, PO2, PO3, PO4
transactions for E-commerce.
CO4 Analyze various e-commerce secure payment BTL4 PO1, PO2, PO3, PO4,
gateway. PO7
CO5 Evaluate Internet banking platform to work with BTL5 PO1, PO2, PO3,
E-commerce infrastructure. PO4, PO11
CO6 Implement ecommerce website for online BTL6 PO1, PO2, PO3, PO4,
business. PO6, PO7, PO8
Bachelor of Computer Applications
UNIT-I
No. of Hours: 10 Chapter/Book Reference: TB1[Chapters – 1,2],

Introduction: Definition of Electronic Commerce, Evolution of e-commerce, E-Commerce & E


Business, Unique features of e-commerce, applications of E-Commerce, advantages and
disadvantages of E-commerce, Types of e-commerce: B2B, B2C, C2C, M-commerce, Social
Commerce
E-commerce infrastructure: Technological building blocks: Internet, web and mobile applications

UNIT II
No. of Hours: 10 Chapter/Book Reference: TB1 [Chapters - 2, 3], RB1,RB3
Building an e-commerce presence: Planning, System Analysis, Design, Choosing Software,
Hardware, Other E-commerce site tools: Tools For website design, Tools for SEO, Interactivity and
active contents (Server side scripting)
Important Components of E-commerce website: Product Cataloging, Product Listing Page,
Product description Page, Cart building and Checkout, Third party integrations: Payment systems,
Data Layer Integrations for analytics, Customer support integration, Order tracking, Shipping, return
and cancellation
New Technologies for E-commerce: Chatbots, Recommendation systems (Personalisation), Smart
Search, Product Comparison, Augmented reality, Big data, Cloud computing

UNIT III
No. of Hours: 10 Chapter/Book Reference: TB2 [Chapters - 5, 6, 7], RB1, RB3
Electronic Payment Systems-
Overview of Electronics payments, electronic Fund Transfer, Digital Token based Electronics
payment System, Smart Cards, Credit Cards, Debit Cards, Emerging financial Instruments
Smartphone wallet, Social / Mobile Peer to Peer Payment systems, Digital Cash and Virtual
Currencies, Online Banking, Payment Gateway, Electronic Billing Presentment and Payment.

UNIT IV
No. of Hours: 10 Chapter/Book Reference: TB1[Chapters - 5, 6, 7], RB4
Security Threats and Issues: Cyber crimes, Credit card frauds/theft, Identity fraud, spoofing ,
sniffing, DOS and DDOS attacks, Social network security Issues, Mobile Platform Security issues,
Cloud security issues
Technology Solutions: Encryption : Secret Key Encryption, Public Key Encryption, Digital
Certificates and public key infrastructure
Securing channels: Secured Socket Layer (SSL), Transport Layer Security(TLS) , Virtual Private
Network (VPN ), Protecting Networks: Firewalls, Proxy Servers, Intrusion detection and protection
systems , Anti Virus software

TEXT BOOKS:
TB1. Kenneth C. Laudon, “E-Commerce: Business, Technology and Society”, 15th Edition,
Pearson education
TB2. KK Bajaj & Debjani Nag,” E-Commerce: The Cutting Edge of Business “McGraw Hill, II
edition, 2015
TB3. Efraim Turban, Jae Lee, David King, H. Michael Chung, “Electronic Commerce – A
Managerial Perspective", Addison-Wesley.
Bachelor of Computer Applications
REFERENCE BOOKS:
RB1. The Complete Reference: Internet, Margaret Levine Young, Tata McGraw Hill.
RB2. E-Commerce: Concepts, Models, Strategies, CSV Murthy, Himalayas Publishing House.
RB3. Frontiers of Electronic Commerce, Ravi Kalakota & Andrew B. Wilson, Addison-Wesley (An
Imprint of Pearson Education).
RB4. Network Security Essentials: Applications & Standards, William Stallings, Pearson Education.
Bachelor of Computer Applications
Course Code: BCA 306 L T C
Course Name: Internet of Things 3 1 4

INSTRUCTIONS TO PAPER SETTERS:


1. Question No. 1 should be compulsory and cover the entire syllabus. There should be 10
questions of short answer type of 2.5 marks each, having at least 2 questions from each unit.
2. Apart from Question No. 1, rest of the paper shall consist of four units as per the syllabus.
Every unit should have two questions to evaluate analytical/technical skills of candidate.
However, student may be asked to attempt only 1 question from each unit. Each question
should be of 12.5 marks, including its sub parts, if any.
3. Examiners are requested to go through the Course Outcomes(CO) of this course and prepare
the question paper accordingly, using Bloom‟s Taxonomy(BT), in such a way that every
question be mapped to some or other CO and all the questions, put together, must be able to
achieve the mapping to all the CO(s), in balanced way.

LEARNING OBJECTIVES:
In this course, the learners will be able to develop expertise related to the following:
1. To learn and understand the concept of Internet of Things (IOT).
2. To study the constituent components of Internet of Things.
3. To design and develop IoT applications using different, Sensors/actuators.
4. To seek working knowledge of Arduino, Raspberry pi Boards and to develop cloud based
IOT projects.

PRE-REQUISITES:
1. Basic Programming Knowledge
2. Use of Internet

COURSE OUTCOMES (COs):


After completion of this course, the learners will be able to:-

CO# Detailed Statement of the CO *BT Mapping to PO #


Level
CO1 Understand the architecture and the functional blocks of BTL2 PO1, PO2, PO3
Internet of Things.
CO2 Explain the concepts of Internet of Things and gain BTL2 PO1, PO2, PO3,PO7,
knowledge to design IoT applications PO10
CO3 Demonstrate the process of capturing and analyzing BTL3 PO1, PO2, PO3,PO4
data in Internet of Things.
CO4 Examine the various components involved in IoT BTL4 PO1, PO2, PO3,PO4,PO7
design methodology.
CO5 Evaluate an IoT device to work with a Cloud BTL5 PO1,PO2,PO3,
Computing infrastructure. PO4,PO11
CO6 Implement IoT protocols for communication. BTL6 PO1,PO2, PO3,PO4,
PO6, PO7,PO8
Bachelor of Computer Applications
UNIT–I
No. of Hours: 10 Chapter/Book Reference: TB1 [Chapters - 1,3,4,6]; TB2[Chapters - 1,2,3]

Internet of Things (IoT): Vision, Definition, Conceptual framework, Architectural view,


Technology behind IoT, Sources of the IoT, M2M Communication, IoT examples.
Design Principles for Connected Devices: IoT/M2M systems layers and design standardization,
Communication technologies, Data enrichment and consolidation, Ease of designing and
affordability.
UNIT–II
No. of Hours: 10 Chapter/Book Reference: TB1 [Chapters - 4,7,8,11], TB2 [Chapters -
4,5,7,9], TB4[Chapters - 2,4,5,6,9]

Hardware for IoT: Sensors, Digital sensors, Actuators, Radio frequency identification (RFID)
technology, Wireless sensor networks, Participatory sensing technology.
Embedded Platforms for IoT: Embedded computing basics, Overview of IOT supported hardware
platforms such as Arduino, NetArduino, Raspberry Pi, Beagle Bone, Intel Galileo boards and ARM
cortex.
UNIT–III
No. of Hours: 11 Chapter/Book Reference: TB1 [Chapters - 1,3,4,], TB2 [Chapters - 2,3,6],
TB4 [Chapter - 7]

Network & Communication Aspects in IoT: Wireless medium access issues, MAC protocol
survey, Survey routing protocols, Sensor deployment & Node discovery, Data aggregation &
dissemination
Programming the Arduino: Arduino platform boards anatomy, Arduino IDE, Coding using
emulator, Using libraries, Additions in Arduino, Programming the Arduino for IoT.
UNIT–IV
No. of Hours: 11 Chapter/Book Reference: TB1 [Chapters - 15,16], TB3[Chapters - 13,
14, 15, 16, 17], RB1[Chapter - 4]

Challenges in IoT Design Challenges: Development challenges, Security challenges, Other


challenges.
IoT Applications: Smart metering, E-health, City automation, Automotive applications, Home
automation, Smart cards, Communicating data with H/W units, Mobiles, Tablets, Designing of smart
street lights in smart city.

TEXT BOOKS:
TB1. Olivier Hersent, David Boswarthick, Omar Elloumi, “The Internet of Things Key Applications
and Protocols”, Wiley.
TB2. Jeeva Jose, “Internet of Things”, Khanna Publishing House.
TB3. Michael Miller, “The Internet of Things”, Pearson Education.
TB4. Raj Kamal, “Internet of Things”, McGraw-Hill, 1st Edition, 2016
TB5. Adrian McEwen, Hakin Cassimally, “Designing the Internet of Things”, Wiley India

REFERENCE BOOKS:
RB1. Arshdeep Bahgaand Vijay Madisetti,"Internet of Things: A Hands-on Approach", University
Press, 2015
RB2. Pethuru Raj and Anupama C. Raman, “The Internet of Things: Enabling Technologies,
Platforms, and Use Cases", CRC Press, 2017.
Bachelor of Computer Applications
Course Code: BCA 308 L T/P C
Course Name: Major Project 0 12 6

PROJECT REPORT
All the students are required to submit a report based on the project work done by them
during the sixth semester.

SYNOPSIS (SUMMARY/ABSTRACT) :
All students must submit a summary/abstract separately with the project report. Summary,
preferably, should be of about 3-4 pages. The content should be as brief as is sufficient enough to
explain the objective and implementation of the project that the candidate is going to take up. The
write up must adhere to the guidelines and should include the following:

 Name / Title of the Project


 Statement about the Problem
 Why is the particular topic chosen?
 Objective and scope of the Project
 Methodology (including a summary of the project)
 Hardware & Software to be used
 Testing Technologies used
 What contribution would the project make?

TOPIC OF THE PROJECT- This should be explicitly mentioned at the beginning of the
Synopsis. Since the topic itself gives a peep into the project to be taken up, candidate is advised to
be prudent on naming the project. This being the overall impression on the future work, the topic
should corroborate the work.

OBJECTIVE AND SCOPE: This should give a clear picture of the project. Objective should be
clearly specified. What the project ends up to and in what way this is going to help the end user
has to be mentioned.

PROCESS DISCRIPTION: The process of the whole software system proposed, to be


developed, should be mentioned in brief. This may be supported by DFDs / Flowcharts to explain
the flow of the information.

RESOURCES AND LIMITATIONS: The requirement of the resources for designing and
developing the proposed system must be given. The resources might be in form of the
hardware/software or the data from the industry. The limitation of the proposed system in respect
of a larger and comprehensive system must be given.

CONCLUSION: The write-up must end with the concluding remarks- briefly describing
innovation in the approach for implementing the Project, main achievements and also any other
important feature that makes the system stand out from the rest.

The following suggested guidelines must be followed in preparing the Final Project Report:
Bachelor of Computer Applications
Good quality white A4 size paper should be used for typing and duplication. Care should be
taken to avoid smudging while duplicating the copies.

Page Specification: (Written paper and source code)


 Left margin - 3.0 cms
 Right margin- 2.0 cms
 Top margin 2.54 cms
 Bottom margin 2.54 cms
 Page numbers - All text pages as well as Program source code listing should be
numbered at the bottom center of the pages.

Normal Body Text: Font Size: 12, Times New Roman, Double Spacing, Justified. 6 point
above and below para spacing

Paragraph Heading Font Size: 14, Times New Roman, Underlined, Left Aligned. 12 point
above & below spacing.

Chapter Heading Font Size: 20, Times New Roman, Centre Aligned, 30 point above and below
spacing. Coding Font size : 10, Courier New, Normal

Submission of Project Report to the University : The student will submit his/her project report in
the prescribed format. The Project Report should include:

1. One copy of the summary/abstract.


2. One hard Copy of the Project Report.
3. The Project Report may be about 75 pages (excluding coding).

FORMAT OF THE STUDENT PROJECT REPORT ON COMPLETION OF THE PROJECT

I. Cover Page as per format


II. Acknowledgement
III. Certificate of the project guide
IV. Synopsis of the Project
V. Main Report
i. Objective & Scope of the Project
ii. Theoretical Background Definition of Problem
iii. System Analysis & Design vis-a-vis User Requirements
iv. System Planning (PERT Chart)
v. Methodology adopted, System Implementation & Details of Hardware &
Software used System Maintenance & Evaluation
vi. Detailed Life Cycle of the Project
a. ERD, DFD
b. Input and Output Screen Design
c. Process involved
d. Methodology used testing
e. Test Report, Printout of the Report & Code Sheet
VI. Coding and Screenshots of the project
VII. Conclusion and Future Scope
Bachelor of Computer Applications
VIII. References

Formats of various certificates and formatting styles are as:

1. Certificate from the Guide


CERTIFICATE
This is to certify that this project entitled “ xxxxxx xxxxx xxxxx xxxx xxxx xxx” submitted in
partial fulfillment of the degree of Bachelor of Computer Applications to the
“xxxxxxxxxxxxxxxxxxxxxxxxxx” through xxxxxx xxxxx done by Mr./Ms. , Roll No.
is an is an authentic work carried out by
him/her at under my
guidance. The matter embodied in this project work has not been submitted earlier for award of any
degree to the best of my knowledge and belief.

Signature of the student Signature of the Guide

2. Project Report Cover Page Format:

Title of the Project/report


(Times New Roman, Italic, Font size = 24 )

Submitted in partial fulfilment of the requirements for the award of the


degree of
Bachelor of Computer Applications
(Bookman Old Style, 16 point, centre)

Submitted to: Submitted by:


(Guide Name) (Student’s name)
Roll No
College Name

3. Self-Certificate by the students

SELF CERTIFICATE

This is to certify that the dissertation/project report entitled


“…………………………………” is done by me is an authentic work carried out for the partial
fulfilment of the requirements for the award of the degree of Bachelor of Computer Applications
under the guidance of . The matter embodied in
this project work has not been submitted earlier for award of any degree or diploma to the best of my
knowledge and belief.
Bachelor of Computer Applications

Signature of the student


Name of the Student
Roll No.

4. ACKNOWLEDGEMENTS

In the “Acknowledgements” page, the writer recognizes his indebtedness for guidance and
assistance of the thesis adviser and other members of the faculty. Courtesy demands that he also
recognize specific contributions by other persons or institutions such as libraries and research
foundations. Acknowledgements should be expressed simply, tastefully, and tactfully.
Bachelor of Computer Applications
Course Code: BCA 312 L T C
Course Name: Data Visualization & Analytics 4 1 5

INSTRUCTIONS TO PAPER SETTERS:


1. Question No. 1 should be compulsory and cover the entire syllabus. There should be 10
questions of short answer type of 2.5 marks each, having at least 2 questions from each unit.
2. Apart from Question No. 1, rest of the paper shall consist of four units as per the syllabus.
Every unit should have two questions to evaluate analytical/technical skills of candidate.
However, student may be asked to attempt only 1 question from each unit. Each question
should be of 12.5 marks, including its subparts, if any.
3. Examiners are requested to go through the Course Outcomes (CO) of this course and prepare
the question paper accordingly, using Bloom‟s Taxonomy (BT), in such a way that every
question be mapped to some or other CO and all the questions, put together, must be able to
achieve the mapping to all the CO(s), in balanced way.

LEARNING OBJECTIVES:
In this course, the learners will be able to develop expertise related to the following:
1. Students will develop relevant programming abilities.
2. Students will demonstrate proficiency with statistical analysis of data.
3. Conduct exploratory data analysis using visualization.
4. Craft visual presentations of data for effective communication.
PRE-REQUISITES:
1. Basics of Python Programming (BCA-206)
COURSE OUTCOMES(COs):
After completion of this course, the learners will be able to:-
CO# Detailed Statement of the CO *BT Mapping to PO #
Level
CO1 Illustrating the features of Multithreading in python. BTL2 PO1, PO2,
PO3, PO5
CO2 Analyzing data using suitable python library. BTL2 PO1, PO2,
PO3,PO7,
PO10
CO3 Visualizing data using Matplotib, Seaborn library. BTL3 PO1, PO2,
PO3,PO4
CO4 Develop python applications with database BTL3 PO1, PO2,
connectivity operations. PO3,PO4

UNIT–I
No. of Hours: 11 Chapter/Book Reference: TB1 [Chapters - 1, 2], TB2 [Chapters - 1, 2]

Analytics: Basic Nomenclature, Analytics Process Model, Analytics part in different profiles,
Analytical Model Requirements.
Data Sources for data collection, Sampling and Sampling distribution, Types of data elements,
Missing Values, Outlier Detection and Treatment, Standardization using Min/max and z-score,
categorization, Segmentation.
UNIT–II
No. of Hours: 11 Chapter/Book Reference: TB2 [Chapter - 3], TB3 [Chapter - 7]

Statistical Hypothesis Testing, p-Values, Confidence Intervals.


Bachelor of Computer Applications
Correlation, Simpson‟s Paradox, Some Other Correlational Caveats, Correlation and Causation,
Correlation Statistics-ANOVA.
UNIT–III
No. of Hours: 11 Chapter/Book Reference: TB3[Chapter - 3], TB4 [Chapter - 8]

Data Visualization: Graphs in Python: Line Graph, Bar charts, Pie-charts, Scatter plots, multiple
plots, Subplots, Legends, Changing figure Size, Styling plots using Matplotib Library. Functions like
relplot(), displot() and catplot ().
Seaborn Library: Introduction, Line plot, Dist plot, Lmplot, Count plot, Color palettes.

UNIT–IV
No. of Hours: 11 Chapter/Book Reference: TB5 [Chapter - 4], TB3 [Chapter - 7]

GUI Programming: Creating User-interface, GUI Widgets with Tkinter, Creating Layouts, Check
Box, Radio Buttons, List Box, Menus, Menus Options, Dialog Boxes
Database Access: Database Connectivity Operations: Create, lnsert, Select, Delete, Drop, Update.

TEXT BOOKS:
TB1. Analytics in a Big Data World, Essential Guide to Data Science and its Application, Bart
Baesens, Wiley Big Data Series.
TB2. Data Science & Big Data Analytics: Discovering, Analyzing, Visualizing and Presenting Data
Published by John Wiley & Sons, Inc
TB3. Data Science from Scratch, 2nd Edition by Joel Grus Publisher(s): O'Reilly Media, Inc
TB4. Agile tools for real world data: Python for Data Analysis by Wes McKinney, O‟Reilly
TB5. Python and Tkinter Programming JOHN E. GRAYSON

REFERENCE BOOKS:
RB1. Allen Downey, "Think Python: How to Think Like a Computer Scientist", O'Reilly, 2nd
Edition,2015.
RB2. ReemaThareja, "Python Programming using Problem Solving Approach", Oxford University
Press, 1" Edition, 2017. RB4. Joel Grus, "Data Science from Scratch", O'Reilly, 2no Edition ,2019.
RB3. Tony Gaddis, "starting out with Python", Pearson, 3'd Edition, 2014.
RB4. Y. Daniel Liang, "lntroduction to Programming Using Python", Pearson, 1" Edition, 201,3.
RB5. Programming in Python 3: A Complete Introduction to the Python Language (2nd Edition),
Mark Summerfield

List of Practicals

S.No. Detailed Statement Mapping to


CO#
Core Practicals
1. Write a program to create a DataFrame have E-commerce data and CO1,CO2,CO3
perform selection of row/column using loc() and iloc()
2. Create a Series object S5 containing numbers. Write a program to CO1, CO2, CO4
store the square of the series values in object S6. Display S6‟s
values which are >15.
3. Write a program to fill all missing values in a DataFrame with zero. CO1, CO2
4. Program for combining DataFrames using concat(), join(),merge() CO1, CO2
Bachelor of Computer Applications
5. Write a program to draw bar graph for the following data for the CO1, CO2,CO3
Medal tally of CWG-2018:-
Gold Silver Bronze Total
26 20 20 66

6. Implementing Line plot, Dist plot, Lmplot, Count plot using CO1, CO2,CO3
Seaborn library
Application Based Practicals (Implement minimum 5 out of 10 practicals)
7. Create a DataFrame namely aid that stores aid CO1, CO2,CO5
(Toys,books,uniform,shoes) by NGO‟s for different states. Write a
program to display the aid for:-
(a) Books and Uniforms only
(b) Shoes only
8. Create a DataFrame ndf having Name, Gender, Position, City, Age, CO1, CO2,CO5
Projects.
Write a program to summarize how many projects are being
handled by each position for each city?
Use pivot()
9. Marks is a list that stores marks of a student in 10 unit test. Write a CO1, CO2
program to plot Line chart for the student‟s performance in these
10 test.
10. Write a program to plot a horizontal bar chart from the height of CO1, CO2,CO3
some students.
11. CO1,
Write a program to implement ANNOVA.
CO2,CO3,CO5
12. Write a program to show correlation between two randomly CO1,
generated numbers . CO2,CO4,CO5
13. Write a program to implement Covariance. CO1, CO2, CO5

14. Create a GUI based form for admission purpose for your college CO1, CO2, CO3

15. The created GUI based application form is to connected to a CO1, CO2, CO5
database and use insert query to enter data.
Note:
1. In total 10 practicals to be implemented. 2 additional practical may be given by the
course instructor.
2. This is a suggestive list of programs. However, the instructor may add programs as per
the requirement of the course.
Bachelor of Computer Applications
Course Code: BCA 314 L T C
Course Name: Deep Learning with Python 4 1 5

INSTRUCTIONS TO PAPER SETTERS:


1. Question No. 1 should be compulsory and cover the entire syllabus. There should be 10
questions of short answer type of 2.5 marks each, having at least 2 questions from each unit.
2. Apart from Question No. 1, rest of the paper shall consist of four units as per the syllabus.
Every unit should have two questions to evaluate analytical/technical skills of candidate.
However, student may be asked to attempt only 1 question from each unit. Each question
should be of 12.5 marks, including its sub parts, if any.
3. Examiners are requested to go through the Course Outcomes(CO) of this course and
prepare the question paper accordingly, using Bloom‟s Taxonomy(BT), in such a way that
every question be mapped to some or other CO and all the questions, put together, must be
able to achieve the mapping to all the CO(s), in balanced way.
LEARNING OBJECTIVES:
In this course, the learners will be able to develop expertise related to the following:-
1. To present the mathematical, statistical and computational challenges of building neural networks
2. To study the concepts of deep learning and important deep learning techniques
3. To introduce important Deep Learning architectures
4. To enable the students to apply deep learning techniques to support real-life applications

PRE-REQUISITES:
Basics of Python Programming

COURSE OUTCOMES (COs):


After completion of this course, the learners will be able to:-
CO# Detailed Statement of the CO *BT Mapping to PO #
Level
CO1 Understand the basic concepts of Deep Learning and BTL2 PO1, PO2, PO6
differentiate between shallow learning and deep
learning.
CO2 Implement various Deep Learning Models. BTL3 PO2, PO3,
PO4,PO8
CO3 Understand different Deep Learning architectures BTL3 PO1, PO2,
and training algorithms. PO3,PO5, PO8
CO4 Understanding Dimensionality Reduction and BTL4 PO1, PO2,
optimization in Deep Learning. PO3,PO4
CO5 Understanding and implementing Recurrent Neural BTL3 PO1,PO2,PO3,
Network (RNN).27 PO8
CO6 Applying Deep Learning techniques in real life BTL6 PO2, PO3,PO4,
applications such as object detection and analysis. PO5, PO6,PO8
Bachelor of Computer Applications
UNIT-I
No. of Hours:11 Chapter/Book Reference: TB1 [Chapters - 1, 2], TB2 [Chapter - 2], TB3
[Chapters - 3, 5]

Introduction – Overview of Machine Learning, Introduction to Artificial Neural Network (ANN),


Perceptron, Training a Neural Network, Activation Functions, Loss Function, Hyperparameters,
Gradient Descent, Stochastic Gradient Descent, Backpropagation and regularization, Batch
normalization, Building an ANN in Python, Frameworks-TensorFlow, Keras.
UNIT-II
No. of Hours:12 Chapter/Book Reference: TB1 [Chapters - 3, 4, 5, 6], TB2 [Chapters - 3,4,5],
TB3[Chapters - 7, 8]

What is Deep Learning? Deep vs Shallow Networks, Convolution Neural Networks (CNN) –
Convolution Layers, Pooling Layer, Flattening, FullyConnected Layers, Softmax and Cross-
Entropy, Building a CNN in Python, Fully Connected CNN, CNN Architectures – LeNet, AlexNet,
ZFNet, GoogLeNet, VGGNet, ResNet, DenseNet, Training a Convnet: weights initialization, batch
normalization, hyperparameter optimization
UNIT-III
No. of Hours:11 Chapter/Book Reference: TB1 [Chapters - 3, 4, 7]

Deep Belief Networks, Auto Encoders, Concept of Dimensionality Reduction, Autoencoder,


Denoising Autoencoders, Deep Autoencoders, Concept of Reinforcement Learning
UNIT-IV
No. of Hours: 11 Chapter/Book Reference: TB2 [Chapter - 7]; TB3 [Chapter - 9]

Recurrent Neural Networks (RNN), LSTM, Sequence Prediction and Time Series Forecasting with
LSTM, Overview of Object Detection Techniques using Deep Learning, Overview of Transfer
Learning.

TEXT BOOKS:
TB1. Adam Gibson and Josh Patterson, Deep Learning: A Practitioner's Approach,
(O'Reilly).
TB2. Mohamed Elgendy, Deep Learning for Vision Systems, Manning Publications, ISBN:
9781617296192
TB3. Navin Kumar Manaswi, Deep Learning with Applications Using Python, Apress
(2018)

REFERENCE BOOKS:
RB1. Cosma Rohilla Shalizi, Advanced Data Analysis from an Elementary Point of View, 2015.
RB2. Deng & Yu, Deep Learning: Methods and Applications, Now Publishers, 2013.
RB3. Ian Goodfellow, Yoshua Bengio, Aaron Courville, Deep Learning, MIT Press, 2016.
RB4. Michael Nielsen, Neural Networks and Deep Learning, Determination Press, 2015.
RB5. Charu C. Aggarwal, Neural Networks and Deep Learning, Springer, 2018.
RB6. M. Arif Wani, Farooq Ahmad Bhat, Saduf Afzal, Asif Iqbal Khan, Advances in
Deep Learning, Springer, 2020.
List of Practical
Bachelor of Computer Applications
S.No. Detailed Statement Mapping to
CO#
1. Write a program for creating a perceptron. CO1

2. Write a program to implement multi-layer perceptron using CO1


TensorFlow. Apply multi-layer perceptron (MLP) on the Iris dataset.
3. (a) Write a program to implement a Convolution Neural Network CO5
(CNN) in Keras. Perform predictions using the trained Convolution
Neural Network (CNN).
(b) Write a program to build an Image Classifier with CIFAR-10
Data.
4. (a) Write a program to perform face detection using CNN. CO5
(b) Write a program to demonstrate hyperparameter tuning in CNN.
(c)Predicting Bike-Sharing Patterns – Build and train neural networks
from scratch to predict the number of bike share users on a given day.
5. Write a program to build auto-encoder in Keras. CO2, CO3

6. Write a program to implement basic reinforcement learning algorithm CO3


to teach a bot to reach its destination.
7. (a) Write a program to implement a Recurrent Neural Network CO5
(b) Write a program to implement LSTM and perform time series
analysis using LSTM.
8. (a) Write a program to perform object detection using Deep Learning CO2, CO4
(b) Dog-Breed Classifier – Design and train a convolutional neural
network to analyze images of dogs and correctly identify their breeds.
Use transfer learning and well-known architectures to improve this
model.
9. (a) Write a program to demonstrate different activation functions. CO2
(b) Write a program in TensorFlow to demonstrate different Loss
functions.
10. Write a program to build an Artificial Neural Network by CO5
implementing the Back propagation algorithm and test the same using
appropriate data sets
Note:
1. In total 10 practicals to be implemented. 2 additional practical may be given by the
course instructor.
2. This is a suggestive list of programs. However, the instructor may add programs as per
the requirement of the course.
Bachelor of Computer Applications
Course Code: BCA 316 L T C
Course Name: IT Act and Cyber Laws 4 1 5

INSTRUCTIONS TO PAPER SETTERS:


1. Question No. 1 should be compulsory and cover the entire syllabus. There should be 10
questions of short answer type of 2.5 marks each, having at least 2 questions from each unit.
2. Apart from Question No. 1, rest of the paper shall consist of four units as per the syllabus.
Every unit should have two questions to evaluate analytical/technical skills of candidate. However,
student may be asked to attempt only 1 question from each unit. Each question should be of 12.5
marks, including its subparts, if any.
3. Examiners are requested to go through the Course Outcomes (CO) of this course and prepare the
question paper accordingly, using Bloom‟s Taxonomy (BT), in such a way that every question be
mapped to some or other CO and all the questions, put together, must be able to achieve the
mapping to all the CO(s), in balanced way.

LEARNING OBJECTIVES:
In this course, the learners will be able to develop expertise related to the following:
1. Students will be able to have the basic clarity and understanding of cybercrimes and
cyber security laws
2. Students will be able to understand the need for cyber laws, will be able to describe and
differentiate between substantive, procedural, and preventive cybercrime laws.
3. To understand and critically assess national, regional, and international cybercrime laws.
4. To create awareness among the students about how crime being is committed in the
cyber world.

PRE-REQUISITES:
None

COURSE OUTCOMES (COs):


After completion of this course, the learners will be able to: -

CO # Detailed Statement of the CO *BT Mapping to PO #


Level
CO1 Define various Cyber laws in the world, BTL1 PO1, PO7
Classification of Cybercrime
CO2 Describe and explain the ways in which certain BTL2 PO3
cybercrimes are perpetrated.
CO3 Explain and use the objectives of national cyber BTL2 PO3, PO7
security strategies. BTL3
CO4 Discover IPR and E-commerce law. BTL4 PO2
CO5 Explain and Evaluate E-Commerce Issues and BTL5 PO3, PO4
provisions in Indian Law.
CO6 Design and create frameworks for international BTL6 PO4, PO6
cooperation on cyber security Matters.
Bachelor of Computer Applications
UNIT I

No. of Hours:14 Chapter/Book Reference: TB5 [Chapter - 1], RB2 [Chapters - 1, 2],
RB3 [Chapters - 1, 3]

Introduction to the Cyber World and Cyber Law: Cyber World: An Overview, The internet
and online resources, Introduction to Computer Crimes and Cyber Crimes, Distinction between
cybercrimes and conventional crimes, Reasons for commission of cyber-crime, Cyber forensic.
Classification of cyber-crimes: Cyber criminals and their objectives, Planning of attacks.
Types of cybercrimes: Cyber Stalking; Forgery and Fraud, Social engineering attacks, Phishing,
DoS and DDoS attacks, Identity Theft, Salami Attack, Net Extortion.
Introduction to Cyberspace: Cybercrime, Threats to the virtual world, Cyber Crimes & Social
Media attacks, Cyber Squatting, Cyber Espionage, Cyber Warfare, Cyber Terrorism, Cyber
Defamation, Crime related to IPRs, Computer Vandalism etc.
Access and Unauthorized Access, Data Security, E-Contracts and E-Forms

UNIT II
No. of Hours: 14 Chapter/Book Reference: TB1 [Chapter - 1], RB2 Chapter – 2]
Introduction to Cyber Law, Need for Cyber Law
Evolution of the IT Act, Genesis and Necessity - Salient features of the IT Act, 2000, Various
authorities under IT Act and their powers, Penalties & Offences, Amendments.
Impact on other related Acts (Amendments) - Amendments to Indian Penal Code, Indian Evidence
Act, Bankers Book Evidence Act, Reserve Bank of India Act - Cyberspace Jurisdiction.
Online Safety for all with special reference for women and children, Misuse of individual
information. Violation of privacy, Trafficking of Information and Data

UNIT-III
No. of Hours: 10 Chapter/Book Reference: TB1 [Chapter - 4], RB2 [Chapter -
7]

E–Commerce and Laws in India: Digital/Electronic Signature in Indian Laws, Digital Certificates,
Certifying Authority, E-Commerce Issues and provisions in Indian Laws, Concept of E-
Governance and its Implication in India, Issues related to E-Taxation in Cyberspace, E-Contracts
and its validity in India (f) Cyber Tribunal & Appellate Tribunal.

UNIT-IV
No. of Hours: 12 Chapter/Book Reference: TB1 [Chapter - 2], RB2 [Chapters - 4, 5]

Intellectual Property Rights - Domain Names and Trademark Disputes, Concept of Trademarks in
Internet Era, Cyber Squatting, Reverse Hijacking Jurisdiction in Trademark Disputes, Copyright in
the Digital Medium, Copyright in Computer Programmes.
Cyber Laws in India – Crime against Individual, Crime against Property, Crime against Nation,
Indian Case Laws, An introduction to International Cyber Laws
Bachelor of Computer Applications
TEXT BOOKS:

TB1. Cyber Laws and IT Protection: Harish Chandra, PHI Learning


TB2. Sharma J. P, & Kanojia S. (2016). Cyber Laws. New Delhi: Ane Books Pvt. Ltd.
TB3. Duggal, P. Cyber Laws. (2016) Universal Law Publishing.
TB4. Kamath, N. (2004). Law relating to computers, internet and e-commerce: A guide to
Cyber Laws and the Information Technology Act, 2000 with rules, regulations and
notifications (2nd ed.). Delhi: Universal Law Publishing Co.
TB5. Cyber security: Nina Godbole, Wiley Publication 2016

REFERENCE BOOKS:

RB1. Baase, S. (2013). A Gift of Fire: Social, Legal, and Ethical Issues for Computing
RB2. Cyber Law Simplifies: Vivek Sood, McGraw Hill Publication
RB3. Introduction to Cyber Security: Anand Shinde
RB4. Technology (4th ed.) Upper Saddle River, NJ: Pearson Education.
Bachelor of Computer Applications
Course Code: BCA-318 L T C
Course Name: Mobile Application Development 4 1 5

INSTRUCTIONS TO PAPER SETTERS:


1. Question No. 1 should be compulsory and cover the entire syllabus. There should be 10
questions of short answer type of 2.5 marks each, having at least 2 questions from each
unit.
2. Apart from Question No. 1, rest of the paper shall consist of four units as per the syllabus.
Every unit should have two questions to evaluate analytical/technical skills of candidate.
However, student may be asked to attempt only 1 question from each unit. Each question
should be of 12.5 marks, including its subparts, if any.
3. Examiners are requested to go through the Course Outcomes (CO) of this course and
prepare the question paper accordingly, using Bloom‟s Taxonomy (BT), in such a way that
every question be mapped to some or other CO and all the questions, put together, must be
able to achieve the mapping to all the CO(s), in balanced way.

LEARNING OBJECTIVES:
In this course, the learners will be able to develop expertise related to the following:-
1. Identify various concepts of mobile application programming that make it unique from
programming for other platforms.
2. To help learner to gain a basic understanding of Android application development.
3. Program mobile applications for the Android operating system that use basic and advanced
phone features, and deploy applications to the Android marketplace for distribution.

PRE-REQUISITES:
1. Java Programming
2. Programming fundamental

COURSE OUTCOMES (COs):


After completion of this course, the learners will be able to:-
CO # Detailed Statement of the CO *BT Mapping to PO #
Level
CO1 Recognize the concept of application development for BTL2 PO1, PO2,
mobile devices.
CO2 Understand the basic technologies used by the Android BTL2 PO1, PO2,
platform
CO3 Recognize and use Android Environment Emulator and BTL3 PO1, PO2, PO3,
Application life cycle PO4
CO4 Develop mobile applications for the Android operating BTL5 PO1, PO2, PO3,
system that use basic and advanced phone features PO4, PO7

CO5 Deploy applications to the Android marketplace for BTL6 PO1, PO2, PO3,
distribution PO4, PO11
Bachelor of Computer Applications
UNIT-I
No. of Hours: 11 Chapter/Book Reference: TB1 [Chapters - 1, 2], TB2 [Chapters - 2, 3]

Introduction: Brief history of mobile applications, Different types of mobile applications, Brief
history of Android, Introduction to Android Development Environment, Android Application
Design Essentials: Anatomy of an Android applications, Creating First Android Application,
Creating Android project , Project organization, Setting up real Android device , Setting up
Android emulator, Developing simple user interface , Running your first application
Android terminologies, Application Context, Activities, Services, Intents, Receiving and
Broadcasting Intents, Android Manifest File and its common settings, Using Intent Filter,
Permissions.
UNIT-II
No. of Hours: 11 Chapter/Book Reference: TB1 [Chapter - 3,4,5,6], TB2 [Chapters – 5, 6,
7]

User Interface in Android: Adaptive and responsive user interfaces, User Input Controls, Menus,
Screen Navigation, Recycler View, Drawables, Themes and Styles, Fragments Fragment Life
Cycle, Introduction to Material Design.
Android Application Components: App Widgets, Processes and Threads, User Interface
Components, Views and layouts, Input controls, Input Events, Settings, Dialogs, Menus,
Notifications, Toasts, Testing the user interface
UNIT – III
No. of Hours: 11 Chapter/Book Reference: TB1 [Chapters - 8, 9], TB2 [Chapter - 9]

Background tasks: AsyncTask, AsyncTaskLoader, Connecting App to Internet, Broadcast receivers,


Services, Notifications, Alarm managers.
Sensor, Location and Maps: Sensor Basic, Motion and Position Sensors, Location services, Google
maps API, Google Places API
UNIT- IV
No. of Hours: 11 Chapter/Book Reference: TB1[Chapters - 9, 10], TB2[Chapter - 10]

Working with data in Android: Shared Preferences, App Setting, SQLite primer, Store data using
SQLite database, Content Providers, Content Resolver, Loader
Publishing Your App: Preparing for publishing, Signing and preparing the graphics, publishing to
the Android Market
Using Common Android APIs: Using Android Data and Storage APIs, Managing data using
Sqlite, Sharing Data between Applications with Content Providers, Using Android Networking
APIs, Using android Web APIs, Using Android Telephony APIs, Deploying Android Application
to the World.

TEXT BOOKS:
TB1. Lauren Darcey and Shane Conder, “Android Wireless Application Development”, Pearson
Education, 2nd ed. (2011)
TB2. Wei-Meng Lee,” Beginning Android 4 Application Development”, Wiley India Pvt. Ltd.
TB3. J. F. DiMarzio, “Android: A Programmers Guide”, McGraw Hill Education (India) Private
Limited.
Bachelor of Computer Applications
REFERENCE BOOKS:
RB1. Paul Deitel “Android for Programmers: An App-Driven Approach” 1st Edition, Pearson
India.
RB2. Wei-Meng Lee, “Beginning Android Application Development”, Wiley Publishing

List of Practicals

Detailed Statement Mapping to CO#


Core Practicals (Implement minimum 8 out of 10 practicals)
1. Create "hello world" application to display "hello world" in the CO1
middle of the screen in the emulator as well as android phone

2. Create an android app to display various android lifecycle CO3


phases.
3. Create a calculator app that performs addition, subtraction, CO2
division and multilpication operation on numbers.

4. Write an Android application to convert into different CO4, CO5


currencies for example, Rupees to dollar

5. Write an android application to convert a ball from size of CO4, CO5


radius 2(colour red) to radius 4(colour blue) to radius 6 (colour
green). The ball must rotate in circle for 1 minute before
changing size and colour.

6. Write an application to mark the daily route of travel in map. CO4, CO5

7. Write an application to record video and audio on topic CO4, CO5


“Intent” and play the audio and video.

8. Create a spinner application with strings taken from resource CO4, CO5
directory res/values/strings.xml and on changing the spinner
value, image will change. Image is saved in the drawable
directory.

9. Create an app that uses radio button group which calculates CO3,CO4, CO5
discount on shopping bill amount. Use ediitext to enter bill
amount and select one of three radio buttons to determine a
discount for 10, 15, or 20 percent.the discount is calculated
upon selection of one of the buttons and displayed in a
textview control.
Bachelor of Computer Applications
10. Create an application that uses checkbox for construction of a CO4, CO5
shopping list so the user can check off items as they are picked
up. The checked items should be displayed in a textview
control.

11. Create a login application to verify username and password. CO2, CO4, CO5
On successful login, redirect to another activity that has a
textview to display "welcome user" with logout button. On
click of logout button, a dialog should appear with ok and
cancel buttons. On click of oK button, go back to the login
activity and on click of cancel button, stay on the same
activity.

12. Create an application to perform the operations of create, CO4, CO5


insert, delete, view and update, using sqlite database.

13. Create an application to pick up any image from the native CO4, CO5
application gallery and display it on the screen.

14. Read phonebook contacts using content providers and display CO2,CO4, CO5
in list.

15. Create an application to take picture using native application. CO2,CO4, CO5

Note:
1. In total 10 practicals to be implemented. 2 additional practical may be given by the
course instructor.
2. This is a suggestive list of programs. However, the instructor may add programs as per
the requirement of the course.
Bachelor of Computer Applications
Course Code: BCA 332 L T C
Course Name: Seminar/ Conference Presentation 0 0 2

OBJECTIVE:

Seminars/Conferences and Presentations provide a platform to the students, where they can learn
from what others are doing, learn about new things, ideas and important tips related to new
technologies. To foster the Innovations happening in upcoming technologies and harnessing the
entrepreneurial opportunities, Institutes must provide ample opportunities to the students to learn
and yield the advantages of new advancements in the field of technology. It is expected from a
student to learn latest in the industry and write an article related to it and present their findings in
front of a panel.
The following points need to considered while planning and evaluating the presentation
 The seminars must be conducted after every 15 days/ or a month. A minimum of 3-4
seminar sessions can be organized during the semester.
 A minimum of 7-8 slides must be there which would include the title slide. The first slide
should be the Introduction slide and the last one reference slide wherein all the links/books
references/paper reference to paper must be quoted. The rest of the slides should focus on
the technology, application areas etc.
 The title of the seminar must be related to the field of Information technology and must talk
about the latest innovation/technology like IOT, Machine learning, Deep learning, AI Cloud
computing, Mobility, Hand held devices, Social Computing, NOSQL Database, CRM,
Social CRM, Open Source Application Development Frameworks, Zero Trust Security
Framework/ Architecture, Big Data/ Data Lake, Emerging and Innovative Technologies,
Conversational AI, Sentiments Analysis, DevOps, Real time Analytics, Fraud Detection.
Proper approval must be taken before starting the work.
 Student‟s feedback must be taken after taking the seminar as to what learning they have
gathered after studying the topics. For this, a feedback form may be designed using Google
form utility.
Bachelor of Computer Applications

Course Code: BCA 372 L T C


Course Name: Practical-XII IOT Lab 0 4 2
LEARNING OBJECTIVES:
In this course, the learners will be able to develop expertise related to the following:
5. To learn and understand the concept of Internet of Things (IOT).
6. To study the constituent components of Internet of Things.
7. To design and develop IoT applications using different, Sensors/actuators.
8. To seek working knowledge of Arduino, Raspberry pi Boards and to develop cloud
based IOT projects.

PRE-REQUISITES:
3. Basic Programming Knowledge
4. Use of Internet

COURSE OUTCOMES (COs):


After completion of this course, the learners will be able to:-

CO# Detailed Statement of the CO *BT Mapping to PO #


Level
CO1 Understand the architecture and the functional blocks BTL2 PO1, PO2, PO3
of Internet of Things.
CO2 Explain the concepts of Internet of Things and gain BTL2 PO1, PO2, PO3,PO7,
knowledge to design IoT applications PO10
CO3 Demonstrate the process of capturing and analyzing BTL3 PO1, PO2, PO3,PO4
data in Internet of Things.
CO4 Examine the various components involved in IoT BTL4 PO1, PO2, PO3,PO4,PO7
design methodology.
CO5 Evaluate an IoT device to work with a Cloud BTL5 PO1,PO2,PO3,
Computing infrastructure. PO4,PO11
CO6 Implement IoT protocols for communication. BTL6 PO1,PO2, PO3,PO4,
PO6, PO7,PO8

List of Practicals
S.No. Detailed Statement Mapping to
CO #

1. Study and Install IDE of Arduino CO1,CO2

2. Write the steps to add libraries in Arduino and setup of Arduino IDE for CO2, CO3
programming.
Bachelor of Computer Applications
3. Write a Program using Arduino for Blink LED. CO2, CO3

4. Write a Program for monitoring Temperature using Arduino and LM35 CO2, CO3,
Temperature Sensors.
5. Write a Program for Controlling Raspberry Pi with WhatsApp.

6. Write a program to shows how to fade an LED on pin 9 using the CO3,CO4
analog Write( ) function.
7. Write the steps to add blynk libraries for NodeMCU and account on CO2,
IFTTT for home automation. CO3,CO4

8. Write a program of Fade LED using NodeMCU(ESP8266) and blynk CO2,


app CO3,CO4

9. Write a program for Arduino by using Ultrasonic sensors and servo CO2,
motor (HC-SR04), and make a smart dustbin. CO3,CO4

10. Write a program for controlling bulb on/off by using Blynk app. CO2,
CO3,CO4

Suggested IOT based Applications


1. Create home automation project for controlling electrical home appliances via Google
assistant or any other IOT based project may be undertaken.
2. Setting up Wireless Access Point using Raspberry Pi.
3. Fingerprint Sensor interfacing with Raspberry Pi
4. Raspberry Pi GPS Module Interfacing.
Visitor Monitoring with Raspberry Pi and Pi Camera

Note:
1. In total 10 practicals and one application to be implemented. 2 additional practical may
be given by the course instructor.
2. This is a suggestive list of programs. However, the instructor may add programs as per
the requirement of the course.
Bachelor of Computer Applications
Course Code: BCA 374 L T
C
Course Name: NSS/NCC/Cultural Clubs/Technical Society/Technical Club - - 2

NUES: Comprehensive evaluation of the students by the concerned coordinator of


NSS/NCC/Cultural Clubs/Technical Society/Technical Club, out of 100 as per the evaluation
scheme worked out by these activity societies, organizations at the institution/ university level; the
coordinators shall be responsible for the evaluation for the same. These activities shall start from
the first semester and the evaluation shall be conducted at the end of sixth semester for students
admitted in the first semester.
Bachelor of Computer Applications

Note on Examination of Elective Papers:

(a) Papers with only theory component shall have 25 marks continuous evaluations by the
teacher and 75 marks term-end examinations. Both these component marks shall be
reflected on the marksheet of the student.

(b) Papers with only practical component shall have 40 marks continuous evaluation by the
teacher and 60 marks term-end examinations. Both these component marks shall be
reflected on the marksheet of the student.

(c) Papers with both theory and practical components shall have 25 marks continuous
evaluation by the teacher and 25 marks term-end examinations for practical and 50
marks term end examination for the theory component. All three component marks
shall be reflected on the marksheet of the student.
Bachelor of Computer Applications
Important Instructions:

1. The examination, attendance criteria to appear in examination, promotion and award of the
degree shall be governed by the Ordinance 11 of the University. The term “major discipline” /
“primary discipline” in this document refers to the discipline in which student is
admitted/studies from 3rd semester onwards.
2. Minimum duration of the Bachelor of Computer Applications (BCA) programme shall be 3
years (N=4 years) (6 semesters).
3. Maximum duration of the Bachelor of Computer Application (BCA) programme shall be 5
years (N+2 years). After completion of N+2 years of study, if the student has appeared in the
papers of all the semester upto 6th semester, then a maximum extension of 1 year may be
given to the student for completing the requirements of the degree if and only if the number of
credits already earned by the student is atleast 120. Otherwise, the admission of the students
shall stand cancelled. After the period of allowed study, the admission of the student shall be
cancelled.
4. The MOOC courses may be taken through SWAYAM / NPTEL MOOCs platform. The
student desirous of doing a specific MOOC based course must seek approval of the APC of
the institution for the same before the commencement of the semester. The APC shall allow
the MOOC paper to the student if and only if the MOOC subject / course being considered for
the student is being offered in line with the Academic Calendar applicable. The student shall
submit the successful completion certificate with marks to the institution for onwards transfer
to the Examination Division. The Examination Divisions shall take these marks on record for
calculation of the SGPA/CGPA of the student concerned by the examination division of the
University. Though the result of the MOOC courses may be declared subsequently. The MOC
course credits shall bot be considered for calculation of the promotion criterion from one
academic year of study to the next academic year.
5. Maximum Credits: at least 162. The student has to appear in the examinations for these credits
in all componenents.
6. Minimum Credits: atleast 150.
7. To earn an Honours degree, the student may enroll for 20 credits or more through SWAYAM
/ NPTEL MOOCs platform. This point has to be read together with other points specially
point 8. The acquisition of the credits should be completed before the 15th of the July of the
Bachelor of Computer Applications
admission year plus 3 years. That is, if a student is admitted in the year X, then these credits
must be acquired through MOOCs by 15th July of the year (X+3), no extra duration or time
shall be allocated. Honours in the degree shall be awarded if and only if at least 20 credits are
acquired through MOOCs. To obtain Honours in the programme, the student must apply to
the institution about the same, before the commencement of the 2nd semester and about
registration for the MOOCs and the specific courses through MOOCs shall be registered by
the student only after approval by the Academic Programme Committee (APC) of the
Institution. The APC shall approve the course if it is not already studied by the student or the
student shall not study it in future andadds value to the major area of specialization (which is
the degree). The papers for which the student desires to appear for Honours through MOOCs,
all papers results shall be submitted by the student to the school for onwards transfer to
Examination Division of the University, to be taken on record of the University. The results of
these papers shall be a part of the records of the examinations of the students. The records
shall be submitted by the student to the school, then transferred to the Examination division,
shall be notified by the examinations division of the University, and a separate marksheet
shall be issued by the Examinations divisions. The cost of taking the MOOC course is to be
borne by the concerned student. Such courses shall be reflected as additional courses / papers
for the student. The “Honours” in the degree shall be awarded if and only if in addition to the
20 credits earned as specified the student has a CGPA of 7.5 or above.

If a student acquires less than 20 credits through MOOCs, following the mechanism specified,
then also the results of these papers shall be taken on record as specified above, though no
Honours degree shall be awarded. The papers through MOOCs for Honours degree shall not
be a part of the set of the papers over which the SGPA / CGPA of the student shall be
calculated.

The paper through MOOCs for Honours degree shall be additional papers studied by the
students and are to be taken into account only for award of Honours in the degree programme,
if 20 credits are earned through MOOCs as approved by APC, by a student. See Clause 8 also.
8. The following degree route can be taken by a student (also refer point 7):
Bachelor of Computer Applications
a. A degree with the nomenclature Bachelor of Computer Applications with minor
specialization in <Discipline Specific Elective Group Name> (Honours) shall be
awarded if the following conditions are satisfied:
i. The student has acquired 150 credits, to meet the minimum credit requirement.
ii. The student has acquired 20 credits from one Discipline Specific Elective Group.
Student must pass all the subjects of Discipline specific course for the award of
Bachelor of Computer Applications with Specializaiton.
iii. The honours in the degree shall be specified on the degree certificate if the student
fulfills the criteria at point 7 and also has a CGPA of 7.5 or above.

b. A degree with the nomenclature Bachelor of Computer Applications (Honours) shall


be awarded if and only if the following conditions are satisfied:
i. The student does not fulfil the criteria (a) above.
ii. The student has acquired 150 credits, to meet the minimum credit requirement.
iii. The honours in the degree shall be specified on the degree certificate if the student
fulfills the criteria at point 7 and also has a CGPA of 7.5 above.

c. A degree with the nomenclature Bachelor of Computer Applications with minor


specialization in <Discipline Specific Elective Group Name> shall be awarded if and
only if the following conditions are satisfied:
i. If the student does not fulfil the criteria at (a) and (b) above.
ii. The student has acquired 150 credits, to meet the minimum credit requirement.
iii. The student has acquired 20 credits from one Discipline Specific Elective Group.
Student must pass all the subjects of Discipline specific course for the award of
Bachelor of Computer Applications with Specialization.
d. A degree with the nomenclature Bachelor of Computer Applications shall be awarded
if and only if the following conditions are satisfied:
i. The student does not meet the criteria at (a), (b) and (c) above.
ii. The student has acquired 150 credits, to meet the minimum credit requirement.
9. Pass marks in every paper shall be 40.
10. Grading System shall be as per Ordinance 11 of the University.

You might also like